To see the other types of publications on this topic, follow the link: Micro-Architectural Attacks.

Journal articles on the topic 'Micro-Architectural Attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 22 journal articles for your research on the topic 'Micro-Architectural Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alam, Manaar, Sarani Bhattacharya, and Debdeep Mukhopadhyay. "Victims Can Be Saviors." ACM Journal on Emerging Technologies in Computing Systems 17, no. 2 (April 2021): 1–31. http://dx.doi.org/10.1145/3439189.

Full text
Abstract:
Micro-architectural side-channel attacks are major threats to the most mathematically sophisticated encryption algorithms. In spite of the fact that there exist several defense techniques, the overhead of implementing the countermeasures remains a matter of concern. A promising strategy is to develop online detection and prevention methods for these attacks. Though some recent studies have devised online prevention mechanisms for some categories of these attacks, still other classes remain undetected. Moreover, to detect these side-channel attacks with minimal False Positives is a challenging effort because of the similarity of their behavior with computationally intensive applications. This article presents a generalized machine learning--based multi-layer detection technique that targets these micro-architectural side-channel attacks, while not restricting its attention only on a single category of attacks. The proposed mechanism gathers low-level system information by profiling performance counter events using Linux perf tool and then applies machine learning techniques to analyze the data. A novel approach using time-series analysis of the data is implemented to find out the correlation of the execution trace of the attack process with the secret key of encryption, which helps in dealing with False-Positives and unknown attacks. This article also provides a detailed theoretical analysis of the detection mechanism of the proposed model along with its security analysis. The experimental results show that the proposed method is superior to the state-of-the-art reported techniques with high detection accuracy, low False Positives, and low implementation overhead while being able to detect before the completion of the attack.
APA, Harvard, Vancouver, ISO, and other styles
2

Polychronou, Nikolaos-Foivos, Pierre-Henri Thevenon, Maxime Puys, and Vincent Beroulle. "A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms." ACM Transactions on Design Automation of Electronic Systems 27, no. 1 (January 31, 2022): 1–35. http://dx.doi.org/10.1145/3471936.

Full text
Abstract:
With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these devices are increasingly used in daily life or industry. To reduce costs related to the time required to develop these devices, security features are usually not considered. This situation creates a major security concern. Many solutions have been proposed to protect IoT/IIoT against various attacks, most of which are based on attacks involving physical access. However, a new class of attacks has emerged targeting hardware vulnerabilities in the micro-architecture that do not require physical access. We present attacks based on micro-architectural hardware vulnerabilities and the side effects they produce in the system. In addition, we present security mechanisms that can be implemented to address some of these attacks. Most of the security mechanisms target a small set of attack vectors or a single specific attack vector. As many attack vectors exist, solutions must be found to protect against a wide variety of threats. This survey aims to inform designers about the side effects related to attacks and detection mechanisms that have been described in the literature. For this purpose, we present two tables listing and classifying the side effects and detection mechanisms based on the given criteria.
APA, Harvard, Vancouver, ISO, and other styles
3

Xiong, Wenjie, and Jakub Szefer. "Survey of Transient Execution Attacks and Their Mitigations." ACM Computing Surveys 54, no. 3 (June 2021): 1–36. http://dx.doi.org/10.1145/3442479.

Full text
Abstract:
Transient execution attacks, also known as speculative execution attacks, have drawn much interest in the last few years as they can cause critical data leakage. Since the first disclosure of Spectre and Meltdown attacks in January 2018, a number of new transient execution attack types have been demonstrated targeting different processors. A transient execution attack consists of two main components: transient execution itself and a covert channel that is used to actually exfiltrate the information.Transient execution is a result of the fundamental features of modern processors that are designed to boost performance and efficiency, while covert channels are unintended information leakage channels that result from temporal and spatial sharing of the micro-architectural components. Given the severity of the transient execution attacks, they have motivated computer architects in both industry and academia to rethink the design of the processors and to propose hardware defenses. To help understand the transient execution attacks, this survey summarizes the phases of the attacks and the security boundaries across which the information is leaked in different attacks.This survey further analyzes the causes of transient execution as well as the different types of covert channels and presents a taxonomy of the attacks based on the causes and types. This survey in addition presents metrics for comparing different aspects of the transient execution attacks and uses them to evaluate the feasibility of the different attacks. This survey especially considers both existing attacks and potential new attacks suggested by our analysis. This survey finishes by discussing different mitigations that have so far been proposed at the micro-architecture level and discusses their benefits and limitations.
APA, Harvard, Vancouver, ISO, and other styles
4

Sepúlveda, Johanna, Mathieu Gross, Andreas Zankl, and Georg Sigl. "Beyond Cache Attacks." ACM Transactions on Embedded Computing Systems 20, no. 2 (March 2021): 1–23. http://dx.doi.org/10.1145/3433653.

Full text
Abstract:
System-on-Chips (SoCs) are a key enabling technology for the Internet-of-Things (IoT), a hyper-connected world where on- and inter-chip communication is ubiquitous. SoCs usually integrate cryptographic hardware cores for confidentiality and authentication services. However, these components are prone to implementation attacks. During the operation of a cryptographic core, the secret key may passively be inferred through cache observations. Access-driven attacks exploiting these observations are therefore a vital threat to SoCs operating in IoT environments. Previous works have shown the feasibility of these attacks in the SoC context. Yet, the SoC communication structure can be used to further improve access-based cache attacks. The communication attacks are not as well-understood as other micro-architectural attacks. It is important to raise the awareness of SoC designers of such a threat. To this end, we present four contributions. First, we demonstrate an improved Prime+Probe attack on four different AES-128 implementations (original transformation tables,T0-Only,T2KB, and S-Box). As a novelty, this attack exploits the collisions of the bus-based SoC communication to further increase its efficiency. Second, we explore the impact of preloading on the efficiency of our communication-optimized attack. Third, we integrate three countermeasures (shuffling,mini-tables, andTime-Division Multiple Access (TDMA) bus arbitration) and evaluate their impact on the attack. Althoughshufflingandmini-tablescountermeasures were proposed in previous work, their application as countermeasures against the bus-based attack was not studied before. In addition, TDMA as a countermeasure for bus-based attacks is an original contribution of this work. Fourth, we further discuss the implications of our work in the SoC design and its perspective with the new cryptographic primitives proposed in the ongoing National Institute of Standard and Technology Lightweight Cryptography competition. The results show that our improved communication-optimized attack is efficient, speeding up full key recovery by up to 400 times when compared to the traditional Prime+Probe technique. Moreover, the protection techniques are feasible and effectively mitigate the proposed improved attack.
APA, Harvard, Vancouver, ISO, and other styles
5

Rebeiro, Chester, and Debdeep Mukhopadhyay. "Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation." IEEE Transactions on Computers 64, no. 3 (March 2015): 778–90. http://dx.doi.org/10.1109/tc.2013.212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zeitschner, Jannik, and Amir Moradi. "PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 3 (July 18, 2024): 342–76. http://dx.doi.org/10.46586/tches.v2024.i3.342-376.

Full text
Abstract:
Software solutions to address computational challenges are ubiquitous in our daily lives. One specific application area where software is often used is in embedded systems, which, like other digital electronic devices, are vulnerable to side-channel analysis attacks. Although masking is the most common countermeasure and provides a solid theoretical foundation for ensuring security, recent research has revealed a crucial gap between theoretical and real-world security. This shortcoming stems from the micro-architectural effects of the underlying micro-processor. Common security models used to formally verify masking schemes such as the d-probing model fully ignore the micro-architectural leakages that lead to a set of instructions that unintentionally recombine the shares. Manual generation of masked assembly code that remains secure in the presence of such micro-architectural recombinations often involves trial and error, and is non-trivial even for experts.Motivated by this, we present PoMMES, which enables inexperienced software developers to automatically compile masked functions written in a high-level programming language into assembly code, while preserving the theoretically proven security in practice. Compared to the state of the art, based on a general model for microarchitectural effects, our scheme allows the generation of practically secure masked software at arbitrary security orders for in-order processors. The major contribution of PoMMES is its micro-architecture aware register allocation algorithm, which is one of the crucial steps during the compilation process. In addition to simulation-based assessments that we conducted by open-source tools dedicated to evaluating masked software implementations, we confirm the effectiveness of the PoMMES-generated codes through experimental analysis. We present the result of power consumption based leakage assessments of several case studies running on a Cortex M0+ micro-controller, which is commonly deployed in industry.
APA, Harvard, Vancouver, ISO, and other styles
7

Busi, Matteo, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, and Frank Piessens. "Securing Interruptible Enclaved Execution on Small Microprocessors." ACM Transactions on Programming Languages and Systems 43, no. 3 (September 30, 2021): 1–77. http://dx.doi.org/10.1145/3470534.

Full text
Abstract:
Computer systems often provide hardware support for isolation mechanisms such as privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at least significantly weaken, the isolation that these mechanisms offer. Extending a processor with new architectural or micro-architectural features brings a risk of introducing new software-based side-channel attacks. This article studies the problem of extending a processor with new features without weakening the security of the isolation mechanisms that the processor offers. Our solution is heavily based on techniques from research on programming languages. More specifically, we propose to use the programming language concept of full abstraction as a general formal criterion for the security of a processor extension. We instantiate the proposed criterion to the concrete case of extending a microprocessor that supports enclaved execution with secure interruptibility. This is a very relevant instantiation, as several recent papers have shown that interruptibility of enclaves leads to a variety of software-based side-channel attacks. We propose a design for interruptible enclaves and prove that it satisfies our security criterion. We also implement the design on an open-source enclave-enabled microprocessor and evaluate the cost of our design in terms of performance and hardware size.
APA, Harvard, Vancouver, ISO, and other styles
8

Yu, Jiyong, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, and Christopher W. Fletcher. "Speculative taint tracking (STT)." Communications of the ACM 64, no. 12 (December 2021): 105–12. http://dx.doi.org/10.1145/3491201.

Full text
Abstract:
Speculative execution attacks present an enormous security threat, capable of reading arbitrary program data under malicious speculation, and later exfiltrating that data over microarchitectural covert channels. This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism to block these attacks. The main idea is that it is safe to execute and selectively forward the results of speculative instructions that read secrets, as long as we can prove that the forwarded results do not reach potential covert channels. The technical core of the paper is a new abstraction to help identify all micro-architectural covert channels, and an architecture to quickly identify when a covert channel is no longer a threat. We further conduct a detailed formal analysis on the scheme in a companion document. When evaluated on SPEC06 workloads, STT incurs 8.5% or 14.5% performance overhead relative to an insecure machine.
APA, Harvard, Vancouver, ISO, and other styles
9

Vu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon, and Karine Heydemann. "Reconciling optimization with secure compilation." Proceedings of the ACM on Programming Languages 5, OOPSLA (October 20, 2021): 1–30. http://dx.doi.org/10.1145/3485519.

Full text
Abstract:
Software protections against side-channel and physical attacks are essential to the development of secure applications. Such protections are meaningful at machine code or micro-architectural level, but they typically do not carry observable semantics at source level. This renders them susceptible to miscompilation, and security engineers embed input/output side-effects to prevent optimizing compilers from altering them. Yet these side-effects are error-prone and compiler-dependent. The current practice involves analyzing the generated machine code to make sure security or privacy properties are still enforced. These side-effects may also be too expensive in fine-grained protections such as control-flow integrity. We introduce observations of the program state that are intrinsic to the correct execution of security protections, along with means to specify and preserve observations across the compilation flow. Such observations complement the input/output semantics-preservation contract of compilers. We introduce an opacification mechanism to preserve and enforce a partial ordering of observations. This approach is compatible with a production compiler and does not incur any modification to its optimization passes. We validate the effectiveness and performance of our approach on a range of benchmarks, expressing the secure compilation of these applications in terms of observations to be made at specific program points.
APA, Harvard, Vancouver, ISO, and other styles
10

Alam, Manaar, Sarani Bhattacharya, Sayan Sinha, Chester Rebeiro, and Debdeep Mukhopadhyay. "IPA: an Instruction Profiling–Based Micro-architectural Side-Channel Attack on Block Ciphers." Journal of Hardware and Systems Security 3, no. 1 (December 12, 2018): 26–44. http://dx.doi.org/10.1007/s41635-018-0060-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Raut, Rahul, Vijaykumar Bidve, Pakiriswamy Sarasu, Kiran Shrimant Kakade, Ashfaq Shaikh, Shailesh Kediya, Santosh Borde, and Ganesh Pakle. "Transfer learning based leaf disease detection model using convolution neural network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (December 1, 2024): 1857. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1857-1865.

Full text
Abstract:
The plants are attacked from various micro-organisms, bacterial illnesses, and pests. The signs are normally identified via leaves, stem, or fruit inspection. Illnesses that generally appeared on vegetation are from leaves and causes big harm if not managed in the early ranges. To stop this huge harm and manipulate the unfold of disorder this work implements a software system. This research work customs deep neural network to gain knowledge of probable illnesses on leaves within the early phases so it can be stopped early. Deep neural network (DNN) used for image classification. This work mainly focuses a neural network model of leaves ailment detection. The commonly available plant leaves dataset is undertaken with a dataset having special training of disease detection. In this work VGG16, ResNet50, Inception V3 and Inception ResNetV2 architectural techniques are implemented to generate and compare the results. Results are compared on the factors like precision, accuracy, recall and F1-Score. The results lead to the conclusion, that the convolution neural network (CNN) is more impactful technique to perceive and predict plant diseases.
APA, Harvard, Vancouver, ISO, and other styles
12

Fiolhais, Luís, and Leonel Sousa. "Transient-Execution Attacks: a Computer Architect Perspective." ACM Computing Surveys, June 10, 2023. http://dx.doi.org/10.1145/3603619.

Full text
Abstract:
Computer architects employ a series of performance optimizations at the micro-architecture level. These optimizations are meant to be invisible to the programmer but they are implicitly programmed alongside the architectural state. Critically, the incorrect results of these optimizations are not scrubbed off the micro-architectural state. This side-effect may seem innocuous. However, through transient-execution, an attacker can leverage this knowledge to obtain information from the micro-architectural state and transmit the data to itself. Transient-Execution is a class of attacks that use the side-effects of executed instructions to leak data. Transient-Execution attacks are split into two categories: speculation-based (Spectre-type) and exception-based (Meltdown-type). A successful attack requires, first, access to the sensitive information, and, second, a transmission channel such that the data can be recovered. Therefore, this survey explains how an attacker can use the state from optimizations in the micro-architecture to access sensitive information from other programs running in the same device; and, once the information is obtained, it describes how the data can be encoded and transmitted in the micro-architectural state. Moreover, it introduces a taxonomy and analyzes defenses for such malicious attacks.
APA, Harvard, Vancouver, ISO, and other styles
13

Gao, Si, Ben Marshall, Dan Page, and Thinh Pham. "FENL: an ISE to mitigate analogue micro-architectural leakage." IACR Transactions on Cryptographic Hardware and Embedded Systems, March 2, 2020, 73–98. http://dx.doi.org/10.46586/tches.v2020.i2.73-98.

Full text
Abstract:
Ge et al. [GYH18] propose the augmented ISA (or aISA), a central tenet of which is the selective exposure of micro-architectural resources via a less opaque abstraction than normal. The aISA proposal is motivated by the need for control over such resources, for example to implement robust countermeasures against microarchitectural attacks. In this paper, we apply an aISA-style approach to challenges stemming from analogue micro-architectural leakage; examples include power-based Hamming weight and distance leakage from relatively fine-grained resources (e.g., pipeline registers), which are not exposed in, and so cannot be reliably controlled via, a normal ISA. Specifically, we design, implement, and evaluate an ISE named FENL: the ISE acts as a fence for leakage, preventing interaction between, and hence leakage from, instructions before and after it in program order. We demonstrate that the implementation and use of FENL has relatively low overhead, and represents an effective tool for systematically localising and reducing leakage.
APA, Harvard, Vancouver, ISO, and other styles
14

Rahul SHANDILYA and R.K. SHARMA. "ProTECT: A Programmable Threat Evaluation and Control Unit for Zero Trust Networks." International Journal of Computational and Experimental Science and Engineering 10, no. 4 (December 11, 2024). https://doi.org/10.22399/ijcesen.673.

Full text
Abstract:
As Zero Trust Architectures (ZTA) become increasingly adopted in enterprise networks, so it is essential to continuously monitor the security status of connected devices. Real-time threat monitoring within the devices that are connected to the network is necessary for this. It's challenging, especially in resource-constrained settings, to ensure continuous monitoring in current devices available in market. ProTECT (Programmable Threat Evaluation and Control Unit) addresses this challenge by providing a continuous real-time monitoring, non-tamperable, trust score for ZTA network connected devices. Trust score in security coprocessor segregated from device computing architecture has been determined employing real-time hardware monitoring of CPU micro-architectural signals. We examined ProTECT on an open-source RISC-V processor based architecture against ransomware, RoP & cache-based micro-architectural attacks. While illustrating area overheads, we implement framework on an AMD Virtex XC7V2000T FPGA Module.
APA, Harvard, Vancouver, ISO, and other styles
15

Gao, Si, Ben Marshall, Dan Page, and Elisabeth Oswald. "Share-slicing: Friend or Foe?" IACR Transactions on Cryptographic Hardware and Embedded Systems, November 19, 2019, 152–74. http://dx.doi.org/10.46586/tches.v2020.i1.152-174.

Full text
Abstract:
Masking is a well loved and widely deployed countermeasure against side channel attacks, in particular in software. Under certain assumptions (w.r.t. independence and noise level), masking provably prevents attacks up to a certain security order and leads to a predictable increase in the number of required leakages for successful attacks beyond this order. The noise level in typical processors where software masking is used may not be very high, thus low masking orders are not sufficient for real world security. Higher order masking however comes at a great cost, and therefore a number techniques have been published over the years that make such implementations more efficient via parallelisation in the form of bit or share slicing. We take two highly regarded schemes (ISW and Barthe et al.), and some corresponding open source implementations that make use of share slicing, and discuss their true security on an ARM Cortex-M0 and an ARM Cortex-M3 processor (both from the LPC series). We show that micro-architectural features of the M0 and M3 undermine the independence assumptions made in masking proofs and thus their theoretical guarantees do not translate into practice (even worse it seems unpredictable at which order leaks can be expected). Our results demonstrate how difficult it is to link theoretical security proofs to practical real-world security guarantees.
APA, Harvard, Vancouver, ISO, and other styles
16

Mahdion, Nima, and Elisabeth Oswald. "Efficiently Detecting Masking Flaws in Software Implementations." IACR Communications in Cryptology, October 7, 2024. http://dx.doi.org/10.62056/ab89ksdja.

Full text
Abstract:
Software implementations of cryptographic algorithms often use masking schemes as a countermeasure against side channel attacks. A number of recent results show clearly the challenge of implementing masking schemes in such a way, that (unforeseen) micro-architectural effects do not cause masking flaws that undermine the intended security goal of an implementation. So far, utilising a higher-order version of the non-specific (fixed-vs-random) input test of the Test Vector Leakage Assessment (TVLA) framework has been the best option to identify such flaws. The drawbacks of this method are both its significant computation cost, as well as its inability to pinpoint which interaction of masking shares leads to the flaw. In this paper we propose a novel version, the fixed-vs-random shares test, to tackle both drawbacks. We explain our method and show its application to three case studies, where each time it outperforms its conventional TVLA counterpart. The drawback of our method is that it requires control over the shares, which, we argue, is practically feasible in the context of in-house evaluation and testing for software implementations.
APA, Harvard, Vancouver, ISO, and other styles
17

Zeitschner, Jannik, Nicolai Müller, and Amir Moradi. "PROLEAD_SW." IACR Transactions on Cryptographic Hardware and Embedded Systems, June 9, 2023, 391–421. http://dx.doi.org/10.46586/tches.v2023.i3.391-421.

Full text
Abstract:
A decisive contribution to the all-embracing protection of cryptographic software, especially on embedded devices, is the protection against Side-Channel Analysis (SCA) attacks. Masking countermeasures can usually be integrated into the software during the design phase. In theory, this should provide reliable protection against such physical attacks. However, the correct application of masking is a non-trivial task that often causes even experts to make mistakes. In addition to human-caused errors, micro-architectural Central Processing Unit (CPU) effects can lead even a seemingly theoretically correct implementation to fail to satisfy the desired level of security in practice. This originates from different components of< the underlying CPU which complicates the tracing of leakage back to a particular source and hence avoids making general and device-independent statements about its security.PROLEAD has recently been presented at CHES 2022 and has originally been developed as a simulation-based tool to evaluate masked hardware designs. In this work, we adapt PROLEAD for the evaluation of masked software, and enable the transfer of the already known benefits of PROLEAD into the software world. These include (1) evaluation of larger designs compared to the state of the art, e.g. a full Advanced Encryption Standard (AES) masked implementation, and (2) formal verification under our new generic leakage model for CPUs. Concretely, we formalize leakages, observed across different CPU architectures, into a generic abstraction model that includes all these leakages and is therefore independent of a specific CPU design. Our resulting tool PROLEAD_SW allows to provide a formal statement on the security based on the derived generic model. As a concrete result, using PROLEAD_SW we evaluated the security of several publicly available masked software implementations in our new generic leakage model and reveal multiple vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
18

Chandrasekaran, Sanjeev Tannirkulam, Abraham Peedikayil Kuruvila, Kanad Basu, and Arindam Sanyal. "Real-Time Hardware Based Malware and Micro-architectural Attack Detection Utilizing CMOS Reservoir Computing." IEEE Transactions on Circuits and Systems II: Express Briefs, 2021, 1. http://dx.doi.org/10.1109/tcsii.2021.3102526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Fahmy, Abdelrhman, Eduardo Molina-Piernas, Javier Martínez-López, and Salvador Domínguez-Bella. "Salt weathering impact on Nero/Ramses II Temple at El-Ashmonein archaeological site (Hermopolis Magna), Egypt." Heritage Science 10, no. 1 (August 5, 2022). http://dx.doi.org/10.1186/s40494-022-00759-6.

Full text
Abstract:
AbstractNero’s Temple at El-Ashmonein archaeological site, in Minia (middle of Egypt), is considered one of the most important of all temples of Nero. This temple dates back to 1520 BC–1075 BC in the New Kingdom and was reused in the era of Nero (the Fifth Emperor of Rome). The temple construction materials are severely decayed from surrounding environmental impacts, especially contaminated water sources. The main objective of this paper is to identify the construction materials of Nero’s Temple and their decay by-products. To achieve them, X-ray diffraction, micro X-ray fluorescence spectrometry, and portable Raman spectroscopy were utilized to identify the compositions and alteration by-products/degradation compounds (mainly saline efflorescence and crusts) from the construction materials, such as limestone walls, and structural mortars of the temple. In addition, a polarizing microscope was used to identify the minerals inside the construction materials and reveal the alteration of the minerals because of decay. Digital microscopy and scanning electron microscopy with EDS were used to detect decayed materials' morphological features. Finally, results showed that the main decay factor is salt attack (chlorides, sulfates, phosphates, nitrates, carbonates, and bicarbonates) for all architectural and structural elements of the temple, which have been carried to the construction materials from various sources of contaminated water (canal, sewage, and agricultural water). Graphical Abstract
APA, Harvard, Vancouver, ISO, and other styles
20

Caluya, Gilbert. "The Architectural Nervous System." M/C Journal 10, no. 4 (August 1, 2007). http://dx.doi.org/10.5204/mcj.2689.

Full text
Abstract:
If the home is traditionally considered to be a space of safety associated with the warm and cosy feeling of the familial hearth, it is also continuously portrayed as a space under threat from the outside from which we must secure ourselves and our families. Securing the home entails a series of material, discursive and performative strategies, a host of precautionary measures aimed at regulating and ultimately producing security. When I was eleven my family returned home from the local fruit markets to find our house had been ransacked. Clothes were strewn across the floor, electrical appliances were missing and my parents’ collection of jewellery – wedding rings and heirlooms – had been stolen. Few things remained untouched and the very thought of someone else’s hands going through our personal belongings made our home feel tainted. My parents were understandably distraught. As Filipino immigrants to Australia the heirlooms were not only expensive assets from both sides of my family, but also signifiers of our homeland. Added to their despair was the fact that this was our first house – we had rented prior to that. During the police interviews, we discovered that our area, Sydney’s Western suburbs, was considered ‘high-risk’ and we were advised to install security. In their panic my parents began securing their home. Grills were installed on every window. Each external wooden door was reinforced by a metal security door. Movement detectors were installed at the front of the house, which were set to blind intruders with floodlights. Even if an intruder could enter the back through a window a metal grill security door was waiting between the backroom and the kitchen to stop them from getting to our bedrooms. In short, through a series of transformations our house was made into a residential fortress. Yet home security had its own dangers. A series of rules and regulations were drilled into me ‘in case of an emergency’: know where your keys are in case of a fire so that you can get out; remember the phone numbers for an emergency and the work numbers of your parents; never let a stranger into the house; and if you need to speak to a stranger only open the inside door but leave the security screen locked. Thus, for my Filipino-migrant family in the 1990s, a whole series of defensive behaviours and preventative strategies were produced and disseminated inside and around the home to regulate security risks. Such “local knowledges” were used to reinforce the architectural manifestations of security at the same time that they were a response to the invasion of security systems into our house that created a new set of potential dangers. This article highlights “the interplay of material and symbolic geographies of home” (Blunt and Varley 4), focusing on the relation between urban fears circulating around and within the home and the spatial practices used to negotiate such fears. In exploring home security systems it extends the exemplary analysis of home technologies already begun in Lynn Spigel’s reading of the ‘smart home’ (381-408). In a similar vein, David Morley’s analysis of mediated domesticity shows how communications technology has reconfigured the inside and outside to the extent that television actually challenges the physical boundary that “protects the privacy and solidarity of the home from the flux and threat of the outside world” (87). Television here serves as a passage in which the threat of the outside is reframed as news or entertainment for family viewing. I take this as a point of departure to consider the ways that this mediated fear unfolds in the technology of our homes. Following Brian Massumi, I read the home as “a node in a circulatory network of many dimensions (each corresponding to a technology of transmission)” (85). For Massumi, the home is an event-space at the crossroads of media technologies and political technologies. “In spite of the locks on the door, the event-space of the home must be seen as one characterized by a very loose regime of passage” (85). The ‘locked door’ is not only a boundary marker that defines the inside from the outside but another technology that leads us outside the home into other domains of inquiry: the proliferation of security technologies and the mundane, fearful intimacies of the home. In this context, we should heed Iris Marion Young’s injunction to feminist critics that the home does provide some positives including a sense of privacy and the space to build relationships and identities. Yet, as Colomina argues, the traditional domestic ideal “can only be produced by engaging the home in combat” (20). If, as Colomina’s comment suggests, ontological security is at least partially dependent on physical security, then this article explores the ontological effects of our home security systems. Houses at War: Targeting the Family As Beatriz Colomina reminds us, in times of war we leave our homelands to do battle on the front line, but battle lines are also being drawn in our homes. Drawing inspiration from Virilio’s claim that contemporary war takes place without fighting, Colomina’s article ‘Domesticity at War’ contemplates the domestic interior as a “battlefield” (15). The house, she writes, is “a mechanism within a war where the differences between defense [sic] and attack have become blurred” (17). According to the Home Security Precautions, New South Wales, October 1999 report conducted by the Australian Bureau of Statistics, 47% of NSW dwellings were ‘secure’ (meaning that they either had a burglar alarm, or all entry points were secured or they were inside a security block) while only 9% of NSW households had no home security devices present (Smith 3). In a similar report for Western Australia conducted in October 2004, an estimated 71% of WA households had window security of some sort (screens, locks or shutters) while 67% had deadlocks on at least one external door (4). An estimated 27% had a security alarm installed while almost half (49%) had sensor lights (Hubbard 4-5). This growing sense of insecurity means big business for those selling security products and services. By the end of June 1999, there were 1,714 businesses in Australia’s security services industry generating $1,395 million of income during 1998-99 financial year (McLennan 3; see also Macken). This survey did not include locksmith services or the companies dealing with alarm manufacturing, wholesaling or installing. While Colomina’s article focuses on the “war with weather” and the attempts to control environmental conditions inside the home through what she calls “counterdomesticity” (20), her conceptualisation of the house as a “military weapon” (17) provides a useful tool for thinking the relation between the home, architecture and security. Conceiving of the house as a military weapon might seem like a stretch, but we should recall that the rhetoric of war has already leaked into the everyday. One hears of the ‘war on drugs’ and the ‘war on crime’ in the media. ‘War’ is the everyday condition of our urban jungles (see also Diken and Lausten) and in order to survive, let alone feel secure, one must be able to defend one’s family and home. Take, for example, Signal Security’s website. One finds a panel on the left-hand side of the screen to all webpages devoted to “Residential Products”. Two circular images are used in the panel with one photograph overlapping the other. In the top circle, a white nuclear family (stereotypical mum, dad and two kids), dressed in pristine white clothing bare their white teeth to the internet surfer. Underneath this photo is another photograph in which an arm clad in a black leather jacket emerges through a smashed window. In the foreground a black-gloved hand manipulates a lock, while a black balaclava masks an unrecognisable face through the broken glass. The effect of their proximity produces a violent juxtaposition in which the burglar visually intrudes on the family’s domestic bliss. The panel stages a struggle between white and black, good and bad, family and individual, security and insecurity, recognisability and unidentifiability. It thus codifies the loving, knowable family as the domestic space of security against the selfish, unidentifiable intruder (presumed not to have a family) as the primary reason for insecurity in the family home – and no doubt to inspire the consumption of security products. Advertisements of security products thus articulate the family home as a fragile innocence constantly vulnerable from the outside. From a feminist perspective, this image of the family goes against the findings of the National Homicide Monitoring Program, which shows that 57% of the women killed in Australia between 2004 and 2005 were killed by an intimate partner while 17% were killed by a family member (Mouzos and Houliaras 20). If, on the one hand, the family home is targeted by criminals, on the other, it has emerged as a primary site for security advertising eager to exploit the growing sense of insecurity – the family as a target market. The military concepts of ‘target’ and ‘targeting’ have shifted into the benign discourse of strategic advertising. As Dora Epstein writes, “We arm our buildings to arm ourselves from the intrusion of a public fluidity, and thus our buildings, our architectures of fortification, send a very clear message: ‘avoid this place or protect yourself’” (1997: 139). Epstein’s reference to ‘architectures of fortification’ reminds us that the desire to create security through the built environment has a long history. Nan Ellin has argued that fear’s physical manifestation can be found in the formation of towns from antiquity to the Renaissance. In this sense, towns and cities are always already a response to the fear of foreign invaders (Ellin 13; see also Diken and Lausten 291). This fear of the outsider is most obviously manifested in the creation of physical walls. Yet fortification is also an effect of spatial allusions produced by the configuration of space, as exemplified in Fiske, Hodge and Turner’s semiotic reading of a suburban Australian display home without a fence. While the lack of a fence might suggest openness, they suggest that the manicured lawn is flat so “that eyes can pass easily over it – and smooth – so that feet will not presume to” (30). Since the front garden is best viewed from the street it is clearly a message for the outside, but it also signifies “private property” (30). Space is both organised and lived, in such a way that it becomes a medium of communication to passers-by and would-be intruders. What emerges in this semiotic reading is a way of thinking about space as defensible, as organised in a way that space can begin to defend itself. The Problematic of Defensible Space The incorporation of military architecture into civil architecture is most evident in home security. By security I mean the material systems (from locks to electronic alarms) and precautionary practices (locking the door) used to protect spaces, both of which are enabled by a way of imagining space in terms of risk and vulnerability. I read Oscar Newman’s 1972 Defensible Space as outlining the problematic of spatial security. Indeed, it was around that period that the problematic of crime prevention through urban design received increasing attention in Western architectural discourse (see Jeffery). Newman’s book examines how spaces can be used to reinforce human control over residential environments, producing what he calls ‘defensible space.’ In Newman’s definition, defensible space is a model for residential environments which inhibits crime by creating the physical expression of a social fabric that defends itself. All the different elements which combine to make a defensible space have a common goal – an environment in which latent territoriality and sense of community in the inhabitants can be translated into responsibility for ensuring a safe, productive, and well-maintained living space (3). Through clever design space begins to defend itself. I read Newman’s book as presenting the contemporary problematic of spatialised security: how to structure space so as to increase control; how to organise architecture so as to foster territorialism; how to encourage territorial control through amplifying surveillance. The production of defensible space entails moving away from what he calls the ‘compositional approach’ to architecture, which sees buildings as separate from their environments, and the ‘organic approach’ to architecture, in which the building and its grounds are organically interrelated (Newman 60). In this approach Newman proposes a number of changes to space: firstly, spaces need to be multiplied (one no longer has a simple public/private binary, but also semi-private and semi-public spaces); secondly, these spaces must be hierarchised (moving from public to semi-public to semi-private to private); thirdly, within this hierarchy spaces can also be striated using symbolic or material boundaries between the different types of spaces. Furthermore, spaces must be designed to increase surveillance: use smaller corridors serving smaller sets of families (69-71); incorporate amenities in “defined zones of influence” (70); use L-shaped buildings as opposed to rectangles (84); use windows on the sides of buildings to reveal the fire escape from outside (90). As he puts it, the subdivision of housing projects into “small, recognisable and comprehensible-at-a-glance enclaves is a further contributor to improving the visual surveillance mechanism” (1000). Finally, Newman lays out the principle of spatial juxtaposition: consider the building/street interface (positioning of doors and windows to maximise surveillance); consider building/building interface (e.g. build residential apartments next to ‘safer’ commercial, industrial, institutional and entertainment facilities) (109-12). In short, Newman’s book effectively redefines residential space in terms of territorial zones of control. Such zones of influence are the products of the interaction between architectural forms and environment, which are not reducible to the intent of the architect (68). Thus, in attempting to respond to the exigencies of the moment – the problem of urban crime, the cost of housing – Newman maps out residential space in what Foucault might have called a ‘micro-physics of power’. During the mid-1970s through to the 1980s a number of publications aimed at the average householder are printed in the UK and Australia. Apart from trade publishing (Bunting), The UK Design Council released two small publications (Barty, White and Burall; Design Council) while in Australia the Department of Housing and Construction released a home safety publication, which contained a small section on security, and the Australian Institute of Criminology published a small volume entitled Designing out Crime: Crime prevention through environmental design (Geason and Wilson). While Newman emphasised the responsibility of architects and urban planners, in these publications the general concerns of defensible space are relocated in the ‘average homeowner’. Citing crime statistics on burglary and vandalism, these publications incite their readers to take action, turning the homeowner into a citizen-soldier. The householder, whether he likes it or not, is already in a struggle. The urban jungle must be understood in terms of “the principles of warfare” (Bunting 7), in which everyday homes become bodies needing protection through suitable architectural armour. Through a series of maps and drawings and statistics, the average residential home is transformed into a series of points of vulnerability. Home space is re-inscribed as a series of points of entry/access and lines of sight. Simultaneously, through lists of ‘dos and don’ts’ a set of precautionary behaviours is inculcated into the readers. Principles of security begin codifying the home space, disciplining the spatial practices of the intimate, regulating the access and mobility of the family and guests. The Architectural Nervous System Nowadays we see a wild, almost excessive, proliferation of security products available to the ‘security conscious homeowner’. We are no longer simply dealing with security devices designed to block – such as locks, bolts and fasteners. The electronic revolution has aided the production of security devices that are increasingly more specialised and more difficult to manipulate, which paradoxically makes it more difficult for the security consumer to understand. Detection systems now include continuous wiring, knock-out bars, vibration detectors, breaking glass detectors, pressure mats, underground pressure detectors and fibre optic signalling. Audible alarm systems have been upgraded to wire-free intruder alarms, visual alarms, telephone warning devices, access control and closed circuit television and are supported by uninterruptible power supplies and control panels (see Chartered Institution of Building Service Engineers 19-39). The whole house is literally re-routed as a series of relays in an electronic grid. If the house as a security risk is defined in terms of points of vulnerability, alarm systems take these points as potential points of contact. Relays running through floors, doors and windows can be triggered by pressure, sound or dislocation. We see a proliferation of sensors: switching sensors, infra-red sensors, ultrasonic sensors, microwave radar sensors, microwave fence sensors and microphonic sensors (see Walker). The increasing diversification of security products attests to the sheer scale of these architectural/engineering changes to our everyday architecture. In our fear of crime we have produced increasingly more complex security products for the home, thus complexifying the spaces we somehow inherently feel should be ‘simple’. I suggest that whereas previous devices merely reinforced certain architectural or engineering aspects of the home, contemporary security products actually constitute the home as a feeling, architectural body capable of being affected. This recalls notions of a sensuous architecture and bodily metaphors within architectural discourse (see Thomsen; Puglini). It is not simply our fears that lead us to secure our homes through technology, but through our fears we come to invest our housing architecture with a nervous system capable of fearing for itself. Our eyes and ears become detection systems while our screams are echoed in building alarms. Body organs are deterritorialised from the human body and reterritorialised on contemporary residential architecture, while our senses are extended through modern security technologies. The vulnerable body of the family home has become a feeling body conscious of its own vulnerability. It is less about the physical expression of fear, as Nan Ellin has put it, than about how building materialities become capable of fearing for themselves. What we have now are residential houses that are capable of being more fully mobilised in this urban war. Family homes become bodies that scan the darkness for the slightest movements, bodies that scream at the slightest possibility of danger. They are bodies that whisper to each other: a house can recognise an intrusion and relay a warning to a security station, informing security personnel without the occupants of that house knowing. They are the newly produced victims of an urban war. Our homes are the event-spaces in which mediated fear unfolds into an architectural nervous system. If media plug our homes into one set of relations between ideologies, representations and fear, then the architectural nervous system plugs that back into a different set of relations between capital, fear and the electronic grid. The home is less an endpoint of broadcast media than a node in an electronic network, a larger nervous system that encompasses the globe. It is a network that plugs architectural nervous systems into city electronic grids into mediated subjectivities into military technologies and back again, allowing fear to be disseminated and extended, replayed and spliced into the most banal aspects of our domestic lives. References Barty, Euan, David White, and Paul Burall. Safety and Security in the Home. London: The Design Council, 1980. Blunt, Alison, and Ann Varley. “Introduction: Geographies of Home.” Cultural Geographies 11.1 (2004): 3-6. Bunting, James. The Protection of Property against Crime. Folkestone: Bailey Brothers & Sinfen, 1975. Chartered Institution of Building Service Engineers. Security Engineering. London: CIBSE, 1991. Colomina, Beatriz. “Domesticity at War.” Assemblage 16 (1991): 14-41. Department of Housing and Construction. Safety in and around the Home. Canberra: Australian Government Publishing Service, 1981. Design Council. The Design Centre Guide to Domestic Safety and Security. London: Design Council, 1976. Diken, Bülent, and Carsten Bagge Lausten. “Zones of Indistinction: Security and Terror, and Bare Life.” Space and Culture 5.3 (2002): 290-307. Ellin, Nan. “Shelter from the Storm or Form Follows Fear and Vice Versa.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Epstein, Dora. “Abject Terror: A Story of Fear, Sex, and Architecture.” Architecture of Fear. Ed. Nan Ellin. New York: Princeton Architectural Press, 1997. Fiske, John, Bob Hodge, and Graeme Turner. Myths of Oz: Reading Australian Popular Culture. Sydney: Allen & Unwin, 1987. Geason, Susan, and Paul Wilson. Designing Out Crime: Crime Prevention through Environmental Design. Canberra: Australian Institute of Criminology, 1989. Hubbard, Alan. Home Safety and Security, Western Australia. Canberra: Australian Bureau of Statistics, 2005. Jeffery, C. Ray. Crime Prevention through Environmental Design. Beverley Hills: Sage, 1971. Macken, Julie. “Why Aren’t We Happier?” Australian Financial Review 26 Nov. 1999: 26. Mallory, Keith, and Arvid Ottar. Architecture of Aggression: A History of Military Architecture in North West Europe, 1900-1945. Hampshire: Architectural Press, 1973. Massumi, Brian. Parables of the Virtual: Movement, Affect, Sensation. Durham: Duke University Press, 2002. McLennan, W. Security Services, Australia, 1998-99. Canberra: Australian Bureau of Statistics, 2000. Morley, David. Home Territories: Media, Mobility and Identity. London and New York: Routledge, 2000. Mouzos, Jenny, and Tina Houliaras. Homicide in Australia: 2004-05 National Homicide Monitoring Program (NHMP) Annual Report. Research and Public Policy Series 72. Canberra: Australian Institute of Criminology, 2006. Newman, Oscar. Defensible Space: Crime Prevention through Urban Design. New York: Collier, 1973. Puglini, Luigi. HyperArchitecture: Space in the Electronic Age. Basel: Bikhäuser, 1999. Signal Security. 13 January 2007 http://www.signalsecurity.com.au/securitysystems.htm>. Smith, Geoff. Home Security Precautions, New South Wales, October 1999. Canberra: Australian Bureau of Statistics, 2000. Spigel, Lynn. Welcome to the Dreamhouse: Popular Media and Postwar Suburbs. Durham and London: Duke University Press, 2001. Thomsen, Christian W. Sensuous Architecture: The Art of Erotic Building. Munich and New York: Prestel, 1998. Walker, Philip. Electronic Security Systems: Better Ways to Crime Prevention. London: Butterworths, 1983. Young, Iris Marion. “House and Home: Feminist Variations on a Theme.” Feminist Interpretations of Martin Heidegger. Eds. Nancy J. Holland and Patricia Huntington. University Park, Pennsylvania: Pennsylvania State UP, 2001. Citation reference for this article MLA Style Caluya, Gilbert. "The Architectural Nervous System: Home, Fear, Insecurity." M/C Journal 10.4 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0708/05-caluya.php>. APA Style Caluya, G. (Aug. 2007) "The Architectural Nervous System: Home, Fear, Insecurity," M/C Journal, 10(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0708/05-caluya.php>.
APA, Harvard, Vancouver, ISO, and other styles
21

Adey, Peter. "Holding Still: The Private Life of an Air Raid." M/C Journal 12, no. 1 (January 19, 2009). http://dx.doi.org/10.5204/mcj.112.

Full text
Abstract:
In PilsenTwenty-six Station Road,She climbed to the third floorUp stairs which were all that was leftOf the whole house,She opened her doorFull on to the sky,Stood gaping over the edge.For this was the placeThe world ended.Thenshe locked up carefullylest someone stealSiriusor Aldebaranfrom her kitchen,went back downstairsand settled herselfto waitfor the house to rise againand for her husband to rise from the ashesand for her children’s hands and feet to be stuck back in placeIn the morning they found herstill as stone, sparrows pecking her hands.Five Minutes after the Air Raidby Miroslav Holub(Calder 287) Holding Still Detonation. Affect. During the Second World War, London and other European cities were subjected to the terrors of aerial bombardment, rendered through nightmarish anticipations of the bomber (Gollin 7) and the material storm of the real air-raid. The fall of bombs plagued cities and their citizens with the terrible rain of explosives and incendiary weapons. A volatile landscape was formed as the urban environment was ‘unmade’ and urged into violent motion. Flying projectiles of shrapnel, debris and people; avalanches of collapsing factories and houses; the inhale and exhale of compressed air and firestorms; the scream of the explosion. All these composed an incredibly fluid urban traumatic, as atmospheres fell over the cities that was thick with smoke, dust, and ventilated only by terror (see for instance Sebald 10 and Mendieta’s 3 recent commentary). Vast craters were imprinted onto the charred morphologies of London and Berlin as well as Coventry, Hamburg and Dresden. Just as the punctuations of the bombing saw the psychic as well as the material give way, writers portraying Britain as an ‘volcano island’ (Spaight 5) witnessed eruptive projections – the volleys of the material air-war; the emotional signature of charged and bitter reprisals; pain, anguish and vengeance - counter-strikes of affect. In the midst of all of this molten violence and emotion it seems impossible that a simultaneous sense of quiescence could be at all possible. More than mere physical fixity or geographical stasis, a rather different sort of experience could take place. Preceding, during and following the excessive mobilisation of an air raid, ‘stillness’ was often used to describe certain plateuing stretches of time-space which were slowed and even stopped (Anderson 740). Between the eruptions appeared hollows of calm and even boredom. People’s nervous flinching under the reverberation of high-explosive blasts formed part of what Jordan Crandall might call a ‘bodily-inclination’ position. Slackened and taut feelings condensed around people listening out for the oncoming bomber. People found that they prepared for the dreadful wail of the siren, or relaxed in the aftermath of the attack. In these instances, states of tension and apprehension as well as calm and relief formed though stillness. The peculiar experiences of ‘stillness’ articulated in these events open out, I suggest, distinctive ways-of-being which undo our assumptions of perpetually fluid subjectivities and the primacy of the ‘body in motion’ even within the context of unparalleled movement and uncertainty (see Harrison 423 and also Rose and Wylie 477 for theoretical critique). The sorts of “musics of stillness and silence able to be discovered in a world of movement” (Thrift, Still 50), add to our understandings of the material geographies of war and terror (see for instance Graham 63; Gregory and Pred 3), whilst they gesture towards complex material-affective experiences of bodies and spaces. Stillness in this sense, denotes apprehending and anticipating spaces and events in ways that sees the body enveloped within the movement of the environment around it; bobbing along intensities that course their way through it; positioned towards pasts and futures that make themselves felt, and becoming capable of intense forms of experience and thought. These examples illustrate not a shutting down of the body to an inwardly focused position – albeit composed by complex relations and connections – but bodies finely attuned to their exteriors (see Bissell, Animating 277 and Conradson 33). In this paper I draw from a range of oral and written testimony archived at the Imperial War Museum and the Mass Observation wartime regular reports. Edited publications from these collections were also consulted. Detailing the experience of aerial bombing during the Blitz, particularly on London between September 1940 to May 1941, forms part of a wider project concerning the calculative and affective dimensions of the aeroplane’s relationship with the human body, especially through the spaces it has worked to construct (infrastructures such as airports) and destroy. While appearing extraordinary, the examples I use are actually fairly typical of the patternings of experience and the depth and clarity with which they are told. They could be taken to be representative of the population as a whole or coincidentally similar testimonials. Either way, they are couched within a specific cultural historical context of urgency, threat and unparalleled violence.Anticipations The complex material geographies of an air raid reveal the ecological interdependencies of populations and their often urban environments and metabolisms (Coward 419; Davis 3; Graham 63; Gregory The Colonial 19; Hewitt Place 257). Aerial warfare was an address of populations conceived at the register of their bio-rhythmical and metabolic relationship to their milieu (Adey). The Blitz and the subsequent Allied bombing campaign constituted Churchill’s ‘great experiment’ for governments attempting to assess the damage an air raid could inflict upon a population’s nerves and morale (Brittain 77; Gregory In Another 88). An anxious and uncertain landscape constructed before the war, perpetuated by public officials, commentators and members of parliament, saw background affects (Ngai 5) of urgency creating an atmosphere that pressurised and squeezed the population to prepare for the ‘gathering storm’. Attacks upon the atmosphere itself had been readily predicted in the form of threatening gas attacks ready to poison the medium upon which human and animal life depended (Haldane 111; Sloterdijk 41-57). One of the most talked of moments of the Blitz is not necessarily the action but the times of stillness that preceded it. Before and in-between an air raid stillness appears to describe a state rendered somewhere between the lulls and silences of the action and the warnings and the anticipatory feelings of what might happen. In the awaiting bodies, the materialites of silence could be felt as a kind-of-sound and as an atmospheric sense of imminence. At the onset of the first air-raids sound became a signifier of what was on the way (MO 408). Waiting – as both practice and sensation – imparted considerable inertia that went back and forth through time (Jeffrey 956; Massumi, Parables 3). For Geographer Kenneth Hewitt, sound “told of the coming raiders, the nearness of bombs, the plight of loved ones” (When the 16). The enormous social survey of Mass Observation concluded that “fear seems to be linked above all with noise” (original emphasis). As one report found, “It is the siren or the whistle or the explosion or the drone – these are the things that terrify. Fear seems to come to us most of all through our sense of hearing” (MO 378). Yet the power of the siren came not only from its capacity to propagate sound and to alert, but the warning held in its voice of ‘keeping silent’. “Prefacing in a dire prolepsis the post-apocalyptic event before the event”, as Bishop and Phillips (97) put it, the stillness of silence was incredibly virtual in its affects, disclosing - in its lack of life – the lives that would be later taken. Devastation was expected and rehearsed by civilians. Stillness formed a space and body ready to spring into movement – an ‘imminent mobility’ as John Armitage (204) has described it. Perched on the edge of devastation, space-times were felt through a sense of impending doom. Fatalistic yet composed expectations of a bomb heading straight down pervaded the thoughts and feelings of shelter dwellers (MO 253; MO 217). Waves of sound disrupted fragile tempers as they passed through the waiting bodies in the physical language of tensed muscles and gritted teeth (Gaskin 36). Silence helped form bodies inclined-to-attention, particularly sensitive to aural disturbances and vibrations from all around. Walls, floors and objects carried an urban bass-line of warning (Goodman). Stillness was forged through a body readied in advance of the violence these materialities signified. A calm and composed body was not necessarily an immobile body. Civilians who had prepared for the attacks were ready to snap into action - to dutifully wear their gas-mask or escape to shelter. ‘Backgrounds of expectation’ (Thrift, Still 36) were forged through non-too-subtle procedural and sequential movements which opened-out new modes of thinking and feeling. Folding one’s clothes and placing them on the dresser in-readiness; pillows and sheets prepared for a spell in the shelter, these were some of many orderly examples (IWM 14595). In the event of a gas attack air raid precautions instructions advised how to put on a gas mask (ARPD 90-92),i) Hold the breath. ii) Remove headgear and place between the knees. iii) Lift the flap of the haversack [ …] iv) Bring the face-piece towards the face’[…](v) Breathe out and continue to breathe in a normal manner The rational technologies of drill, dressage and operational research enabled poise in the face of an eventual air-raid. Through this ‘logistical-life’ (Reid 17), thought was directed towards simple tasks by minutely described instructions. Stilled LifeThe end of stillness was usually marked by a reactionary ‘flinch’, ‘start’ or ‘jump’. Such reactionary ‘urgent analogs’ (Ngai 94; Tomkins 96) often occurred as a response to sounds and movements that merely broke the tension rather than accurately mimicking an air raid. These atmospheres were brittle and easily disrupted. Cars back-firing and changing gear were often complained about (MO 371), just as bringing people out of the quiescence of sleep was a common effect of air-raids (Kraftl and Horton 509). Disorientation was usually fostered in this process while people found it very difficult to carry out the most simple of tasks. Putting one’s clothes on or even making their way out of the bedroom door became enormously problematic. Sirens awoke a ‘conditioned reflex’ to take cover (MO 364). Long periods of sleep deprivation brought on considerable fatigue and anxiety. ‘Sleep we Must’ wrote journalist Ritchie Calder (252) noticing the invigorating powers of sleep for both urban morale and the bare existence of survival. For other more traumatized members of the population, psychological studies found that the sustained concentration of shelling caused what was named ‘apathy-retreat’ (Harrisson, Living 65). This extreme form of acquiescence saw especially susceptible and vulnerable civilians suffer an overwhelming urge to sleep and to be cared-for ‘as if chronically ill’ (Janis 90). A class and racial politics of quiescent affect was enacted as several members of the population were believed far more liable to ‘give way’ to defeat and dangerous emotions (Brittain 77; Committee of Imperial Defence).In other cases it was only once an air-raid had started that sleep could be found (MO 253). The boredom of waiting could gather in its intensity deforming bodies with “the doom of depression” (Anderson 749). The stopped time-spaces in advance of a raid could be soaked with so much tension that the commencement of sirens, vibrations and explosions would allow a person overwhelming relief (MO 253). Quoting from a boy recalling his experiences in Hannover during 1943, Hewitt illustrates:I lie in bed. I am afraid. I strain my ears to hear something but still all is quiet. I hardly dare breathe, as if something horrible is knocking at the door, at the windows. Is it the beating of my heart? ... Suddenly there seems relief, the sirens howl into the night ... (Heimatbund Niedersachsen 1953: 185). (Cited in Hewitt, When 16)Once a state of still was lost getting it back required some effort (Bissell, Comfortable 1697). Cautious of preventing mass panic and public hysteria by allowing the body to erupt outwards into dangerous vectors of mobility, the British government’s schooling in the theories of panicology (Orr 12) and contagious affect (Le Bon 17; Tarde 278; Thrift, Intensities 57; Trotter 140), made air raid precautions (ARP) officers, police and civil defence teams enforce ‘stay put’ and ‘hold firm’ orders to protect the population (Jones et al, Civilian Morale 463, Public Panic 63-64; Thomas 16). Such orders were meant to shield against precisely the kinds of volatile bodies they were trying to compel with their own bombing strategies. Reactions to the Blitz were moralised and racialised. Becoming stilled required self-conscious work by a public anxious not to be seen to ‘panic’. This took the form of self-disciplination. People exhausted considerable energy to ‘settle’ themselves down. It required ‘holding’ themselves still and ‘together’ in order to accomplish this state, and to avoid going the same way as the buildings falling apart around them, as some people observed (MO 408). In Britain a cup of tea was often made as a spontaneous response in the event of the conclusion of a raid (Brown 686). As well as destroying bombing created spaces too – making space for stillness (Conradson 33). Many people found that they could recall their experiences in vivid detail, allocating a significant proportion of their memories to the recollection of the self and an awareness of their surroundings (IWM 19103). In this mode of stillness, contemplation did not turn-inwards but unfolded out towards the environment. The material processual movement of the shell-blast literally evacuated all sound and materials from its centre to leave a vacuum of negative pressure. Diaries and oral testimonies stretch out these millisecond events into discernable times and spaces of sensation, thought and the experience of experience (Massumi, Parables 2). Extraordinarily, survivors mention serene feelings of quiet within the eye of the blast (see Mortimer 239); they had, literally, ‘no time to be frightened’ (Crighton-Miller 6150). A shell explosion could create such intensities of stillness that a sudden and distinctive lessening of the person and world are expressed, constituting ‘stilling-slowing diminishments’ (Anderson 744). As if the blast-vacuum had sucked all the animation from their agency, recollections convey passivity and, paradoxically, a much more heightened and contemplative sense of the moment (Bourke 121; Thrift, Still 41). More lucid accounts describe a multitude of thoughts and an attention to minute detail. Alternatively, the enormous peaking of a waking blast subdued all later activities to relative obsolescence. The hurricane of sounds and air appear to overload into the flatness of an extended and calmed instantaneous present.Then the whistling stopped, then a terrific thump as it hit the ground, and everything seem to expand, then contract with deliberation and stillness seemed to be all around. (As recollected by Bill and Vi Reagan in Gaskin 17)On the other hand, as Schivelbusch (7) shows us in his exploration of defeat, the cessation of war could be met with an outburst of feeling. In these micro-moments a close encounter with death was often experienced with elation, a feeling of peace and well-being drawn through a much more heightened sense of the now (MO 253). These are not pre-formed or contemplative techniques of attunement as Thrift has tracked, but are the consequence of significant trauma and the primal reaction to extreme danger.TracesSusan Griffin’s haunting A Chorus of Stones documents what she describes as a private life of war (1). For Griffin, and as shown in these brief examples, stillness and being-stilled describe a series of diverse experiences endured during aerial bombing. Yet, as Griffin narrates, these are not-so private lives. A common representation of air war can be found in Henry Moore’s tube shelter sketches which convey sleeping tube-dwellers harboured in the London underground during the Blitz. The bodies are represented as much more than individuals being connected by Moore’s wave-like shapes into the turbulent aggregation of a choppy ocean. What we see in Moore’s portrayal and the examples discussed already are experiences with definite relations to both inner and outer worlds. They refer to more-than individuals who bear intimate relations to their outsides and the atmospheric and material environments enveloping and searing through them. Stillness was an unlikely state composed through these circulations just as it was formed as a means of address. It was required in order to apprehend sounds and possible events through techniques of listening or waiting. Alternatively being stilled could refer to pauses between air-strikes and the corresponding breaks of tension in the aftermath of a raid. Stillness was composed through a series of distributed yet interconnecting bodies, feelings, materials and atmospheres oriented towards the future and the past. The ruins of bombed-out building forms stand as traces even today. Just as Massumi (Sensing 16) describes in the context of architecture, the now static remainder of the explosion “envelops in its stillness a deformational field of which it stands as the trace”. The ruined forms left after the attack stand as a “monument” of the passing of the raid to be what it once was – house, factory, shop, restaurant, library - and to become something else. The experience of those ‘from below’ (Hewitt 2) suffering contemporary forms of air-warfare share many parallels with those of the Blitz. Air power continues to target, apparently more precisely, the affective tones of the body. Accessed by kinetic and non-kinetic forces, the signs of air-war are generated by the shelling of Kosovo, ‘shock and awe’ in Iraq, air-strikes in Afghanistan and by the simulated air-raids of IDF aircraft producing sonic-booms over sleeping Palestinian civilians, now becoming far more real as I write in the final days of 2008. Achieving stillness in the wake of aerial trauma remains, even now, a way to survive the (private) life of air war. AcknowledgementsI’d like to thank the editors and particularly the referees for such a close reading of the article; time did not permit the attention their suggestions demanded. Grateful acknowledgement is also made to the AHRC whose funding allowed me to research and write this paper. ReferencesAdey, Peter. Aerial Geographies: Mobilities, Bodies and Subjects. Oxford: Wiley-Blackwell, 2010 (forthcoming). Anderson, Ben. “Time-Stilled Space-Slowed: How Boredom Matters.” Geoforum 35 (2004): 739-754Armitage, John. “On Ernst Jünger’s ‘Total Mobilization’: A Re-evaluation in the Era of the War on Terrorism.” Body and Society 9 (2001): 191-213.A.R.P.D. “Air Raid Precautions Handbook No.2 (1st Edition) Anti-Gas Precautions and First Aid for Air Raid Casualties.” Home Office Air Raid Precautions Department, London: HMSO, 1935. Bialer, Uri. The Shadow of the Bomber: The Fear of Air Attack and British Oolitics, 1932-1939. London: Royal Historical Society, 1980.Bishop, Ryan. and John Phillips. “Manufacturing Emergencies.” Theory, Culture and Society 19 (2002): 91-102.Bissell, David. “Animating Suspension: Waiting for Mobilities.” Mobilities 2 (2007): 277-298.———. “Comfortable Bodies: Sedentary Affects.” Environment and Planning A 40 (2008): 1697-1712.Bourke, Johanna. Fear: A Cultural History. London: Virago Press, 2005.Brittain, Vera. One Voice: Pacifist Writing from the Second World War. London: Continuum 2006.Brown, Felix. “Civilian Psychiatric Air-Raid Casualties.” The Lancet (31 May 1941): 686-691.Calder, Angus. The People's War: Britain, 1939-45. London: Panther, 1971.Calder, Ritchie. “Sleep We Must.” New Statesman and Nation (14 Sep. 1940): 252-253.Committee of Imperial Defence. Minute book. HO 45/17636. The National Archives, 1936.Conradson, David. “The Experiential Economy of Stillness: Places of Retreat in Contemporary Britain.” In Alison Williams, ed. Therapeutic Landscapes: Advances and Applications. Aldershot: Ashgate, 2008. 33-48.Coward, Martin. “Against Anthropocentrism: The Destruction of the Built Environment as a Distinct Form of Political Violence.” Review of International Studies 32 (2006): 419-437. Crandall, Jordan. “Precision + Guided + Seeing.” CTheory (1 Oct. 2006). 8 Mar. 2009 ‹http://www.ctheory.net/articles.aspx?id=502›.Crighton-Miller, H. “Somatic Factors Conditioning Air-Raid Reactions.” The Lancet (12 July 1941): 31-34.Davis, Mike. Dead Cities, and Other Tales. New York: New P, 2002. Davis, Tracy. Stages of Emergency: Cold War Nuclear Civil Defence. Durham: Duke U P, 2007Gaskin, Martin. Blitz: The Story of December 29, 1940. London: Faber and Faber, 2006.Graham, Stephen. “Lessons in Urbicide.” New Left Review (2003): 63-78.Gregory, Derek. The Colonial Present: Afghanistan, Palestine, Iraq. London: Routledge, 2004.———. “‘In Another Time-Zone, the Bombs Fall Unsafely…’: Targets, Civilians and Late Modern War.” Arab World Geographer 9 (2007): 88-112.Gregory, Derek, and Allan Pred. Violent Geographies: Fear, Terror and Political Violence. London: Routledge, 2007.Grosscup, Beau. Strategic Terror: The Politics and Ethics of Aerial Bombardment. London: Zed Books, 2006.Griffin, Susan. A Chorus of Stones: The Private Life of War. London: Anchor Books, 1993.Goodman, Steve. Sonic Warfare: Sound, Affect and the Ecology of Fear. Cambridge: MIT P, 2009 (forthcoming).Haldane, Jack. A.R.P. London: Victor Gollancz, 1938.Harrisson, Tom. Living through the Blitz. Harmondsworth: Penguin Books, 1979.Harrison, Paul. “Corporeal Remains: Vulnerability, Proximity, and Living On after the End of the World.” Environment and Planning A 40 (2008): 423-445.Hewitt, Kenneth. “Place Annihilation - Area Bombing and the Fate of Urban Places.” Annals of the Association of American Geographers 73 (1983): 257-284.———. “When the Great Planes Came and Made Ashes of Our City - Towards an Oral Geography of the Disasters of War.” Antipode 26 (1994): 1-34.IWM 14595. Imperial War Museum Sound Archive. Oral Interview.IWM 19103. Imperial War Museum Sound Archive. Oral Interview.Janis, Irving. Air War and Emotional Stress. Psychological Studies of Bombing and Civilian Defense. New York: McGraw-Hill, 1951.Jones, Edgar, Robert Woolven, Bill Durodie, and Simon Wesselly. “Civilian Morale during the Second World War: Responses to Air Raids Re-Examined.” Social History of Medicine 17 (2004): 463-479.———. “Public Panic and Morale: Second World War Civilian Responses Reexamined in the Light of the Current Anti-Terrorist Campaign.” Journal of Risk Research 9 (2006): 57-73.Kraftl, Peter, and John Horton. “Sleepy Geographies and the Spaces of Every-Night Life.” Progress in Human Geography 32 (2008): 509-532.Le Bon, Gustav. The Crowd. London: T. F. Unwin, 1925.Massumi, Brian. Parables for the Virtual: Movement, Affect, Sensation. Durham and London: Duke U P, 2002.———. “Sensing the Virtual: Building the Insensible.” Architectural Design 68.5/6 (1998): 16-24Mendieta, Edwardo. “The Literature of Urbicide: Friedrich, Nossack, Sebald, and Vonnegut.” Theory and Event 10 (2007):MO 371. “Cars and Sirens.” Mass Observation Report. 27 Aug. 1940.MO 408. “Human Adjustments to Air Raids.” Mass Observation Report. 8 Sep. 1940.MO 253. “Air Raids.” Mass Observation Report. 5 July 1940.MO 217. “Air Raids.” Mass Observation Report. 21 June 1940.MO A14. “Shelters.” Mass Observation Report. [date unknown] 1940.MO 364. “Metropolitan Air Raids.” Mass Observation Report. 23 Aug. 1940.Mortimer, Gavin. The Longest Night. London: Orion, 2005.Ngai, Sianne. Ugly Feelings. Harvard: Harvard U P, 2005.Orr, Pauline. Panic Diaries. Durham and London: Duke U P, 2006.Reid, Julian. The Biopolitics of the War on Terror. London: Palgrave McMillan, 2006.Rose, Mitch, and John Wylie. “Animating Landscape: Editorial Introduction.” Environment and Planning D: Society and Space 24 (2007): 475-479.Schivelbusch, Wolfgang. The Culture of Defeat. New York: Henry Holt, 1994.Sebald, W. G. On the Natural History of Destruction. New York: Random House, 2003.Sloterdijk, Peter. "Airquake." Environment and Planning D: Society and Space 27.1 (2009): 41-57.Thomas, S. Evelyn. The Wardens Manual. London: St Albans Press, 1942.Thrift, Nigel. “Still Life in Nearly Present Time: The Object of Nature.” Body and Society 6 (2000): 34-57.———. “Intensities of Feeling: Towards a Spatial Politics of Affect.” Geografiska Annaler Series B 86 (2005): 57-78.Tomkins, Sylvan. Exploring Affect: The Selected Writings of Silvan S. Tomkins. Cambridge: Cambridge U P, 1995.Trotter, Wilfred. Instincts of the Herd in Peace and War. London: T. Fisher Unwin, 1924.
APA, Harvard, Vancouver, ISO, and other styles
22

Arnold, Bruce, and Margalit Levin. "Ambient Anomie in the Virtualised Landscape? Autonomy, Surveillance and Flows in the 2020 Streetscape." M/C Journal 13, no. 2 (May 3, 2010). http://dx.doi.org/10.5204/mcj.221.

Full text
Abstract:
Our thesis is that the city’s ambience is now an unstable dialectic in which we are watchers and watched, mirrored and refracted in a landscape of iPhone auteurs, eTags, CCTV and sousveillance. Embrace ambience! Invoking Benjamin’s spirit, this article does not seek to limit understanding through restriction to a particular theme or theoretical construct (Buck-Morss 253). Instead, it offers snapshots of interactions at the dawn of the postmodern city. That bricolage also engages how people appropriate, manipulate, disrupt and divert urban spaces and strategies of power in their everyday life. Ambient information can both liberate and disenfranchise the individual. This article asks whether our era’s dialectics result in a new personhood or merely restate the traditional spectacle of ‘bright lights, big city’. Does the virtualized city result in ambient anomie and satiation or in surprise, autonomy and serendipity? (Gumpert 36) Since the steam age, ambience has been characterised in terms of urban sound, particularly the alienation attributable to the individual’s experience as a passive receptor of a cacophony of sounds – now soft, now loud, random and recurrent–from the hubbub of crowds, the crash and grind of traffic, the noise of industrial processes and domestic activity, factory whistles, fire alarms, radio, television and gramophones (Merchant 111; Thompson 6). In the age of the internet, personal devices such as digital cameras and iPhones, and urban informatics such as CCTV networks and e-Tags, ambience is interactivity, monitoring and signalling across multiple media, rather than just sound. It is an interactivity in which watchers observe the watched observing them and the watched reshape the fabric of virtualized cities merely by traversing urban precincts (Hillier 295; De Certeau 163). It is also about pervasive although unevenly distributed monitoring of individuals, using sensors that are remote to the individual (for example cameras or tag-readers mounted above highways) or are borne by the individual (for example mobile phones or badges that systematically report the location to a parent, employer or sex offender register) (Holmes 176; Savitch 130). That monitoring reflects what Doel and Clark characterized as a pervasive sense of ambient fear in the postmodern city, albeit fear that like much contemporary anxiety is misplaced–you are more at risk from intimates than from strangers, from car accidents than terrorists or stalkers–and that is ahistorical (Doel 13; Scheingold 33). Finally, it is about cooption, with individuals signalling their identity through ambient advertising: wearing tshirts, sweatshirts, caps and other apparel that display iconic faces such as Obama and Monroe or that embody corporate imagery such as the Nike ‘Swoosh’, Coca-Cola ‘Ribbon’, Linux Penguin and Hello Kitty feline (Sayre 82; Maynard 97). In the postmodern global village much advertising is ambient, rather than merely delivered to a device or fixed on a billboard. Australian cities are now seas of information, phantasmagoric environments in which the ambient noise encountered by residents and visitors comprises corporate signage, intelligent traffic signs, displays at public transport nodes, shop-window video screens displaying us watching them, and a plethora of personal devices showing everything from the weather to snaps of people in the street or neighborhood satellite maps. They are environments through which people traverse both as persons and abstractions, virtual presences on volatile digital maps and in online social networks. Spectacle, Anomie or Personhood The spectacular city of modernity is a meme of communication, cultural and urban development theory. It is spectacular in the sense that of large, artificial, even sublime. It is also spectacular because it is built around the gaze, whether the vistas of Hausmann’s boulevards, the towers of Manhattan and Chicago, the shopfront ‘sea of light’ and advertising pillars noted by visitors to Weimar Berlin or the neon ‘neo-baroque’ of Las Vegas (Schivelbusch 114; Fritzsche 164; Ndalianis 535). In the year 2010 it aspires to 2020 vision, a panoptic and panspectric gaze on the part of governors and governed alike (Kullenberg 38). In contrast to the timelessness of Heidegger’s hut and the ‘fixity’ of rural backwaters, spectacular cities are volatile domains where all that is solid continues to melt into air with the aid of jackhammers and the latest ‘new media’ potentially result in a hypereality that make it difficult to determine what is real and what is not (Wark 22; Berman 19). The spectacular city embodies a dialectic. It is anomic because it induces an alienation in the spectator, a fatigue attributable to media satiation and to a sense of being a mere cog in a wheel, a disempowered and readily-replaceable entity that is denied personhood–recognition as an autonomous individual–through subjection to a Fordist and post-Fordist industrial discipline or the more insidious imprisonment of being ‘a housewife’, one ant in a very large ant hill (Dyer-Witheford 58). People, however, are not automatons: they experience media, modernity and urbanism in different ways. The same attributes that erode the selfhood of some people enhance the autonomy and personhood of others. The spectacular city, now a matrix of digits, information flows and opportunities, is a realm in which people can subvert expectations and find scope for self-fulfillment, whether by wearing a hoodie that defeats CCTV or by using digital technologies to find and associate with other members of stigmatized affinity groups. One person’s anomie is another’s opportunity. Ambience and Virtualisation Eighty years after Fritz Lang’s Metropolis forecast a cyber-sociality, digital technologies are resulting in a ‘virtualisation’ of social interactions and cities. In post-modern cityscapes, the space of flows comprises an increasing number of electronic exchanges through physically disjointed places (Castells 2002). Virtualisation involves supplementation or replacement of face-to-face contact with hypersocial communication via new media, including SMS, email, blogging and Facebook. In 2010 your friends (or your boss or a bully) may always be just a few keystrokes away, irrespective of whether it is raining outside, there is a public transport strike or the car is in for repairs (Hassan 69; Baron 215). Virtualisation also involves an abstraction of bodies and physical movements, with the information that represents individual identities or vehicles traversing the virtual spaces comprised of CCTV networks (where viewers never encounter the person or crowd face to face), rail ticketing systems and road management systems (x e-Tag passed by this tag reader, y camera logged a specific vehicle onto a database using automated number-plate recognition software) (Wood 93; Lyon 253). Surveillant Cities Pervasive anxiety is a permanent and recurrent feature of urban experience. Often navigated by an urgency to control perceived disorder, both physically and through cultivated dominant theory (early twentieth century gendered discourses to push women back into the private sphere; ethno-racial closure and control in the Black Metropolis of 1940s Chicago), history is punctuated by attempts to dissolve public debate and infringe minority freedoms (Wilson 1991). In the Post-modern city unprecedented technological capacity generates a totalizing media vector whose plausible by-product is the perception of an ambient menace (Wark 3). Concurrent faith in technology as a cost-effective mechanism for public management (policing, traffic, planning, revenue generation) has resulted in emergence of the surveillant city. It is both a social and architectural fabric whose infrastructure is dotted with sensors and whose people assume that they will be monitored by private/public sector entities and directed by interactive traffic management systems – from electronic speed signs and congestion indicators through to rail schedule displays –leveraging data collected through those sensors. The fabric embodies tensions between governance (at its crudest, enforcement of law by police and their surrogates in private security services) and the soft cage of digital governmentality, with people being disciplined through knowledge that they are being watched and that the observation may be shared with others in an official or non-official shaming (Parenti 51; Staples 41). Encounters with a railway station CCTV might thus result in exhibition of the individual in court or on broadcast television, whether in nightly news or in a ‘reality tv’ crime expose built around ‘most wanted’ footage (Jermyn 109). Misbehaviour by a partner might merely result in scrutiny of mobile phone bills or web browser histories (which illicit content has the partner consumed, which parts of cyberspace has been visited), followed by a visit to the family court. It might instead result in digital viligilantism, with private offences being named and shamed on electronic walls across the global village, such as Facebook. iPhone Auteurism Activists have responded to pervasive surveillance by turning the cameras on ‘the watchers’ in an exercise of ‘sousveillance’ (Bennett 13; Huey 158). That mirroring might involve the meticulous documentation, often using the same geospatial tools deployed by public/private security agents, of the location of closed circuit television cameras and other surveillance devices. One outcome is the production of maps identifying who is watching and where that watching is taking place. As a corollary, people with anxieties about being surveilled, with a taste for street theatre or a receptiveness to a new form of urban adventure have used those maps to traverse cities via routes along which they cannot be identified by cameras, tags and other tools of the panoptic sort, or to simply adopt masks at particular locations. In 2020 can anyone aspire to be a protagonist in V for Vendetta? (iSee) Mirroring might take more visceral forms, with protestors for example increasingly making a practice of capturing images of police and private security services dealing with marches, riots and pickets. The advent of 3G mobile phones with a still/video image capability and ongoing ‘dematerialisation’ of traditional video cameras (ie progressively cheaper, lighter, more robust, less visible) means that those engaged in political action can document interaction with authority. So can passers-by. That ambient imaging, turning the public gaze on power and thereby potentially redefining the ‘public’ (given that in Australia the community has been embodied by the state and discourse has been mediated by state-sanctioned media), poses challenges for media scholars and exponents of an invigorated civil society in which we are looking together – and looking at each other – rather than bowling alone. One challenge for consumers in construing ambient media is trust. Can we believe what we see, particularly when few audiences have forensic skills and intermediaries such as commercial broadcasters may privilege immediacy (the ‘breaking news’ snippet from participants) over context and verification. Social critics such as Baudelaire and Benjamin exalt the flaneur, the free spirit who gazed on the street, a street that was as much a spectacle as the theatre and as vibrant as the circus. In 2010 the same technologies that empower citizen journalism and foster a succession of velvet revolutions feed flaneurs whose streetwalking doesn’t extend beyond a keyboard and a modem. The US and UK have thus seen emergence of gawker services, with new media entrepreneurs attempting to build sustainable businesses by encouraging fans to report the location of celebrities (and ideally provide images of those encounters) for the delectation of people who are web surfing or receiving a tweet (Burns 24). In the age of ambient cameras, where the media are everywhere and nowhere (and micro-stock photoservices challenge agencies such as Magnum), everyone can join the paparazzi. Anyone can deploy that ambient surveillance to become a stalker. The enthusiasm with which fans publish sightings of celebrities will presumably facilitate attacks on bodies rather than images. Information may want to be free but so, inconveniently, do iconoclasts and practitioners of participatory panopticism (Dodge 431; Dennis 348). Rhetoric about ‘citizen journalism’ has been co-opted by ‘old media’, with national broadcasters and commercial enterprises soliciting still images and video from non-professionals, whether for free or on a commercial basis. It is a world where ‘journalists’ are everywhere and where responsibility resides uncertainly at the editorial desk, able to reject or accept offerings from people with cameras but without the industrial discipline formerly exercised through professional training and adherence to formal codes of practice. It is thus unsurprising that South Australia’s Government, echoed by some peers, has mooted anti-gawker legislation aimed at would-be auteurs who impede emergency services by stopping their cars to take photos of bushfires, road accidents or other disasters. The flipside of that iPhone auteurism is anxiety about the public gaze, expressed through moral panics regarding street photography and sexting. Apart from a handful of exceptions (notably photography in the Sydney Opera House precinct, in the immediate vicinity of defence facilities and in some national parks), Australian law does not prohibit ‘street photography’ which includes photographs or videos of streetscapes or public places. Despite periodic assertions that it is a criminal offence to take photographs of people–particularly minors–without permission from an official, parent/guardian or individual there is no general restriction on ambient photography in public spaces. Moral panics about photographs of children (or adults) on beaches or in the street reflect an ambient anxiety in which danger is associated with strangers and strangers are everywhere (Marr 7; Bauman 93). That conceptualisation is one that would delight people who are wholly innocent of Judith Butler or Andrea Dworkin, in which the gaze (ever pervasive, ever powerful) is tantamount to a violation. The reality is more prosaic: most child sex offences involve intimates, rather than the ‘monstrous other’ with the telephoto lens or collection of nastiness on his iPod (Cossins 435; Ingebretsen 190). Recognition of that reality is important in considering moves that would egregiously restrict legitimate photography in public spaces or happy snaps made by doting relatives. An ambient image–unposed, unpremeditated, uncoerced–of an intimate may empower both authors and subjects when little is solid and memory is fleeting. The same caution might usefully be applied in considering alarms about sexting, ie creation using mobile phones (and access by phone or computer monitor) of intimate images of teenagers by teenagers. Australian governments have moved to emulate their US peers, treating such photography as a criminal offence that can be conceptualized as child pornography and addressed through permanent inclusion in sex offender registers. Lifelong stigmatisation is inappropriate in dealing with naïve or brash 12 and 16 year olds who have been exchanging intimate images without an awareness of legal frameworks or an understanding of consequences (Shafron-Perez 432). Cameras may be everywhere among the e-generation but legal knowledge, like the future, is unevenly distributed. Digital Handcuffs Generations prior to 2008 lost themselves in the streets, gaining individuality or personhood by escaping the surveillance inherent in living at home, being observed by neighbours or simply surrounded by colleagues. Streets offered anonymity and autonomy (Simmel 1903), one reason why heterodox sexuality has traditionally been negotiated in parks and other beats and on kerbs where sex workers ply their trade (Dalton 375). Recent decades have seen a privatisation of those public spaces, with urban planning and digital technologies imposing a new governmentality on hitherto ambient ‘deviance’ and on voyeuristic-exhibitionist practice such as heterosexual ‘dogging’ (Bell 387). That governmentality has been enforced through mechanisms such as replacement of traditional public toilets with ‘pods’ that are conveniently maintained by global service providers such as Veolia (the unromantic but profitable rump of former media & sewers conglomerate Vivendi) and function as billboards for advertising groups such as JC Decaux. Faces encountered in the vicinity of the twenty-first century pissoir are thus likely to be those of supermodels selling yoghurt, low interest loans or sportsgear – the same faces sighted at other venues across the nation and across the globe. Visiting ‘the mens’ gives new meaning to the word ambience when you are more likely to encounter Louis Vuitton and a CCTV camera than George Michael. George’s face, or that of Madonna, Barack Obama, Kevin 07 or Homer Simpson, might instead be sighted on the tshirts or hoodies mentioned above. George’s music might also be borne on the bodies of people you see in the park, on the street, or in the bus. This is the age of ambient performance, taken out of concert halls and virtualised on iPods, Walkmen and other personal devices, music at the demand of the consumer rather than as rationed by concert managers (Bull 85). The cost of that ambience, liberation of performance from time and space constraints, may be a Weberian disenchantment (Steiner 434). Technology has also removed anonymity by offering digital handcuffs to employees, partners, friends and children. The same mobile phones used in the past to offer excuses or otherwise disguise the bearer’s movement may now be tied to an observer through location services that plot the person’s movement across Google Maps or the geospatial information of similar services. That tracking is an extension into the private realm of the identification we now take for granted when using taxis or logistics services, with corporate Australia for example investing in systems that allow accurate determination of where a shipment is located (on Sydney Harbour Bridge? the loading dock? accompanying the truck driver on unauthorized visits to the pub?) and a forecast of when it will arrive (Monmonier 76). Such technologies are being used on a smaller scale to enforce digital Fordism among the binary proletariat in corporate buildings and campuses, with ‘smart badges’ and biometric gateways logging an individual’s movement across institutional terrain (so many minutes in the conference room, so many minutes in the bathroom or lingering among the faux rainforest near the Vice Chancellery) (Bolt). Bright Lights, Blog City It is a truth universally acknowledged, at least by right-thinking Foucauldians, that modernity is a matter of coercion and anomie as all that is solid melts into air. If we are living in an age of hypersocialisation and hypercapitalism – movies and friends on tap, along with the panoptic sorting by marketers and pervasive scrutiny by both the ‘information state’ and public audiences (the million people or one person reading your blog) that is an inevitable accompaniment of the digital cornucopia–we might ask whether everyone is or should be unhappy. This article began by highlighting traditional responses to the bright lights, brashness and excitement of the big city. One conclusion might be that in 2010 not much has changed. Some people experience ambient information as liberating; others as threatening, productive of physical danger or of a more insidious anomie in which personal identity is blurred by an ineluctable electro-smog. There is disagreement about the professionalism (for which read ethics and inhibitions) of ‘citizen media’ and about a culture in which, as in the 1920s, audiences believe that they ‘own the image’ embodying the celebrity or public malefactor. Digital technologies allow you to navigate through the urban maze and allow officials, marketers or the hostile to track you. Those same technologies allow you to subvert both the governmentality and governance. You are free: Be ambient! References Baron, Naomi. Always On: Language in an Online and Mobile World. New York: Oxford UP, 2008. Bauman, Zygmunt. Liquid Modernity. Oxford: Polity Press, 2000. Bell, David. “Bodies, Technologies, Spaces: On ‘Dogging’.” Sexualities 9.4 (2006): 387-408. Bennett, Colin. The Privacy Advocates: Resisting the Spread of Surveillance. Cambridge: MIT Press, 2008. Berman, Marshall. All That Is Solid Melts into Air: The Experience of Modernity. London: Verso, 2001. Bolt, Nate. “The Binary Proletariat.” First Monday 5.5 (2000). 25 Feb 2010 ‹http://131.193.153.231/www/issues/issue5_5/bolt/index.html›. Buck-Morss, Susan. The Dialectics of Seeing: Walter Benjamin and the Arcades Project. Cambridge: MIT Press, 1991. Bull, Michael. Sounding Out the City: Personal Stereos and the Management of Everyday Life. Oxford: Berg, 2003. Bull, Michael. Sound Moves: iPod Culture and the Urban Experience. London: Routledge, 2008 Burns, Kelli. Celeb 2.0: How Social Media Foster Our Fascination with Popular Culture. Santa Barbara: ABC-CLIO, 2009. Castells, Manuel. “The Urban Ideology.” The Castells Reader on Cities and Social Theory. Ed. Ida Susser. Malden: Blackwell, 2002. 34-70. Cossins, Anne, Jane Goodman-Delahunty, and Kate O’Brien. “Uncertainty and Misconceptions about Child Sexual Abuse: Implications for the Criminal Justice System.” Psychiatry, Psychology and the Law 16.4 (2009): 435-452. Dalton, David. “Policing Outlawed Desire: ‘Homocriminality’ in Beat Spaces in Australia.” Law & Critique 18.3 (2007): 375-405. De Certeau, Michel. The Practice of Everyday Life. Berkeley: University of California P, 1984. Dennis, Kingsley. “Keeping a Close Watch: The Rise of Self-Surveillance and the Threat of Digital Exposure.” The Sociological Review 56.3 (2008): 347-357. Dodge, Martin, and Rob Kitchin. “Outlines of a World Coming into Existence: Pervasive Computing and the Ethics of Forgetting.” Environment & Planning B: Planning & Design 34.3 (2007): 431-445. Doel, Marcus, and David Clarke. “Transpolitical Urbanism: Suburban Anomaly and Ambient Fear.” Space & Culture 1.2 (1998): 13-36. Dyer-Witheford, Nick. Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism. Champaign: U of Illinois P, 1999. Fritzsche, Peter. Reading Berlin 1900. Cambridge: Harvard UP, 1998. Gumpert, Gary, and Susan Drucker. “Privacy, Predictability or Serendipity and Digital Cities.” Digital Cities II: Computational and Sociological Approaches. Berlin: Springer, 2002. 26-40. Hassan, Robert. The Information Society. Cambridge: Polity Press, 2008. Hillier, Bill. “Cities as Movement Economies.” Intelligent Environments: Spatial Aspects of the Information Revolution. Ed. Peter Drioege. Amsterdam: Elsevier, 1997. 295-342. Holmes, David. “Cybercommuting on an Information Superhighway: The Case of Melbourne’s CityLink.” The Cybercities Reader. Ed. Stephen Graham. London: Routledge, 2004. 173-178. Huey, Laura, Kevin Walby, and Aaron Doyle. “Cop Watching in the Downtown Eastside: Exploring the Use of CounterSurveillance as a Tool of Resistance.” Surveillance and Security: Technological Politics and Power in Everyday Life. Ed. Torin Monahan. London: Routledge, 2006. 149-166. Ingebretsen, Edward. At Stake: Monsters and the Rhetoric of Fear in Public Culture. Chicago: U of Chicago P, 2001. iSee. “Now More Than Ever”. 20 Feb 2010 ‹http://www.appliedautonomy.com/isee/info.html›. Jackson, Margaret, and Julian Ligertwood. "Identity Management: Is an Identity Card the Solution for Australia?” Prometheus 24.4 (2006): 379-387. Jermyn, Deborah. Crime Watching: Investigating Real Crime TV. London: IB Tauris, 2007. Kullenberg, Christopher. “The Social Impact of IT: Surveillance and Resistance in Present-Day Conflicts.” FlfF-Kommunikation 1 (2009): 37-40. Lyon, David. Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. London: Routledge, 2003. Marr, David. The Henson Case. Melbourne: Text, 2008. Maynard, Margaret. Dress and Globalisation. Manchester: Manchester UP, 2004. Merchant, Carolyn. The Columbia Guide to American Environmental History. New York: Columbia UP, 2002. Monmonier, Mark. “Geolocation and Locational Privacy: The ‘Inside’ Story on Geospatial Tracking’.” Privacy and Technologies of Identity: A Cross-disciplinary Conversation. Ed. Katherine Strandburg and Daniela Raicu. Berlin: Springer, 2006. 75-92. Ndalianis, Angela. “Architecture of the Senses: Neo-Baroque Entertainment Spectacles.” Rethinking Media Change: The Aesthetics of Tradition. Ed. David Thorburn and Henry Jenkins. Cambridge: MIT Press, 2004. 355-374. Parenti, Christian. The Soft Cage: Surveillance in America. New York: Basic Books, 2003. Sayre, Shay. “T-shirt Messages: Fortune or Folly for Advertisers.” Advertising and Popular Culture: Studies in Variety and Versatility. Ed. Sammy Danna. New York: Popular Press, 1992. 73-82. Savitch, Henry. Cities in a Time of Terror: Space, Territory and Local Resilience. Armonk: Sharpe, 2008. Scheingold, Stuart. The Politics of Street Crime: Criminal Process and Cultural Obsession. Philadephia: Temple UP, 1992. Schivelbusch, Wolfgang. Disenchanted Night: The Industrialization of Light in the Nineteenth Century. Berkeley: U of California Press, 1995. Shafron-Perez, Sharon. “Average Teenager or Sex Offender: Solutions to the Legal Dilemma Caused by Sexting.” John Marshall Journal of Computer & Information Law 26.3 (2009): 431-487. Simmel, Georg. “The Metropolis and Mental Life.” Individuality and Social Forms. Ed. Donald Levine. Chicago: University of Chicago P, 1971. Staples, William. Everyday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham: Rowman & Littlefield, 2000. Steiner, George. George Steiner: A Reader. New York: Oxford UP, 1987. Thompson, Emily. The Soundscape of Modernity: Architectural Acoustics and the Culture of Listening in America. Cambridge: The MIT Press, 2004. Wark, Mackenzie. Virtual Geography: Living with Global Media Events. Bloomington: Indiana UP, 1994. Wilson, Elizabeth. The Sphinx in the City: Urban Life, the Control of Disorder and Women. Berkeley: University of California P, 1991. Wood, David. “Towards Spatial Protocol: The Topologies of the Pervasive Surveillance Society.” Augmenting Urban Spaces: Articulating the Physical and Electronic City. Eds. Allesandro Aurigi and Fiorella de Cindio. Aldershot: Ashgate, 2008. 93-106.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography