Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Annotated Portfolio

Engaging Design, Spring 2014


MA Design: Interaction Research
Goldsmiths, University of London
In partnership with Microsof Research
Samantha Miller
Anuradha Reddy
WIRED
EYE
Overview
On a daily basis, many of us give large amounts of personal data to online compa-
nies and services. We often do not think about where our data is located; where does
it travel to and where is it being stored? Our use of and reliance on the cloud can
make it seem as though our data is foating and abstract, but in fact, there are vast
physical centers around the globe that are responsible for the safekeeping of our
personal data. The Wired Eye attempts to highlight these questions and draw your
attention to these physical locations of data. Pulling information from your internet
browsing history, the device takes the IP addresses of the websites you have recently
visited. From these IP addresses, it fnds the associated data centers these compa-
nies use and pulls an aerial image of the center using satellite imagery. The Wired
Eye displays a series of these images through a kaleidoscopic lens, inviting play and
wonder around visuals that are both strange and beautiful. The optical distortion
comments on the blurry nature of knowing where your data is at any given moment,
as it is constantly moving, shifting between servers, and travelling across the world
in a span of milliseconds. The Wired Eye aims to provoke curiosity in further explor-
ing the complex relationship between our online data and geographical sites of stor-
age.
Acknowledgements
Tobie Kerridge, Alex Wilkie, Richard Banks, Tim Regan, Interaction Research Stu-
dio, Andrew Weatherhead, Richard Brett and other workshop staf
MA Interaction Research, Class of 2013-14
Table of Contents
Overview
1. Introduction
1.1. The Brief
2. The Public Body
2.1 Information Commissioners Ofce
3. The Documentary
3.1 Preliminary Research of ICO
3.2 Interviews and responses
3.3 Developing a framework
4. Research Data
4.1 Brainstorming
4.2 Field Visit
4.3 Interviews
4.4 Probes
4.5 Character Inspiration
4.6 Researching Concepts
5. Design Workbook
5.1 Rear-view Mirror
5.2 Warding Of the Evil-eye
5.3 Recording Paraphernalia
5.4 Closing the Shutters
5.5 Across the Seven Seas
5.6 The Ethical Camera
6. Prototyping
6.1 Journey to Jordan
6.2 Looking Into/Out of the Router
6.3 Risk-based Hard Drive
6.4 Kaleidoscopic View
7. Wired Eye
8. Conclusion
References
1. Introduction
The course Engaging Design launched with an introductory session in partnership with Micro-
soft Research Cambridge at the White Building, London. The session included presentations and
discussions with researchers, artists and other participants in order to set the tone for the project.
There were site visits followed by an exercise, in groups, to explore, observe and derive insights by
engaging in discussions with residents who live around the area. We were also introduced to a brief
concerned with the course outcome.
1.1 The Brief
We were initially asked to identify a public body and design a product or service that may promote,
provide new experiences or even implement changes to improve the services of the organisation.
The brief was open-ended and required a deep understanding of the chosen public bodys ofer-
rings to design something that people could engage with.
2. The Public Body
2.1 Information Commissioners Ofce
The Information Commissioners Ofce (ICO) is the UK governmental body we selected as our
starting point for the design brief. The ICO, formed in 1984 with headquarters in Wilmslow,
Cheshire, deals with data privacy and regulation for individuals, companies, and organisations
throughout the UK. According to the ICO, their mission statement is to uphold information rights
in the public interest, promoting openness by public bodies and data privacy for individuals. The
current head of the ICO is Christopher Graham, who has been the Information Commissioner
since 2009.
For individuals, the ICO provides services to request your personal information from organisa-
tions; they also provide guidance on how to keep your information secure, as well as how to lodge
complaints against organisations. For organisations, they regulate and enforce how information is
collected, processed, and stored based on privacy legislation. They also provide guidance on how to
comply with these regulations.
The ICO carries out its mission by enforcing fve main pieces of legislation:
- Data Protection Act (1998): protects personal data in the UK and ensures a publicly avail-
able database of data controllers.
- Freedom of Information Act (2000): allows the public to have the right to access informat
ion held by public authorities, including the Houses of Parliament and the NHS.
- Privacy and Electronic Communications (EC Directive) Regulations (2003): prohibits the
sending of automated recorded messages, emails, or text messages for marketing purposes
without prior consent. The ICO can impose fnes of up to 500,000 for breaches of this.
- Environmental Information Regulations (2004): allows the public to have the right to ac
cess environmental data held by UK public authorities, including the Security Service.
- INSPIRE Regulations (2009): allows the public to discover and access spatial data sets.
Each of these pieces of legislation address particular concerns in regards to fair data usage, includ-
ing obtaining personal information, digital communication, and spatial and geographic informa-
tion.
3. The Documentary
Using the ICO and its mission as our starting point, we set of to make a documentary that ex-
plored the work of the ICO and its relationship to peoples feelings around their personal data,
specifcally in an online context.
3.1 Preliminary Research of the ICO
The ICO in recent times has been primarily concerned with the privacy policies of large corpo-
rations such as Google, which hold crucial personal information of millions of people. Following
Snowdens leak, a sudden spotlight on the NSA has raised increasing privacy concerns among
individuals. In the face of global terrorism and dangers to national security, there are lingering
tensions regarding the government seeking access to individual information. These events have led
the ICO to be more vigilant and aware of peoples rights to protect their information. Additional-
ly, the ICO is involved in advising individuals and organisations to be wary of bringing their own
devices to work and accessing unsecure networks in public spaces, highlighting the vulnerability of
their data to an attack.
3.2 Interviews and Responses
We started our documentary on the ICO by thinking about the ways in which we frequently give
our personal data to companies, services, and various organisations. We read books on e-readers,
listen to music on Spotify, carry out banking transactions, and purchase all kinds of goods online.
We wanted to explore how people felt about this constant exchange of personal data. Overall, the
answers to the question How do you feel about companies and organisations having access to
your online data? was overwhelmingly negative. People expressed skepticism and distrust in com-
panies having access to their personal information, and pointed out a wish to be informed if and
when data was collected about them, and to be told exactly what it would be used for.
In the prior image, the student in the yellow jacket felt that companies should get his permission
frst before using his data in any capacity. For him, permission was of the utmost importance.
Another scenario depicted below shows a security guard with a pessimistic view of surveillance,
noting concern about hackers and the fact that all of our activity is monitored.
A library IT employee expressed disgust at the sharing of information online. He took great pains
to protect his information, creating his own email service provider.
3.3 Developing a Framework
We then created a diagram of a relationship framework to map the relationships between people
and data; what are the conscious and unconscious forms of data input? How do certain uses of our
data feel comforting and positive, and others fearful and negative? We explored the extremities of
values people associate with data, such as being open and free to closed and protected.
4. Research Data
As we began the research phase of our project, we moved away from our prior focus on the regu-
latory, legislative aspects of the Information Commissioners Ofce. We became more interested
in aspects of data privacy and surveillance that raise psychological and philosophical questions
involving themes of fear, trust, comfort, and control. We also focused on optics in relation to data
privacy and surveillance technologies, not only in terms of CCTV cameras, but in other possible
ways of seeing and spying on the things and people around us.
4.1 Brainstorming
In one of our frst brainstorming sessions, we identifed themes we wanted to explore further
through probes, interviews, feld visits, and our literature review. This map used the Internet of
Things and communication as a start point to explore themes around data privacy and surveil-
lance. What does it mean for objects to communicate with each other without our explicit knowl-
edge or input? We thought about whether it is necessarily a negative thing for humans to relin-
quish this control; in what scenarios might this be a benefcial thing for humans? We considered
emerging technologies in terms of near-feld communication (NFC) and existing technologies like
RFID tags that make objects uniquely identifable. We were also interested in what it would mean
for objects to see that we do not normally associate with vision or perception in an everyday
sense.
4.2 Field Visit
We visited the Spymaster store in London at 3 Portman Square to see diferent gadgets of surveil-
lance frst-hand. The store consisted of covert objects like spycameras, radio bugging devices, tiny
microphones, and self-help books for masquerading oneself. It was interesting to see these objects
available to consumers who feel their safety is threatened.
4.3 Interviews
We interviewed some experts in the feld, including two cryptographers, one based in Luxembourg
and the other in London. We found their responses fairly technical and objective driven. The cryp-
tographer from Luxembourg shed some light on the Internet of Things, suggesting that the only
sure way of turning devices of is to remove the battery. We also interviewed Thomas Thwaites, a
designer/artist based in London. He refected upon his own experiences as a designer and men-
tioned the importance of including mysticism in the designed outcome.
4.4 Probes
We created probes to elicit responses from people on their relationship to data privacy and sur-
veillance. We showed photos of CCTV operators working and asked people to write their responses
on post-it notes. Another image probe included photos of peoples feet using public restrooms; we
were aiming to highlight the spaces that are deemed private but still exist within public spaces.
To generate comments across a breadth of topics related to data privacy, we made two books that
contained quotes cut out from various online news articles, inviting people to fip through and
write or draw a comment underneath a quote they found particularly interesting. Another activity
we designed was a page outlining various types of online data, from geographical to medical; we
asked participants to rank the types of data in order of importance to them (which do they care
most about protecting and keeping secure?). The fnal probe we designed was called Trace a Link
and think; it was a map of underground cables and we had people trace over those links and com-
ment on what these connections mean to them.
4.5 Character Inspiration
As part of our research we took inspiration from characters in movies and television shows we
found relevant. Who are characters that exhibit extreme and interesting behaviours? What can we
learn from them?
Gene Hackman as Harry Caul, a paranoid surveillance expert, in The Conversation (1974)
James Stewart as L.B. Jef Jefries, a spying photographer, in Rear Window (1954)
Ryshi Morino from the anime series kami-san, who is afraid of
people seeing him and hides behind his long bangs
4.6 Researching Concepts
We researched concepts related to extremes of paranoia and faith, and in particular we were fasci-
nated by the anxiety disorder known as Scopophobia. People sufering from this disorder have an
irrational morbid fear of being seen or stared at. We also looked at diferent objects of faith people
use to protect themselves from the evil eye, including the nazar, an eye-shaped amulet, and the
hamsa, a palm-shaped talisman.
5. Design Workbook
We identifed seven main themes that we structured our design workbook around: transparen-
cy, agency, paranoia, remoteness, prediction, waste, and protest. We used these themes both as
prompts to explore relevant work we admire by other designers and artists, as well as a conceptual
framework to develop our own design ideas.
We considered overarching theoretical questions in relation to the workbook as a whole:
Who has access to our data and how is it being used?
When do we know this is happening and when is it hidden from us?
Are we always being watched?
What are the ethics of surveillance?
How could we protest or fght against this ubiquitous surveillance?
Use it to our advantage? Take it to extreme cases?

The following is a brief overview of each theme, followed by selected design proposals from across
these sections.
Transparency: Investigating ways in which we can trace transparency to what we can more lit-
erally see or feel in the way information is presented to us. Lacking consent or control in many
of the ways we are monitored leaves us with a desire for more transparency in processes of surveil-
lance.
James Bridles Surveillance Spaulder project (2013)
Agency: Looking at how much (or little) choice, say, or control we have in our world full of sur-
veillance. Is part of our fear and unease at our lack of control in knowing that we have a part of us
that wants to take a peek at the inappropriate or of-limits? We were also interested in what will
happen when the technologies and gadgets of surveillance have minds of their own; what will
that agency be like?
Shizuka Yokomizos Stranger (1998-2000)
Paranoia: In our surveillance society, it is easy to feel like someone, or something, is always
watching, looking, or following us. We investigated this fear, looking at how it plays a role in our
lives - is it an overreaction or is it there to protect us?
Vito Acconcis Following Piece (1969)
Remoteness: We were interested in drawing on ideas that characterise surveillance with respect
to the spatiality and temporality of data capture and monitoring. As digital technologies connect us
to people, places, markets, and organisations without having to physically travel, we tend to over-
look all of the manpower, geographical boundaries, and time durations involved in running these
technologies.
James Bridles Dronestragram (2012)
Prediction: We used data capture as a tool to identify patterns for the future of prediction, based
on past lives, personality types, and potential relationships. It was especially interesting to us to
look at diferent views on prediction and its powers, from scientifc scepticism to a more ritualistic,
spiritual faith.
Waste: We aimed to expand the notion of what surveillance could be by looking at forms of use-
less, involuntary, and overlooked data. Often, massive amounts of data collected is considered
waste and is discarded after a short period of time.
Protest: We delved into ways of protesting against practices of data capture and its usage without
our prior consent, questioning the inherent power relationships between the watcher and the
watched. Government regulations that enforce lawful behaviour and discipline through surveil-
lance may face resistance from its citizens if they feel their freedom or belief systems are threat-
ened.
The following section elaborates on selected pages from the workbook, providing a background
and context to the fnal design.

5.1 Rear-view Mirror | Paranoia
Would having an extra pair of eyes watching over your shoulder help to protect you, make you
feel safer, or make you unnecessarily obsess about being able to see what is behind you? The rear-
view mirror glasses are a straightforward way of exploring an altered way of seeing what is around
us. Through this idea, we tried to question if the refecting mirror was a source of comfort and
self-protection or if it was enforcing even more paranoia.
5.2 Warding Of the Evil-eye | Paranoia
Charms such as nazars or talismans are used for protecting oneself from the evil eye and other
harm-causing external entities. Similarly, can we protect our data from hackers by sticking charms
on our data? By casting a spell? Perhaps we would want to use a charm on our data when we are
accessing our data through a vulnerable network (for example, in a caf).
5.3 Recording Paraphernelia | Paranoia
Why might people want to have their own record of everything that happens around them? As
more of our lives become recorded and archived by various entities, it might be benefcial to have
your own recording of what took place - for documentation, proof, or recollection. If you have your
own recording of event(s), then no one else (or nothing else) can tell you what really happened.
We imagined a scenario where one would want to be equipped for total surveillance at all times
with a camera, microphone, and lights.
5.4 Closing the Shutters | Transparency
How do we know if the laptop camera is turned of? Is the green LED sufcient proof that we arent
being recorded covertly?
5.5 Across the Seven Seas | Remoteness
We looked at two IP address trace routes to Google and Facebook headquarters respectively, both
in California, from Goldsmiths, University of London. The images reveal the geographic locations
where the requested data is relayed in order to reach its fnal destination. Using websites like IP
Location (http://www.iplocation.net/), we were able to obtain a street view image associated with
the geographical location of where each IP address is hosted.
5.6 The Ethical Camera | Agency
What if surveillance technology had the capability for ethical judgment, the agency to decide what
should or should not be recorded on camera?
Moving to Design Prototypes
In reviewing our workbook ideas, the traceroute exercise stuck with us the most, pushing us to
investigate how we could manifest the way our data travels in a visible form. How could we draw
from IP addresses and their associated geographical locations to bring awareness to these myste-
rious servers and data centers across the world? The feeling of uncertainty in knowing where our
data is at any given moment was a key turning point for our project. We intended to design a form
that would retain this element of mystery, while inviting someone in to explore these issues in a
visual way. The following section details a series of prototypes we generated for exploring these
thoughts.
6. Prototypes
6.1 Journey to Jordan
Our frst prototype used the idea of travel and tourism to link how we desire to travel to certain
places with how our data travels across the world. We selected the website of Petra, Jordan, one of
the seven wonders of the world, as the destination - www.visitjordan.com. We imagined a charac-
ter that would travel to the diferent exchange points in the IP address traceroute, showing where
diferent servers are located in this particular journey, and highlighting that our data travels to
places we may not be aware of. Even websites that are focused on a particular geographical loca-
tion (in this example, Petra, Jordan), are hosted in an entirely diferent region of the world (e.g.
Atlanta, Georgia). We designed a scenario where we would try to obtain a photo of the exterior of
each data center the request to Jordan traveled to, perhaps with a person or a designed object rep-
resenting the data, visualising this particular journey through the locations of data exchange.
6.2 Looking Into/Out of the Router
Our interest in visualising how and where our data travels led us to re-imagine the router, as it
is the physical object that connects us to the internet. What if you could look into your router to
see where your data is travelling to at any given moment? We designed an object that would have
eyepieces allowing you to either peer inside the object from the top or look in from the side. This
design conjured up notions of the mystical black box and our desire to make this process of data
travel more transparent to someone. We also imagined a version of the router that would project a
visualisation of your data travelling onto the nearest wall.
6.3 Risk-based Hard Drive
We asked ourselves what we found most interesting about these physical locations where our
data travels, and realised it was the datas destination; where does our data end up and where is it
stored? These are the locations we all put a lot of faith into, in terms of keeping our data secure and
accessible to us at any time. With the risk-based hard drive prototype, we wanted to highlight the
vulnerabilities of these data centers in terms of their geographical locations and physicality - what
are possible threats to these centers? We designed a hard drive that would begin to back up your
personal data stored in these centers if it detected a high risk of a threat in those locations (wheth-
er that threat was related to weather conditions, political climate, violence, or another cause). We
prototyped forms that highlight the precariousness of our data and would refect the degree of
threat the hard-drive calculated.
6.4 Kaleidoscopic View
We moved from the risk-based hard drive to our fnal prototype of the Wired Eye, taking our de-
sign from one that emphasised vulnerability and fear to one that highlighted play, curiosity, and
wonderment at the extensive storage of our data worldwide. In incorporating the kaleidoscope, we
related our design back to an initial interest in optics in the realm of data privacy and surveillance.
What is it possible to see or peek in on?
We were inspired by James Bridles project titled Rorschmap which distorted existing digital
maps (such as Google Maps) by applying a flter on the aerial image, resembling a Rorschach Test.
In his blog, he writes Were so busy looking for ways to make digital books and maps usable in
ways that we understand that we fail to do things with them that we dont understand, or that are
beyond our understanding.
Rorschmap, James Bridle (2011)
We liked the visual form of the kaleidoscope, as it naturally invites you to look into the eyepiece
to explore the visuals inside. We felt the distortion of the displayed image behind the lens aptly
commented on the complex, blurry nature of discovering where your data really is at any given
time. Our frst prototypes were limited in our form by the use of the iPhone screen to display aerial
images of data centers. When we used an iPod nano screen instead, we were able to reduce the size
of the base and explore other forms.
7. Wired Eye
In order to make the fnal prototype, we used clear acrylic with the CNC machine. We felt that
black and white colours served several communicative purposes for us; from the top view an opti-
cal illusion was created that resembled a nazar (a charm against the evil eye), and the main black
piece evoked the notion of the black box and the desire to make something more transparent.
We designed an accompanying publication that introduced the project and our fnal design, along
with a sampling of images of data centers you may see through the Wired Eye. We selected a vari-
ety of centers in terms of services/companies, size, and location, to display the breadth of places
that may store your data. The publication was a way for us to synthesize our fnal design and show
people the connections we hope to make between their online activity and the visuals of data cen-
ters displayed through the Wired Eye.
6. Conclusion
In taking our project further, we want to consider how the Wired Eye would in fact function. Is an
object that could make clear links between your internet activity and associated data centers even
possible? Would the Wired Eye pull images from your recent browsing history (perhaps the past
24 hours), or would it be a live refection of your browsing activity? The possible issues with being
able to link IP addresses to companies and then to their associated data centers is refective of the
complex, intricate web of data storage that weve only begun to untangle.


As we have an interest in deploying the object for more extensive periods of time in the future, we
also must consider how important the functionality of the object is to the deployment. What would
people get out of the experience of interacting with the Wired Eye if the object wasnt fully func-
tional? It may be ideal to make more of the fnal objects for deployment in diferent homes, get ini-
tial reactions and feedback from people on their experience with the device and use this feedback
as a start point for further developing the Wired Eye.
References
Acconci, Vito. (1969). Following Piece [photograph]. Retrieved March 10, 2014, from http://smarthistory.khanacade-
my.org/conceptual-artacconcis-following-piece.html
Baker, Michael. (2009, Dec 24). How to hack into any webcam in the world. [Video fle]. Retrieved from https://www.
youtube.com/watch?v=SFgHslD_I4A
Bauman, Z., & and Lyon, D. (2013). Liquid Surveillance: A Conversation. Cambridge, UK: John Wiley & Sons.
Boatman, K. Are Hackers Using Your Webcam to Watch You? Message posted to http://uk.norton.com/yoursecuri-
tyresource/detail.jsp?aid=webcam_hacking
Booktwo.org. Surveillance Spaulder. (2004). Retrieved March 10, 2014, from http://booktwo.org/notebook/surveil-
lance-spaulder/
Booktwo.org. Dronestagram: The Drones-Eye View. (2012). Retrieved March 5, 2014, from
http://booktwo.org/notebook/dronestagram-drones-eye-view/
Corbijn, A., Frei, C., Howarth, S., Verene, C., & Yokomizo, S. (2010). What are you looking at? Exposed: Voyeurism,
Surveillance, and the Camera. Tate. Retrieved February 20, 2014. from: http://www.tate.org.uk/context-comment/
articles/what-are-you-looking
Information Commissioners Ofce. Data Protection and Freedom of Information Advice. Retrieved March 27, 2014,
from http://ico.org.uk
IP Location. IP Location Finder - Geolocation. Retrieved March 20, 2014, from http://www.iplocation.net/
James Bridle. Rorschmap. (2011). Retrieved March 20, 2014, from http://rorschmap.com/
Legislation.gov.uk. Data Protection Act 1998. Retrieved March 15, 2014, from http://www.legislation.gov.uk/ukp-
ga/1998/29/contents
Legislation.gov.uk. Freedom of Information Act 2000. Retrieved March 15, 2014, from http://www.legislation.gov.uk/
ukpga/2000/36/contents
Legislation.gov.uk. Privacy and Electronic Communications (EC Directive) Regulations 2003. Retrieved March 15,
2014, from http://www.legislation.gov.uk/uksi/2003/2426/contents/made
Legislation.gov.uk. Environmental Information Regulations 2004. Retrieved March 15, 2014, from http://www.legis-
lation.gov.uk/uksi/2004/3391/contents/made
Phillips, Sandra S., & Baker, S. (2010). Exposed: Voyeurism, Surveillance, and the Camera since 1870. San Francisco,
CA: San Francisco Museum of Modern Art.
Rushkof, D. (2013). Present Shock: When everything happens now, Current Hardcover.

Spymaster. Londons Leading Spy Shop. Retrieved March 26, 2014, from http://www.spymaster.co.uk/
Yokomizo, Shizuka. (1998-2000). Untitled (from the series Stranger) [photographs], Retrieved February 20, 2014,
from:
http://www.tate.org.uk/context-comment/articles/what-are-you-looking

You might also like