black box

By Li Yi, 3 October, 2018
Language
Year
Record Status
Abstract (in English)

After Edward Snowden revealed the extent of the National Security Agency's spying program, people worldwide suddenly realised the degree to which their computing devices were gathering personal information that could be accessed by anyone with both the means and the inclination. The games Blackbox and République play with our relationships with our mobile devices, the former by cheekily revealing the functions of the titular blackboxes we hold in our hands, and the latter by crafting a dystopian society in which the player's phone becomes a tool primarily due to its centrality to surveillance culture. In this paper I consider the ways in which both Blackbox and République make use of the affordances of modern mobile devices to entertain and delight players while at the same time drawing attention to the ease with which malicious actors can exploit these same affordances to discover a worrying amount of information about the user. The tactics each game uses are notably different: Blackbox makes the user discover that it is secretly streaming an empty audio track without explicitly drawing a comparison to Facebook’s use of a similar tactic to spy on the user; République, by contrast, has the player make use of in-game cellphones, webcams, and Xbox consoles to spy on the game’s protagonist, drawing a direct comparison to the CIA’s use of the same devices. Despite these differences, however, each game makes use of the affordances of the platform to insert a crowbar into the gap between the user’s expectations and the technological reality of our devices. As I will demonstrate, the use of a player’s device to exploit hidden functionality within a ludic framework is a powerful illustration of the vulnerability of users to bad-faith actors, a vulnerability that works of electronic literature are uniquely positioned to communicate.

Description in original language
Content type
Author
Year
Language
Platform/Software
Record Status
Description (in English)

Ian Hatcher’s online and kinetic poem ⌰ [Total Runout] (2015) critiques corporate and governmental black boxing, at the level of its code, text, visual output and live sound performance. The poem is part of the series Drone Pilot, and it is presented in different versions: a Web-based work, a sound piece and a performance. It remixes appropriated text from a WikiLeaked manual by the UK Ministry of Defense, essays on artificial intelligence, and Hatcher’s own text. The overall versions of the work, understood as variable events, boldly problematize communication and cognitive processes in networks—whether they are implemented in computer systems by secret agencies or corporations. Hatcher’s critique to black boxes entails recreating issues of security, control and surveillance, as controlled systems are increasingly paving the way for less privacy and less knowledge about their inner workings. As a result, the poem questions the essence of privacy, redaction, and systemic violence, when access is a privileged asset of agents with security clearances or those with a deep knowledge of programming.

(Source: Álvaro Seiça)

Screen shots
Image
Total Runout
Image
Total Runout