Constant Vitrine
Install ? 21 Jan 2016
Opening 27 January 2016

Text for constant newsletter:
-------------------------

SICV (Scandinavian Institute of Computational Vandalism)

The Scandinavian Institute of Computational Vandalism is inspired by the Scandinavian Institute of Comparative Vandalism founded by Asger Jorn shortly after leaving the Situationist International in 1961. It was the name of an association combining the practices of collage, the forces of photography, image archives and political experiments. Using these methods, computational Vandalism challenges the assumptions at the basis of computer vision, the discipline that ties together programmatically the visual and the mnemonic.
In every operation of computer vision, there is this expectation that the gap between human perception and computer perception will be filled. But  what if it isn’t? What if it reveals that there is a zone of  intersection between human perception and computer vision, and that the contours of this zone are problematic, fluctuating? The process of computer vision is often narrated like a crime investigation where a story has to be reconstructed from various traces. Computational  vandalism is what introduces us to a world with a proliferation of powerfully meaningless little clues that do not point towards any murderer. Nobody is punished in the world of computational vandalists, but its visual structure is denser. Computational vandalism is Agatha Christie smoking Asger Jorn’s cigar.

-------------------------
FINAL TEXTS POSTER

The archive activists Michael Murtaugh, Nicolas
Malevé and Ellef Prestsæter present the installation
The Scandinavian Institute of Computational Vandalism in
the vitrine of Constant. During the opening on
Wednesday, January 27 at 18:00, you will have the
opportunity to discover the treasures hidden behind its
virtual scenes.


The project is inspired by the Scandinavian Institute of Comparative Vandalism (SICV) founded by Asger Jorn shortly after leaving the 
Situationist International in 1961. The SICV was an art and research 
association experimenting with the practice of collage, the forces of 
photography, image archives, and political imaginaries. 
Today Computational Vandalism challenges the assumptions at the basis of 
computer vision, the discipline that programmatically ties together the 
visual and the mnemonic. 

## FR

Les activistes des archives Michael Murtaugh, Nicolas
Malevé et Ellef Prestsæter présentent dans la vitrine
de Constant l’installation l’Institut Scandinave de
Vandalisme Computationnel . Pendant le vernissage, le
mercredi 27 janvier à 18h00, vous aurez l’occasion de
découvrir les trésors qui se cachent dans ses coulisses
virtuelles.

Ce projet est inspiré par l’Institut Scandinave de
Vandalisme Comparé (SICV) fondé par Asger Jorn peu
après avoir quitté l’Internationale Situationniste en
1961. C’était le nom d’une association combinant les
pratiques du collage, le potentiel de la photographie, les
archives d’images et les expériences politiques. En
utilisant ces méthodes, le Vandalisme Computationnel
remet en question les hypothèses à la base de la vision
par ordinateur, une discipline qui utilise le code
informatique pour relier la vision et la mémoire.

## NL

Programmeur en mediakunstenaars Michael
Murtaugh, Nicolas Malevé en Ellef Prestsæter
presenteren in de vitrine van Constant de installatie
Scandinavisch Instituut voor Computer Vandalisme . Tijdens
de opening op woensdag 27 januari om 18:00 kan je
enkele schatten ontdekken die anders in de coulissen
verborgen blijven.

Dit project is geïnspireerd op het Scandinavian Institute
for Comparative Vandalism (SICV), opgericht door Asger
Jorn kort na zijn afscheid van de Situationisten in
1961. Het was de naam van een vereniging die collage
combineerde met het potentieel van fotografie,
beeldarchieven en politieke ervaringen. Het
Scandinavisch Instituut voor Computer Vandalisme gebruikt
dezelfde methoden om de stellingnames die aan de
basis liggen van computer vision te bevragen, een
discipline die visuele en mnemonische gereedschappen
in software verenigt.


---------
Could we create a sense of moving through someone's desktop... performing the different kinds of materials in the blog (including those maybe less suited to the "cinematic" presentation).
* Selenium? (as a way to drive different browsers)
* Or an extension of videowiki / bash script -- have a way to translate a list of links (or actually sets of links) to automatically playout across (multiple) displays.

Eames "Glimpses of the U.S.A."
https://www.youtube.com/watch?v=Ob0aSyDUK4A
Could we riff of this language... and talk about contemporary computer vision / surveillance?


Orit Halpern
https://www.dukeupress.edu/Beautiful-Data/

---------------------------



As part of a workshop at the KHiO in Oslo, we presented a 1 hour presentation of the work of the SICV. Rather than a traditional lecture, we "performed" the following, a mix of images, sketch interfaces, video and audio clips. On top of this visual/audio layer, we read quotations from (related) blog posts and other collected snippets (the credits/sources of which are listed at the end).

Event link:
    http://www.khio.no/Norsk/Nyheter/Arkiv/Design/Forelesning+15.10.15%3A+%E2%80%8BEnemies+of+the+Archive.d25-SwljU1K.ips (SCREEN 1)

http://sicv.activearchives.org/mw/images/1/1a/Poctracingforprint.png

The  Scandinavian Institute of Comparative Vandalism (SICV) was founded by  Asger Jorn shortly after leaving the Situationist International in 1961.  It was the name of an association combining the forces of certain  artistic and political ideas, the French museum photographer Gerard  Franceschi and his Danish assistant Ulrik Ross, book printers and  publishing houses, a Citroën, archeologists and art historians, a board  consisting of well-respected citizens from Jorn’s hometown Silkeborg, a  darkroom and an archival apparatus. For a brief period (1961-1965), this  unlikely assembly was held together and in motion by the sales of  Jorn’s paintings, which by then had started to fare well on the  international market. The output of the institute was paginated rather  than painted: for Jorn the codex was a site for the analysis, sequencing  and presentation of large quantities of heterogeneous visual materials. 

Comparative contours http://sicv.activearchives.org/contours-view/test-plur-black-01.html

Through his “continuous collages” (the phrase belongs to Jorn’s friend  and collaborator, the archeologist P.V. Glob) Jorn wanted to trace image  migrations across space and time, including, most notably, what he  perceived as a specifically Nordic tradition going back to pre-Christian  times and significantly influencing European art writ large. Most  ambitiously, he planned the production of some thirty volumes of coffee  table books devoted to 10,000 Years of Nordic Folk Art under the auspices of the SICV

Matthew Fuller: Computational Vandalism (Contour tracing)
http://sicv.activearchives.org/audio/computationalvandalism.webm


VIDEO: Scanners Part 1 07:30-08:30 (voices)

Praat Annotations: http://activearchives.org/mw/images/9/93/Praat-annotations.png
Spectrum sort (Kurenniemi) http://activearchives.org/wiki/Spectrum_sort 131:50-ish

(VIDEO: Scanners (ephemerol) FIND TIMECODE)

Image pyramid (GG)
http://guttormsgaard.activearchives.org/ephemerol/scanners.html


This movement into the image is, for me, precisely the same as travelling out into the world. Zooming and travelling are two sides of the same coin. It’s a question of seeing through the conventions, of seeing one’s own culture from the outside – or trying to go as far as possible into it.

*A man goes to see his optician and asks for a pair of reading glasses.
*The optician: I already gave you a new pair last week.
*The man: I have already read them.
*
VIDEO: Out of Focus
http://sicv.activearchives.org/logbook/out-of-focus/


CABINET: http://sicv.activearchives.org/cabinet
Wolfgang: http://rwm.macba.cat/en/sonia/wolfgang_ernst/capsula   TIMECODE 01:43

*
Scanscapes (SICV)
http://sicv.activearchives.org/scanscape/README.html


*Like  the  blind, software sees while touching. And its vision is inseparable  from  movement. Considering its rhythmic dimension, scanning means more  than  digital conversion. Scanning has everything to do with slowness  and  speed, waiting and moving. The meaning of the word itself is   paradoxical: to scan   means to examine minutely and also means to look over quickly.  Scanning  is a redistribution of attention. What then if we look at the  scanner  not only as a practical digital photocopier but as a tool that  can be  extended to look at the entire archive, something that can (make  us)  scan and skim, minutely observe and look over rapidly. A scanner  gone  back to its etymological root from the Late Latin scandere   "to scan verse". As we know from poetry, verses are structures aimed  at  creating an aesthetic effect, but also to create a mnemonic one.  What  then is the scanner marking off? What are those mnemonic  structures  sensed by the comb of light-emitting fingers?


Blind Annotation: http://activearchives.org/wiki/Blind_annotation
for example.... http://kurenniemi.activearchives.org/aa/annotate/407/
*
*With privacy law, copyright, one can only look at an archive  blindfolded. Before tedious negotiations take place, images, sounds,  videos of the archive cannot be published. They still can remain in the  archive though.
*
*Can we therefore access the archive blindfolded?
*
*Being blindfolded implies the suppression of sight, but also implies a  concentration on other senses. Or implies a remapping of sight. Our  eyes are delegated to our hands, nose, to the epiderm and all these  informations combined produce a global image, a mental image.
*Using computer vision algorithms, we are seeing without eyes,  computer vision hides and reveals, hides and concentrates. A Braille  for the legal blind spots.


DATA GALLERY http://www.kurenniemi.constantvzw.org/db/records/images/view/3148

*Imagine a picture.
*An horizontal picture of 2592 pixels wide and of 1944 pixels height.
*Its print size is 36×27 inches.
*The picture was taken on the 06th of November 2004 at 21h56:37. The  document set contains 45732 pictures by Erkki Kurenniemi for the year  2004. Erkki took 223 pictures in 2004 between the hours of 9 and 10pm.  Of the 45732 pictures present in the dataset, Erkki took 33712 at night.

*In the folder where this file is located, there are 28 other pictures.  They have been taken between 21h56:32 and the next day at 19h21:18. The  folder Harrin bileet can be seen as a sequence of 21 hours 24 minutes 46  seconds of the life of a man of 63 years and 4 months at the date the  picture was taken.
*It took 10 of a 400th second for the camera to take the picture.
*The blink of an eye.
*
*[...]
*The level of skin colors is low, there is probably no nudity in the image. Or at least, nudity is not the main subject of the picture. In opposition to 63 percent of the pictures that contain a significant amount of skin colors. Two photographs in the same folder contain a large percentage of skin colors in their center. They are taken at 23h41 and 23h42, one hour and 45 minutes after the picture.
*There are 172 corners present. This level indicates that the picture may have been taken in a built environment. There are 3 faces positioned at (xx,xx), (xx,xx) and (xx,xx). They occupy a portion of xx% of the image. One at the lower left corner and two in the upper half of the image. The distance between the tree rectangles is in average xxx. The people are close without touching each other. The proximity of the photographer and the position of the face in other pictures prove that the photographer moves easily among the circle of people photographed.
*It is dark now. It is the end of an evening of November 2004. And the face in the center of the image receives more light than the one next to it at the right side. Two hands are close to the second face poorly lit. An image begins to form in the back of your mind, and we have only started counting.

*http://kurenniemi.activearchives.org/logbook/?page_id=521


(LATER: ?? Kurenniemi diary... )

GG: Orderings walk http://guttormsgaard.activearchives.org/orderings/walk.html

An interest in dispersed attention, such as the one modern art has shown throughout this century, may contribute to the deterioration of culture’s authoritarian patent makers, and surely it is this practice you would call comparative vandalism.
Détournement is a game born out of the capacity for devalorization. Only he who is able to devalorize can create new values. And only there where there is something to devalorize, that is, an already established value, can one engage in devalorization. It is up to us to devalorize or to be devalorized according to our ability to reinvest in our own culture.

Consider what happens when you run an image analysis procedure such as an edge detection or a (SIFT*) feature extractor, and then use a conventional means of visualizing the results drawnon top of the original. The result is an image dense with markings, edges of figures traced with the brutal pixelized edge of a computed curve or dotted with swarms of circular markers of various sizes and positions throughout the image at various points of (algorithmically determined) interest. The marks typically number from tens to hundreds. Visually, the language of the algorithmically annotated image resonates with the vandalized image, the political poster with sprayed-on beard or mustache, the marketing billboard covered with elements crossed out or covered by graffiti tags. There is an essential difference however: where the billboard vandal challenges the authority of the image (both of those depicted and the forces that arrange to place them in public), the marks of the algorithm carry themselves an authority borne from the often impenetrable layers of technique and software employed. On top of this, such techniques may well be further allied to authority by patents, software licenses, and other aspects of law. Furthermore, the images most frequently subjected to the algorithmic processes of analysis are typically banal ones, themselves collected by agents of authority and typically recorded with their subjects (relatively) unaware of their being taken. For instance, the closed circuit surveillance system in a shopping center or laundromat, or the passport control agent’s webcam.

Computational vandalism aims to challenge the authority of the algorithm and uses computation both as a means and a subject of critical investigation. It aims to expose the values enshrined in algorithms, to consider alternatives, and to feed them back upon themselves to make these processes more apparent in their operation, as well as to activate them as tools to investigate other kinds of images and contexts from their conventional uses.



Histograms: http://sicv.activearchives.org/histograms/ratios-colored.php
(showing histograms --- select an interval and click SWITCH)
*
* You are right to underline the authority of the algorithm. It is  nevertheless interesting to see that this authority is granted under a  very specific condition. The algorithm must in the end confirm human  perception. I always see a visual algorithm as a sort of Hercule Poirot  on a crime scene. Where his assistant Captain Hastings will immediately  decode the semantic layer, the obvious clues, the motives, Poirot always  seems concerned with absurdly pointless details: a slight change of  color in a carpet, the position of a finger, etc.
*
Feature browser (SICV)
http://sicv.activearchives.org/features/04_sift_features.html

*Poirot seems to embody  the coolness of media archeology, indifferent to content. Let’s think  of the SIFT algorithm, how it looks into extremely narrow fragments of  an image to find patterns that could identify an image even when it is  rotated. When we look at the regions of the images selected by the  algorithm, they seem completely secondary to the human observer. But, in  the end, if we make a search for similar images, the results returned  by this algorithm seem to match very well what a human would have picked  up. In every Hercule Poirot ending, the tour de force is to make a  match between all these apparently absurd little clues and a narrative  where the murderer is punished and the social order is confirmed.


http://sicv.activearchives.org/features/05_collage.html

*In  every operation of computer vision, there is this expectation that the  gap between human perception and computer perception will be filled. But  what if it isn’t? What if it reveals that there is a zone of  intersection between human perception and computer vision, and that the  contours of this zone are problematic, fluctuating? Computational  vandalism is what introduces us to a world with a proliferation of  powerfully meaningless little clues that do not point towards any  murderer. Nobody is punished in the world of computational vandalists,  but its visual structure is denser. Computational vandalism is Agatha  Christie smoking Asger Jorn’s cigar.


Video: UCF Bag of words "We don't have a vocabulary for visual images" TIMECODE

http://sicv.activearchives.org/logbook/the-past-is-woven-into-it/
http://kurenniemi.activearchives.org/video/thumbs.webm

“A photograph is a frozen moment, outside time. As Wittgenstein says it  is ‘a probability’, not ‘all probabilities’, what one sees in the blink  of an eye. But if you keep your eyes open you will see things move and  change, nature as a dynamic event, and it is this constant changing that  creates fuzziness on one hand but clarity on the other, because if you  only glimpse then you exclude all other aspects, you have no greater  clarity, you are blinkered.”
http://sicv.activearchives.org/logbook/francis-galtons-composite-portraiture-meets-wittgensteins-camera/

[…] A while ago I met an extremely interesting developer in Holland.  He was working on smart phone camera technology. A representational mode  of thinking photography is: there is something out there and it will be  represented by means of optical technology ideally via indexical link.  But the technology for the phone camera is quite different. As the  lenses are tiny and basically crap, about half of the data captured by  the sensor are noise. The trick is to create the algorithm to clean the  picture from the noise, or rather to define the picture from within  noise. But how does the camera know this? Very simple. It scans all  other pictures stored on the phone or on your social media networks and  sifts through your contacts. It looks through the pictures you already  made, or those that are networked to you and tries to match faces and  shapes. In short: it creates the picture based on earlier pictures, on  your/its memory. It does not only know what you saw but also what you  might like to see based on your previous choices. In other words, it  speculates on your preferences and offers an interpretation of data  based on affinities to other data. The link to the thing in front of the  lens is still there, but there are also links to past pictures that  help create the picture. You don’t really photograph the present, as the past is woven into it.

The result might be a picture that never existed in reality, but that  the phone thinks you might like to see. It is a bet, a gamble, some  combination between repeating those things you have already seen and  coming up with new versions of these, a mixture of conservatism and  fabulation. The paradigm of representation stands to the present  condition as traditional lens-based photography does to an algorithmic,  networked photography that works with probabilities and bets on inertia.  Consequently, it makes seeing unforeseen things more difficult. The  noise will increase and random interpretation too. We might think that  the phone sees what we want, but actually we will see what the phone  thinks it knows about us. A complicated relationship — like a very  neurotic marriage.


end credtis
Matthew Fuller
Asger Jorn
David Cronenberg
Hito Steyerl
Guttorm Guttormsgaard
Woody Allen
Robin Williams
Wolfgang Ernst
and other members of the SICV
 All reproduction, deformation, modification, derivation and transformation is permitted.


outtakes
Associative Memory http://kurenniemi.activearchives.org/logbook/?p=90

--------------------------

Search engine as curiosity cabinet

---------------------------

Planning
Need a "etherpad player" to play the page using iframes / give some preview of what a multiscreen installation would look like.

Desire to connect to bookmarking moments of the Guttorm / Orderings interface.
TODO: how to link to specific moments in the Orderings interface (need way to link)

WORMS as potential walks through the interface (like an active tag)

? Wormy paper books from Guttorm on display

Include the report?
http://pad.constantvzw.org/p/sicv_gg_report
==> http://sicv.activearchives.org/w/GG_Report

Play with the vitrine as a lab space, gradually augmenting it...

We have the first two reports, and the:
* Orderings
* Features & Affinities

How can this platform be used to preview spreads (PDF generation)...
or also multi screen output (vitrine)
(sifting blog post in a sense is about linking by image)

THOUGHTS WHILE TAGGING (...)

Is capturing and making a video loop of a figure opening their front door invasive, YES IT CERTAINLY IS.
Have we broken the law by placing a camera mounted facing outward onto the street, MOST LIKELY.
However, we make the mechanics of the machine also visible, also outward facing.

How is what we're doing not itself as invasive of privacy and alarming as the practices of mass CCTV surveillance, etc?
The image often came to my mind in returning each morning to the interface to tag collected faces of the fisherman considering the "daily catch" of faces caught by the net of haar cascades. In trawling the streets of St. Gilles in search of faces, much debris is collected along the way, headlights and hubcaps of cars, folds of jackets, the odd bit of plastic shopping bag, the fleeting visual interactions of a passersby and the street, and the endless plays of light on the architecture of a wall.

Is the law we break in creating an installation with computer vision simply one of not labelling the installation with the increasingly present (and thus ignored) iconography of public surveillance?

GIVING THE FINGER BACK TO THE DIGITAL!!!
http://sicv.activearchives.org/vitrine/20160227/collage20160227_004714.webm

The difference (if there is to be one) is in creating a (hopefully) more open loop -- as in the closed circuit of the public surveillance camera, our loop critically inverts the viewing screen to be outward facing, inviting participants to consider the implications of such a circuit, and to provide a platform for explicitly performing for it. Our position is to say that by activiating engagement with the materials of this sort of detection, seeing it's particular capabilities, but also limitations and peculiarities, is a means of taking a position of strength in critically opposing them or considering what means of legal limitation are important (for instance) or more to the point consider the limitations of legal measures  given the proliferation of smartphones and mechanisms of surveillance built into our so called social networks. This in contrast to a popular approach that often in the supposed name of critique, often seems to assert the authority of "big data" and (worse) to further unsubtantiated / undeserved reputation for being altogether more powerful, more accurate, more "human-like" (more black box) than these systems in fact really are or need to be.

FOR FINNISSAGE:
    I think it can really be a statement to have the screens then PLAY recorded snippets ... the source documents from Wenesday to Saturday, to complete the gesture of reversal to play the recordings back into the street. BUT rather than being a kind of vague thankyou to "the people" for helping make "our artwork"... it seems important to figure out how to frame the gesture as one to encourage taking a critical position. Maybe playing up the (possibly) sinister aspect of it is in fact a part of the statement -- rather than only being purely pleasurable.

Connect to criticism of this imal lecture http://imal.org/en/artssciences/jonasdegrave
* Statements of how "pretty good" the tech is...
* <!> the interface comparing "human" vs "bot" art making, the impovershment of what it means to be "human"... together with the overstatement/oversimplification of what it means to be "machine"

connections: Apple making an iPhone that "even they can't hack" ... as they ultimate embodiment of techno-determinism, and a transfer of responsibility / political agency into the "body" of technology / a device. ref: http://timesofindia.indiatimes.com/tech/tech-news/Apple-working-on-an-iPhone-even-its-engineers-cant-hack/articleshow/51133749.cms

TODO:
    * Prepare video of recordings
    * DOCUMENT / photograph the installation and possibly a "demo" of it working from outside.


(blah blah.... thinking about how these tools don't "THEMSELVES" write (as in the example of generating 1000s of pages of "shakespeare"... but rather if possible create a situation for the maybe writer to READ text again, intensely, in repetition, and perhaps eventually to write something of value enriched by the reading.

... cf here also Barthes in Plaisir du texte --- about the limits of syntax ... for simply reading a text, and the movement to writing.

ON THE (non)UNIVERSALITY of the FEATURE

In viewing Guttormsgaard's archive through the lens of the haar detector, you gain a new appreciation for the material in the collection. Whether in form of wire, wood, or typography, Guttorm has collected forms that tend toward a certain optical malleability, promiscuously inviting human forms to be cast on to them.

( language is theft
http://www.graffiti.org/ups/heal/part1b.html )

INSTALLATION NOTES (continued)
sudo apt-get install openbox rxvt-unicode feh figlet
mkdir ~/.config/openbox
cp /etc/xdg/openbox/rc.xml ~/.config/openbox


new openbox based server...  (addendum)

Openbox setup for pi...
actually openbox is already installed...
just need to add a .xinitrc with:
    exec openbox

Installed xscreensaver to disable screen blanking!

.Xdefaults

URxvt*transparent:true
URxvt*scrollBar:false
URxvt*foreground:Black
URxvt*font: 9x15bold
URxvt*geometry:110x50
URxvt*borderLess:true

~/.config/openbox/rc.xml
<application name="urxvt">
  <decor>no</decor>
  <focus>yes</focus>
  <position>
    <x>center</x>
    <y>200</y>
  </position>
  <layer>below</layer>
  <desktop>all</desktop>
  <!--  <maximized>true</maximized> #Only if you want a full size terminal.-->
  <skip_taskbar>yes</skip_taskbar>
 </application>

~/.config/openbox/autostart.sh
# Programs that will run after Openbox has started
sh ~/.fehbg & # set background image
(sleep 1 && tint2) &                             # start panel
(sleep 1 && wbar -pos right -vbar) &          # start menu bar
(sleep 1 && urxvt) &                    # start urxvt terminal
# disable screen blanking
xset -dpms &
xset s off &


Installing node     
    ------------------------------     
    Node for arm-pi, Last version built is 0.10.28?     
           https://nodejs.org/dist/v0.10.28/          
    Version of node in apt (nodejs) seems quite out of date (v 0.6.19)     
    
    SO to install, following the wonderfully compact instructions given here (            https://github.com/tvl83/RaspPaycoin)          :     
    
MAGIC 2 line node on pi install:
wget https://nodejs.org/dist/v0.10.28/node-v0.10.28-linux-arm-pi.tar.gz
cd /usr/local && sudo tar --strip-components 1 -xzf ~/node-v0.10.28-linux-arm-pi.tar.gz


Selecting the simpler OPENBOX-SESSION as default
-------------------------------------------------------------------------------------------
*sudo update-alternatives --config x-session-manager

select openbox-session (no 2 for me) then use

*sudo raspi-config

to configure boot to desktop env