[spectre] News about the the exhibition "Touch me" in Zagreb,
Croatia
Darko Fritz
fritz.d at chello.nl
Tue Sep 20 00:49:05 CEST 2005
http://www.kontejner.org/priopcenje/
from bbc
http://nrd.picigin.net/app/backend/Spoof_9/news.bbc.co.uk/frames.html
Printers made people mad
During the exhibition "Touch me" in Zagreb, Croatia, art group NRD Van
broke into local insecure wireless networks. The group hijacked several
users printers and fooled them into believing they became alive by
printing information about their online habits. Two people suffered
injuries as result of fearful reactions. In an exclusive interview with
the artists...
... we tried to shed some light as to why there was so much
manipulation with and abuse of animals, and in the end also people, in
the "Touch Me" exhibition. The talk with the artists lead us also to
check up on certain information with the T-Com, whose unprotected
wireless networks were used by the NRD Van artists as their chosen
medium of manipulation. But let start from the beginning:
What happened? What is your work about?
To do our work we have chosen completely uprotected wireless networks
that the T-Com is installing around with such a hype. These networks
provided us a good example for end user ignorance meeting corporate
greed for profit.
There is a large number of them installed all around Zagreb and we have
decided to tinker with that setting in order to start, in an
entertaining way, a communication with users of particularly insecure
networks.
Networks that particularly appealed to us were those where we could
find printers that could be accessed once you were connected to their
wireless network.
It needs to be noted that those are not simply networks that you can
connect to and access Internet, but networks where the key network
component "wireless router" was left without a password, so that we
could do anything we please without owners of those wireless nodes ever
noticing.
By using the router user name and T-Com's on-line telephone directory
we could soon dig out the address and the first and last name of the
account owner. The remaining data used in printing on remote printers
were recorded by monitoring and rdirecting the network traffic our way.
With a little bit of knowledge about network technologies in such
insecure networks in real time one can track in real time data such as
address and content of a web page that user is visiting at the moment
or text of an email message that user is receivig or sending at that
moment...
How were you entering the "communication" with users?
After intercepting their private data, we would initially first print
out on their printer: "Dear so and so, can you please check if I have
enough paper? I was silent for so long that I would now like to print
out entire novels..."..
After that we would wait for couple of minutes to send another message:
"What do you mean who?! Me, your printer that has finally come to life,
isn't that exciting :)"...
..After that we would most commonly relate the messages to the current
stream of data that we would get if the person would start to search
the web (and some of them immediately googled for the message) or to
the data we had already before printing out the first messages.
For us this seemed as a amusing and interesting way to let people know
that their communication infrastructure is fragile and that they should
do something about it...
Yet two people got hurt... One smashed his printer against the floor
and injured his foot in the process, while the other jumped through the
window freaked out by the printer that "came to life"?
When we speak of jumping through the window, we're not sure it can be
said that it was our intent to make people do such things.
The genious radio experiment "War of the Worlds" that Orson Welles did
in 1938 has proven that art can and, in a way, must question the limits
of mediation through media.
In our talks with the injured and their families it was Orson Welles's
example that people could grasp and accept as a key reference and
acknowledgement that our work can indeed be called art.
Besides shocking them, you also made them learn something new, didn't
you?
Learning through shock, manipulation and complex mediation are exactly
the artistic forms and procedures that we find interesting and that we
use in our work. Here we'd like to take a quote from Walter Benjamin
who says: that a revolutionary author should overcome the constrains of
dealing with product in order to bring about a transformation of "tools
of production"., and that culture and art must contain a dialectical
component too.
Such a statement in these post- times probably seems too doctrinary,
but we think that the society lingers behind the modern condition
established by communication technologies, and therefore to start
catching up we need to resort to the old school ideas of K.Marx or
W.Benjamin. ;)
What do you think what will the people whom you have scared,
manipulated and, in the manipulated, injured think of such
interpretations?
Those who got scared live in a state of permanent fear anyhow, while
for those whom we have manipulated and we continue to manipulate we
wish that the process of learning will start as soon as possible. To
those who got hurt we apologized and promised to buy them a new
printer, DVD release of "War of the Worlds" and a GNU/Linux LiveCD. We
also configured their router, so they are secure now. And they typed in
their own passwords ;)
... yet it was their accident that helped you get into the coverstories
of CNN, BBC, ...
The whole media coverage in our case is a complete scam, that is pure
unadulterated lie.
You quoted the corporate greed as a reason that there is so many
insecure networks in Zagreb?
We have quoted a combination of user ignorance, complete absence of
will to learn anything related to computers _and_ corporate greed for
profit as instrumental in generating such situations.
Ignorance and absence of will to learn new things became so deeply
rooted through decades of tradition and culture of using computer and
new technologies. Those who have contributed most to this situation are
the two technological mega-corporation Microsoft and Apple. Their users
are proud dummies.
In this particular case of our insecure wireless networks the T-Com
knows all to well that leaving wireless nodes installed in users'
appartments completely unprotected, even without a password for loging
into and taking control over the node, leaves users at the mercy of
anyone who commands basic knowledge of how networks function. The only
reason for leaving nodes as they are is to reduce costs of maintenance
and user support, and thus to increase profits. In this way the T-Com
allows its users an easy log on onto the node, but users are not aware
that this means also an easy log on for anyone in their vicinity.
You claim that leaving nodes without password is solely the
responsibility of T-Com?
Solely. The Telecommuncations Act, Article 105 clearly states: (1)
Provider of public telecommunication services must undertake necessary
technical and organizational steps in order to make secure own
telecommuncation services, and together with the operator undertake the
necessary steps to protect the security of telecommuncational network.
Steps undertaken must ensure the level of security adequate to the
level of danger for network security, provided that technical and
technological solutions exists and costs of such steps are reasonable.
(2) In case of a particular danger for telecommuncation network
security, the provider of public telecommuncation services must notify
users of its serevices of the existence of such danger. If the danger
is beyond the reasonable steps the services provider must undertake,
the services provider must notify users of its services of possible
counter-measures to remove the danger and/or its consequences,
including the notification of potential cost of such steps.
(3) Provider of public telecommuncation services is required to
delegate a person resposible for impelementation of steps from this
article.
In the case of wireless networks, the T-Com is not implementing any
level of security it is required to, and we still recall the dialer
bills that it tried to push its users to pay. A low level of security
means low maintenance costs, low costs of user care and often, as in
the dialer case, just another chance to rip off the ignorant. When
viewed against the background of a culture of ignorance promoted by
leading actors of software industry, the existing condition can hardly
be changed.
What could in your opinion change this existing condition?
GNU/Linux
More information about the SPECTRE
mailing list