You are on page 1of 14

This is an image from the Snowden files.

It is
labeled Òsecret.Ó1 Yet one cannot see anything on
it.
ÊÊÊÊÊÊÊÊÊÊThis is exactly why it is symptomatic.
ÊÊÊÊÊÊÊÊÊÊNot seeing anything intelligible is the new
normal. Information is passed on as a set of

01/14
signals that cannot be picked up by human
senses. Contemporary perception is machinic to
large degrees. The spectrum of human vision
only covers a tiny part of it. Electric charges,
radio waves, light pulses encoded by machines
for machines are zipping by at slightly
subluminal speed. Seeing is superseded by
calculating probabilities. Vision loses
importance and is replaced by filtering,
Hito Steyerl decrypting, and pattern recognition. SnowdenÕs
image of noise could stand in for a more general
A Sea of Data: human inability to perceive technical signals
unless they are processed and translated
accordingly.
Apophenia and ÊÊÊÊÊÊÊÊÊÊBut noise is not nothing. On the contrary,
noise is a huge issue, not only for the NSA but for
Pattern (Mis- machinic modes of perception as a whole.
ÊÊÊÊÊÊÊÊÊÊSignal v. Noise was the title of a column on
the internal NSA website running from 2011 to
)Recognition 2012. It succinctly frames the NSAÕs main
problem: how to extract Òinformation from the
truckloads of dataÓ:

ItÕs not about the data or even access to the


data. ItÕs about getting information from
the truckloads of data É Developers, please
help! WeÕre drowning (not waving) in a sea
of data Ð with data, data everywhere, but
A Sea of Data: Apophenia and Pattern (Mis-)Recognition

not a drop of information.2

Analysts are choking on intercepted


communication. They need to unscramble, filter,
e-flux journal #72 Ñ april 2016 Ê Hito Steyerl

decrypt, refine, and process Òtruckloads of data.Ó


The focus moves from acquisition to discerning,
from scarcity to overabundance, from adding on
to filtering, from research to pattern recognition.
This problem is not restricted to secret services.
Even WikiLeaks Julian Assange states: ÒWe are
drowning in material.Ó3

Apophenia
But letÕs return to the initial image. The noise on
it was actually decrypted by GCHQ technicians to
reveal a picture of clouds in the sky. British
analysts have been hacking video feeds from
Israeli drones at least since 2008, a period which
includes the recent IDF aerial campaigns against
Gaza.4 But no images of these attacks exist in
SnowdenÕs archive. Instead, there are all sorts of
abstract renderings of intercepted broadcasts.
Noise. Lines. Color patterns.5 According to
leaked training manuals, one needs to apply all
sorts of massively secret operations to produce
these kinds of images.6

04.14.16 / 13:08:39 EDT


ÊÊÊÊÊÊÊÊÊÊBut let me tell you something. I will decrypt on TV. My husband said he wanted to go to
this image for you without any secret algorithm. I sleep, but I wanted to stay up and watch Al
will use a secret ninja technique instead. And I Jazeera to see if there was any news of a
will even teach you how to do it for free. Please ceasefire. The last thing I remember, my
focus very strongly on this image right now. husband asked if I changed the channel
ÊÊÊÊÊÊÊÊÊÊDoesnÕt it look like a shimmering surface of and I said yes. I didnÕt feel anything when

02/14
water in the evening sun? Is this perhaps the the bomb hit Ð I was unconscious. I didnÕt
Òsea of dataÓ itself? An overwhelming body of wake up again until I was in the
water, which one could drown in? Can you see the ambulance.Ó Amani suffered second degree
waves moving ever so slightly? burns and was largely blinded.9
ÊÊÊÊÊÊÊÊÊÊI am using a good old method called
apophenia. What kind of ÒsignalÓ was extracted from what
ÊÊÊÊÊÊÊÊÊÊApophenia is defined as the perception of kind of ÒnoiseÓ to suggest that al-Nasasra was a
patterns within random data.7 The most common legitimate target? Which faces appear on which
examples are people seeing faces in clouds or on screens, and why? Or to put it differently: Who is
the moon. Apophenia is about Òdrawing Òsignal,Ó and who disposable ÒnoiseÓ?
connections and conclusions from sources with
no direct connection other than their Pattern Recognition
indissoluble perceptual simultaneity,Ó as Jacques Ranci•re tells a mythical story about
Benjamin Bratton recently argued.8 how the separation of signal and noise might
ÊÊÊÊÊÊÊÊÊÊOne has to assume that sometimes, have been accomplished in Ancient Greece.
analysts also use apophenia. Sounds produced by affluent male locals were
ÊÊÊÊÊÊÊÊÊÊSomeone must have seen the face of Amani defined as speech, whereas women, children,
al-Nasasra in a cloud. The forty-three-year-old slaves, and foreigners were assumed to produce
was blinded by an aerial strike in Gaza in 2012 in garbled noise.10 The distinction between speech
front of her TV: and noise served as a kind of political spam
filter. Those identified as speaking were labeled
ÒWe were in the house watching the news citizens and the rest as irrelevant, irrational, and

This image from the Snowden


files was captioned: ÒA single
frame of scrambled video
imagery.Ó

04.14.16 / 13:08:39 EDT


potentially dangerous nuisances. Similarly, ÊÊÊÊÊÊÊÊÊÊBrown teenagers, in this worldview, are
today, the question of separating signal and likely to exist. Dead brown teenagers? Why not?
noise has a fundamental political dimension. But rich brown teenagers? This is so improbable
Pattern recognition resonates with the wider that they must be dirty data and cleansed from
question of political recognition. Who is your system! The pattern emerging from this
recognized on a political level and as what? As a operation to separate noise and signal is not very

03/14
subject? A person? A legitimate category of the different from Ranci•reÕs political noise filter for
population? Or perhaps as Òdirty dataÓ? allocating citizenship, rationality, and privilege.
ÊÊÊÊÊÊÊÊÊÊWhat are dirty data? Here is one example: Affluent brown teenagers seem just as unlikely
as speaking slaves and women in the Greek polis.
Sullivan, from Booz Allen, gave the example ÊÊÊÊÊÊÊÊÊÊOn the other hand, dirty data are also
the time his team was analyzing something like a cache of surreptitious refusal;
demographic information about customers they express a refusal to be counted and
for a luxury hotel chain and came across measured:
data showing that teens from a wealthy
Middle Eastern country were frequent A study of more than 2,400 UK consumers
guests. by research company Verve found that
60%Êintentionally provided wrong
informationÊwhen submitting personal
ÒThere were a whole group of 17 year-olds details online. Almost one quarter (23
staying at the properties worldwide,Ó percent) said they sometimes gave out
Sullivan said. ÒWe thought, ÔThat canÕt be incorrect dates of birth, for example, while
true.ÕÓ11 9 percent said they did this most of the
time and 5 percent always did it.12
The demographic finding wasÊdismissed as dirty
data Ð a messed up and worthless set of Dirty data is where all of our refusals to fill out
information Ð before someone found out that, the constant onslaught of online forms
actually, it was true. accumulate. Everyone is lying all the time,

Rose Mary Woods, Nixon's lifelong secretary, demonstrates the ÒRose Mary Stretch,Ó a gesticulation that purportedly led to the erasure of a section of
the Watergate tapes. The quality of noise in this section of the tapes has been throughly analyzed to understand if the omission was intentional.
Photo: Wikimedia commons.

04.14.16 / 13:08:39 EDT


whenever possible, or at least cutting corners.
Not surprisingly, the ÒdirtiestÓ area of data Graeber goes on to call this an example of
collection is consistently pointed out to be the utopian thinking. Bureaucracy is based on
health sector, especially in the US. Doctors and utopian thinking because it assumes people to
nurses are singled out for filling out forms be perfect from itÕs own point of view. GraeberÕs
incorrectly. It seems that health professionals mother died before she was accepted into the

04/14
are just as unenthusiastic about filling out forms program.
for systems designed to replace them, as ÊÊÊÊÊÊÊÊÊÊThe endless labor of filling out completely
consumers are about performing clerical work meaningless forms is a new kind of domestic
for corporations that will spam them in return. labor in the sense that it is not considered labor
ÊÊÊÊÊÊÊÊÊÊIn his book The Utopia of Rules, David at all and assumed to be provided ÒvoluntarilyÓ
Graeber gives a profoundly moving example of or performed by underpaid so-called data
the forced extraction of data. After his mom janitors.14 Yet all the seemingly swift and
suffered a stroke, he went through the ordeal of invisible action of algorithms, their elegant
having to apply for Medicaid on her behalf: optimization of everything, their recognition of
patterns and anomalies Ð this is based on the
I had to spend over a month É dealing with endless and utterly senseless labor of providing
the ramifying consequences of the act of or fixing messy data.
whatever anonymous functionary in the ÊÊÊÊÊÊÊÊÊÊDirty data is simply real data in the sense
New York Department of Motor Vehicles that it documents the struggle of real people
had inscribed my given name as ÒDaid,Ó not with a bureaucracy that exploits the uneven
to mention the Verizon clerk who spelled distribution and implementation of digital
my surname ÒGrueber.Ó Bureaucracies technology.15 Consider the situation at LaGeSo
public and private appear Ð for whatever (the Health and Social Affairs Office) in Berlin,
historical reasons Ð to be organized in such where refugees are risking their health on a daily
a way as to guarantee that a significant basis by standing in line outdoors in severe
proportion of actors will not be able to winter weather for hours or even days just to
perform their tasks as expected.13 have their data registered and get access to

This photographÊfromÊJune 6, 2012 shows a student pilot and sensor operator manning the controls of a MQ-9 Reaper in a ground-based
cockpit during a training mission flown from Hancock Field Air National Guard Base, Syracuse, New York. Photo: AP Photo.

04.14.16 / 13:08:39 EDT


services to which they are entitled (for example, casualties from the conflict gleaned from
money to buy food).16 These people are perceived open press reports and other sources.
as anomalies because, in addition to having the Some of the material came from the Dark
audacity to arrive in the first place, they ask that Web, data related to the black market for
their rights be respected. There is a similar passports; IBM says that they anonymized
political algorithm at work: people are blanked or obscured personally identifiable

05/14
out. They cannot even get to the stage to be information in this set É
recognized as claimants. They are not taken into
account.
ÊÊÊÊÊÊÊÊÊÊOn the other hand, technology also Borene said the system could provide a
promises to separate different categories of score to indicate the likelihood that a
refugees. IBMÕs Watson AI system was hypothetical asylum seeker was who they
experimentally programmed to potentially said they were, and do it fast enough to be
identify terrorists posing as refugees: useful to a border guard or policeman
walking aÊbeat.17
IBM hoped to show that the i2 EIA could
separate the sheep from the wolves: that The cross-referencing of unofficial databases,
is, the masses of harmless asylum-seekers including dark web sources, is used to produce a
from the few who might be connected to Òscore,Ó which calculates the probability that a
jihadism or who were simply lying about refugee might be a terrorist. The hope is for a
theirÊidentities É pattern to emerge across different datasets,
without actually checking how or if they
correspond to any empirical reality. This example
IBM created a hypothetical scenario, is actually part of a much larger subset of
bringing together several data sources to ÒscoresÓ: credit scores, academic ranking
match against a fictional list of passport- scores, scores ranking interaction on online
carrying refugees. Perhaps the most forums etc., which classify people according to
important dataset was a list of names of financial interactions, online behavior, market

TheÊRussian TV station Zvezda claimed this flock of birds over New York City appeared to form the shape of President Vladimir PutinÕs face.
YouTube video screenshot.

04.14.16 / 13:08:39 EDT


06/14

A plate of spaghetti meatballs return our gaze, courtesy of Google inceptionism. Source: Mary-Ann Russon, ÒGoogle DeepDream robot: 10 weirdest images
produced by AI 'inceptionism' and users online,Ó International Business Times, July 6, 2015 http://www.ibtimes.co.uk/google-deepdream-robot-10-weirdest-
images-produced-by-ai-inceptionism-users-online-1509518

04.14.16 / 13:08:39 EDT


07/14

CGI acupuncture: Face Robot, a general-purpose animation system, promises efficiency in motion capturing actorÕs faces through this 32-point system.

04.14.16 / 13:08:39 EDT


data, and other sources. A variety of inputs are followed, thousands of innocent people in
boiled down to a single number Ð a superpattern Pakistan may have been mislabelled as terrorists
Ð which may be a ÒthreatÓ score or a Òsocial by that Ôscientifically unsoundÕ algorithm,
sincerity score,Ó as planned by Chinese possibly resulting in their untimely demise.Ó19
authorities for every single citizen within the next ÊÊÊÊÊÊÊÊÊÊOne needs to emphasize strongly that
decade. But the input parameters are far from SKYNETÕs operations cannot be objectively

08/14
being transparent or verifiable. And while it may assessed, since it is not known how itÕs results
be seriously desirable to identify Daesh moles were utilized. It was most certainly not the only
posing as refugees, a similar system seems to factor in determining drone targets.20 But the
have worrying flaws. example of SKYNET demonstrates just as
ÊÊÊÊÊÊÊÊÊÊThe NSAÕs SKYNET program was trained to strongly that a ÒsignalÓ extracted by assessing
find terrorists in Pakistan by sifting through cell correlations and probabilities is not the same as
phone customer metadata. But experts criticize an actual fact, but determined by the inputs the
the NSAÕs methodologies. ÒThere are very few software uses to learn, and the parameters for
Ôknown terroristsÕ to use to trainÊandÊtest the filtering, correlating, and Òidentifying.Ó The old
model,Ó explained Patrick Ball, a data scientist engineer wisdom Òcrap in Ð crap outÓ seems to
and director of theÊHuman Rights Data Analysis still apply. In all of these cases Ð as completely
Group, to Ars Technica. ÒIf they are using the different as they are technologically,
same records to train the model as they are using geographically, and also ethically Ð some version
to test the model, their assessment of the fit is of pattern recognition was used to classify
completelyÊbullshit.Ó18 groups of people according to political and social
ÊÊÊÊÊÊÊÊÊÊHuman Rights Data Analysis Group parameters. Sometimes it is as simple as, we try
estimates that around 99,000 Pakistanis might to avoid registering refugees. Sometimes there is
have ended up wrongly classified as terrorists by more mathematical mumbo jumbo involved. But
SKYNET, a statistical margin of error that might many methods used are opaque, partly biased,
have had deadly consequences given the fact exclusive, and Ð as one expert points out Ð
that the US is waging a drone war on suspected sometimes also Òridiculously optimistic.Ó21
militants in the country and between 2500 and
four thousand people are estimated to have been Corporate Animism
killed since 2004: ÒIn the years that have How to recognize something in sheer noise? A

Previously unknown archaeological monuments have been revealed as of September 2015 by the Stonehenge Hidden Landscapes Project. The findings
include new information about the world's largest Òsuper hengeÓ and include ritual monuments such as the mortuary building pictured above in a 3-D
reconstruction. Copyright: LBI ArchPro, Joachim Brandtner

04.14.16 / 13:08:39 EDT


striking visual example of pure and conscious ÊÊÊÊÊÊÊÊÊÊBy ÒrecognizingÓ things and patterns that
apophenia was recently demonstrated by were not given, inceptionist neural networks
research labs at Google:22 eventually end up effectively identifying a new
totality of aesthetic and social relations. Presets
We train an artificial neural network by and stereotypes are applied, regardless of
showing it millions of training examples whether they ÒapplyÓ or not: ÒThe results are

09/14
and gradually adjusting the network intriguing Ð even a relatively simple neural
parameters until it gives the classifications network can be used to over-interpret an image,
we want. The network typically consists of just like as children we enjoyed watching clouds
10Ð30 stacked layers of artificial neurons. and interpreting the random shapes.Ó26
Each image is fed into the input layer, ÊÊÊÊÊÊÊÊÊÊBut inceptionism is not just a digital
which then talks to the next layer, until hallucination. It is a document of an era that
eventually the ÒoutputÓ layer is reached. trains smartphones to identify kittens, thus
The networkÕs ÒanswerÓ comes from this hardwiring truly terrifying jargons of cutesy into
final output layer.23 the means of production.27 It demonstrates a
version of corporate animism in which
Neural networks were trained to discern edges, commodities are not only fetishes but morph into
shapes, and a number of objects and animals franchised chimeras.
and then applied to pure noise. They ended up ÊÊÊÊÊÊÊÊÊÊYet these are deeply realist representations.
ÒrecognizingÓ a rainbow-colored mess of According to Gyšrgy Lukacs, Òclassical realismÓ
disembodied fractal eyes, mostly without lids, creates Òtypical characters,Ó insofar as they
incessantly surveilling their audience in a represent the objective social (and in this case
strident display of conscious pattern technological) forces of our times.28
overidentification. ÊÊÊÊÊÊÊÊÊÊInceptionism does that and more. It also
ÊÊÊÊÊÊÊÊÊÊGoogle researchers call the act of creating a gives those forces a face Ð or more precisely,
pattern or an image from nothing but noise innumerable eyes. The creature that stares at
ÒinceptionismÓ or Òdeep dreaming.Ó But these you from your plate of spaghetti and meatballs is
entities are far from mere hallucinations. If they not an amphibian beagle. It is the ubiquitous
are dreams, those dreams can be interpreted as surveillance of networked image production, a
condensations or displacements of the current form of memetically modified intelligence that
technological disposition. They reveal the watches you in the shape of the lunch that you
networked operations of computational image will Instagram in a second if it doesnÕt attack you
creation, certain presets of machinic vision, its first. Imagine a world of enslaved objects
hardwired ideologies and preferences. remorsefully scrutinizing you. Your car, your
A Sea of Data: Apophenia and Pattern (Mis-)Recognition

yacht, your art collection observes you with a


One way to visualize what goes on is to turn gloomy and utterly desperate expression. You
the network upside down and ask it to may own us, they seem to say, but we are going to
enhance an input image in such a way as to inform on you. And guess what kind of creature
e-flux journal #72 Ñ april 2016 Ê Hito Steyerl

elicit a particular interpretation. Say you we are going to recognize in you!29


want to know what sort of image would
result in ÒBanana.Ó Start with an image full Data Neolithic
of random noise, then gradually tweak the But what are we going to make of automated
image towards what the neural net apophenia?30 Are we to assume that machinic
considers a banana. By itself, that doesnÕt perception has entered its own phase of magical
work very well, but it does if we impose a thinking? Is this what commodity enchantment
prior constraint that the image should have means nowadays: hallucinating products? It
similar statistics to natural images, such as might be more accurate to assume that humanity
neighboring pixels needing to be has entered yet another new phase of magical
correlated.24 thinking. The vocabulary deployed for separating
signal and noise is surprisingly pastoral: data
In a feat of genius, inceptionism manages to ÒfarmingÓ and Òharvesting,Ó ÒminingÓ and
visualize the unconscious of prosumer networks: ÒextractionÓ are embraced as if we lived through
images surveilling users, constantly registering another massive neolithic revolution31 with itÕs
their eye movements, behavior, preferences, own kind of magic formulas.
aesthetically helplessly adrift between ÊÊÊÊÊÊÊÊÊÊAll sorts of agricultural and mining
Hundertwasser mug knockoffs and Art Deco technologies Ð that were developed during the
friezes gone ballistic. Walter BenjaminÕs Òoptical neolithic Ð are reinvented to apply to data. The
unconsciousÓ has been upgraded to the stones and ores of the past are replaced by
unconscious of computational image silicone and rare earth minerals, while a
divination.25 Minecraft paradigm of extraction describes the

04.14.16 / 13:08:39 EDT


processing of minerals into elements of ÊÊÊÊÊÊÊÊÊÊThe supposedly new forms of governance
information architecture.32 emerging from these technologies look partly
ÊÊÊÊÊÊÊÊÊÊPattern recognition was an important asset archaic and partly superstitious. What kind of
of neolithic technologies too. It marked the corporate/state entities are based on data
transition between magic and more empirical storage, image unscrambling, high-frequency
modes of thinking. The development of the trading, and Daesh Forex gaming? What are the

10/14
calendar by observing patterns in time enabled contemporary equivalents of farmer kings and
more efficient irrigation and agricultural slaveholders, and how are existing social
scheduling. Storage of cereals created the idea hierarchies radicalized through examples as
of property. This period also kick-started vastly different as tech-related gentrification
institutionalized religion and bureaucracy, as and jihadi online forum gamification? How does
well as managerial techniques including laws the world of pattern recognition and big-data
and registers. All these innovations also divination relate to the contemporary jumble of
impacted society: hunter and gatherer bands oligocracies, troll farms, mercenary hackers, and
were replaced by farmer kings and slaveholders. data robber barons supporting and enabling bot
The neolithic revolution was not only governance, Khelifah clickbait and
technological but also had major social polymorphous proxy warfare? Is the state in the
consequences. age of Deep Mind, Deep Learning, and Deep
ÊÊÊÊÊÊÊÊÊÊToday, expressions of life as reflected in Dreaming a Deep Stateª? One in which there is
data trails become a farmable, harvestable, no appeal nor due process against algorithmic
minable resource managed by informational decrees and divination?
biopolitics.33 ÊÊÊÊÊÊÊÊÊÊBut there is another difference between the
ÊÊÊÊÊÊÊÊÊÊAnd if you doubt that this is another age of original and the current type of Òneolithic,Ó and it
magical thinking, just look at the NSA training harks back to pattern recognition. In ancient
manual for unscrambling hacked drone astronomy, star constellations were imagined by
intercepts. As you can see, you need to bewitch projecting animal shapes into the skies. After
the files with a magic wand. (Image Magick is a cosmic rhythms and trajectories had been
free image converter): recorded on clay tablets, patterns of movement

04.14.16 / 13:08:39 EDT


Could this image be a representation of the neo-neolithic? Source: Mary-Ann Russon, ÒGoogle DeepDream robot: 10 weirdest images produced by AI
'inceptionism' and users online,Ó International Business Times, July 6, 2015 http://www.ibtimes.co.uk/google-deepdream-robot-10-weirdest-images-
produced-by-ai-inceptionism-users-online-1509518.

04.14.16 / 13:08:39 EDT


started to emerge. As additional points of images of this attack, at least as far as I know of.
orientation, some star groups were likened to All we know is what she told Human Rights
animals and heavenly beings. However, progress Watch. This is what she said: ÒI canÕt see Ð ever
in astronomy and mathematics happened not since the bombing, I can only see shadows.Ó34
because people kept believing there were ÊÊÊÊÊÊÊÊÊÊSo there is one more way to decode this
animals or gods in space, but on the contrary, image. ItÕs plain for everyone to see. We see what

12/14
because they accepted that constellations were Amani cannot see.
expressions of a physical logic. The patterns ÊÊÊÊÊÊÊÊÊÊIn this case, the noise must be a
were projections, not reality. While today ÒdocumentÓ of what she ÒseesÓ now: Òthe
statisticians and other experts routinely shadows.Ó
acknowledge that their findings are mostly ÊÊÊÊÊÊÊÊÊÊIs this a document of the drone warÕs
probabilistic projections, policymakers of all optical unconscious? Of itÕs dubious and
sorts conveniently ignore this message. In classified methods of Òpattern recognitionÓ? And
practice you become coextensive with the data- if so, is there a way to ever ÒunscrambleÓ the
constellation you project. Social scores of all ÒshadowsÓ Amani has been left with?
different kinds Ð credit scores, academic scores, ÊÊÊÊÊÊÊÊÊÊ×
threat scores Ð as well as commercial and Acknowledgments: The initial version of this text was written
at the request of Laura Poitras, who most generously allowed
military pattern-of-life observations impact the access to some unclassified documents from the Snowden
real lives of real people, both reformatting and archive, and a short version was presented during the opening
radicalizing social hierarchies by ranking, of her show ÒAstro NoiseÓ at the Whitney Museum. Further
thanks to Henrik Moltke for facilitating access to the
filtering, and classifying. documents, to Brenda and other members of LauraÕs studio, to
ÊÊÊÊÊÊÊÊÊÊÊ Linda Stupart for introducing me to the term Òapophenia,Ó and
to Ben Bratton for fleshing it out for me.

Source: Anh Nguyen, Jason Yosinski, and Jeff Clune, ÒDeep Neural
Networks are Easily Fooled: High Confidence Predictions for
Unrecognizable Images,Ó cv-foundation.org, 2015 http://www.cv-
foundation.org/openaccess/content_cvpr_2015/papers/Nguyen_Deep_Neural_Networks_2015_CVPR_paper.pdf.

Gestalt Realism
But letÕs assume we are actually dealing with
projections. Once one accepts that the patterns
derived from machinic sensing are not the same
as reality, information definitely becomes
available with a certain degree of veracity.
ÊÊÊÊÊÊÊÊÊÊLetÕs come back to Amani al-Nasasra, the
woman blinded by an aerial attack in Gaza. We
know: the abstract images recorded as
intercepts of IDF drones by British spies do not
show the aerial strike in Gaza that blinded her in
2012. The dates donÕt match. There is no
evidence in SnowdenÕs archive. There are no

04.14.16 / 13:08:39 EDT


Hito SteyerlÊis a filmmaker and writer whoÊlives in ÊÊÊÊÊÊ1 a shared aisthesis. And the
Berlin. See politics of these categories É
https://www.documentcloud.or has consisted in making what
g/documents/2699846-Anarchis was unseen visible; in getting
t-Training-mod5-Redacted-Com what was only audible as noise
pat.html to be heard as speech.Ó

ÊÊÊÊÊÊ2 ÊÊÊÊÊÊ11
ÒThe SIGINT World Is Flat,Ó Verne Kopytoff, ÒBig dataÕs dirty

13/14
Signal v. Noise column, problem,Ó Fortune, June 30, 2014
December 22, 2011. http://fortune.com/2014/06/3
0/big-data-dirty-problem/
ÊÊÊÊÊÊ3
Michael Sontheimer, ÒSPIEGEL ÊÊÊÊÊÊ12
Interview with Julian Assange: Larisa Bedgood, ÒA Halloween
ÔWe Are Drowning in Material,ÕÓ Special: Tales from the Dirty
Spiegel Online, July 20, 2015 Data Crypt,Ó relevategroup.com,
http://www.spiegel.de/intern October 30 2015
ational/world/spiegel-interv http://www.relevategroup.com
iew-with-wikileaks-head-juli /a-halloween-special-tales-f
an-assange-a-1044399.html rom-the-dirty-data-crypt/#st
hash.BWrxNRaE.dpuf. The
ÊÊÊÊÊÊ4 article continues: ÒIn late June
Cora Currier and Henrik Moltke, and early July 1991, twelve
ÒSpies in the Sky: Israeli Drone million people across the
Feeds Hacked By British and country (mostly Baltimore,
American Intelligence,Ó The Washington, Pittsburgh, San
Intercept, January 28, 2016 Francisco, and Los Angeles) lost
https://theintercept.com/201 phone service due to a
6/01/28/israeli-drone-feeds- typographical error in the
hacked-by-british-and-americ software that controls signals
an-intelligence/ regulating telephone traffic. One
employee typed a Ô6Õ instead of a
ÊÊÊÊÊÊ5 ÔD.Õ The phone companies
Ibid. Many of these images are essentially lost all control of
currently part of Laura PoitrasÕs their networks.Ó
excellent show ÒAstro NoiseÓ at
the Whitney Museum in New ÊÊÊÊÊÊ13
York. David Graeber, The Utopia of
Rules: On Technology, Stupidity
ÊÊÊÊÊÊ6 and the Secret Joys of
In the training manual on how to Bureaucracy (Brooklyn: Melville
decode these feeds, analysts House, 2015), 48.
proudly declared they used open
source software developed by ÊÊÊÊÊÊ14
the University of Cambridge to Steve Lohr, ÒFor Big-Data
hack Sky TV. See Scientists, ÔJanitor WorkÕ Is Key
https://www.documentcloud.or Hurdle to Insights,Ó New York
g/documents/2699846-Anarchis Times, August 17, 2014
t-Training-mod5-Redacted-Com http://www.nytimes.com/2014/
pat.html 08/18/technology/for-big-dat a-
scientists-hurdle-to-insig hts-
A Sea of Data: Apophenia and Pattern (Mis-)Recognition

ÊÊÊÊÊÊ7 is-janitor-work.html?_r= 0
See https://en.wikipedia.org/wik
i/Apophenia ÊÊÊÊÊÊ15
See ÒE-Verify: The Disparate
ÊÊÊÊÊÊ8 Impact of Automated Matching
Benjamin H. Bratton, ÒSome Programs,Ó chap. 2 in the report
e-flux journal #72 Ñ april 2016 Ê Hito Steyerl

Trace Effects of the Post- Civil Rights, Big Data, and Our
Anthropocene: On Algorithmic Future,
Accelerationist Geopolitical bigdata.fairness.io, September
Aesthetics,Ó e-flux journal 46 2014 https://bigdata.fairness.io/
(June 2013) www.e- e-verify/
flux.com/journal/some- trace-
effects-of-the-post-an ÊÊÊÊÊÊ16
thropocene-on-accelerationis t- See Melissa Eddy and Katarina
geopolitical-aesthetics/ Johannsen, ÒMigrants Arriving in
Germany Face a Chaotic
ÊÊÊÊÊÊ9 Reception in Berlin,Ó New York
ÒIsrael: Gaza Airstrikes Violated Times, November 26, 2015
Laws of War,Ó hrw.org, February http://www.nytimes.com/2015/
12, 2013 11/27/world/europe/germany-b
https://www.hrw.org/news/201 erlin-migrants-refugees.html
3/02/12/israel-gaza-airstrik es- ?_r=0. A young boy disappeared
violated-laws-war among the chaos and was later
found murdered.
ÊÊÊÊÊÊ10
Jacques Ranci•re, ÒTen Theses ÊÊÊÊÊÊ17
on Politics.Ó Theory & Event, Vol. Patrick Tucker, ÒRefugee or
5, No. 3 (2001). ÒIn order to Terrorist? IBM Thinks Its
refuse the title of political Software Has the Answer,Ó
subjects to a category Ð Defense One, January 27, 2016
workers, women, etc. Ð it has http://www.defenseone.com/te
traditionally been sufficient to chnology/2016/01/refugee-or-
assert that they belong to a terrorist-ibm-thinks-its-sof
ÔdomesticÕ space, to a space tware-has-answer/125484/. This
separated from public life; one example was mentioned by Kate
from which only groans or cries Crawford in her brilliant lecture
expressing suffering, hunger, or ÒSurviving Surveillance,Ó
anger could emerge, but not delivered as part of the panel
actual speeches demonstrating discussion ÒSurviving Total

04.14.16 / 13:08:39 EDT


Surveillance,Ó Whitney Museum, available at monoskop.org reading patterns into data as if
February 29, 2016. http://monoskop.org/images/7 ÊÊÊÊÊÊBut singularity also means they were the entrails of
/79/Benjamin_Walter_1931_197 something different: general sacrificial animals. They are
ÊÊÊÊÊÊ18 2_A_Short_History_of_Photogr rules no longer apply to this successors of the more
Christian Grothoff and J. M. aphy.pdf entity, especially not the rule of traditional augurs that Walter
Porup, ÒThe NSAÕs SKYNET law. ItÕs case-by-case instead, or Benjamin described as
program may be killing ÊÊÊÊÊÊ26 rather, every-case-for-itself. photographers avant la lettre:
thousands of innocent people,Ó ÒInceptionism.Ó Accordingly, there seem to be ÒIs not every spot of our cities
Ars Technica, February 16, 2016, competing singularities. the scene of a crime? Every

14/14
italics in original ÊÊÊÊÊÊ27 Another, even more powerful passerby a perpetrator? Does
http://arstechnica.co.uk/sec See ibid. singularity of our times is most not the photographer Ð
urity/2016/02/the-nsas-skyne t- obviously the semi-divine descendent of augurers and
program-may-be-killing-tho ÊÊÊÊÊÊ28 mythical entity called Òthe haruspices Ð uncover guilt in his
usands-of-innocent-people/. An Farhad B. Idris, ÒRealism,Óin markets,Ó a set of organizations pictures?Ó
additional bug of the system was Encyclopedia of Literature and regarded as both autonomous
that the person who seemed to Politics: Censorship, Revolution, and superintelligent, of such ÊÊÊÊÊÊThere is a decisive
pose the biggest threat of all and Writing, Volume II: HÐR, ed. providence that reason has to distinction, though, between the
according to this program was M. Keith Booker (Westport, CT: bow to its vast superiority. If the twentieth-century photographer
actually the head of the local Al Greenwood), 601. myth of the market today can be and the filterers and decoders of
Jazeera office, because he said to have replaced the myth the twenty-first. Contemporary
obviously traveled a lot for ÊÊÊÊÊÊ29 of socialism, then the actually pattern extractors are not mainly
professional reasons. A similar Is apophenia a new form of existing singularities today Ð supposed to recognize the guilty
misassessment also happened paranoia? In 1989, Frederic government surveillance and after the fact. They are expected
to Laura Poitras, who was rated Jameson declared paranoia to market domination, each to predict the perpetrator as
four hundred out of a possible be one of the main cultural dominated by singular laissez- well as the crime before it ever
four hundred points on a US patterns of postmodern faire ideas Ð plus the vast and happens Ð and to preempt it.
Homeland Security threat scale. narrative, pervading the political confusing bureaucracies, Every spot of our cities is
As Poitras was filming material unconscious. According to oligarchies, quasi-states, mapped out as a probable crime
for her documentary My Country, Jameson, the totality of social informal dictatorships, dark net site, fully decked out with
My Country in Iraq Ð later relations could not be culturally start-ups, econometric SWAT gender- and age-based targeted
nominated for an Academy represented within the Cold War teams, and unclassifiable para- advertising Ð surveilled by
Award Ð she ended up filming in imagination Ð and the blanks monopolies sustaining their animated commodities,
the vicinity of an insurgent were filled in by delusions, operations have replaced the divinatory cellphone cameras,
attack in Baghdad. This conjecture, and whacky plots actually existing socialisms of and aerial views from tapped
coincidence may led to a six- featuring Freemason logos. But the twentieth century: drones.
year ordeal that involved her after SnowdenÕs leaks, one thing ideological entities spread out
being interrogated, surveilled, became clear: all conspiracy across junk space data centers, ÊÊÊÊÊÊ34
searched, etc., every time she theories were actually true. high-frequency trading ÒIsrael: Gaza Airstrikes Violated
reentered the United States Worse, they were outdone by exchanges, and vast zones of Laws of War.Ó
from abroad. reality. Paranoia is anxiety impunity and violence that
caused by an absence of create a completely biased and
ÊÊÊÊÊÊ19 information, by missing links unsustainable distribution of
Ibid. and allegedly covered-up both information and resources.
evidence. Today, the contrary
ÊÊÊÊÊÊ20 applies. JamesonÕs totality has ÊÊÊÊÊÊ30
See Michael V. Hayden, ÒTo Keep taken on a different form. It is More recent, extremely
America Safe, Embrace Drone not absent. On the contrary: it is fascinating examples include
Warfare,Ó New York Times, rampant. Totality Ð or maybe a Christian Szegedy et. al,
February 19, 2016 correlated version thereof Ð has ÒIntriguing properties of neural
http://www.nytimes.com/2016/ returned with a vengeance in the networks,Ó arxiv.org, February
02/21/opinion/sunday/drone-w form of oceanic Òtruckloads of 19, 2014
arfare-precise-effective-imp data.Ó Social relations are http://arxiv.org/pdf/1312.61
A Sea of Data: Apophenia and Pattern (Mis-)Recognition

erfect.html. The director of the distilled as contact metadata, 99v4.pdf; and Anh Nguyen,
CIA from 2006Ð09, Hayden relational graphs, or infection Jason Yosinski, and Jeff Clune,
asserts that human intelligence spread maps. Totality is a ÒDeep Neural Networks are
was another factor in tsunami of spam, atrocity porn, Easily Fooled: High Confidence
determining targets, while and gadget handshakes. This Predictions for Unrecognizable
admitting that the program did quantified version of social Images,Ó cv-foundation.org,
e-flux journal #72 Ñ april 2016 Ê Hito Steyerl

indeed kill people in error: ÒIn relations is just as readily 2015 http://www.cv-
one strike, the grandson of the deployed for police operations foundation.org
target was sleeping near him on as for targeted advertising, for /openaccess/content_cvpr_201
a cot outside, trying to keep cool personalized clickbait, eyeball 5/papers/Nguyen_Deep_Neural_
in the summer heat. The Hellfire tracking, neurocurating, and the Networks_2015_CVPR_paper.pdf
missiles were directed so that financialization of affect. It . The first paper discusses how
their energy and fragments works both as social profiling the addition of a couple of pixels
splayed away from him and and commodity form. Klout Ð a change imperceptible to the
toward his grandfather. They did, ScoreÐbased A-lists and human eye Ð causes a neural
but not enough.Ó presidential kill lists are equally network to misidentify a car, an
based on obscure proprietary Aztec pyramid, and a pair of
ÊÊÊÊÊÊ21 operations. Today, totality comes loudspeakers for an ostrich. The
Grothoff and Porup, ÒThe NSAÕs as probabilistic notation that second paper discusses how
SKYNET program.Ó includes your fuckability score entirely abstract shapes are
as well as your disposability identified as penguins, guitars,
ÊÊÊÊÊÊ22 ratings. It catalogs affiliation, and baseballs by neural
Thank you to Ben Bratton for association, addiction; it networks.
pointing this out. converts patterns of life into
death by aerial strike. ÊÊÊÊÊÊ31
ÊÊÊÊÊÊ23 ÒDo We Need a Bigger SIGINT
ÒInceptionism: Going Deeper ÊÊÊÊÊÊThis type of totality is Truck?Ó Signal v. Noise column,
into Neural Networks,Ó Google actually something else, namely January 23, 2012.
Research Blog, June 17, 2015 a Òsingularity.Ó Singularity Ð the
http://googleresearch.blogsp pet myth of California ideology Ð ÊÊÊÊÊÊ32
ot.de/2015/06/inceptionism-g describes, among other things, a See Jussi Parikka, ÒThe Geology
oing-deeper-into-neural.html time when artificial intelligences of Media,Ó The Atlantic, October
take over. The NSAÕs SKYNET 11, 2013
ÊÊÊÊÊÊ24 program was named after one of http://www.theatlantic.com/t
Ibid. the most famous Hollywood echnology/archive/2013/10/th e-
singularities, an AI robot gunning geology-of-media/280523/
ÊÊÊÊÊÊ25 for world domination in
Walter Benjamin, ÒA Short SchwarzeneggerÕs cyborg ÊÊÊÊÊÊ33
History of Photography,Ó vehicle Terminator. Contemporary soothsayers are

04.14.16 / 13:08:40 EDT

You might also like