Critical Engineering Working Group EXHIBITION 2021 Exhibition Piksel Fest Spill 2021 May 20, 2021May 20, 2021 Decoding Black Magic. Interventions in Infrastructure Piksel Festival 202115th of November to 12th of December Critical Engineers Working Group exhibition “Decoding Black Magic. Interventions in Infrastructure” will take place from the 15th of November to 12th of December 2021, showing well known artworks plus new works in progress by the artists Bengt Sjölén and Danja Vasiliev.Black Book of Wireless (2020), Unintended Emissions (2019), Vending Private Network, WannaScry! [work in progress] and Unnamed Deep Fake Project (2021) Black Book of Wireless The Black Book of Wireless is intended to be a book of the dark magic that antennas and radios is, with pages that are circuits and PCB trace antennas (copper traces on PCB material) and of which some examples are shown in this iteration. The piece tries to describe the physical connection between form and function in high frequency electronics such that all the traditional passive electronic components can be implemented with just the shape of copper on a substrate: a resistor being the thickness and length of trace, a capacitor a gap in a trace, a coil literally being a spiral or coil shaped trace and more obscure shapes like filters, couplers, transmission lines. The more obscure parts of this is things that are not fully understood or even if you can model and simulate how you think they will behave you have to try them out to see how they actually behave. For examples in the pictures see e.g. the UWB antennas that look like little faces or funny cartoon shapes and the fractal antennas with funny shapes and turns trying to maximize their length in a finite space or the Vivaldi antennas curved shapes where the maximum and minimum gaps between the copper bodies define the range of frequencies the antenna is tuned for while not even being connected the input – the input is on the opposite side of the PCB being coupled and in that way conveying the received signal. Black Book of Wireless receives and decodes radio signals present in the local environment such as Air Traffic transponders for airplanes flying past, AIS transponders from ships, GSM communication between local cell towers and phones, Wifi communication between devices and base stations. Decoded information as well as description of other artefacts such as pcb trace antennas and a software radio system that can be a rogue GSM baase station (the white beagle bone and the white usrp software radio board with gsm antennas) is continuously printed on terminal style min screens distributed across the table. Unintended Emissions (2019) Wireless (802.11) Citizen Surveillance Investigation https://criticalengineering.org/projects/unintended-emissions/ Inserted into urban environs, Unintended Emissions captures, dissects, maps and projects radio emissions invisibly shared by our portable wireless devices. Unintended Emissions reveals meta-data such as make of device, networks the device previously connected to and Internet connection requests transmitted by the device out into the air, employing two arrays of directional Yagi antennae the project attempts to determine positions of Wi-Fi devices in the vicinity. Similar to surveillance and tracking systems such as StingRay, Unintended Emissions places mobile Wi-Fi users on a 2D map indicating the kind of device user has, time of appearance, user’s network activity and other user-specific meta data. This information can be further analyzed to determine the user’s identity and movements within a locality and the Internet. Using methods and technologies known to be deployed by federal, surveillance initiatives, the intervention seeks to engender a “healthy paranoia” in the interests of an increased techno-political subjectivity. Vending Private Network A vending machine for selling VPN internet access via gateways located four countries not involved in FIVE- NINE- ELEVEN-EYES internet surveillance program. https://criticalengineering.org/projects/vending-private-network Virtual Private Networks (VPNs) have come into increasing demand in recent years, providing route encryption through hostile networks. In China, Vietnam, Turkey and Pakistan they also serve to mitigate government censorship, such that foreign sites otherwise blocked by state firewalls are made available to VPN users (Twitter, Facebook, Wikipedia, activist sites and digital libraries being the most common). Vending Private Network takes the form of a condom vending machine, such as those typically seen in public toilets, nightclubs and bars. Equipped with mechanical buttons, a coin-slot and USB ports, it offers 4 VPN routes, each with an animated graphic depicting the route as a fantasy destination. Audiences are invited to insert a USB stick into the slot, a coin (1 pound or euro) into the machine, and to select a VPN destination by pressing a mechanical button. In doing so, a unique VPN configuration file is then written to the USB stick. Special instructions (in the form of a README.txt) are also copied, explaining how to use the VPN in a special ‘sheathed’ mode that evades detection methods (namely Deep Packet Inspection, or DPI) used by corporations and state-controlled infrastructure administrators. This is the only means known to work against state controlled firewalls. Vending Private Network is especially designed for use in wealthy countries; only then can its ulterior motive come into play: leveraging economic and cultural privilege to benefit those less fortunate. With each VPN config paid for, another ‘shadow config’ is generated, to be later shipped to dissidents, activist organisations and others in Turkey, China, Vietnam, Afghanistan, Iran (other countries to be confirmed) such that those that need it most can enjoy protection and access to the open web. The coins inserted into the vending machine also directly fund the VPN running costs, whose tally is displayed on each screen of the vending machine. Should a particular VPN not have enough money deposited to pay for monthly server hosting costs, it is shutdown, with a white on black notice on the display that it no longer functions due to insufficient public funding. Should money sufficient to cover costs be donated the dormant server will boot back to life and public service continues. Just as one might expect to see on a condom vending machine, Vending Private Network is adorned with the sticker “Get Protected”. WannaScry! [work in progress] WannaScry! is a video-conferencing server that operates from an exhibition venue and publicly displays and stores video calls conducted through it. Real-time and recorded video-chat are projected inside a Palantir*-like scrying ball. *Palantir is a Techie Software Soldier Spy, Big Data’s scariest, most secretive unicorn in Silicon Valley1 https://vimeo.com/manage/videos/523667524 Unnamed DeepFake Project (2021) Minimal variant: A camera tracks faces of visitors moving in front of the projection. On the projection there a number of faces idling, breathing, looking around. As the system locks to your presence you get assigned a face and any expression, or what you say, will be mimicked by the face live on the screen. Other people approaching will be assigned other faces so visitors can interact with each other through the faces on the screen. Part of the experience will be making weird faces or other efforts to try to glitch the system to make weird faces.