Current Reblogger: Chloë Bass

Chloë Bass is an artist, curator and community organizer based in Brooklyn. She is the co-lead organizer for Arts in Bushwick (, which produces the ever-sprawling Bushwick Open Studios, BETA Spaces, and performance festival SITE Fest, which she founded. Recent artistic work has been seen at SCOPE Art Fair, CultureFix, the Bushwick Starr Theater, Figment, and The Last Supper Art Festival, as well as in and around the public spaces of New York City. She has guest lectured at Parsons, the Polytechnic University of Puerto Rico, and Brooklyn College. Other moments have found her co-cheffing Umami: People + Food, a 90 person private supper club; growing plants with Boswyck Farms (; and curating with architecture gallery SUPERFRONT ( Chloë holds a BA in Theater Studies from Yale University, and an MFA in Performance and Interactive Media Arts (PIMA) from Brooklyn College.

Shared by reBlog @ Eyebeam

Is High Speed Rail Coming to a City Near You? A Guide to Obama's Plans

by Brian Merchant, Brooklyn, New York on 04.16.09

obama high speed rail plans photo
Photo via EBBC

It's one of Obama's greenest ideas--even though it may be underfunded--but news broke today that a massive high speed rail is officially on the way. The president's announcement included an outline of 10 corridors around the US that will each likely see rail begin construction. So buckle up. Obama's serious about getting our transportation system up to the cutting edge—here's a guide to his plan, and a breakdown of the cities slated for a high speed transit future.

Where the Rail Will Go

With only $8 billion specifically allotted to getting the project off the ground, and an additional $1 billion a year for five years, he's going to have to be cautious of where he builds rail. And he seems to have acknowledged this in his planning—instead of an ambitious plan to lay rail from coast to coast, Obama is suggesting 10 corridors of 100-600 miles each around the country. Check out Obama's vision for high speed rail in America (pdf) for yourself--the grey lines are where future lines will hopefully go. Blue is where high speed rail already exists (yup, it's that single, solitary line in the Northeast—we're way behind Japan and Europe here).

The Ten Rail Corridors

And here's a complete list of the proposed corridors and the cities that would get high speed rail access.

-California Corridor - (Bay Area, Sacramento, LA, San Diego)

- Pacific Northwest Corridor - (Eugene, Portland, Tacoma, Seattle, Vancouver BC)

- South Central Corridor - (Tulsa, Oklahoma City, Dallas/Fort Worth, Austin, San Antonio, Little Rock)

- Gulf Coast Corridor – (Houston, New Orleans, Mobile, Birmingham, Atlanta)

- Chicago Hub Network – (Chicago, Milwaukee, Twin Cities, St. Louis, Kansas City, Detroit, Toledo, Cleveland, Columbus, Cincinnati, Indianapolis, Louisville)

- Florida Corridor - (Orlando, Tampa, Miami)

- Southeast Corridor – (Washington Richmond, Raleigh, Charlotte, Atlanta, Macon, Columbia, Savannah, Jacksonville)

- Keystone Corridor – (Philadelphia, Harrisburg, Pittsburgh)

- Empire Corridor – (New York, Albany, Buffalo)

- Northern New England Corridor – (Boston, Montreal, Portland, Springfield, New Haven, Albany)

How the High Speed Rail Will Be Built

Obama's goals will (hopefully) be realized through a combination of constructing brand new corridors that will be entirely dedicated to high speed rail and the incremental upgrading of existing rail. And in addition to the $8 billion in stimulus funds, money will be made available as grants for states with rail projects that are "ready to go." Rail projects like these are expected to create a slew of jobs as well.

Both Express and Regional High Speed Rail lines are planned. From the plans:

HSR – Express. Frequent, express service between major population centers 200–600 miles apart, with few intermediate stops. Top speeds of at least 150 mph on completely grade-separated, dedicated rights-of-way (with the possible exception of some shared track in terminal areas). Intended to relieve air and high-way capacity constraints.

HSR – Regional. Relatively frequent service between major and moderate population centers 100–500 miles apart, with some intermediate stops. Top speeds of 110–150 mph, grade-separated, with some dedicated and some shared track (using positive train control technology). Intended to relieve highway and, to some extent, air capacity constraints.

Green Benefits of High Speed Rail

Besides the obvious benefits of having a more effective mass transit system—less car travel, fewer flights, less congestion, less incentive for the creation of urban sprawl—Obama's plan notes a specific green figure:

"According to one recent study, implementation of pending plans for the federally designated HSR corridors could result in an annual reduction of 6 billion pounds of CO2

So all in all, the plan looks like a solid first step--and it could very well mean that we finally see a high speed rail system emerge in the US in coming years.

Shared by reBlog @ Eyebeam

Richard Jackson

Discovered series photo “The Laundry Room” by the American contemporary artist Richard Jackson. Currently in Los Angeles, it rebuilt 2 parts and off subjects the model of the american way life the proof the grotesque one. Exposure between sculpture and installation.









Following my investigation, thousands of people in the world get the loans at various creditors. So, there is great possibilities to get a commercial loan in all countries.

Shared by reBlog @ Eyebeam

Tate Modern Makes Its Talks (Including Ours) Available On ITunes


This past Summer, Sara and i were honored to be invited to the Tate Modern to give a talk on street art from a "world view" perspective. The room was packed and all-in-all we thought it went quite well.

This week the Tate Modern finally made available on iTunes not only our talk, but over 150 recordings (going back to 2006). There's some incredible recordings (more than 200 hours so far) including talks by such people as David Shringly, Gilbert and Geoerge, Wolfgang Tilman's and many others.

Unfortunately our talk is audio only, as the slides were not videotaped. But if you've never heard us give our slideshow, you might want to give it a listen. Ours is in the 2008 tab, entitled:

"Street Art Talks - Street Art Now: A World View"

Click here to be redirected to iTunes.

Shared by reBlog @ Eyebeam

Secrecy Message Service

A project in the form of service was born, Secret Message Service which enables you to express and to share the secrecies by sms anonymously. They are diffused daily thus creating a collection of confessions, low registers or light, amusing or sad. 5 exclusive in the continuation.


Shared by reBlog @ Eyebeam

A few years ago, the idea of hackers bringing the world to the brink of catastrophe was just a fun Hollywood plotline. Now, cyber-attacks are on the rise and Nato's top computer experts have gathered in a military base in Estonia to prepare cyberwar defences

Back in 1983, the world was a simpler place. The economy looked healthy, there were only four channels on the TV - and, if you believed Hollywood at least, the biggest threat to world security was a pimply teenager with a computer. Matthew Broderick's turn in the film WarGames, as a nerdy kid who accidentally blunders into a highly classified computer system that controls the US nuclear arsenal and proceeds to take the world to the brink of nuclear war, didn't win many awards. But it made its mark on millions of people around the world - and introduced us to the stereotype of the precocious young hacker.

The film plugged into every paranoid star-wars fantasy from the Reagan era but now it is unlikely to elicit more than a snigger. The prospect of a cyberwar launched by someone too young to drink is, frankly, ridiculous. Isn't it?

In fact, the implications of a cyberwar are, right now, being carefully considered by intelligence chiefs in Britain and around the western world. Their nightmare? A co-ordinated strike that targets businesses, public services, central government, the financial sector and communication systems.

In the worst-case scenario, what might start slowly - a few propaganda messages here, a hacked website there - could quickly spread. The already hammered British economy might soon be crippled as the nation's bank accounts are drained of their funds - stripping billions out of people's hands in seconds - and major online shops including eBay and Amazon fail.

Elsewhere, communications networks could come under fire, with phone, internet and mobile systems quickly collapsing. The transport network might fail, too, causing air-traffic control computers to go haywire, rail systems to break down, traffic light systems to be reprogrammed. The ensuing chaos would create panic around the country, with airports from Heathrow to Glasgow on high alert, facing the horrifying prospect of midair collisions as the aircraft above them are fed wrong information. While the emergency services struggle to cope with the confusion, they could fall victim to attacks themselves. A stream of fake messages and alerts might send fire engines to the wrong locations, and ambulances to hospitals already filled with patients.

And the coup de grace? Hidden programs inside the country's electricity grid might then jump to life, shutting down power supplies, creating targeted blackouts, even sending nuclear reactors into freefall.

Such a doomsday scenario might sound drastic - more of a cyber-apocalypse than a cyber-attack - but it is one that has been outlined many times by the Metropolitan Police, MI5 and the Joint Intelligence Committee. The US Navy investigator and cybercrime specialist Kenneth Geers characterises the typical response of powerful individuals as they hear this doomsday scenario outlined as a sort of unbridled terror inspired by technology. "More than one senior official said they've had so many cyber-briefings now that they don't want to turn their computers on any more," he says.

Geers identifies a number of potential weak spots in the system, including websites of "pure economic value" (such as banks and online shops) as well as telecommunications systems and the electricity grid.

"In the worst case? [Someone] invading your own infrastructure and using your own tools against you," he says. "Tell your troops to move in the wrong direction, or your missiles to fire on your own cities ... anything in your imagination."

Hidden in the shadow of crumbling Soviet tower blocks on the outskirts of the Estonian capital Tallinn sits a compact military post that looks pretty much like any other. The base carries the official name of Cooperative Cyber Defence Centre of Excellence, but is usually referred to by the code name K5. Soldiers march across the small parade ground, passing a selection of camouflaged vehicles as they troop to and fro. Heavy weaponry is dotted around the buildings, while on one side of the plot a discreet armoury holds a stock of emergency weapons.

Behind the security gates and razor wire, however, this is a different kind of military operation - the unlikely frontline in Nato's attempt to prevent a global cyberwar. K5 is where the alliance's top computer experts - high-ranking researchers, academics and security specialists - work in teams to analyse potential cyberthreats, and predict exactly how Nato will fight virtual wars in the future.

Since the centre opened last year, few people have been granted a glimpse inside - but I am being given the chance to see exactly what takes place here. And so I find myself standing opposite Rain Ottis, a stout, serious-looking Estonian computer scientist who speaks flawless English, in the corner of K5's mess room. It would be easy to forget that this is a military station were it not for the fact he is wearing fatigues. I'm holding a cup of weak coffee in a Nato mug, and watching as a light rain starts falling on the barracks next door.

Ottis speaks with a calm voice, but is forceful about how we might need to respond to a future cyber-strike. His solution? Overwhelming response: a single, gigantic counter-strike that cripples the target and warns anyone else off launching a future cyberwar. He isn't sure what it would look like, but the show of force he envisages is so severe that the only thing he can compare it to is a nuclear attack - meaning, of course, that K5 could be the virtual equivalent of the Manhattan Project, the US-led secret programme to develop the atomic bomb.

"Obviously nuclear weapons do a lot more damage than a cyber-weapon would do in a physical sense - but a single cyber-weapon could have global consequences," he says. It feels as if we have come full circle from the contrived Hollywood paranoia of WarGames.

Fears over computerised warfare stretch back many years, but it was only in the early 1990s - when the internet started to become a more widely accepted technology - that researchers at Rand, the Pentagon thinktank, first coined the term "cyberwar". In a prescient 1993 paper, "Cyberwar is coming!", the analysts John Arquilla and David Ronfeldt argued that an online battle waged between two nations was almost inevitable - but that at least it would be less destructive than full-blown conflict.

Many of the cyber-attacks that have been identified in recent years have been linked back to China, which now has more internet users than anywhere in the world, and Russia. The growing animosity surrounding these reported strikes is developing into a new sort of cold war, played out by teams of cyber-spies sitting at computers in opposite corners of the globe.

Recent examples that have raised the tension include a hi-tech spy group known as Titan Rain, which successfully infected government computers in Britain, America and Germany, and GhostNet, a cyber-espionage network which targeted supporters of a free Tibet. Both were said to come from China, and possibly be directly linked to the People's Liberation Army - although researchers couldn't agree on the evidence. University of Cambridge researchers claim it was definitely the product of "agents of the Chinese government", while their colleagues at the University of Toronto say that it is too easy to presume guilt.

"Certainly Chinese cyber-espionage is a major global concern," the Canadian experts wrote in a report on GhostNet. "But attributing all Chinese malware to deliberate or targeted intelligence-gathering operations by the Chinese state is wrong and misleading."

Then, last week, it was widely reported that the US's power grid had succumbed to hackers. Given that America's security services are scrabbling for the attention of their new president, there's plenty of reason to be sceptical about these unsubstantiated and largely anonymous reports (American security whizz Kevin Poulsen says the timing of this uncheckable story is "unusually opportune"). Regardless, such stories are enough to convince the powers-that-be to take action: last week it emerged that the US Congress is considering legislation to massively increase the country's cyber-defences - including, potentially, a single official who is in charge of keeping civil systems, military networks and public utilities safe.

Inside Nato's own cyber-defence HQ in Estonia, the day-to-day business at K5 largely involves people staring at computer screens. Those expecting a vast, hi-tech control centre worthy of Nasa would probably be disappointed by the austere surroundings, which look more like they were lifted from a university hall than MI5 headquarters. Essentially, the centre is a hybrid of a global listening post and a thinktank. The 30 experts stationed here are tasked with gathering and processing intelligence and information, then giving scientists the information to simulate possible responses to cyber-attack.

The group is drawn from a range of Nato countries, and they spend their days analysing data that streams in from around the internet. One of those stationed at K5 is Geers, the author of a book called Cyber Jihad and the Globalisation of Warfare. Tall, slim, dark-haired and wearing civilian clothes, he tells me that we are paying the price for a headlong rush into using technologies without thinking through the potential consequences.

"In certain ways, this is a golden age for attackers," he says, in a careful voice. "Over the past 15 years, the world has rushed to connect networks together because they want to use their power. But the rush to connect everything to the internet was ahead of security."

With so much of the world now connected to the internet - billions of computers and mobile phones across a multitude of homes, banks, schools, shops and elsewhere - it is ripe for attackers to exploit the gaps in security. "It's a very big challenge for us to be able to leverage networks and the power of computers, while at the same time securing them."

In a side room, Geers' colleague Ottis tells me: "Espionage is something that countries and governments accept - it's always been there, and always will. But if we see attacks that target the citizen? That's different."

There is a particular reason for Ottis and his fellow Estonians to be concerned about the threat of cyberwar: in 2007, Estonia itself was the target of a massive internet assault, allegedly sparked by a political disagreement with Russia. Over the course of several weeks, Estonia's government, banking and commercial sectors endured a sustained barrage of online attacks that brought parts of the system - one of the most advanced and internet-friendly in the world - grinding to a halt.

Although the Estonians imply that the campaign was sponsored by the Kremlin, K5 officials admit they can offer no proof. But whoever was ultimately responsible, the strikes highlighted fears that technology is the weapon at the forefront of a new sort of cold war.

"This is definitely not science fiction any more," says Ottis. "We have plenty of examples where nation states have actually been involved - both on the offensive and the defensive side. Cyber-attacks are very efficient. You don't have to fly to the country you're attacking, you don't need a cell somewhere. All you need is a connection. What happens if your country gets targeted by 25,000 well-equipped, well-trained people who work to achieve the same goal? No country is ready for that."

The first step towards a proper cyber-defence is understanding who the actors behind a potential attack might be. But doing that requires information which, for the most part, is impossible to find. "Defence against cyberwarfare is extremely difficult," explains Peter Sommer, a computer security specialist and visiting professor at the London School of Economics. "Only the very unskilled leave pointers to their identities and locations."

Skilled hackers can implant targeted viruses inside their victim's computers and leave them to gestate for weeks, months or even years before activating them at a later date. There are numerous examples of such vast, destructive virus strikes - most notably the Conficker worm, which has infected more than 9m PCs worldwide in recent months. Right now nobody knows who created Conficker, or what its target might be. It has yet to fully activate, leaving security groups and antivirus companies on high alert. Some have suggested it is part of a criminal plan to steal identities by the million, or a dangerous cyber-weapon, or that it could simply be a gigantic prank. But even if the worm does prove the spark that ignites a full-blown cyber-conflict, its author would remain almost untraceable.

Just as any hard evidence to suggest the Russian military approved the Estonian cyberattack in 2007 is largely missing, so proving that China or Russia are directly responsible for other attacks is almost impossible. And, experts admit, it would be politically smart for a truly destructive organisation to mask their attacks and make them seem like they originated from a country already under scrutiny.

In truth, it could be almost anybody, almost anywhere. Rudimentary hackers' toolkits are available to buy cheaply online, while an illicit black-market trade in more complex tools takes would-be attackers out of the reach of the authorities on the so-called "darknet". And while a highly intelligent virus such as Conficker may have required some skill to program, other hackers may succeed simply by having the time to experiment rather than any great raw ability. (Gary McKinnon, the Briton accused of hacking into Pentagon computers, bumbled his way into supposedly secure networks by guessing that the password had not been changed from the default "password").

There is also an increasingly blurred line between what action the state sponsors (which would qualify as full-blown international conflict) and what is being done in the name of the state - a sort of guerrilla warfare played out on virtual battlefields. With China's growing power leading to widespread suspicion and criticism in the western media, these groups - a mixture of roguish hackers, disaffected teens and intellectuals frustrated by stereotypes about their culture - see part of their job as defending the homeland, even while they reserve the right to criticise it from the inside.

Rebecca MacKinnon, a Hong Kong-based journalist and academic, has identified this burgeoning ideology as "cyber-tarianism" - where highly connected citizens are critical of government repression but fiercely nationalistic at the same time.

"A lot of people don't want a western-style democracy," she told a conference in California last month. "Before the Olympics last year, Chinese students protested all over the world at what they saw as biased western media accounts." These protests included a series of large-scale hacking attacks - on large targets such as the news channel CNN, and small ones such as pro-Tibet websites, which temporarily disabled them.

In China and Russia, this cyberforce is reckoned to be becoming more powerful - and more destructive. Dissident Russian nationalists have also been blamed for the Estonia attacks, while similar groups are appearing in other countries around the globe as internet connectivity spreads. Armed with technical know-how and a passionate cause, these ad hoc groups of individuals would seem increasingly important in the way these conflicts are playing out.

But it's still difficult to imagine what would actually happen if a full-blown cyberwar ever did take place. After all, movies like WarGames - stuffed with Hollywood exaggerations - surely stretch the limits of what can happen. Don't they? © Guardian News & Media Limited 2009 | Use of this content is subject to our Terms & Conditions | More Feeds

Shared by reBlog @ Eyebeam

Handmade Music: Bent Edition - tonight!

Coinciding with NYC's Bent Festival Handmade Music initiates an especially hacked event tonight at 3rd Ward in Brooklyn. The free event features a pretty amazing lineup including -

  • "modular synth meets circuit-bent Barbie dolls. noise, drone, dance party with Peter Edwards of Casper Electronics." -

  • A surprise mystery instrument(s) from Handmade Music superstar Ranjit Bhatnagar, who promises it'll be "something weird." -

  • CDM captain Peter Kirn shows you how to have fun with Radio Shack contact mics and using water for music-making.

  • E-Squared churn out homemade analog synthesis featuring the unique hardware stylings of Mr. Eric Archer -


  • Plus - Jamie Allen and Jo Kazuhiro talking about the circuitry, the music, and the magic of the Chiptune Marching Band -

  • Free beer courtesy Pabst Blue Ribbon, while it lasts!

Handmade Music on Facebook

3rd Ward
195 Morgan Ave
Brooklyn, NY 11237

Shared by reBlog @ Eyebeam
Tokyo Fiber 2009: Senseware by CH Contributor

by Kori Schulman


Talent meets technology at the second Tokyo Fiber exhibition since 2007. Senseware, a title that refers to materials that inspire creativity, features the stunning possibilities of Japanese artificial fiber technology. A mix of architects, designers, manufactures and artists make use of new fibers in inventive and unexpected ways, giving us all a glimpse into what the future of fiber holds.


Nendo/Asahi Kasei present a paper lantern that blows up like a balloon with the material Smash, a highly thermoplastic non-woven fabric.


Water Logo '09 uses the material Monert to spell out the exhibition theme in water droplets. The fibers are treated with an ultra-water-repellent coating at the nano level to completely repel drops of water.


Kengo Kuma/Mitsubishi Rayon Co. create light-penetrable concrete for communicating with the outside using Eska, a luminous optical fiber made with plastic.


Kashiwa Sato/Toyobo use Breathair, a highly-elastic coiled cushion material that is 95% air, to make soft children’s blocks that capture air in three dimensions.

Tokyo Fiber ’09
22-27 April 2009
La Triennale di MIlano
Viale Emilio Alemagna, 6
20121 Milano map
tel. +33 46 10 07 07

Shared by reBlog @ Eyebeam

In Wiesbaden

The conference is dedicated to new approaches that are being developed in the fields of design, art, architecture, new media and economy to confront this complexity and to transform the immense flood of information into useable knowledge.

The most recent views and thoughts on this topic will be presented by speakers like Aaron Koblin of Google Creative Lab, the software artist Julian Oliver and Eric Rodenbeck from Stamen Design.

Watch's related podcast here.

See Conference, April 18th 2009 at Caligari Theatre, Marktplatz 9, Wiesbaden

Shared by reBlog @ Eyebeam

Scarygirl game online

Australian-born Nathan Jurevicius has created a plethora of characters, many of whom appear in his Scarygirl comic and in very limited edition vinyl format.

Now the Scarygirl game is officially online and free to play!

Shared by reBlog @ Eyebeam

Speak n' Spellbinder uber bent-strument


GetLoFi points out this rather mighty specimen of circuit bending - The Speak n' Spellbinder fuses
a Rock Band guitar controller with (of course) a Speak and Spell and supporting switches, pots, and pushbuttons - resulting in a plastic speech axe complete with tone triggers, pitch contol, whammy bar and more. The 'binder's creator, AJ Gannon,forged the instrument for use on his upcoming "Toy Volcano" album. Be sure to check out the build pics for more sound devices he's using on the record.

Syndicate content