WGXC-90.7 FM
Saturday Afternoon Show: PRISM Breakup
Brooklyn (2003 - 2004) | Acra (2005 - 2015), NY
free103point9.org + transmissionarts.org/listen
90.7-FM in NY's Upper Hudson Valley and wgxc.org/listen everywhere
http://www.wgxc.org/
Hosted by Tom Roe.
Hosted by Eyebeam October 2013, PRISM Breakup, was a series of art and technology events dedicated to exploring and providing forms of protection from surveillance. The gathering brought together a wide spectrum of artists, hackers, academics, activists, security analysts and journalists for a weekend-long of conversation, hands-on workshops, and art installations.
A special thanks to Roddy Schrock and Heather Dewey-Hagborg for making the WGXC radio broadcast of this exciting series possible.
Panels include, Ingrid Burrington, "The Architecture of Surveillance;" Katherine Maher, "[FullStop]Watching Us;" Nadim Kobeissi, "Cryptocat;" Seeta Pena Gangadharan, "Data Profiling And Social Justice;" Amelia Marzec, "Signal Strength;" Dan Phiffer, "Small Wifi Networks Loosely Joined;" Enrique Piraces and Barbra Mack, "Paranoia;" Brian House, "Open Paths;" Helen Nissenbaum, "DIY Privacy with Obfuscation;" Genevieve Hoffman, "Tracking, Spoofing And Jamming;" PRISM Breakup Opening Panel.From Eyebeam's event description, "In the contemporary digital era, privacy has become a luxury for the initiated. Google and Facebook mine your personal data for a profit, the government monitors your phone calls, even shopping malls track the mobile phones connected to their wifi. In the wake of revelations about the NSA PRISM program, many citizens are left wondering what they can do to protect their privacy. We believe everyone has a right to define their own digital privacy, understand how it is being compromised, and feel empowered to protect it.
Initiatives like Prism Break, the Locker Project, and Security in a Box have attempted to combat privacy violations, but the process continues to be complex and inaccessible to the general population. We also recognize that security and privacy, especially at the hardware level, is tricky, but that’s not going to stop us from trying to determine how it can best be protected."