[a glytch-infested cut-n-paste job from the original journal article in Leonardo]

Existential Technology: Wearable Computing Is Not the Real Issue!

Steve Mann


The author presents “Existential Technology” as a new category of in(ter)ventions and as a new theoretical framework for understanding privacy and identity. His thesis is twofold: (1) unprotected individual has lost ground to invasive surveillance technologies and complex global organizations that undermine the humanistic property of the individual; (2) A way for the individual to be free and collegially assertive in such a world is to be “bound to freedom” by an articulably external force. To that end, the author explores empowerment via self-demotion. He has founded a federally incorporated company and appointed himself to a low enough position to be bound to freedom within that company. His performances and in(ter)ventions over the last 30 years have led him to an understanding of such concepts as individual self-corporatization and submissivity reciprocity for the creation of a balance of bureaucracy.

Steve Mann (mailroom clerk), University of Toronto, Department of Electrical and Computer Engineering, Mailstop S.F. B540, 10 King's College Road, Toronto, Ontario, Canada, M5S 3G4. E-mail: mann@eecg.toronto.edu.

As our world becomes more and more globally connected, the official hierarchies of corporations and governments become larger and more complicated in scope, often making the chain of command and accountability more difficult for an individual person to question. Bureaucracies spanning several countries provide layers of abstraction and opacity to accountability for the functionaries involved in such official machinery. Thus, policy affecting our everyday life is moved further from our ability to in?uence, affect or even understand it. At the same time, the increased use of surveillance and monitoring technologies makes the individual more vulnerable to, and accountable to, these very organizations that are themselves becoming less accountable to the surveilled populace. In this paper, I propose the concept of “Existential Technology” as the technology of self-determination and mastery over our own destiny, and I provide several examples of in(ter)ventions (new inventions I filed with the Patent Office as well as new interventions). In this article I deliberately con?ate the terms invention and intervention, as I did in my recent exhibit at Gallery TPW, Prior Art: Art of Record [1]. ( terms “Prior Art” and “Art of Record” are commonly used in patent law.)

My performances and in(ter)ventions attempt to re?ect the technological hypocrisies of large bureaucratic organizations on a moralistic (or humanistic) level by way of firsthand encounters with low-level “clerks,” rather than the more traditional approach of writing letters to manage- ment, politicians or the like. By mirroring the structures of bureaucracy and complexity, I engage in a Re?ectionist approach that I have found is, in many situations, surprisingly far more successful than writing letters to high-level officials [2]. Ironically, Existential Technology serves to empower the individual by disempowering the individual of responsi- bility for his or her own actions.

Empowerment is achieved through selfdemotion (e.g. assuming a low rank in the corporate hierarchy of a subservience services corporation such as the Existential Technology Corporation). In the same way that large “covernments” (convergence of multiple governments corrupted by interests of global corporations) are em- powered by being less accountable for actions, existential technologies allow individuals to self- bureaucratize in order to achieve a balance of bureaucracy when dealing with government organizations. Existentialist theory holds that individuals are entirely free, thus entirely responsible. Clerks and functionaries, however, are not free, or at least can allege to be not free, and thus, ironically, are in some ways more free to escape responsibility or accountability for actions. In the existentialist tradition, my apparatus of computer-mediated reality (e.g. wearing a computer and living in a computer-generated world) suggests the absurdity of reality that is so much a part of existentialist thinking [3]. Existentialism is not a philosophy but a label for several widely different revolts against traditional philosophy. refusal to belong to any school of thought and a marked dissatisfaction with traditional philosophy as superficial form the heart of existentialism [4]. Thus, in formulating the concept of Existential Technology, I deliberately try to avoid making it too clear upon exactly whose shoulders I am standing, yet in so doing, I follow the (existentialist) tradition of not following a tradition.

I begin by describing some of my “cyborg” in(ter)ventions over the past 30 years, during which I invented, designed and built experimental apparatuses for various experiments, which were also performances. My experimental subjects were often drawn from the following groups:

  • gambling casino owners
  • security guards at gambling casinos
  • security guards in department stores where video surveillance was being used extensively
  • customs officials
  • other officials involved in placing our society under surveillance and who

were fearful of being placed under surveillance themselves.

I then summarize, within a theoretical framework, what I have learned from these in(ter)ventions.


The over-protection of intellectual “property” has emerged as a situation that could threaten scholarly discourse, computer science and fair use. Take, for example, the “purchase” of a typical computer or computer program. What we now often have is a change from what might once have been a purchase into a license. I addressed the complexity of this paradigm shift in a recent traveling art installation entitled SeatSale: Seating Made Simple,in which a simple object, a chair, was connected to a global computer network with a license manager. Rather than owning the chair, the user licenses the use of the chair. Sliding a credit card through a slot in the chair causes 23 seat spikes to retract, for the duration of the “Seating License?” [6] (Fig. 1). The complicated array of computers, servers and other equipment in the 19in relay rack (“License Manager,” “License Server,” etc.) is juxtaposed with the corporate slogan “Seating Made Simple.” Downloading a “Free Seating License?” causes the solenoid-activated seat spikes to retract for a certain time period. word “free” is used with jest, in the sense that although there is zero monetary cost (the credit card is for “identification purposes only”), the true cost is the loss of privacy and the loss of freedom to sit without asking for permission from a global Seating Services? provider. point of SeatSale was to show how the protection of “Intellectual Property” violates something one might call the right of “Humanistic Property” [7].

CONSENSUS TACTICS: O UIJAGREE AS CONSENSUAL DISSENT Shortly after SeatSale?, I created a performance piece called Ouijagree. On Friday, 5 January 2001, at 18:12:34 EST, I plugged in a new computer for the first time. Like many new computers, it had been “tagged” with unsolicited advertising, including a sticker reading “De- signed for Microsoft Windows 2000.” I wondered how this corporate tag was any different from graffiti that kids use to tag gang's territory. computer also seemed to have been tagged internally with some unsolicited advertising as well, because a software message popped up on the screen indicating Terms and Conditions, which I certainly did not agree with. (I had not asked for any software for this computer since I ordinarily use only open-source software such as GNU Linux.) Among other things, the Terms and Conditions forbid the practice of science (e.g. trying to understand how a program works, its underlying operational principles, etc.). So, having three students (Ryan V. Fung, Ashish J. Khisti and Meghal H. Varia) working with me on the computer, the four of us placed our hands gently on the mouse, to position the cursor wherever it was sum- moned to go.

Ouijagree contained elements of “Oui” (French for “yes,” as in “yes, we agree”) and of the Ouija board's planchette. The mouse assumed the role of the latter. On the abstract level, we might say that the spirits of the dead are bound by the Terms and Conditions of the contract, whereas on the more concrete level, since no one particular one of us moved the mouse, it would be difficult to discern which of us, if any, were to be bound by these unfair and outrageous Terms and Conditions.

The Ouijagree performance was a very simple example of what I call Existential Technology (technology of selfdetermination and mastery over our own destiny). Ironically, our mastery over our own destiny (our freedom) came from our very lack of control over the situation (i.e. the fact that no one person exercised decisive voluntary control over the position of the planchette mouse). Ouija board is an appropriate metaphor for my “community of cyborgs,” because it complicates the locus of control. In the same way that a gov- ernment's firing squad may include some unloaded guns, the Ouijagree piece re?ects a similar diffusion of responsibility. For example, a large community of online users could remotely operate a global Ouija board to write a program to convert Proprietary Data Format (PDF) documents to plain text for accessibility to the blind or visually impaired. Adobe (purveyors of PDF) would then have a hard time knowing whom to prosecute.


In a mid-1970s performance I connected my body to electricity to stimulate body movement. Much like the planchette in Ouijagree, the My Manager performance allowed me to corporatize my body. Indeed, just as a corporation is an abstract entity, my body became an abstract entity, writhing in movement beyond my own control. My Manager also evolved into other pieces that explored the freedom associated with covering, restraining and diminishing the capabilities of the human body, using such works as PleaseWait [8] (Fig. 2) and Sight License (Color Plate A No. 1), which prevented me from seeing or hearing anything until a person iden- tified themselves by sliding an ID card through a slot on my head. PleaseWait bears some similarity to Eduardo Kac's Telepresence Garment [9].


A more recent series of performances, from the mid-1980s to the present, involved wearing photographic apparatus to create an incidentalist intervention. In such apparatus, intentionality can be conveniently obscured. For example, my telematic body in Wearable Wireless Webcam (a live performance transmitting continuously on the Web from 1994 to 1996) allowed other people (not me) to initiate a picture-capture process, and in some cases remotely teleoperate my body. When asked by security guards or department store staff if I was taking pictures, I could respond with uncertainty and consensus tactics, e.g. I was not knowingly taking pictures of anyone and I would need to check with my managers (thousands of other people I did not even know) in order to determine whether or not pictures were being remotely acquired [10]. Questioning and deconstructing rules becomes a new art form [11].


In the making of the film Cyberman, a film crew followed me through various day-today life activities, e.g. my visit to Casino Niagara on Sunday, 2 July 2000. For shooting my documentary video (upon which the above was based) I used my EyeTap system?eyeglasses that cause the eye itself to function as if it were a camera. My wearable apparatus is controlled by a handpiece that looks (and works) much like a musical instrument. This “keyer” [12] has various keys that can be pressed in various combinations to form various chords. I unplugged my keyer so that I would have no control over my EyeTap rig, but before I unplugged it, I asked my wife to MAYBE press C, so that I would not know whether or not my eyeglasses were remembering (or recording or transmitting) anything. keyer, which works like a musical instrument that I usually start off by playing in the key of G (Grab), then change to the key of C (Capture), was now removed so that I had no way of controlling the function of the apparatus or of knowing whether or not I was in the key of C. Finally, I switched to the key of Lost: I locked myx waist-worn computer rig shut with a small padlock for which I did not have a key. (I gave the key to my manager so that I would not have it.) Thus, I could not access any of the controls or determine whether or not the system was in Capture mode. Now once I was MAYBE playing in the key of C, but definitely playing in the key of Lost, I wandered into the casino, with the film crew following.

The film crew managed to sneak in all film gear (this was not merely video, but included a large Arri?ex motion picture camera that shot real celluloid film). line producer (Alexi Steele) distracted the guard, while the cameraman (Rudy) pretended to be close friends with his assistant, giving her a big hug, with the camera hidden between them, as they walked in past the guards. sound crew also managed to sneak in past the guards, and so as I walked in, the crew quickly assembled inside and followed me up the escalator. There was a tall escalator going up a very grand entrance, and the crew knew that they could not be attacked in the confined space of the escalator, so that even after detection, any assailants would need to wait until the crew got to the top. The assailants were waiting at the top. The film crew explained that they were making a documentary of me (that they had been following me around, in my day-to-day life, etc.), but the crew was asked not to take pictures, so I continued to wander around and make my own documentary. Nobody seemed to know that I might be playing in the key of C. Later, I left and met up with the film crew who were waiting outside, having been prohibited from shooting inside the casino. Casinos have traditionally been associated with money-laundering and crime, so that shooting video within casinos raises some interesting questions as to what is prohibited and what is allowed (e.g. the question as to whether photography is often prohibited in order to hide evidence of wrongdoing by the casino owners).


HeartCam was a bra made using two surveillance domes as cups, with a heart monitor in the left cup to trigger image capture; the apparatus took pictures when the heart beat faster (Fig. 3). HeartCam turned the tables on the “male gaze” by allowing the female wearer of the apparatus to capture images; at the same time it used heart rate as a natural index to frame rate (i.e. frame rate was proportional to the wearer's degree of arousal). Because image capture was involuntarily controlled by the wearer (heart rate being an externality not directly under her intentioned control), the apparatus provided an incidentalist element [13]. Moreover, if an assailant objected to the camera, or the possibility of a camera, by assailing the wearer, whether verbally or otherwise, the frame rate would increase. Thus, a potential perpetrator who became upset at the wearer for photographing him would cause her heart to beat faster, which would cause her to take more pictures of him. Since this feedback loop was beyond her control, it could be said that the assailant was taking pictures of himself by agitating her.


Finally, I should emphasize that not all Existential Technology need be wearable. Although wearability is closely correlated to existentiality, there are examples, such as handcuffs, of wearable technologies that are not very existential in the context of ordinary usage. There are also examples of non-wearable technologies that are very empowering (in the context of personal empowerment). One such example is a briefcase that can be opened by anyone other than myself (Fig. 4). Even though I built it, I cannot open it, because I have replaced the thumb-operated latches with fingerprint scanners. A computer inside the case matches the fingerprints against a database, and I have simply put myself in the /etc/deny directory. Griefcase bears these written instructions on its exterior surface: This briefcase is property of EXISTech Corp. By extension, it is thus considered to be part of EXISTech's corporate head- quarters. Therefore, it requires the same degree of protection as EXISTech's Corporate Headquarters, namely that it be protected from undocumented access to its contents, or to access by strangers. Accordingly, an audit trail log, with fingerprints of anyone and everyone opening this briefcase, whether for business, or simply for routine inspection, must be maintained. Routine inspection may include inspection by officials, such as lawenforcement personnel, customs officials, etc., as well as by private security officers such as those stationed at the egress of establishments such as department stores, public libraries, and other places where bags and personal belongings are checked upon exiting or entering these establishments. In order to ensure this accountability, the owner or person carrying this briefcase cannot open it. Only persons other than the owner of this briefcase can open it.

Anyone opening this briefcase, whether they be law enforcement officers, customs officials, military police, or private security forces, must therefore be fingerprinted, and the fingerprints must be maintained in a time-stamped accountability archive. Additionally, this briefcase contains a video surveillance system to document any inspection of its contents, in order to ensure that the contents are not compromised by strangers or corruption. Compliance with these directives is enforced by both policy as well as by using the latest in keyless lock security technology. briefcase uses keyless thumb latches activated by pressing both thumbs on the latches simultaneously. onboard microprocessor scans the thumbprints of the person attempting to open the briefcase. If the fingerprints are those of the owner, the briefcase is not opened. If the fingerprints are those of any person other than the owner, the fingerprints are transmitted by way of a built in cellular telephone data communications system, for remote archiving and comparison with a database of known criminals. Assuming no criminal match is found, the briefcase can be opened by anyone other than its owner, pending successful transmission and archiving of that person's fingerprints to a logfile mirrored across EXISTech's global network of servers. As Assistant Mailroom Clerk for EXISTech Corporation, my job is simply to deliver the mail, and I, of course, cannot be trusted with access to the mail. Therefore, I cannot open the Griefcase. This situation creates something I call Submissivity Reciprocity. That means that anyone wishing me to submit to a search of the case must submit to being fingerprinted. Additionally, by handcuffing one of my hands to the case, and leaving the key in EXISTech's level 4 laboratory (or inside the briefcase itself), I am unable even to try to open the case, because I cannot get both thumbs onto the scanners at the same time. Thus, I require the help of the person wishing the case to be opened [14].


The fundamental problem that the individual faces when interacting with the ever-increasing scope of larger and larger global bureaucracies is that of imbalance and asymmetry. Figure 5 illustrates this imbalance by way of an individual interacting with a clerk who either is, or pretends to be, under the control of a manager who either is, or pretends to be, under the control of a chief technology officer, who either is, or pretends to be, under the control of a board of directors, etc. For example, the CLERK may be protected by a surveillance camera or by a conspicuously covert container for a surveillance camera (such as a large Plexiglas hemispherical dome of wine-dark opacity). If the INDIVIDUAL complains about the surveillance or about the potential for surveillance (e.g. by asking about Plexiglas hemispherical domes of wine-dark opacity within the establishment), the CLERK either can claim not to know what is in the domes or can absolve himself or herself from responsibility for the situation by making reference to the MANAGER. CLERK can either claim that the MANAGER installed the surveillance cameras?or authorized or required the installation of the cameras?or that the MANAGER decides whether or not images are captured from these domes. Alternatively, the CLERK can completely deny knowing whether or not the domes actually contain cameras. Similarly, the MANAGER is bound by, or can pretend to be bound by, conditions from a chief executive officer (CEO). CEO is bound by, or pretends to be bound by what the insurance company requires, or by a board of directors, denoted BOARD.

A typical example of such a situation is when an individual attempts to negotiate with a used-car salesman, and the usedcar salesman might say something like, “I'd love to give you the car for two thousand dollars; let me check with my manager.” used car salesman then disappears into a back room, alone, has some coffee and reads a newspaper for a few minutes and then comes out and says, “I'd love to give you the car for two thousand dollars but my manager won't let me.” Although the salesman never talked to a manager, the salesman has some degree of power over the customer by virtue of being able to credibly pretend that he is bound by a higher and unquestionable authority. A credible, articulable, higher and unquestionable authority allows representatives of organizations to obtain external blame and excuses for what would otherwise be irrational or disagreeable actions. Unfortunately, the individual person does not ordinarily enjoy the same luxury as the clerk and must therefore behave more rationally, or risk seeming irrational, rude or otherwise inappropriate.

Another example is that of video surveillance. If we visited a friend's house where video surveillance was used because that person did not trust us, we would likely be quite angry. However, we often accept the use of video surveillance systems by owners of large organizations, simply because it is not clear who is responsible for the installation of such systems. In my ShootingBack? performance [15] I explored this phenomenon, by asking clerks at department stores, and the like, why they had placed me under video surveillance. Their typical response externalized the responsibility to some higher and unquestionable authority such as management. When I attempted to follow the chain of responsibility upwards, management indicated the directive was from head office, and head office argued video surveillance was just policy, or for insurance purposes or the like. Thus, there was no clear accountability for the situation. If an individual carried a handheld video camera around, videotaping clerks, casino operators, police officers, customs officials and the like, the individual might be regarded as strange, rude or otherwise acting in an inappropriate manner.

The individual could rely on religion as a manager, by, for example, wearing a camera contraption as part of a religious order. Just as religion allows individuals the right to wear special headwear even as uniformed employees (e.g. to wrap heads in various materials that would otherwise be regarded as inappropriate), a new religion such as the “personal safety religion” could be invented that required its members to wear cameras. Thus, religion could be used to play a role similar to that of the manager for the individual, but there is the danger that others (including clerks) may dismiss the individual as a religious freak. Therefore, what I invented was another way for the individual to have excuses for, and to externalize blame for, otherwise irrational or disagreeable actions.

An important aspect of my invention is for the individual to be able to nonconfrontationally in?ict fear of accountability, uncertainty or doubt on persons exerting physical or other coercive force, or the threat or possibility thereof, upon the user of the invention. I did this by way of an incidentalist imaging possibility. Incidentalist imaging is imaging that can be made to seem as if it occurs merely by chance or without intention or calculation. An incidentalist imaging system may in fact blatantly capture images (as by an articulable requirement from a higher authority to do so), or it may present itself as a device that could capture images, in a way that makes it difficult to discern the intentionality of the use of the invention. Figure 6 illustrates the situation of a wearable computer user who is able either to be or to pretend to be under the control of a Safety Management Organization (SMO). This figure shows an embodiment of my WearComp? invention, in which the INDIVIDUAL has a credible mechanism to externalize at least a portion of his or her image-capture actions to a Safety Management Organization (SMO). SMO provides an articulable basis upon which to deny free will or self-determination. SMO creates a management system, either real or perceived, that forces the CLERK out of the normal role, making necessary a true back channel (REVERSE PATH) from the CLERK to the MANAGER, which will often also require a true back channel to the CEO, etc. Ordinarily there would be no such back channel, or the back channel would be reduced, or its existence may even be denied or obscured by the CLERK. For example, if an INDIVIDUAL complains about video surveillance systems in use by a CLERK, then the CLERK will simply refer the INDIVIDUAL to management, and management will likely be available only during certain limited hours, and only after extensive delay. Then management will likely say the directive for use of surveillance comes from the head office, and refer the INDIVIDUAL to a head office, where the INDIVIDUAL will spend several hours waiting on hold and calling various telephone numbers, etc. head office will then often say that the surveillance is used because the insurance company requires it. However, if the INDIVIDUAL takes out his or her own personal handheld camera and photographs the CLERK, indicating that the SMO requires it, a very rapid back channel (REVERSE PATH) will emerge. Quite often the MANAGER will immediately become available, and the INDIVIDUAL will no longer have to wait in line or come back on a certain special day to talk to the manager. CLERK will, in fact, desperately seek a manager to avoid being photographed. matter will therefore rapidly escalate to the highest available level of authority. This system thus has a symmetrical effect in which the individual and manager either snap out of respective roles or a back channel is opened, disrupting the normally top-down nature of the ?ow control from the management to the CLERK. Thus, the individual human becoming a clerk forces the clerk to become an individual human and make responsible decisions outside the scope of being just a clerk. In addition to an SMO, the INDIVIDUAL can also choose to be bound by (or to pretend to be bound by) an SMO that is itself bound by a higher authority such as an insurance company. Thus, in one embodiment, the INDIVIDUAL could, for example, take out a life-insurance policy that required him to wear a personal safety device that recorded video at all times.

Thus, an individual wishing to wear a video-capture and recording system merely signs up with a life-insurance company (e.g. EXISTech Corporation) that requires him to do so. A small premium of one cent per year is paid by the individual, primarily for the reason of being bound by the requirement to wear the device. life-insurance company provides the individual with a choice of two programs, one being one cent a year wearing a camera, and the other being two cents a year not wearing the camera. Thus, the individual wishing to wear a camera system simply selects the lower premium and then blames his apparently irrational actions (constantly wearing a camera system) on the insurance company. EXISTech Corporation simply becomes the individual's corporationality (corporate rationality).

Thus, the life-insurance company provides the individual with a means for articulably externalizing his own irrational actions. Now the individual can say, “I'm wearing this camera because my manager (SMO) requires it, and the insurance company requires the SMO to require me to wear it, etc.” Preferably, in the experimental apparatus, a PROCEDURALIZER is used to allow the individual to follow, or to appear to follow, a prescribed procedure without appearing to be thinking for him- or herself. lack of apparent individual thought or intentionality allows the individual to become or seem to become a clerk, which forces the CLERK to be human in being forced to think and make decisions for himself or herself.

References and Notes

  • 1. See http://wearcam.org/dusting/tpw/ and the accompanying curatorial essay at http://existech. com/tpw/.
  • 2. Surprisingly, using my approach of self-demotion to confront the lowest level clerks in an establish- ment usually brings me face-to-face with highest official much faster than trying to approach the official myself (as in Michael Moore's Roger and Me). By demoting myself to a low-level clerk in my own self-in?icted bureaucracy, I create a situation that the clerks cannot deal with, so they bring me managers right away. I do not need to write endless unanswered letters and wait for hours on hold. I mirror the organization upon itself to get them to bring me top official very quickly. S. Mann, “'Re?ectionism' and 'Diffusionism': New Tactics for Deconstructing the Video Surveillance Superhighway,” Leonardo 31, No. 2, 93?102 (1998); http://wearcam. org/leonardo/index.htm.
  • 3. Albert Camus, a writer who worked for the French resistance movement against the Germans in World War II and co-edited with Jean-Paul Sartre a newspaper called Combat, also examined civilization's failure to properly address many serious moral issues. See also the many writings by Camus and others on the “Theater of the Absurd.”
  • 4. Walter Kaufmann, Existentialism from Dostoevsky to Sartre (World Publishing Company, 1956). See also http://www.interchange.ubc.ca/cree/kaufmann. htm.
  • 5. See, for example, Viktor Frankl, “From Death Camp to Existentialism” (Boston, MA: Beacon Press, 1959).
  • 6. See http://wearcam.org/seatsale/index.htm for more details on the actual exhibits.
  • 7. concept of Humanistic Property is described in Steve Mann, “Computer Architectures for Protection of Personal Informatic Property,” First Monday 5, No. 7 (July 2000); http://firstmonday.org/ issues/issue5_7/mann/index.html.
  • 9. “Instead of adorning or expanding the body, how- ever, the Telepresence Garment . . . foregrounds the other meanings of the verb 'to wear': To damage, diminish, erode, or consume by long or hard use; to fatigue, weary, or exhaust.” Eduardo Kac, “Dialogical Telepresence Art and Net Ecology,” in Ken Goldberg, ed., Robot in the Garden: Telerobotics and Telepistemology in the Age of the Internet (Cambridge, MA: MIT Press, 2000) pp. 180?196; http://www. ekac.org/dialtelep.html.
  • 10. Wearable Wireless Webcam, as described in http://wearcam.org and http://wearcam. org/art.htm. Beginning in 1994 (and at that time only known to my close friends and relatives) the site exploded in popularity. Eventually, on 22 February 1995, this site was chosen as “Cool Site of the Day” by what was then the world's most popular Web portal. At the end of the day I accidentally documented a fire at MIT's East Campus http://wearcam. org/previous_experiences/eastcampusfire.html, serendipitously creating a new kind of journalism. Part of my reason for doing this was also to raise issues about privacy and surveillance, which it certainly did. See, for example, http://wearcam.org/ anders_hove_wearable_web_camera_goes_too_far. htm (criticism of my using my invention as a “complete substitute for existence”).
  • 11. Artists are beginning to ask questions about rules and regulations, and even about crime and what crime is, for example, as articulated by Stephen Wilson: “Deconstructing Crime: What's a crime Who defines it What are our prejudices about crime Are street crimes worthy of more attention than other crimes against the community such as poisoning the Bay or creation of dangerous products that kill or maim” http://userwww.sfsu.edu/~netart/crimezy/crime main.html; see also http://www.ctheory.com/ article/a067.html. Julia Scher also provides a critical framework in which to understand such concepts as what she calls INTERFACE DISEASE SQUADRONS; MAN TRAP BOOTHS; and QUARANTINE BLOCKS. See http://www.insecuritybyjulia.com. My recent exhibit on mass decontamination also looks at similar issues. See http://wearcam.org/ tpw_decon_drill/index.htm.
  • 12. See http://wearcam.org/septambic/index. html and http://about.eyetap.org/library/ weekly/aa120400a.shtml.
  • 13. By incidentalism, I mean that there is no appearance of deliberate action. For example, HeartCam, like the other WearCam? inventions, creates a possibility for image capture by mere chance, seemingly without intention, as opposed to the situation with a traditional camera that needs to be held up to the eye. 14. A smaller wallet-sized version of a similar apparatus is described at http://wearcam.org/griefcase/ idwallet.htm. 15. See http://wearcam.org/shootingback.html, as well as some of the movies at http://wearcam. org/shootingback/.

Manuscript received 26 March 2001.

Steve Mann has lived as a cyborg for 30 years, creating live street performances. Although his work has been exhibited at the Museum of Modern Art in New York, Stedelijk Museum of Art in Amsterdam, Science Museum in the U.K. and various other museums around the world, he believes that the artifacts of the museums are little more than the residue left over from a live performance. Therefore, as a satire of the art gallery, he has constructed a wearable art gallery in which anyone can exhibit work. He now works as an assistant filing clerk trainee in the self-constructed gallery (as described in his book Cyborg: Digital Destiny and Human Possibility in the Age of the Wearable Computer [Doubleday, 2001]), written with Hal Niedzviecki.

Figures seem to be missing; there's a pdf in http://wearcam.org/id/id_leonardo_36_1_19_0.pdf and so I wonder if there's a simple way to extract the figures from the pdf version and insert in the above (it's nicer to see it in html as here in this wiki, than in pdf, despite some missing question marks in the text, etc.).

– Libarynth.guest - 25 May 2003

  • existential_technology.txt
  • Last modified: 2007-06-09 14:29
  • by