Streams of data leak out of environments under duress: journalists and activists in repressive conditions; civilians and organised groups in wartime and conflict zones; prisoners and captives in detention. By nature, the sources of information may be at high risk, and the concept that “privacy is dead” puts human life in danger.
Additionally information is a weapon used for advocacy in both sides of conflicts, to convince, to persuade, to create noise. What techniques and tools are used to collect, aggregate, visualise and report on conflict? Are our ethical systems outdated or are there still core principles worth preserving (e.g., “do no harm”, “protect victim identity”)? This course will look closely at real-‐life scenarios and the tools and techniques used within conflict environments. Key issues may include the use of open-‐source intelligence, human-‐sourced data, big data, evasive tactics, surveillance systems. working in groups, students will be asked to do a series of design exercises
with specific constraints for the first half of the semester, like a series of design warm-‐ups. The second half of the semester students would work individually or in groups to create a prototype of a tool which could be implemented in conflict zones or environments. Students are encouraged to combine this class with lab classes, so that the prototype is sufficiently functioning for the ITP Show. The class will include guest speakers who will provide expert knowledge on specific information problems in conflict zones, to present their own tools, and to provide feedback at end of semester evaluations. The class will also aim to connect students with groups and organizations for further exploration beyond ITP.
Christina Goodness