Notice: add_custom_image_header is deprecated since version 3.4.0! Use add_theme_support( 'custom-header', $args ) instead. in /var/www/html/shows/wp-includes/functions.php on line 4329 ITP Spring Show 2008 » The Home Network Awareness Program
-->

The Home Network Awareness Program

Emery Caleb Martin

The Home Network Awareness Program (HNAP) is a fictitious program that teaches and encourages individuals to monitor their home networks and eavesdrop on those of their neighbors to help the government fight terrorism.

http://www.dhsnnw.org/hnap.html

Classes Programming from A to Z,Sousveillance Culture,Thesis

The Home Network Awareness Program (HNAP) is a program that has been started by the Neighborhood Network Watch (NNW), which is a fictitious government backed and affiliated community based domestic surveillance organization that targets public networks under the pretense of attempting to identify networks and regions within the community that terrorists maybe using.

HNAP itself provides educational materials for teaching people how to eavesdrop or “packet sniff” networks using their own home computers and off the shelf consumer hardware. The group provides these materials as short video public service announcements and documents, that are distributed via the NNW website.

HNAP provides these educational materials in order to train the public to “packet sniff” their own home networks as well as their neighbors’ networks in order to determine if terrorists maybe using their networks, their neighbors’ networks, or to potentially identify that their neighbors’ are actually terrorists. The amount of “terrorist” activity is determined by using the Neighborhood Network Watch Keyword Analysis Application (NNWKAA), a java application that is designed to process the network capture files and look for terrorism but in actuality is designed to manipulate and amplify any perceived threat that may lie within these samples network traffic.

The program aims to reveal and educate people on the underlying potentials built into the technology that we use in our everyday lives. To demonstrate the ease with which one may operate a domestic surveillance operation as well as how any information can be manipulated or misconstrued to legitimize any claim. The question that arises from this is, if this technology is available to the mainstream consumer then what advanced versions of these same technologies are being used to carry out domestic surveillance as part of post 9/11 U.S. policy and how are they being used to legitimize these policies.

Background
"Resisting Surveillance"&"9/11, Synopticon, and Scopophilia: Watching and Being Watched" - David Lyon
"Information & Behavior Exploitation in Virtual Worlds" - Dr. Rita Bush & Kenneth Kisiel
"Simulations and Simulacrum"&"The Spirit of Terrorism" - Jean Baudrillard
"Discipline and Punishment" - Michael Foucault
"Financial Reporting in a Post Enron World" - George Parker, Stanford Graduate School of Business
U.S. Department of Homeland Security
N.S.A.
C.I.A.
F.B.I.
INTERPOL
U.S.A.F. 67th Network Warfare Wing
U.S.A.F. podcasts
USAonwatch.org
Citizen Corp
The Yes Men

Audience
Ultimately it should be able to engage anyone within the public, despite the fact it deals specifically with networks, the underlying themes are applicable to many other areas that have effects upon the public. More precisely it will be directly targeted for people who have networks in their homes and/or use and own devices that have networking capabilities. People who are concerned with domestic surveillance, invasions of privacy, the effects of neighborhood watch groups, government transparency, and the manipulation of data and information.

User Scenario
I will be resuming my role as the Emissary to the Department of Homeland Security and will be dressed in governmental fashion. This time my performance goal will be to teach people how to eavesdrop on networks (using TCPDUMP), possibly recruit individuals for the program, and to also discuss contemporary issues regarding U.S. government eavesdropping programs. I will have copies of the HNAP official training manual, "How To Sniff Network Traffic," on hand for people to read. There will also be a small pamphlet or reference card that will operate as a quick reference guide on packet sniffing with TCPDUMP. The HNAP's training videos will be viewable off of a computer or screen for those who would like to watch them and learn more. I will also be hopefully distributing copies of the Neighborhood Network Watch Keyword Analysis Application (NNWKAA) as well as demonstrating how it is used and what it does.

Implementation
HNAP is part of the larger project the Neighborhood Network Watch (NNW) with the specific components that are localized to HNAP being the following: TCPDUMP, the Neighborhood Network Watch Keyword Analysis Application (NNWKAA), the NNW website with the HNAP Wiki, the HNAP training videos, and the HNAP literature.

TCPDUMP is the application used for the actual packet sniffing. It will be run off of a Mac laptop with a wireless card connecting to a small local wireless network. It will be used to packet sniff this wireless network (in an ideal situation there will need to be more than one computer on this network).

The NNWKAA will be processing the data that is captured by TCPDUMP and giving ratings on the amount of terrorist like activity is found on that network. The NNWKAA may also be distributed on CD or users maybe directed to the website to download a copy for themselves if they are interested.

The NNW website will provide more background information on HNAP as well as the NNW. This may also be where the training videos are watched from or they maybe separate.

Lastly the HNAP literature will be available for reading and some will be there for free distribution.

I will be performing in the manner discussed in the User Scenario section and will be teaching those interested in packet sniffing, addressing any questions from the public, and disbursing the materials and directing them to the videos and website as well.