22.09.2020 Views

Approaches for Digital Self Defence

Process journal

Process journal

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Approaches

for Digital

Self-Defence

a speculative project

about cyber-paranoia

and contemporary

surveillance cultures

Erlend Prendergast



Discover

Deciding on a topic

Taking a step back

Reframing the brief

Surveillance in the digital age

Mapping out research

Governement surveillance

Sousveillance

Corporate spying

Define

User research

Christopher

Elsbeth

Generating insights

The perfect digital citizen

Cyber paranoia

4

3, 4

5, 6

7, 8

9, 10

11, 12,

13, 14

15, 16

17, 18,

19, 20

21, 22

23, 24

25, 26,

27, 28,

29, 30

30

Are we ever truly offline? 31

Digitally tailored everything 32

How ‘smart’ should a blender be? 33

Develop 34, 35

User persona and opportunity 36, 37

Government scenario 38, 39

Corporate scenario 40, 41

Lateral scenario 42, 43

Concept stage 44, 45

Concept one 46, 47

Concept two 48, 49

Concept three (chosen concept) 50, 51

Initial form research 52

External input day 53

Form collages 54, 55

Three legs 56, 57

Considering personas 58, 59

First prototypes 60, 61

Multiple attatchments 62, 63

Scramble 64, 65

Murmur 66, 57, 68, 69

Babbler 70, 71

Material research 72, 73, 74, 75

Reflections: materials and details 76, 77

Deliver 78, 79

Storyboard 80, 81, 82 , 83

Final outcome; reflections 84, 85

Final reflections and next steps 86, 87

3


4


This project took quite a few turns from the

brief I wrote at the beginning, but both my

approach and the central theme remained

the same.

The ‘discover’ section this journal will

discuss the initial ideas that I had for this

project, and reflect on how and why I

adapted the brief, as I embarked on my

research.

5


I have always been interested in technology,

and I had been sure for some time

that I wanted it to be the focus of my final

project.

However, when it came to submitting

the initial proforma and writing myself a

brief, I wasn’t quite sure where to place

my focus. Having just finished writing a

dissertation about the ethical implications

of ubiquitous computing - and felt that it

would make sense to continue researching

in this area.

Something which I didn’t have time to

discuss in my dissertation was the lack of

education surrounding computing ethics

in schools - and I thought this could be

a really interesting place to start. What I

didn’t take into account at the start was

how hard it would be to get access into a

school environment in order to conduct

research and carry out user testing later

on. I was made aware of this during an

ethics session in the first few weeks, and

decided to rethink my user group and alter

my topic.

6


Penny Webb - Seprate Togetherness

Thomas Thwaites - the Toaster Project

I was slightly stuck for a while on how to

adapt the project - so I decided to take

a step back from my previous idea and

carry out more research into some of

the issues and that surround technology

today. On reflection, moving away from

my inital direction was definitely beneficial

for the project,

A lot of my desk research insights were

connected to privacy, data collection and

surveillance. I was excited by a number

of speculative design projects that I had

seen exploring these topics, and felt that

it was an interesting path for me to research

and explore further.

7


Digital technology is being woven rapidly

into the fabric of society. We use it to

mediate a great number of everyday interactions,

across all aspects of our lives.

As computational devices advance, becoming

smaller and more complex - they

are embedded into objects in a manner

which is more or less invisible to the user.

In turn, our inability to understand the

technology that we use everyday opens

up space for user vulnerability - notably

surrounding issues of privacy and surveillance.

8


9


People often use the literary analogy of

Orwell’s “Big Brother” when discussing

surveillance, but in actual fact Orwell’s

model of omnipresent government surveillance

isn’t really an appropriate metaphor

for the kind of surveillance we see

today. I was interested to further analyse

what ‘surveillance’ really means in today’s

digital society.

Thanks in part to the Internet of Things,

surveillance today is multifaceted and

complex, taking place across all facets of

everyday life. All of the internet-enabled

devices we use - from smartphones and

fitness trackers to smart-fridges - collect

data about who we are as individuals.

This data might indeed be accessible to

governments, but a larger threat might

arise in the way in which it be leveraged

by corporations, or even other individuals.

The next stage of my research was to try

and seperate different forms of surveillance

and find a specific area to focus on

in more detail.

10


11


I found at this stage that I was slightly

lost in the research I had carried out, and

the next step for me was to synthesise

this research and map it out. There were

three main forms of surveiller that I had

come across in my research: governments,

corporations and finally peer-topeer

surveillance carried out by individuals.

Creating this map was really helpful for

my process, as it helped me to conclude

the first stage of desk research, and acted

as a tool that allowed me to explain

my research more coherently. I revisited

it a lot as I progressed through the project

- and the three areas that I defined

on it ended up forming the basis for my

final outcome.

Each of these areas were experienced

and enacted differently, and each had different

connotations and implications for

technology users. I created a map which

explained and analysed each area of my

research.

12


In the early stages of my project I found it quite difficult to articulate what it was about - I knew that I was interested

in data privacy and surveillance, but there were too many aspects of this topic that I found interesting,

and I kept getting a bit lost when trying to present the research. This research map really helped me to define

my key areas of research and speak about it more coherently.

13


Prompted by disclosures and leaks such

as Snowden and Cambridge Analytica -

the majority of the media discourse surrounding

surveillance is centred around

the notion of a a ‘Big Brother’ state. In

many ways state surveillance is considered

to be most intimidating - as we

consider it to be top-down and covert,

something which is done to us without

our knowledge or approval.

Snowden’s was the largest leak of data

to date, and marked the beginning of a series

of disclosures, particularly relating to

the surveillance practices of the US government.

It began with the publishing of

classified documents containing detailed

reports of a wide-scale electronic data

mining program by the National Security

Agency (NSA), codenamed ‘PRISM’.

One of the most significant findings

from these disclosures was the revelation

of the covert relationship between

technology companies and government.

Snowden’s documents revealed that

the NSA has partnerships with nine

major technology corporations: Microsoft,

Google, Yahoo!, AOL and Skype to

name a few

14


Snowden plays a huge role in our understanding of state surveillance - which is largely dependent on the

cooperation of big corporations.

15


Not only does today’s surveillance depend

on the participation of those surveilled,

but those surveilled are often

the intiaters of surveillance themselves.

James Cascio describes this using the

term ‘participatory panopticon’:

“this won’t simply be a world of a single,

governmental Big Brother watching over

your shoulder, nor will it be a world of

a handful of corporate siblings training

their ever-vigilant security cameras and

tags on you. Such monitoring may well

exist, probably will, in fact, but it will be

overwhelmed by the millions of cameras

and recorders in the hands of millions of

Little Brothers and Little Sisters. We will

carry with us the tools of our own transparency,

and many, perhaps most, will do

so willingly, even happily.”

Moreover, most of us use social media

platforms such as instagram and Facebook

to snoop on one and other - and

in turn, the reality which we project

through social media can often be highly

constructed.

16


A family watching a couple on tv watching their tv. With the rise of celebrity and reality tv; sousveillance

has become something of a way of life.

17


We engage frequently with corporations

across many different contexts - in ways

which are increasingly individualised and

targeted. Primarily these corporations

are trying to sell services and products

to us and, by doing so, are shaping our

decisions and behaviours.

we utter close enough for Siri to hear.

And once more, marketing itself is no

longer limited by the confines of advertising

- it permeates into many of our

digital interactions, in ways often unnoticed.

Advertising, once confined to billboards,

television and radio - has infiltrated all

facets of our digital environments. The

adverts we see are optimised depending

on our interests - according to the websites

we visit, the phrases we search and

the words

18


The massive amounts of personal data collected on Facebook make it the perfect tool for mass

surveillance - the Cambridge Analytica Scandal being a good example of this.

19


20


The research I had carried out in the discover

stage was rich and full of insights, However,

it was still quite macro and abstract. It

didn’t touch on the human experiences that

surround surveillance, and I didn’t yet have

a good understanding of the way in which

surveillance impacts our everyday lives.

In the ‘define’ stage I began to connect my

desk research to real users, and tried to

understand how surveillance trickles down

into our interactions with digital products

and services.

21


What I set out to achieve when I began

my user research was to understand

how fears surrounding surveillance

might impact the way we interact with

technology. The first task in doing this

was to redefine my user group now that

I had a more detailed understanding of

the topic.

Though having conversations about my

project with a number of different people;

peers, family and tutors, I came to

realise that one of the main factors that

influenced poeple’s ideas about surveillance

was their age; whether they were

a ‘Digital Native’ or a ‘Digital Immigrant’.

The understanding that I had formed

was that Digital Immigrants are more

likely to second guess technology and try

to work around it, whereas Digital Natives

tend to be more accustomed to it.

Considering this, I felt that i could gain

more interesting insights by focussing on

older generations of technology users,

and after visiting my parents for a weekend

and observing the way that they

interacted with and behaved around

technology, I decided to focus the user

research on people in their age group.

I visited the homes of three retired couples,

had a look at the technology they

used and asked them some interview

questions. This was really beneficial as

the insights I gained here played a large

role in informing the development of my

final outcome.

22


I prepared some questions but I didn’t have to use them that much in the end - surveillance is an easy

topic to discuss with people, as everyone seems to have their own paranoias

23


Christopher, 58

Quotes from interview:

“I use Safari for my online banking and

Chrome for everything else. I’m not quite

sure why - it just feels unsafe to do

everything on the same one”

“I heard Zuckerberg on the radio saying

how he covers his webcam. Apparently it’s

really easy to hack them. ”

“I’m pretty funny about passwords.

I change them all the time, I have a folder

upstairs with hundreds of them in it.”

“I mean I’ve not got much to hide

really, I understand why doctors or bankers

don’t want Alexa listening, but I’m an

artist. What could they want from me?”

“It made me jump the other day - it lit up

and I definitely say its name”

“It’s funny because I wouldn’t consider myself

to be someone who’s paranoid using

technology at all. I don’t notice myself doing

all of these things”

24


I think one of the most interesting things

that i drew from this interview was that

people have a number of paranoias that

they aren’t necessarily aware of.

Moreover, we sometimes pick up behaviours

and ways of doing things - such as

using stickers to cover webcams - that

are actually a little bit irrational and don’t

make a whole lot of sense. Someone

who is capable of hacking into a webcam

would probably be more likely to hack

into Zuckerberg’s than ours (I write this

with a sticker over my webcam)

What was also interesting is the ‘I don’t

have much to hide” attitude. This seems

to be linked to the idea of panopticism -

the idea that our personal might in some

way be used to discipline us.

25


Elsbeth, 61

“My sister gave it (Amazon smart speaker)

to me for my birthday last year. I was

terrified of the thing at first, but we’re good

friends now”

“We often joke about her being the ‘kitchen

spy’ - actually that’s what we call her if

she’s in the room so she doesn’t wake up.”

“Well we thought she only recorded us if

we woke her up, but I read in the Guardian

that she’s always recording everything.

How else would she know when we say

her name?”

“I said that the drain was blocked the other

day and an suddenly I was seeing advert

s for drain unblocker - I’m sure it was her”

“I do get a bit freaked out sometimes when

the blue light comes on but I haven’t said

said anything to it. That’s when it feels as

though it’s been listening all the time”

“If it really is recording all the time, they

must know a lot about us”

26


I got a lot of insights from my interview

with Elsbeth, that helped me to form my

final design opportunity and outcome.

27

I found the interaction that she has with

her Alexa speaker really interesting. Firstly

the fact that she personifies Alexa, using

‘she/her’ pronouns when discussing

it. I think there is an interesting dynamic

between the human characteristics of

Alexa and its techy, paired back aesthetic.

It’s not too human that it’s scary, but

human enough that it has a personality.


What I set out to achieve when I began

my user research was to understand

how fears surrounding surveillance

might impact the way we interact with

technology. The first task in doing this

was to redefine my user group now that

I had a more detailed understanding of

the topic.

Considering this, I felt that i could gain

more interesting insights by focussing on

older generations of technology users,

and after visiting my parents for a weekend

and observing the way that they

interacted with and behaved around

technology, I decided to focus the user

research on people in their age group.

28


Not only can our personal data be used

to tailor the adverts we see and influence

the decisions we make, but it might

also be used by employers, or banks in

order to assess us.

In turn, the opportunities we receive

might be defined by our digital representations;

the things we’ve purchased,

what we’ve Google searched or even

the topics we’ve discussed in front of

Alexa. This is information capitalism, and

will only become more prevalent as the

amount of data we generate continues

to increase.

Could it be possible to alter our digital

representations in order to optimise our

chances and increase the number of opportunities

we are presented with? What

does a ‘perfect’ digital citizen look like?

29


A photo of Mark Zuckerberg was posted

last year, in which his laptop was seen

to have a sticker over its webcam. The

photo went viral, and the effects of it

trickled their way down into society,

prompting lots of laptop users to cover

their webcams.

The sticker over the webcam has become

just one of a number of different

habits technology users have formed to

ensure their privacy: using VPN’s, private

browsing modes, ad blockers and pseudonyms

to name but a few.

As we continue to find out more about

surveillance - through disclosures, leaks,

or even just a photo like this one - we

become more wary of our technology.

30


We use computers across all aspects of

our everyday life, in work and leisure; to

email colleagues, to pay for coffee, to find

our way around Our smartphones are

always operating autonomously in the

background, connecting us into a web of

communication and digital interaction.

We don’t just use computers at home

or in our offices anymore - nowadays a

phone is a computer. Computers have

made their way into many a whole array

of products that we encounter frequently

across many different contexts.

As a result of this, the boundary between

the online and the offline has begun to

merge.

31


Each Google Maps app is individually tailored

to its user, according to an algorithmic

prediction of their interests.

In turn, each smartphone user will see

a different list of shops whilst standing

on the same street. An algorithm skims

through our previous locations, email

conversations and internet searches to

give us a personalised list of places that it

thinks we’d like to see.

In the same way that personalised advertising

changes how we experience

our virtual environment - two people

navigating the same street using Google

Maps will experience their physical environment

differently.

32


‘Smart’ technology has made its way into

many of the products that were once

pretty simple things - from fridges and

blenders to watches and headphones.

The defining feature of these products is

their ability to collect user data, allowing

for a more personalised user experience.

Perhaps these data collecting devices are

simply acting as an apparatus through

which corporations can exploit their customer

and maximise profits?

Jacob Silverman writes “What is presented

as an upgrade is actually a stealthy

euphemism for surveillance (used to)

provide a company with a permanent

foothold in a person’s home from which

they can be monitored”

How ësmartí should

a Blender be?

33


34


I began the develop stage by creating a

detailed persona based on my insights

and user research. I focussed on one

specific opportunity relating to Alexa,

and developed a series of speculative

scenarios of how this user’s personal data,

gathered by Alexa, might be used. I was

really happy with these scenarios, as I

felt they really brought the project to life.

I then went on to generate concepts - before

focussing specifically on one. Through

form research, sketching, physical/digital

prototyping and material development,

I developed this concept into my final

proposition

35


61 year old Elspeth received a virtual assistant

as a Christmas gift from her sister

last year. She was initially very wary of

the device after reading articles about

its privacy implications online. She didn’t

like the idea a that tech company was

eavesdropping on her conversations. The

recent revelations that a British political

data firm, Cambridge Analytica, had improperly

harvested the information of

50 million Facebook users only added to

her wariness. There was no way of her

knowing who was sitting at the other

end of the device, analysing her every

word.

Elspeth’s concerns didn’t change over

time - but the way in which she used

the device did. She began to realise how

useful it could be for tasks around the

house. She started to rely on it to mediate

a number of her everyday tasks.

After months of using the device, Elspeth

can’t imagine her life without it. She’s

even considering purchasing more smart

devices to create a ‘smart home’. The

only thing stopping her from doing is her

concern over privacy.

Things I wanted to address through my

scenario cards:

Where might Elspeth’s personal data end

up?

How might corporations, governments, or

other individuals be able to leverage this

data for their own gain?

My design opportunity:

How might Elspeth protect her privacy,

without having to sacrifice the device?

36


37


The Snowden Disclosures in 2014 shined

light on the surveillance practices of the

US government. Classified documents

were published containing detailed reports

of a wide-scale electronic data

mining program by the National Security

Agency (NSA), codenamed ‘PRISM’.

Snowden’s documents revealed that

the NSA has partnerships with nine

major technology corporations: Microsoft,

Google, Yahoo!, AOL and Skype to

name a few. These partnerships enable

the NSA to monitor real time data content

such internet search behavior and

browsing patterns. Further, the ‘Verizon

Scandal’ revealed that a secret court

order had required major telephone

networks to provide the NSA with a

sustained stream of metadata regarding

phone calls: locations, caller, callee and

call duration.

38

If the NSA had access to Elspeth’s voice

transcripts, how might they be used?

- Trigger words and phrases might be monitored

to assess whether Elspeth holds any

threat to national security.

- In the future, Elspeth’s conversations

could feed into the establishment of a social

credit system, such as the one currently

in place in china.

- A police investigation looks to harvest

data from Elspeth’s virtual assistant, after

she is affilated with a small crime.


39


As the user of an Amazon Echo speaker

begins to rely on its voice assistant, Alexa,

to mediate a variety of tasks around the

home - their use of the device becomes

habitual. Each time they add a new device

into their smart-home ecosystem,

Amazon learns in more detail about

their lifestyle and behaviours. This detail

constitutes invaluable information capital,

which Amazon can leverage to predict

and control the lifestyles and behaviours

of their customers.

For the person living in a smart-home

filled with Echo devices, Amazon becomes

more than just a retailer - it becomes

an operating system used to mediate

their physical life.

40

How might a technology company such

as Amazon use the data generated by

its virtual assistants?

- Key words and phrases are used to create

channels for personalised advertising.

- Amazon delves into the insurance market,

offering tailored quotes based on the user’s

behavioural data, such as purchasing decisions

and conversation transcripts.

- The personal data of millions of users is

supplied to a third-party app developer,

leading to a mass behavioural study and

the swaying of numerous global political

elections. (sound familiar?)


41


It only takes a Google search to find

countless cases in which hackers have

been able to to remotely access the microphones

of virtual assistants.

One group of Chinese hackers spent

months developing a new technique for

hijacking Amazon’s Echo smart speaker:

“After several months of research, we successfully

broke the Amazon Echo by using

multiple vulnerabilities in the Amazon Echo

system, achieving remote eavesdropping…

When the attack [succeeds], we can control

Amazon Echo for eavesdropping and

send the voice data through network to the

attacker”

What could a hacker do with

Elspeth’s virtual assistant?

- Elspeth discusses a her holiday plans in

front of her virtual assistant. Whilst she is

away, her house is robbed.

- An anonymous email is sent to Elspeth

from a blackmailer, who threatens to publish

her private converstations online.

- The data from thousands of Amazon

smart speakers in London homes is harvested

by a terrorist organisation and used

to plan an attack

42


43


Google the term ‘surveillance’ and a

plethora of articles from the last 24 hours

will come up. Many of these articles will

have bold, sensationalist titles, such as

“Facebook Just Gave Repressive Regimes

The Ultimate Surveillance Blueprint”, or

“China’s ‘horrifying’ new surveillance system

could have global consequences”

I became interested quite early on in the

role that the media plays in creating fear

around surveillance. Though surveillance

is certainly a real threat in today’s society,

I noticed that most of this media coverage

is centred around top down, government

surveillance and the notion of

‘state spying’.

Furthermore, there are a lot of divisive

whistleblower characters involved in

the media coverage surrounding surveillance,

such as Snowden, Christopher

Wylie and Julian Assange. These characters

allow us to engage with the debate

surrounding the topic, as there is a narrative

to follow.

The first concept I had was to design

my own narrative of an Alexa-themed

surveillance disclosure, with its own

whistleblower character.

44


I actually really liked this idea - but

I moved on from it pretty quickly. I

did however keep the idea of creating

a narrative to make the notion

of surveillance something tangible. I

feel that this is something my final

proposition did really well in a different

way.

45


One of my main interests in this project

was designing and making an object or

product that was subversive and critical.

This was the direction I started to take

when I came up with the idea for my

second concept - a series of switches

that the user could install in their house

to create false patterns of data.

This concept was centred around the

idea of smart homes - where the house’s

electrics are connected into a centralised

digital system. From the perspective of

digital surveillance, the issue with smart

homes is that a lot of ‘smart’ devices are

weakly secured and quite easy to hack.

As the user is constantly generating data,

patterns begin to emerge that show, for

example, what times they are usually in

the house. This in turn makes the person

living in a smart home more vulnerable

to criminals than someone in a regular,

not-so-smart home - I liked the irony in

this.

Article on the Independent that led me to think about this concept

46


Rather than actually switching appliances

on, the switch would connect

to the internet-enabled aspect of

the device and create a false indication

that it was being switched on at

random intervals.

I didn’t develop this concept very far

as it did not immediately respond to

my opportunity, which was about Alexa.

However, this idea and the bit of research

that I did alongside it definitely

informed the direction that I took

with my final concept.

I used this concept to teach myself the basics of CAD modelling, as I knew I wanted to

use it in this project.

47


Though my two prior concepts were interesting

- they did not directly address

the opportunity that I had defined when

I created my user persona as I had gotten

a little lost in my ideas. At this stage I

went back to my opportunity and decided

to address it more directly.

This opportunity was quite specific:

How might Elspeth (the user) protect her

privacy, without having to sacrifice the device

(Aexa speaker) ?

When I came up with the idea for my

third concept, it felt like it should have

been quite obvious to me earlier on. It

was actually quite simple; an accessory

that would work in conjunction with

the Alexa speaker in order to mess with

Amazon’s algorithms, and give the user

(Elspeth) a sense of security.

Of course, this concept is slightly absurd;

that someone would purchase an accessory

to defend themselves against a

device that they choose to use. And as I

mentioned previously (page __) there is

no way really knowing how Alexa’s algorithms

work - and therefore it would be

quite difficult to defend Elspeth against

them.

In many ways this is what made me so

drawn to this concept. Most of the fears

and paranoias that we have surrounding

Alexa, and the different rituals and interactions

that came up in my user research

- are somewhat nonsensical. In reality, the

only way to defend ourselves against Alexa,

is to not use it at all.

I think that this concept highlighted this

paradox quite well, and I was really excited

to start developing it.

48


Very initial sketches were a bit unamaginative

but I moved on quite quickly as I began to collate

together some visual references

I started off thinking about an accessory that the Alexa speaker would slot into, so that the object

would be surrounding Alexa. I made a first very simple digital prototype of how this could look.

Again at this point I was mainly trying to get my head around the software. .

49


intial form research

At this stage of the project I began

compile some visual materials together;

other projects that I had seen and

felt drawn to, and objects which I felt

reflected the ideas surrounding my

concept.

From the beginning I had a pretty clear

idea of the semantic qualities of the

product I wanted to make. I wanted it

to be playful, and characterful and satirical,

and I wanted the form of the

object to be suggestive of its function

and motives.

Also really important was the relationship

between the object I was designing

and the Alexa speaker that it would be

sitting next to. I tried to keep this in mind

throughout the development process,

integrating the speaker into my sketches

and placing a model of it next to my

prototypes.

I got some really helpful feedback when I

presented my initial sketch model at the

first development review - to start off

being very experimental with my own

prototypes and choose a selected few

to refine after.

Dan Adleš - Electricity is Just Like Woah

50


“sprinkling of disinformation”

“language of nonsense”

“David and Goliath”

“data watering can”

Schimmel & Schweikle - Return to Default

The first very basic model I made

We had two an external input days

over the course of this project, in

which we had the opportunity to

present our project designers, design

researchers and design academics.

The second of this in out days was

early on in the development stage,

and was really informative and beneficial.

I had a particularly helpful discussion

with James Johnson from getMade Design,

who gave me some brilliant comments

about the direction I could take

with the project. One of these comments

was about the user forming a relationship

with it with the device, almost

as if it were a pet. I really liked this idea,

and tried to keep it with me throughout

the development process.

51


I saw a lot of really interesting forms

whilst looking through a Bang and

Olufson book, and started to think about

how they might translate into the form

of my object. I photocopied some pages

that I liked from the book, cut up individual

elements and created come collages.

Each of the new forms that I made had

a different character and personality,

which I really liked. I tried to create little

scale that I think represented the trials

of these forms quite well. Humour, ‘techness’

(their resemblance to Alexa-like

tech products) and human-ness (looking

like they are alive in some way).

52


unconventional

characterful

disruptive

satirical

53


I was particularly drawn to one of the

collages that I had made, which had three

legs and looked almost insect-like. There

was something about the three legs that

I felt have the object a lot of character.

It reminded me of a little pot that I had

in my family home growing up. I always

used to imagine when I was younger that

this little, awkwardly innocent pot had a

life of its own.

the same diameter - almost as if Alexa

had grown grown three little legs. I really

liked the relationship between these two

objects when they were placed together,

and from this point I started to integrate

similar legs onto all of my form sketches.

This became one of the integral features

of the design, that I kept all the way

through as I developed the models and

prototypes.

When I was home visiting my parents,

I had another look at this pot and took

a photo of it besides the Alexa speaker.

Funnily enough, they were both about

The pot at my parents’ house

The collage with the legs I liked

54


Sabira Silcock

(same below)

Sometimes it can be difficult to know

what to draw next when the object

could really take any form. It was quite

nice to have a feature of the object

which was set and remained sort of

static. Although I changed aspects of the

legs - their size, thickness, material, and

texture - they remained quite similar up

until my final models.

Lampshade from

Kenya Hara’s book

‘Haptics’

A false furry

fabric on a

polystyrene ring

55


I had a visual language and a good sense

of how the product might look at this

stage, but I wasn’t sure exactly what kind

of personality it would have, as this was

dependent to some extent on its function.

I didn’t know what it was going to do

to confuse and disrupt Alexa; whether it

would say random things, or very considered

things - whether it would sing or

whether it would shout.

Part of me wanted to design the object

to have a sort of false innocence, and

sneakily feed Alexa with data - maybe in

the form of a whisper. However I was

also fond of the idea that it would be

more jumpy and alert, and shout over

the user when they said something private.

I was a little conflicted about having to

settle on one personality for the object.

56


Markus Wold + MarkusBader,

2002: Bootleg

Objects: series sound - Rebraun

I thought that the most natural way to

design more than one personality into

the device, was the give it a set of controls.

This worked well with one of the

insights I had defined earlier on (page

29), about the user being able to tailoring

their own digital representation.

The Alexa speaker, like a lot of other

technology today - has been designed

to look really simple and discreet. Its

form does not give any indication of the

complexity of the technology inside it. I

initially liked the idea of having different

switches and sliders and a retro interface

of my product in order to contrast with

this.

I moved on from this idea as I started

to make phsysical prototypes, and began

think about having a family different objects,

rather than one object with multiple

functions

initial plastacine model with control panel detail

57


First physical prototype

First digital prototype

When I started to make my first physical

prototypes in the workshop, I was

firstly interested in thinking about the

base of the object and its legs. I had

a pretty good idea if how I wanted

this part of the product to look, and

thought it experiment with this component

first.

I wanted the form to be a similar scale

to the Alexa speaker, so I found out its

diameter and started off by cutting out

foam circles of the same size. The first

prototype I made was pretty simple and

a bit of a blob. I took this form into a

CAD software, and sculpted it to give it

to be a bit more refined.

58


The first form was a bit too small

and nondescript, and there was no

plane on top to put a control panel

(which I was still interested in exploring

at this point)

I made a second model which had

a flat plane along the top where a

control panel could sit. I really liked

this prototype and the way that the

legs looked on it, but I felt that it was

a bit bulky.

At this stage -and after a productive

tutorial - started to doubt the idea

of the control panel, as it seemed

like it would quite limiting for the

form of the object. I was also worried

that having these controls might

make it appear to be just another

technology product, rather than one

which is different and disruptive.

59


As the result of making of first prototypes

and seeing them as physical forms,

I came to the idea that rather than using

buttons to alter its function, it might

be more interesting to alter the function

through a series of different attachments

- each with its own personality.

I was really happy with this idea, as I felt

that I could express the different forms

of surveillance paranoia more effectively

by creating a family of accessories,

than I could creating just one.

One of the things I had discussed during

my external input session with James

Johnson was the idea that this product

should have a DIY quality to it. That

the user could build it and bring it to

life themselves. I felt that this could be

achieved by having two parts to the

product. This way when the user puts

the attachment on, the object wakes up.

60


After deciding to create a family of

attachments, I went back to the workshop

to refine the form of the base. I

wanted to have this set in stone before

I started to design the attachments, as

it meant that I had a basis that I could

work from.

Looking back at my previous prototypes,

I decided to make the legs of

this final prototype a bit longer and the

body a little slimmer. I was really happy

with how the final form of the base

turned out.

Making the final prototye for the base

I began to think about the details of the

base and how the attachments would

fit on top. Created a CAD model of

the final prototype and created a little

space at the top where a magnet could

sit - measured o the size of magnet that

I purchased on online.

The slot where the magnet would fit

61


The first attachment that I set out to

design was based on the form that

I had been leading towards in most

of my sketches, with the speaker that

looms over Alexa. I felt that the forms in

these sketches almost looked as though

though they were almost waiting for

Alexa or the user to say something. I

thought that this would tie in really

nicely with the idea of the user saying

sensitive word around Alexa.

scenario cards; one for corporate surveillance,

and one for lateral sousveillance.

The idea for my first attachment it that

it would be programmed to respond

when it hears these trigger words being

spoken, and scramble the recording by

shouting over the user into the speaker.

After a list of trigger words monitored

by the the US’s National Security Agency

was leaked online, there were multiple

studies that showed how people’s

behaviours changed online. People

were more wary to search certain

words than they were before.

As this concept was tied to the idea of

state surveillance and governemnt spying,

I decided at this point that it would

make a lot of sense to design two other

attacthments that reflected my earlier

62


I wanted to amp up the characteristics

that I had observed in the form of my

first model. This attachment was to look

alert - like it was on its toes waiting for

a sound. I sketched down some ideas

before using CAD to bring them to life.

The first CAD model I made was quite over the

top, but effective

63


After creating a model on CAD that

I was really happy with, I wanted to

make sure that the scale of it looked

right. However, making prototypes of

this form proved a bit more challenging

as I was beginning to feel the time

constraints. I still had to come up with

the ideas for the other attachments,

and experiment create forms for them

also.

I measure dout the size of the digital

model and went went back to the

workshop to make a prototype. I didn’t

completely finish this prototype, but

making it in part allowed me to see

how the scale would be in real life.

Prototype of Scramble’s neck, measures to be

same size as the one on CAD model

64


final model:

After making the physical prototype I

realised that the neck was a little too

long and not quite balanced enough.

I rectified this by making the base of the

neck a bit shorter and more organic

looking.

I really liked the final form, as it has

loads of character, and defintely looks

like it’s waiting to intervene. I showed

it to a lot of people and felt that it

didn’t need to be refined any further.

65


The concept for the second attachment

came to me whilst designing Scramble. I

wanted this attachment to be the complete

opposite of Scramble - rather than

hanging over Alexa and waiting to shout

over the user, this attachment would

hang back discretely and whisper to

Alexa. This interaction came first, along

with the name Murmur, meaning “a softly

spoken or almost inaudible utterance”.

The function of this attachment also fell

into place really nicely. I wanted to address

fears around tailored advertising,

something which we all feel the effects

of. I came up an idea that every time the

user says something that might indicate

a personal taste, hobby or preference,

Murmur would counteract it by uttering

something completely opposing.

The mechanisms for tailored advertising

are really very sneaky - we rarely know

what data has been used to tailor the

adverts we see. This is something which

came up in my interview with Elspeth,

and I really liked the way this attachment

addressed this opportunity.

66


How sneaky could the pipe/cable be? In this

model it disappears behind a wall and resurfaces

above Alexa’s head

Eriko Matsumura - Air Puff

I liked way this object interacts

with the computer

67


For this attachment I spent a lot of time

working between sketches and creating

digital prototypes using CAD, which I’m

happy about as I learned a lot about

how to use the software. I had a lot of

fun concepts about how Murmur could

sneak up and infiltrate Alexa’s algorithms.

In the end, I think the answer was not

to not complicate the form too much,

and keep it quite fitting quite low, baring

in mind that Scramble is tall and towers

over Alexa. This way the different attachments

would play off of one and other.

68


I started to think about

how I could express the

chracteristics of the attatchment

through its

material

final model

I imagined this attatchment

all to feel quite soft

and rubberised.

I really liked hiw it turned

out, even though it did

take me ages to make

69


One of the insights I got from my user

research was that people are sometimes

a bit embarrassed to think that a Alexa

really could be listening all the time. Recently

there have been articles in the

news claiming that there really are human

workers at Amazon whose job it is

to listen to recording made by Alexa -

this is what I wanted to play on with the

third attachment I made.

How could the user fool the person

sitting on the other end of Alexa, into

thinking that they were a wholesome,

good person?

The idea I developed for this attachment

was that it could be turned on when the

user leaves the house, and it would chat

to Alexa all dat about socially desirable

things. In turn, the user would build a

perfect persona for themselves - a digital

alter ego.

The semantics of this object had to communicate

that the attachment is a false

friend - using a chatty friendly facade to

fool Alexa into believing the lies that it

tells.

70


I felt like I didn’t need to make quite as

many different form iterations for this

one, as the idea for it had been forming

whilst I was designing the previous

attachments.

Ideally I would’ve liked to have gone to

the workshop and some physical prototypes,

or even 3D printed some prototypes

using the facilities at the school, but

at this point I wanted to order print the

final models in order to ensure that they

would be with me in time. 71


I wanted the product to feel like a manufactured

and commercially available

product. The best option for this was to

3D printed, but I had to send the file

away as soon as possible to ensure that

I would receive it in time to develop

the proposition further. This meant that

I did not have a lot of time to carry out

material exploration during the prototyping

stage. Instead, experimented with

materials whilst I was waiting for the final

models to print. This meant that I

could come to a conclusion on how I

wanted to treat the models when I had

them.

I created a colour palette that I thought

that I felt would compliment the project

well. I ended up varying a bit from this

palette, but it was helpful to limit myself

a bit at the beginning.

The difficult part was that I could only

afford to order one base - so I would

have to figure out whether I wanted the

base and attachments to be different

colours, or all the same colour.

72


Scramble is alert, and snappy - the first

though I had was to make it bright - a

red or yellow. I tried this and felt that it

detracted from the form a lot, a warm

terracotta red worked quite nicely

though.

I only liked the look of the colour when

both the base and the attachment were

the same - I tried various different

options and this was something I felt

across all of the attachments.

73


74

Murmer is under-the-radar and sneaky. I

wanted this to reflect on the materials

so that it wasn’t too bright. I really liked

the mirrored chrome material, as it almost

acts as a disguise. However this

was not going to be possible. I actually

felt that the white worked best here.


Babbler’s form implies that it is friendly

and welcoming - I tried to reflect this

through the colours and materials by

choosing ones that were brighter and

more playful.

75


After receiving my final models and

getting a lot of thought feedback from

others, I felt that it would be a mistake

to apply a new finish to the models. The

quality of the plastic feels really nice, as

the finish of models was already processed.

The forms of the objects themselves

have an inherent materiality, and

applying a new finish to them might

have ended up detracting from their

forms in some way.

I was also quite aware that I wanted the

objects to be nuanced and not over-designed

If they were to become too familiar

looking - like something that could

be found in a kitchen - they would not

be so curious as objects.

I put small ridges into this face of Scramble, so the user

knows that it is this side they attach to the base. I will

laser cut a small acrylic panel with a magnet on the

other side, so that it will attatch onto the base

76


laser cut acrylic

magnet

silicone

I filled the hollow parts of the other two

attachments with silicone, and was going

to sit a magnet on this before covering it

with laser cut acrylic disk, so that it would

look neat. Unfortunately I didn’t manage

to get all of this done before assessment,

but will refine it for degree show

I designed a hole into the top of the base

sonthat I could fill it with plaster before

sealing it with the magnet. This makes the

base heavier as if were filled with technology.

77


78


The deliver stage was probably the most

stressful point in the project - as time was

beginning to get tight. I had to decide on

certain things that I would leave until after

completing this journal, and certain things

that I would have to fix after assessment, in

time for degree show.

I decided that the way I could organise

my time most productively was to make

a storyboard and take some shots of the

product before going to take the final

photographs, whilst shooting the film.

I wanted to make a storyboard showing how

the user might hear about and purchase

Counterbug. This storyboard had to be

visually engaging so that it brought the

proposition to life - and I think I achieved

this quite well.

79


Whilst reading her morning newspaper, Elaine

comes across an article that leaves her feeling

deeply conflicted.

According to the article, there are staff employed

at Amazon whose role it is to listen

through Alexa users’ voice transcripts.

Elaine suddenly feels very aware that someone

might be on the other end of the speaker. she

decides to switch Alexa off whilst she thinks

about what she has just read.

Elaine has been using an Alexa speaker ever

since she received it as a birthday gift from her

sister last year. Though she has always been

dubious about how much the device is recording

- she has grown to really like having it.

80


Elaine

Lilian

Order

CounterBug

Here

Looking for some comfort and reassurance,

Elaine messages her friend Lillian, who also

owns an Alexa speaker:

“Hello Lillian,

I have just read a shocking article, and I thought

that as a fellow Alexa user you might want to

know about it.

Here’s a link:

www.guardian.co.uk/txksieo2ueodspy4834”

Much Elaine’s surprise, Lillian replies with a link

to a product that she hasn’t heard of before:

“Hi Elaine!

I’m all too aware of this after reading a similar

article last week! My brother suggested I buy a

Counterbug - and I haven’t looked back ever since

- safety at last!

www.counterbug.com

81


Elaine reads CounterBug’s manifesto, imagining

all of the scenarios of how her data might be

used.

She clicks through the three different accessories

available to her, and comes to the conclusion

that she definitely has to have one.

Though all of the attachments seem revelant

to her, there is one which seems especially

pertinent.

Since the Snowden disclosures, Elaine always

feels a bit on edge. She accidentally shoplifted a

tub of house paint from B&Q about a year ago,

and she worries that one day she will say the

wrong thing in front of Alexa, and the police

will come knocking on her door.

She orders Scramble with next day delivery.

82


Elaine recieves her CounterBug in the post the

next day and assembles it straight away, She is

delighted to hear Scramble jump into action.

It took a little bit of getting used to - as Scramble

can sometimes be a little loud, but she feels

a lot more at ease now that she doesn’t have

to worry about saying the wrong thing in front

of Alexa.

83


84


I think my final outcome was really well

resolved. The fact that it has quite a high

quality finish really helps engage people

to ask what it is. This is exactly what it

intended - as the objects act as a vehicle

to provoke thought and discussion

about the way that we use technology,

and the lengths are willing to go to protect

our privacy.

If people are already willing to do things

such as use VPN’s, cover up their webcams

and turn off Alexa when it’s not in

use - the idea that someone would buy

a product like CounterBug is not so so

much of a stretch.

85

I didn’t get the chance to film a video

before I finished this journal, but I

think it will play a really important part

in bringing to life the experiences and

interactions that surround the product

What I would really like to capture in this

video is the relationship between Counterbug,

Alexa and the user - and the idea

that these two robots, sat in the corner,

are playing off one and other.

As AI moves its way rapidly into our

homes - these are the sorts of relationships

that will begin to form. Not only

will we have robots that service us, but

we may even have robots that exist to

service other robots.


86


I’m really happy with the way that this project developed, and

I feel very confident in what I have produced. I think that

there is a really strong narrative from start to finish. I started

off with a challenging topic, and the outcome that I ended up

is actually really simple, but in a good way. I like that the final

proposition correlates directly with the insights from my user

research, and I can imagine the product being placed back

into the domestic scenes that I photographed (p.24,25).

The studio environment was really beneficial for me during

this project, as I had lots of discussions about my work; not

only with tutors but with peers and friends. This meant that I

didn’t ever feel too stuck, as there were always lots of ideas

flowing back and fore.

One of the things that I wanted to get from this project was to

learn how to use CAD as a quick tool to visualise my ideas. I

feel that I achieved this really well and I now feel comfortable

using the software in this way, which is huge bonus for me.

However, this also meant than I could’t spend as much time in

the workshop making prototypes as I would have liked to - as

I was sitting behind the computer for quite a lot of the project.

I would’ve liked to have illustrated in more detail the system

that surrounds Counterbug; how a potential user would come

across it, and where/how the product would be sold. These

were aspects of the project that I discussed in my tutorials

and I touched upon in my storyboard, but I didn’t manage to

expand on that much before assessment.

I am also a little bit disappointed that I didn’t manage to

refine some of the details I had planned for the attachments

- particularly the magnet system, but this is something I will

definitely fix for degree show.

87


88


89


90

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!