CONTENT
1. Abstract
7
Y,L & Y,S & J, Y & Y,Q
5,6 Surveillance Situation of King’s Cross
47
2. Thesis Introduction
9
Y,S
5.7 Site Conclusion
49
6. Design strategy and process
51
2.1 Background 2.1.1 Data reveals an alternative world
11
6.1 Site strategy
53
2.1.2 Data reshapes the modern society
15
6.2 Ginger bread
55
2.1.3 Data calls for the surveillance architecture.
17
6.2.1 Program and Data Farm
Y,L
A Tale of Surveillance Architecture
6.2.2 Willingness of being surveilled
2.2 Thesis Topic 2.3 Thesis Objectives and Ambitions
19
3. Literature Review
21
6.2.3 Toolbox: MAX DIA Y,S
6.3 Faraday cage
3.1 Timeline: History of Surveillance
6.3.1Data Safe area
3.1.1 Social Theory and Technology Development
6.3.2 New Nolli Map: from accident to on purpose
3.1.2 Literature and Art Works
'HANSEL AND GRETEL'
6.3.3 Toolbox: MIN DIA – Street Research
23
6.4 Proposed Zoning and Program of Architectural Interventions
3.1.3 Economic Research 3.1.4 Architectural Response
25
4. Methodology
27
J, Y
6.4.1 Prograwm of The Architectural Interventions
57
6.4.2 Precedent
59
4.1 Data impact assessment
6.4.3 Threshold between program area and Faraday cage.
4.1.1 Why surveillance architecture needs DIA
6.5 Dangerous / uncanny as a Spatial Experience
61
4.1.2 Data sensors: Architecture plays an important role
29
6.6 Refined Massing Development
63
4.1.3 Assessment method - Scoring system
31
6.7 Proposed Plans, Sections and Elevations
71 Y,L & Y,S & J, Y & Y,Q
4.2 Profile Strength
6.8 Sustainability Agenda
73
4.2.1 Defination
6.8.1 Environment Sustainability Agenda
4.2.2 Components of Profile
6.8.2 Data Sustainability Agenda
33
4.3 Case studies, Profile Efficiency of Space
6.9 Sustainability Agenda
4.3.1 Building Scale - Leverhulme Building, LSA
6.9.1 Faraday cage
4.3.2 Street Scale - Kings Cross, London
6.9.2 Ginger bread
73
7. Conclusion
73
8. Bibliography
79
5.1 Google Lab X and King’s cross.
9. List of images
83
5.1.1 Data Farm of Google Lab X
10. Appendix
89
4.3.3 The application of DIA study
35
5. Site investigation—King’s Cross: An Ideal Platform
37
5.1.2 Google campus and King’s Cross
39
5.2 Transportation Hub
41
5.3 Landscape Situation
43
Y,Q
Y,L & Y,S & J, Y & Y,Q
10.1 DIA Report Draft
5.4 Ownership 5.5 Complicated Activities
The name above indicate the author of the each sections of this report. Yongjiang, Liu (Y. L) Yiteng, Sun (Y. S) Yajun, Qiu (Y. Q) Jinrun, Yang (J. Y)
45
3
CHAPTER 1
ABSTRACT
ONE
'HANSEL AND GRETEL'
1. ABSTRUCT
A Tale of Surveillance Architecture
A
fter millennium, the surveillance topic has become popular because of both abundant filmic works and reveal of several secret but existed surveillance program. Meanwhile, advanced technology allows all surveillance activities remaining undetectable while everywhere. In economic sector, the data maybe replace the petroleum and become the new oil. Even in current epidemic situation due to COVID-19, surveillance approaches on biometric data has actually assisted with management. All these occurring situation without exemption reminds us of surveillance age’s coming. Therefore, this thesis will choose surveillance as broad topic.
T
his thesis seeks to explore the potential typology for surveillance architecture through one specific commissions from Google of a data farm. Through exploring the possible typology, this thesis also aims to emphasis data as an essential factor in architectural design. Meanwhile, this
Left: Long rolling drawing - Living with Surveillance/Surveillance is everywhere
thesis attempt to retrospect/redefine the basic concept of architecture, publicness in particular.
T
o achieve these objectives, on the one hand, the research process will be supported by abundant literature review not only in architecture fields but other relevant aspects including society, economy and technology. On the other hand, a new Data Impact Assessment (DIA) inspired by Environment Impact Assessment (EIA) is introduced as trigger. This new DIA plays as methodology and foundation to explore architectural toolbox and strategy.
T
his thesis is mainly organised through three sectors, the introduction and background research (Chapter1-2), the methodology (Chapter 3-4), and design strategy and process (Chapter 5-6). The DIA (draft) will be included in Appendix after the conclusion.
7
CHAPTER 2
INTRODUCTION
TWO
'HANSEL AND GRETEL'
2. INTRODUCTION 2.1 BACKGROUND
A Tale of Surveillance Architecture
2.1 BACKGROUND 2.1.1 DATA REVEALS AN ALTERNATIVE WORLD
M
ajority of surveillance program and approaches hide in the dark with few acknowledges while remains attractive and popular in art works. We choose and research in deep of two filmic works to trigger our thesis background study.
D.A.U: Polarised Social Experiment
I
nitially, D.A.U. was a simple biography film for a Soviet Union Nobel-prize physicist, Lev Davidovich Landau, whose last three letters and nickname is the D.A.U. Then it swiftly changed to a large-scale social surveillance project. The Director, Ilya Khrzhanovsky and his team converted an abandoned industrial zone in Ukraine into a restricted-access institute, drawing participants back to 1938-1968, Soviet Union period. Under
several principles along with that period, they lived in a rebuilt Institute for about two years. During their stay, all of their life are surveilled by cameras and then edited and cut into 14 feature films. For now, majority of them released online to view.
S
ome praise it providing a new development orientation of film while others criticized that it is an inhuman experiment rather than an art works. The essence of this film project is a social experiment which records how people live and behave with Big-Brother like surveillance system. On the one hand, it provide us a detailed depiction on society under comprehensive surveillance. On the other hand, it implies people’s performance desire under surveillance situation. People behaved because of their knowledge that surveillance exists, which actually deviates the original intention. Awareness of being seen determines human’s actual behavior.
Left: D.A.U actress poster Right: Black Mirror Season1 poster, illustrated by Tapia Hidalgo
Black Mirror: Panoptic Surveillance Life
B
lack Mirror is a British science fiction anthology television series, which mainly focuses on humanity's relationship to technology and its consequences. Charlie Brooker (2011), the creator of Black Mirror, points out that the aim of the series is to show “the way w e live now” with a focus on adverse effects of addiction to technology. Among whole series, high-tech is mainly utilized for surveillance purpose. As Ozer and Tarakcioglu pointed out, the TV series depicts a panoptic surveillance society (2019, 71). In majority of episodes, the panopticism are expressed or achieved by high-tech such as in-body memory chip (S01E03-Entire History of You) cell-like room(S01E02-Fifteen Million Merits) or even individuals’ camera (S02E02-White Bear). Although the technologies are far different from what we are at present, the consequences of panopticism are inferred with rational logic, offering audiences almost-real atmosphere. The whole series has
convey one significant signal, our seemly reliable technology may inversely replace bricks and walls becoming the new panopticon.
“One of the most commonly echoed themes in the episodes of Black Mirror is panoptic surveillance of society and individuals.” ——Ozer and Tarakcioglu
11
TWO
'HANSEL AND GRETEL'
2. Introduction 2.1 BACKGROUND
A Tale of Surveillance Architecture
2.1.2 DATA RESHAPES THE MODERN SOCIETY Citizenfour: Pandora’s box has now been opened
R
evealed by Edward Snowden in November 2013, PRISM is a code name for a surveillance program under which the United States National Security Agency (NSA), collecting internet communications from various U.S. internet companies, mainly including Microsoft (2007), Yahoo! (2008), Google (2009), Facebook (2009), YouTube (2010), and Skype (2011) (Johnson et al. 2013). These series of revealed documents have uncover a tip of iceberg of happening large-scale surveillance programs led by the United States government or even the rest of the world.
A
ccording to revealed documents, the PRISM surveillance program’s trigger is for antiterrorist and national security uses, targeting
Left: Collage - Beneath the shade of COVID-19 Right: Collage - Security or Privacy?
on potential terrorist attacks. The seemingly justice reason actually blur the limitation of this surveillance jumbo, who surveille not only criminal suspects but also common public indistinguishably. In somewhat good intention, it may protect our physical life. However, when it is abused, the PRISM program has put individual privacy in danger. The Pandora’s box has now been opened. Like Snowden said in Citizenfour’s interview, “you are the happiest person only because of your ignorant.”
Beneath the shade of COVID-19: Privacy or Security?
A
lthough the surveillance program and technology is no doubt harm individuals’ privacy, the breakout of COVID-19 has seemed to add new perspective in these long-lasting debate. To precisely trace the potential COVID-19 affected patients, global governments and their private sector partners have already turned to physical-
and bio-surveillance to contain the pandemic.
leaking comparing to those existing security risks.
F
Surveillance Future: New Oil from New Virgin Land
or instance, Chinese government utilize Health QR code with red, green and grey three colors to distinguish the health and the pandemic. In the US, Google and Apple have joined forces to create their own panoptic solution. Together, these tech rivals enable governments and private entities to know if users have crossed paths with someone who has tested positive for Covid-19, which will also be known to users (Dubal, 2020). Although people scarify their privacy, the surveillance tech has actually protected more people’s health. These discussions actually accord with previous PRISM program which is that, when surveillance is served for people’s own security, is privacy matters?
D
ue to the obvious benefits of bio-surveillance from this COVID-19 epidemic situation, many has worried about the large scale surveillance age will come and appear in front of public much more unscrupulously than ever after COVID-19. It seems that public become less concerned on privacy
F
rom perspective of economists, these surveillance activities are more like economic rather than political ones. Among these scholars, Shoshana Zuboff is a pioneer who popularized ‘surveillance capitalism’ this term since 2014. In her new book Age of Surveillance Capitalism, she systemizes the economic phenomenon benefited from surveilled data and privacy. The human data has attained the statues as new oil of industrial age for big cooperate like Google and Facebook in this new surveillance age. In primary actions, they could screen and profile each person when they surf the internet while providing the most proper ads for them. Furthermore, they may predict even influence people’s daily behavior, for instance, the notorious Cambridge Analytica who is suspect to several political manipulation through large-
13
TWO
'HANSEL AND GRETEL'
2. Introduction 2.1 BACKGROUND
A Tale of Surveillance Architecture
"Before we searched Google, now Google searches us. We used to think digital services were free. Now the surveillance capitalists think we're free." ——Shoshana Zuboff
-scale surveillance on data trace as well as big data analysis.
C
ompared to previous capitals, data this new capital requires much less operation and labour costs. On the contrary, it possesses almost limitless resources, the human behaviour, which are abundant from daily activities. The customer feed themselves by their own data sacrifices. Worse still, all these are in the name of “personalization”. We are willing to scarify our privacy in exchange of more convenient services. Inversely, there are less restricted by current regulations and laws, which makes the data and privacy become more like a virgin land explored arbitrarily by those big cooperate. This is what we are facing in recent future. How shall we behave and live? What is architecture’s role in this coming surveillance age? These will be discussed in later chapter.
2.1.3 DATA CALLS FOR THE SURVEILLANCE ARCHITECTURE Controlled Architecture: the Panopticon
T
he word ‘panopticon’ derives from the Greek word for "all seeing" – panoptes (Briskin, 1998, 77), which is mainly utilized in prison design. The essence of panopticon is to hire less labors for maximum control of criminals. In Bentham’s initial design, the guard in central tower could surveil all prison cells entirely while criminals barely see the guard due to architectural setting. In other words, this typology achieves a kind of “asymmetrical gaze” (Howeler, 2002). The panopticon expressed one obvious orientation of surveillance architecture, the controlled.
F
ollowing with the development of surveillance technology and social media, this typology is
Left up: Big cooperate utilise human behaviour data as new oil Left below: Behaviour surplus utilisation Right: Panopticon drawing illustration
dispelled by smaller even invisible objects. Like depicted in the Black Mirror, the panopticon function is increasingly replaced by surveillance web camera, intelligent furniture and smart devices like smartphone. In Seagram Building’s Brasserie restaurant, Diller + Scofidio redesign Phillip Johnson’s version with two hidden camera in front of entrance gate capturing the moment when people enter the restaurant. The images shown above the bar benches will only be replaced by later visitors’ faces. Under current situation, the panopticon is more like a metaphor instead of manipulatable architectural typology.
Peep Show Architecture: Big Brother House
A
part from controlled architecture, another strategy is exposure. A significant example is Big Brother House, actually a TV show studio. The shooting scene seems like a normal residence building while surrounded and surveilled by
15
TWO
'HANSEL AND GRETEL'
2. Introduction 2.1 BACKGROUND
A Tale of Surveillance Architecture
dozens of camera and producers. The participants are clearly aware of presence of surveillance while behaving as part of performance, which could be regarded ss a Warholian moment of fame – or rather exposure. This typology also accords to present popular livestream industry, where people are willing to show public their privacy as cost of fame, fortune or other objectives.
A
nother example is the Glass Bar in Chelsea which converts one toilet brick wall into a oneway mirror, allowing people taking furtive glance on people who washing their faces or refining the make-ups. With several variations, the panopticon is still a unique architecture typology, which is achieved by specific architectural design and consideration. On the one hand, it represents aforementioned asymmetrical gaze of panopticon. On the other hand, people inside the bar are full aware of this peep device’s presence. All the behaviors then transform into performance which more or less differ from daily routine.
The popularity of glass and other transparent materials somehow promote this phenomenon where architecture serves as a platform for the surveillance capitalism peep show.
Emerging and Aesthetic of Surveillance Architecture: Leviathan
T
he surveillance technology and program has integrated and reshaped our built environment. There shall be new aesthetic principles for the surveillance. As discussed previously, current architectural responses to this situation is uneven and varied which including but not limited to camouflage, decoys, dissimulation and controlled (Howeler, 2002). There are furious discussions on this topic. Shall the architecture be the last defense of surveillance or the opposite, which becomes the accomplice of it?
B
esides these two, there shall be the third option, co-living with surveillance and privacy. In 2015, Space Caviar has designed RAM
Left: Glass Bar in Chelsea - One direction mirror in back wall of toliet Right up: RAM House Interior View with radar-absorbent material Right below: Diller + Scofido's, Brasserie Restaurant
House for exhibition which allows residences to choose whether exposed to data collectors. The whole project involves various movable shields of radar-absorbent material (RAM) which efficiently prevents signal’s in and out. This is where we link architecture with concept of Leviathan. We propose that there is no absolute attitude from architecture. Architecture should be a neutral object who offers people opportunities of choices. The presence of close bond between architecture and surveillance possesses both benefits and harms, which the architecture shall serve as Leviathan, a gathering consciousness from public.
“It seems there is nowhere to hide; everything is public, transparent, visible to invisible others. The sheltering walls of privacy have been digitally dissolved.” ——Lyon
17
TWO
'HANSEL AND GRETEL'
2. Introduction 2.2 THESIS TOPIC
A Tale of Surveillance Architecture
2.2 THESIS TOPIC: HANSEL AND GRETEL 2.2.1 An Allegory for Surveillance Age
H
ansel and Gretel is a German fairy tale published in 1812 in Grimm’s Fairy Tales. It could be briefly concluded that a young brother and sister are abandoned in the forest, where they fall into the hands of a cannibalistic witch living in a house made of gingerbread. The witch intends to fatten the children before eventually eating them, but the girl outwits the villain and kills her. The two children then escape with their lives and return home with a treasure.
A
lthough the whole story is simple, it actually adapts well to this surveillance age. Living in this society, the whole surveillance system aforementioned is the exact modern ‘ginger bread’ for public, which baits and entices people into its control. On the one hand, people are aware of the
risk of data leaking. On the other hand, majority of people possess few self-control leaving the convenient devices like intelligent furniture and smartphone. The whole fairy tale then becomes an ideal allegory for current society. We may all indulge in benefits of surveillance until not able to escape from it.
U
nder this topic, our thesis is researching surveillance architecture this new architecture typology. Whether the architecture become ‘ginger bread’ helping the Big Brother to maximum data collection or offering a data safe space served as a guardian? Meanwhile, thesis is researched through a data farm project, which also accords to the title ‘Hansel and Gretel’.
2.3 THESIS OBJECTIVES AND AMBITIONS
U
Up, Collage - Hansel and Gretel as a proper metaphor for data farm
nder the surveillance background, the thesis aims to achieve following three main
objectives and ambitions.
2.3.1 A. Making data as one factor when designing architecture
T
he access to Wifi and network is increasingly as essential as rooms’ orientation and access to external environment due to people’s rising dependence on electrical device. For surveillance age’s clients, the electrical accessibility may be indispensable demands. Therefore, it will become an inevitable challenge for architecture in surveillance age. In this thesis, our team aims to explore a general data analysis system (Data Impact Assessment Report) including data into whole design decisions.
2.3.2 B. Redefining the architectural concept: Publicness
P
ublicness is another key architectural aspect that this thesis pays attention to. The data’s emergence will force architect reconsider the
publicness this fundamental architectural concept. Data reveals an alternative world where the data privacy relates loosely with architectural physical privacy. This thesis concentrates on redefining the conventional publicness this concept. Furthermore, we attempt to explore how could this new publicness under data/surveillance perspective influences design principles and process.
2.3.3 C. Exploring a new typology of Architecture: Surveillance Architecture
T
he last but not the least objective is to explore the surveillance architecture’s typology. On the one hand, it is essential to define the characteristic of surveillance architecture. Through designing a data farm project, we propose to explore a duplicatable architectural language for the new typology, for instance, the circulation and plan logic. Utilizing the specific design process, we aim to conclude with manifesto of surveillance architecture.
19
CHAPTER 3
LITERATURE REVIEW
THREE 3. LITERATURE REVIEW
3.1 TIMELINE: HISTORY OF SURVEILLANCE AGE
T
o possess sufficient knowledge on surveillance this broad thesis topic, this chapter aims to illustrate one brief timeline for surveillance history depicting a background for the later thesis research.
T
he timeline research includes society, technology, literature and art works these aspects which are illustrated correspondingly with different colours.
3.1.1 Social Theory and Technology Development
T
his timeline starts with Thomas Hobbes’s Leviathan published in 1651. Because the surveillance program and institution increasingly become the ‘Leviathan’ which allocates people’s ‘inconscience’ that people are willing to utilise for
Up: Timeline - History of Surveillance (Left part)
their own benefits. This process adapts perfectly with Leviathan’s perspective. Meanwhile, this provides surveillance this broad topic a neutral position which cannot be simplified into clear right and wrong this binary opposition situation.
F
ollowing with technology’s rapid development, surveillance this topic has become both dormant while flagrant. On the one hand, according to Moore’s Law in a dense integrated circuit field, the driving force of technological and social changes or economic growth shall be exponential. For instance, it takes human being thousands years from Agricultural Civilization to Industrial Civilization. Meanwhile, it only costs a hundred year for humans’ entering Information Civilization. The speed of development could only be accelerated rather than statics. The technology’s development promotes the surveillance devices to become smaller even more undetectable.
O
n the other hand, surveillance methods now are full of people’s daily life. Meanwhile more and more people are aware of this situation as mentioned in above chapter. Apart from the evil part, there are plenty of government has begun to enact relevant regulations even law to limit and manage the surveillance and relevant personal data collection activities. For instance, the European Union (EU) has enacted The General Data Protection Regulation (GDPR) to protect individual’s data and privacy both inside and outside EU and EEA area.
3.1.2 Literature and Art Works
T
he relevant literatures could prospect back to Dystopia or Anti-Utopia this trend. Aldous Huxley’s Brave New World is one of typical cases for that period. A seemingly order society governed by full-scale surveillance even including human’s thoughts. George Orwell’s 1984 furtherly emphasises the surveillance methods’ potential
function and effects on society.
T
he filmic works increasingly have appeared in recent decades. From Western World to Black Mirror these TV original series as well as the Matrix, the Truman Show, and recently D.A.U project, more and more producers concentrate onto surveillance and its potential impacts. Inversely, these filmic works inspire people’s thinking on real world.
3.1.3 Economic Research
I
n 2017, The Economist has published an article clearly stated that the world's most valuable resource is no longer oil, but data. The data or individual’s privacy has replaced petroleum becoming the ‘new oil’, which hides millions of benefits. This report also triggered economists’ attention on surveillance and its relevant activities. This demonstration fundamentally accords with Shoshana Zuboff’s The Age of Surveillance Capitalism. In her remarkable book, Zuboff explained the how this surveillance capitalism
23
'HANSEL AND GRETEL' A Tale of Surveillance Architecture
appeared and developed in detail. She also revealed how the big cooperate participant and benefits from surveillance capitalism this gigantic monster. Rather upset on current situation, she actually possesses confidence on future’s development, pining her hope on future’s management and regulation just like EU’s GDPR.
3.1.4 Architectural Response
A
s discussed in Background Introduction Chapter, architecture has been impacted and inspired by surveillance situation from Panopticon. There are actually several theories inspiring this thesis efficiently.
F
irstly, the glass and other transparent material represent the first step of architectural response after production of panopticon while introduce the performance and peep concept into discussion. The Crystal Palace and Mies or Philip Johnson’s Glass House unintentionally has achieved similar influence. The glass replacing
Up: Timeline - History of Surveillance (Right part) Right below: Cover of book, The Age of Surveillance Capitalism
solid material ensure an un-block visual accessibility.
M
eanwhile, two of postmodernism’s books are beneficial to this thesis. Robert Venturi’s Complexity and Contradiction in Architecture is a "gentle manifesto for a non-straightforward architecture". This expresses in the most compelling and original terms that postmodern rebels against the purism of modernism. This also inspire this thesis project to bravely destroy the current principles leaved from modernism. Another book is Tschumi’s the Manhattan Transcripts. In his book, Tschumi argues that the disjunction between spaces and their use, objects and events, being and meaning is no accident today. These statements force us to retrospect the basic concept in architecture such as publicness, functions and program, form, and circulation. Under surveillance age, there may be potential opportunities to redefine these terms then producing new topology.
O
ther beneficial literatures starts to research on surveillance architecture this new typology. For instance, the Eric Howeler has come up with several possible strategies on surveillance architecture including camouflage, decoys, proxies and dissimulation (Howeler, 2002). In Surveillance, Architecture and Control this edited book, scholars aim to explore surveillance’s existence within architectural entities, majority of which are based on fiction, film, and performance. For instance, Luke Reid has researched on domestic architecture in Black Mirror. He arises “Uncanny” theory under surveillance age while utilizing ‘souveillance’ to describe the current situation when people are aware and willing to be surveilled. This article along with others in Surveillance, Architecture and Control has provided abundant orientations while basic research platform for later thesis works.
25
CHAPTER 4
METHODOLOGY
27
FOUR
4. METHODOLOGY 4.1 DATA IMPACT ASSESSMENT (DIA)
'HANSEL AND GRETEL'
Environment Impact Assessment
A Tale of Surveillance Architecture
Screening
Scoping
Assessment & Mitigation
Management
The EIA Report
Review & Licensing
Monitoring
4.1 DATA IMPACT ASSESSMENT (DIA) 4.1.1 Why surveillance architecture needs DIA
A
s for the imagination of this new definition of architecture, a tailored methodology might be more helpful for the early research. This methodology might not be limited by the rationality of the detailed quantitative index, but place emphasis on providing a unified big frame and all possible research directions for this new architectural study.
G
enerally, in sociological study, the basic unit related to surveillance is always human, space is not necessary need in this kind of analysis, the main concern is about human’s subjective motivation of surveillance.
H
owever, if we use space as main subject, considering the surveillance behavior as the activity “born” in this space, while regarding human as random variables, how to analyze the “subjective motivation” of this space? Based on this, could we discuss this space is negative or positive? Does space have its personality? Those are the problems that this thesis wants to argue, which is concluding the surveillance behavior in specific space and define the problem it caused, in order to re-evaluate this space and response in design proposal.
4.1.2 Data sensors: Architecture plays an important role
T
herefore, how to conclude the surveillance behavior in specific space without considering human as subject. For the discussion about Surveillance Capitalism in Chapter 3 has mentioned, a concept called Behavioral Futures Markets shows a logic that consider human’s
Up left, Diagram - Data Sensors: Human, Architecture and Activity Up Right, Diagram - Environmental Impact Assessment (EIA)
future behavior as commodities, so the more accurate the predication for it is, the more accurate products advertising and designing will be, the return of investment will be higher. So, the predictability of users’ future behavior determined the value of data.
T
he aggregation of all this kind data could be called as Profile, the object of Profile could be a single person or a group, and even a certain kind of people. The accuracy of Profile is determined by the common impact of multiple categories of data, we could call them Data Sensors, as shown in Fig. 000. So, we could define the ability of data leaking of a space like this: when the user’s future behavior predictability becomes higher because he entered this space, we could say this space has a relative high risk of data leaking, and this is caused by some of its features. Therefore, the extracting, analyzing, and concluding of this feature is the methodology that this chapter want to introduce.
4.1.3 Assessment method Scoring system
W
e called this methodology as Data Impact Assessment, DIA for short. The DIA is inspired by the Environment Impact Assessment, aimed to form a systematic and analytical method, which could be applied on all existing architectures, as shown in up right diagram. The full contents of DIA will be added in appendix.
T
herefore, we could evaluate an architecture space and even have a quantification result to describe the ability of data leaking. Through this assessment system we hope to re-understand the architecture in a different layer --- the data leaking layer, and estimate if this space is protecting our data, the architecture is the guardian or accomplice of data leaking.
T
o understand this Assessment system, firstly, we need to understand how to ensure that there is surveillance taken place in this space. As
29
FOUR
'HANSEL AND GRETEL'
4. METHODOLOGY 4.1 DATA IMPACT ASSESSMENT (DIA)
A Tale of Surveillance Architecture
mentioned before, we consider space itself as subject instead of human, so the aim of DIA is evaluating the potential of random surveillance cases could happen in this space, which could be realized by scoring the specific structure parts of this space, and then get an overall grade of the space.
S
o, essentially, DIA is a scoring system that through marking a series space features to get the grade of space, the higher the grade is, the stronger ability of data leaking of this space has. We could call the grade as DIA rate, so that, a high DIA rate space will have stronger predictability of user’s future behavior, so the data security coefficient of this space is lower, the risk of data leaking is higher.
A
s for the detailed method of evaluation, firstly we need to be explicit about what kind of space has higher possibility of data leaking. Transparent, bad acoustic insulation, strong network signal, large opening, small area? So, all
Left: Diagram - DIA Procedure
factors that could influence the possibilities of surveillance in a space should be covered in this assessment system, including but not limited to material, dimension, form, decoration, and so on. As mentioned before, the aim of this thesis is introducing a big frame of research for this new definition of architecture, as the specific details might need multidisciplinary cooperation to find out the most practical method, so in this thesis, we will show our outcomes as example to explain this system, which consist of 6 main features. They are:
1. Space Efficiency; 2. Visual Exposure; 3. Sound Exposure; 4. Digital Exposure; 5. Area Ratio; 6. Activity Diversity.
A
t the beginning, we firstly decided that this assessment won’t consider the situations with CCTVs, because any space covered by CCTVs will suddenly become highest DIA space, in another word it will change the attribute of the space, which is not our main concern in this thesis.
B
ased on this precondition, we regard the private data leaking as two main approaches, the visual leaking and internet leaking. The internet leaking has relatively weak link to the physical space, so we only use Digital Exposure to represent it. The rest 5 features are all about visual leaking. The space efficiency means both the inside circulation and outside accessibility of the room, visual exposure describes the use of windows and door as well as other openings, and sound exposure considers about the material use of wall and floor, is it acoustic insulation or not.
E
specially, the fifth and sixth feature are more related directly to user Profile build. The Area ratio means the ratio of building total area and
room numbers, the smaller the value of ratio is, the easier the data could leak. As mentioned before, the more efficiency Profile is, the more accurate predication could be made for user’s future behavior, so here the value of Area ratio is smaller, which means the activity of this building is divided more specifically, so it is easier for each room to create accurate Profile for users, which means it is a relatively high DIA space. For Activity Diversity is similar as Area Ratio, we could determine the diversity of activity in a room by estimate the duration time, the proportion of all day time is bigger will mean the activity is more single in this room, which will also help to building Profile of users.
4.2 Profile Strength 4.2.1 Definition
A
s mentioned in Chapter 4.1.2, the Behavioral Futures Market regards the predictability
31
FOUR
'HANSEL AND GRETEL'
4. METHODOLOGY 4.3 CASE STUDY OF DIA
A Tale of Surveillance Architecture
of data as important, while the accuracy of predictability could be described as Profile. More detailed, We believe that the producing and leaking of data is happening everywhere but almost of them are neutral and chaotic, such as the pedestrian people encountered on the street, at that moment, the data he received from another would quickly become invalid and then disappeared. Therefore, only the data that helps the receiver build an effective "profile" of the person or group of people, which could be used to predict their preference and behavior, so this kind data is negative and potentially dangerous, and is our main concern.
4.2.2 Components of Profile
P
rofile as a collection of different groups of data. The DIA rate could be treated as the group which from architecture perspective. There could be more components, but this thesis design will only focus on 3 main groups,
Left: Diagram - Strength of Profile Right: Diagram - DIA Case Study: Leverhulme Building, LSA
which are DIA rate, the quantity of people, as well as the predictability of activity. The strength of each single component represents the profile efficiency, for example, DIA means the profile efficiency of space. Therefore, when these three factors reach their maximum, we will get a space that provide a strongest profile, in this diagram we use panopticon as an example, as shown in above diagram.
T
o sum up, when the overall "Profile strength" gets higher, it means the predictability of user’s future behavior will increase, which might increase the risk of the manipulation or exploitation of user’s life.
4.3 Case studies of DIA, Profile Efficiency of Space 4.3.1 Building Scale Leverhulme Building, LSA
T
his section is used to introduce a series of case studies of the practice of DIA, aimed to test the practicability and find models of high DIA and Low DIA rate in the reality.
F
irstly, we chose our academic building as object, picking four typical spaces to respectively represent traditional private space, traditional public space, and semi-public space, which is working studio. By applying the evaluate method of DIA, the results shown a new perspective of defining public and private space.
A
s shown in right up diagr, the personal accommodation has the highest DIA rate, while the Stirling Gallery has the lowest. The reason here is because our definition of DIA rate, or the Profile efficiency, they have positive correlation with the behavior predictability. When user entered his accommodation, a traditional private space, which indeed has a smaller opening and good sound insulation performance, but his future behavior will be easily predicted --- using smart device to
keep communication with others via internet, and almost traceable.
O
n the other hand, for the Stirling Gallery, which is large empty space with rich circulations and openings, due to the future behavior of users in this space is hard to predict, and even impossible to define the identity of each users, so this space is somehow a data-safe area, which is protecting our space.
T
herefore, based on this case study, if we define a concept of public and private space as below:
Public space means your information will be shared with others actively or leaked passively, private space means your information will only be your own.
33
FOUR
'HANSEL AND GRETEL'
4. METHODOLOGY 4.3 CASE STUDY OF DIA
A Tale of Surveillance Architecture
Based on this definition, then the result of our case study shown the tendency that the more private space we used to think is actually more public in the perspective of data leaking.
small corner space of street is also important, which provide the shelter for homeless people, and also create a lot uncertain or even unsafe factors as blind areas on the street.
4.3.2 Street Scale - Kings Cross, London
4.3.3 The application of DIA study
A
hrough this series of case studies, we finally determined two typical models to represent different DIA rate, and in order to get the basic concept our design proposal. The typical model of a high DIA rate space should be like a personal house, which has good condition in lighting, warming, and alluring user to get connected with others and share personal information; the typical model of a low DIA rate space should be like street, which is totally free and even unsafe, so the user only want to protect their information and avoid to communicate with others. These two typical models will become a Toolbox, in section 6.2.3 and 6.3.3 will show the specific process of how to apply them on design proposal in detail.
s we found that there is such a tendency of reversal, by analyzing the space future of the chosen rooms in Leverhulme Building, the more “public” the space is the lower DIA it has, like Stirling Gallery, so the typical model of a low DIA space could be street. Therefore, for the later design of our proposal, a specific study of street becomes necessary, to extract the architecture feature of street, wo choose the street in Coal Drop area as case study to approve. As shown above, the street section of Coal Drop area shows the main feature of “street-like” space is the side walls, the different heights of wall provide various shade on the ground, which shapes the irregularity of a street. In addition, the narrow and
Left: Diagram - Street Scale of Kings Cross Area Right: Diagram - DIA Case Study: Leverhulme Building, LSA
T
35
CHAPTER 5
SITE INVESTIGATION
37
FIVE
'HANSEL AND GRETEL'
5. SITE INVESTIGATION 5.1 GOOGLE LABX AND KING'S CROSS
A Tale of Surveillance Architecture
5.1 Google Lab X and King’s cross. 5.1.1 Data Farm of Google Lab X
A
s we mentioned in the before chapter, Google takes an important role as one of the biggest companies in this surveillance age. They give the world a great vision that data actually becomes the new oil. For years, Google has an explorative Lab called Google X. In this Lab, they built up things like infamous self-driving cars, robotics projects and space elevator. Google has a considerable amount of money, also their leader and investor love big and excited ideas. As Google mentioned in their website,
X
is a diverse group of inventors and entrepreneurs who build and launch technologies that aim to improve the lives of millions, even billions, of people. Our goal: 10x impact on the world’s most intractable problems,
not just 10% improvement. We approach projects that have the aspiration and riskiness of research with the speed and ambition of a startup.” (X – The Moonshot Factory, 2020)
C
ombine Google X goals with our thinking about surveillance architecture, we believe Google could be a great platform to explore a project about how architecture could help in this surveillance capitalism age. Thus, we assume our data Farm could be one project of Google X.
I
n this project, google will harvest human data from designed scenario of social activities not only from Phone and internet but also from real world. In the meanwhile, deep leaning technology enable developers to understand people's behavior, hence group or individual behavior can be predicted. After that, related products could be improved, google will also build a more personalized network for everyone and then get profit from this project.
Up left, Diagram - Google Lab X Program Up Right, Diagram - Google Cooperate and Potential Google Campus in King’s Cross.
I
n this data farm, we schedule programs based on traditional farming process: Seeding, growing, debugging, harvesting. Different activities will be considered in these four-farming processes of this project. Based on the Maslow's hierarchy of needs: physiological need, safety and healthy, love and belong, and self-actualization, we schedule Hotel, Clinic, Museum and Casino as the main seeding program to attract people. In addition, we plan several service spaces like Canteen, café as growing program to keep people stay in this building for long time. During their time in this data farm, their behavior data will be collected maximum by their controlled scenario between different activities. These data will feedback to google to build user profile for everyone. Deatailed analysis about data farm programing will be described in chapter 6.2 and 6.3.
F
or present, there are Google offices and YouTube live studio in King’s Cross area, which also belongs to Google. After announcement of new HQ as Google London here, Google intentionally make this area become new Google campus or Googleplex in London. In addition, King’s Cross area have varieties user and activities, thus, the chosen site is proper to build the new Google Lab X, a data farm. In the meanwhile, the establishment of data farm in this Google campus respond their mission statement, provide more activities space to public to allow the individual to conceive, investigate, and execute the impossible.
5.1.2 Google campus and King’s Cross
39
FIVE
'HANSEL AND GRETEL'
5. SITE INVESTIGATION 5.2 Transportation Hub
A Tale of Surveillance Architecture
5.2 Transportation Hub
F
irstly, we analysis the transportation situation of King’s Cross area. As above diagram shown, the chosen site located on west side of Regent Canal, also near to King’s Cross station which is one of the busiest transportation nodes in London, and St Pancras International station which connect London with the whole Europe. In the meanwhile, Cube and Bus system also have interchange here. As Figure XX and XXX shows, chosen site is also convenient for walk in and has large-quantity of human stream.
S
o, we could conclude this area is a complicated transportation hub full of different group of people and activities, which is proper for our aim: a data lab.
W
e also think about connecting our building with public transportation, this will be described detailly in latter chapter.
Up left, Diagram - Train situation in King’s Cross. Up Right, Diagram - Public transportation in King’s Cross. Below Left, Diagram - Pedestrian route in King's Cross. Right, Diagram - Summary transportation situation in King’s Cross.
41
FIVE
'HANSEL AND GRETEL'
5. SITE INVESTIGATION 5.3 Landscape Situation
A Tale of Surveillance Architecture
5.3 Landscape Situation As masterplan (figure xxx) shows, the public gardens and squares at King’s Cross come in different sizes and shapes, everyone could find their right space at their area. All these spaces are designed to grow naturally over years as people use them by their own.
T
he chosen site is a Natural Preserved Park. Based on the whole masterplan of King’s Cross area, we plan to keep the atmosphere of welcome, public and green space of the site, but provide more varieties activities to form data farm. In addition, the water tower shows in site photo is a historical protected building, we plan to keep it as normal, it will stand as an orientation for people who coming to our site from the bridge which connected with the Canal Corridor.
of active public space. The Canal Corridor runs through the heart of King’s Cross along the Regent Canal and forms a linear green park over 600 meters which provides connections to and from surrounding area. The Canal landscape has the most open aspect of anywhere at King’s Cross area. It receives sun throughout the day because of its south orientation. In our proposal, we also want to keep the bridge which connect the canal landscape and our site.
I
n King’s Cross area, the Canal Corridor (shows in figure xxxx) was conceived as important part of the site wide masterplan. It is a series
Up left, Diagram - The Canal Corridor in King’s Cross. Up Right, Photo - Site photo. Right, Diagram - Masterplan of King’s Cross highlight squares, parks and gardens.
43
FIVE
'HANSEL AND GRETEL'
5. SITE INVESTIGATION 5.4 OWNERSHIP
A Tale of Surveillance Architecture
5.4 Ownership
F
rom figure xxx, it can be seen that the building surrounding the chosen site belongs to Google, Urbanist, Argent, NetworkRail, London & Continental Railways and Kings Cross Central Limited Partnership. Additionally, in 2008, Argent, London & Continental Railways and DHL formed a joint partnership: Kings Cross Central Limited Partnership. So, this partnership was the single land owner at King’s Cross. (land owner story). In other words, the surrounding building are all private.
controlled by developers and their private backers. (Revealed: the insidious creep of pseudopublic space in London, 2020) Although this space seems accessible to public, but actually was controlled and surveilled. In these spaces, private security guards could remove you for protesting, taking photos, or even just looking scruffy.
W
hen we analysis the ownership of public space in this area, it can be found that The Canal Corridor and several squares are managed by Kings Cross Central Limited Partnership. This kind of space was called “pseudo-public”.
P
seudo-public spaces mean some large squares, parks and thoroughfares which looks like public but are actually owned and
Up left, Diagram - Ownership of surrounding buildings in King’s Cross. Up Right, Diagram - Ownership of “Public Space” in King’s Cross.
5.5 Complicated Activities
K
ing’s Cross is one of the largest and most exciting redevelopments in London which has rich history and unique settings. It transformed from an underused industrial wasteland to a total new part of the city with homes, offices, galleries, shops, bars, restaurants even a university (shows in diagram of next page). All these activities happen with different timetables (shows diagram below) enrich this area, and attract more people coming there. Meanwhile, as figure xxx shows that various of activities and architecture could serve as a filter for our target group of people, which is proper for our aim: a data farm. These filter facilities also provide advices for the entrance design of our building.
Rate of Profile built. Form figure xxx, we could have a rough idea of the profile-built situation around the chosen site. Our proposal was designed to maximum DIA in program area, the situation of surrounding area could provide a comparison for our data farm.
I
n addition, we analysis the surrounding building from the perspective of DIA (Data impact assessment). Each building has a general Efficiency
45
FIVE
'HANSEL AND GRETEL'
5. SITE INVESTIGATION 5.6 SURVEI LLANCE SITUATION OF KING'S CROSS
A Tale of Surveillance Architecture
5.6 Surveillance Situation of King’s Cross
F
or exploring surveillance situation of King’s cross, we investigate locations of security web cameras. As figure xxx shows, this area was under full-scale surveillance already. The security web cameras have been utilized everywhere. Besides, the web camera could rotate, even zoom in to specific angles and targets. Even more, the whole King’s Cross area has utilized facial recognition to all visitors, which could offer our project a happening platform.
Page 46, Up left, Diagram - Various Activities happened in King’s Cross. Up Right, Diagram - Timetable of different area in King’s Cross. Below left, Diagram - DIA Profile of surrounding building in King’s Cross. Below Right, Diagram - Building as Filter Facility in King’s Cross. Page 47, Right Diagram - Location of security web cameras in King’s Cross.
47
FIVE
'HANSEL AND GRETEL'
5. SITE INVESTIGATION 5.7 Site Conclusion
A Tale of Surveillance Architecture
5.7 Site Conclusion This is a long section cross our site. In this long section, it is obvious that the context possesses comparable low terrain situation, which suggests to follow the current typography tendency of the district, in our perspective, the camouflage strategy.
Complexity and Comprehensive
T
o sum up, King’s Cross was an ideal platform for our proposal. The role of transportation hub and abundant nationhood provide opportunity to achieve a goal: data farm. The location of google office, YouTube office and new google HQ provide an ideal atmosphere to form google campus while supporting the establishment of data farm. Meanwhile, the landscape situation gives us opportunity to explore a green, public space at site.
Cityscape Context
Up left, Diagram - Site Section of King’s Cross. Up Right, Photo - Site photo.
A
nother conclusion from the whole site investigation is the essence of cityscape context for data farm project. The previous analysis is actually a combination of site consideration factors for surveillance architecture or a data farm. This site possesses several urban characteristics which could be similar in various other cities and places. These proper but replicable features also allow the data farm project occurring different cityscapes which making this project reproducible. Meanwhile, this cityscape context also makes the project title: the Hansel and Gretel more convincing which offering citizens a rare landscape bait inside a busy concrete forest.
A
s discussed previously, the ownership situation of whole King’s Cross is simple as one ltd. manages and develops the area. There is actually no real-public space inside King’s Cross area due to the ownership. Even the wellorganised square and bank alongside the canal is kind of “Pseudo-public” space. Another evidence is the thorough surveillance system inside the area. With the help of new-established facial recognition system, the whole King’s Cross area is under full-scale surveillance for management. Both circumstances provide the perfect platform to explore new public and privacy from the perspective of surveillance.
D
etailed strategy about how we respond to urban context will be described in the next chapter.
Pseudo-public
49
CHAPTER 6
DESIGN STRATEGY
SIX
'HANSEL AND GRETEL'
6.1 SITE STRATEGY
A Tale of Surveillance Architecture
6.1 Site Strategy
T
hus, it is concluded with two strategy from site. The first is the entrances. The four main entrances shall be King’s Cross & St Pancras International Station, Coal Drop Yard Market, Gasholder, and boat stops on Regent’s Canal. Meanwhile, these three entrances are separated from each other in height levels and orientations, which ensures a comprehensive internal circulation. or example, the entrance linking Gasholder is bridge above the canal while entrance to Coal Drop Yard Market is a tube below the canal. Apart from large while complicated human stream, they could also act as filter facility to screen the target people that data farm requires. For instance, the entrance linked with Coal Drop Yard could filter the potential visitors who are willing to custom into the data farm. The multiple entrances also seek to maximumly utilise the site complexity advantages mentioned in last chapter.
F
A
nother site strategy relates with the vegetation corridor. To preserve the current landscape for surrounding area, camouflage become one ideal strategy for this data farm project. n the one hand, this accords with project’s name, the Hansel and Gretel, offering a rare landscape bait inside cityscape of London for entering our building. The ground level vegetation shall be prolonged to roof level with a continuous landscape lane. n the other hand, this accords to site’s natural preserved statues while adapting to surrounding well-designed Regent’s Canal’s vegetation corridor, which could be regarded as a response to current planning strategy.
O
O
Page 52, Up, Diagram - Connection withe urban context. Page 53,Up Left, Diagram - Scheme 01, landscape camouflage : forest. Up Right, Diagram - Scheme 02, Architecture bait. Below left, Diagram - Scheme 03, DIA Minmum: faraday cage. Below right, Diagram - Scheme 04 initial layout.
53
SIX
'HANSEL AND GRETEL'
6.2 'GINGERBREAD HOUSE' 6.3 'FARADAY CAGE'
A Tale of Surveillance Architecture
6.2 'Gingerbread'
6.2.2 Willingness of being surveilled
I
n a data farm, human is the livestock and human’s behavior is harvested as crop. The willingness of being surveilled is the key to the quality of data and profile. To achieve this goal, a comprehensive surveillance system is operated to provide extra safety. Especially in COVID-19 period. As T. Hobbs mentioned in Leviathan, 'The condition in which people give up some individual liberty in exchange for some common security is the Social Contract' lso, data as a new capital in surveillance age, a data commercial and banking system will allow the participants to gain money, products, or service by exchanging personal behavior profile.
n the tale of Hansel and Gretel, witches create a ‘Gingerbread House’ to lure the people who get lost in the dark forest, and then take their flesh to enhance their dark magic. In the surveillance age, human behavior is what the modern witches, (the state and the big corporations) seeking for their ‘dark magic’ (control and prediction). By providing a ‘Gingerbread house’ space to extract data, people is fully lured and controlled by the illusion of the perfect space experience.
6.2.1 Program and Data Farm
G
ingerbread is an ultimate controlled space to monitor all possibility data in this area. It will provide quality architecture space for specific activities. By applying all possible measurement, to minimize the unexpected variations. Not only the variations are well designed, but also the program is well set to extract qualified profile from the participants.
I
A
6.2.3 Toolbox: MAX DIA According to our previous research (Chapter 4), maximum DIA means high risk of being profiled. And by applying different architectural elements will allow people to customize their building to meet certain DIA index.
Page 54, Up, Left, Diagram - DIA maximum toolbox . Up Right, Diagram - DIA maximum toolbox instruction for program Page 54,Up, Left, Diagram - DIA minimum toolbox (Faraday Cage): Street research Up Right, Diagram - Street research application.
6.3 'Faraday Cage' In the tale of Hansel and Gretel, people fear to travel in the dark woods and trying to get access to the Gingerbread house. In the surveillance age, the dark forest is representing the chaotic urban area. However, nowadays, even in a public space, you may be surveilled by your phone or a security camera. Can we create a Faraday Cage so we can have an escape from the surveillance age?
6.3.1Data Safe area A data free zone enables people to get a chance to protect their personal data. It will have a minimum information leaking possibility, and meanwhile creates a chaotic place where all events may happen, no matter evil or good.
6.3.2 New Nolli Map: from accident to on purpose
T
his map is inspired by Nolli Map, original showing the real publicity of an urban context. The new Nolli map is generated by the perspective of surveillance, which a new public and private is defined by data. The new map can reveal architectural risk of human behavior being profiled.
6.3.3 Toolbox: MIN DIA – Street Research
A
ccording to our previous research (Chapter 4), minimum DIA means low risk of being profiled. And by increasing complexity of activities, we can efficiently lower the DIA index. Therefore, we run a study of street type and square type of London by using DIA system. Through section study of space, we find out similar space qualities of low DIA. All these streets and squares have a clear strategy to separate pedestrian and vehicle, complex threshold, various hidden niches, and multiple activities area.
55
SIX
'HANSEL AND GRETEL'
6.4 PROPOSED ZONING AND PROGRAM OF ARCHITECT -URAL INTERVEN -TIONS
A Tale of Surveillance Architecture
6.4.1 Prograwm of The Architectural Interventions
M
aslow's hierarchy of needs is a theory to describe human's motivations. In his theory, people's motivation can be categorized into several levels. y using this framework, we can introduce our program by fulfill people's motivation in all perspectives from physiological needs to selfactualization. An architecture story is organized, a hotel, a livestream studio, a gym, a casino will be set into the data farm to enable participants to rest, get a job, and change their life by effort or by luck.
B
Left, Diagram: New Nolli Map Right, Diagram: Maslow's hierarchy of Needs
57
SIX
'HANSEL AND GRETEL'
6.4 PROPOSED ZONING AND PROGRAM OF ARCHITECT -URAL INTERVEN -TIONS
A Tale of Surveillance Architecture
6.4.2 Precedent OMA - Netherlands Embassy, Berlin
F
or the Netherlands Embassy project, OMA creates a cube and a wall (to fight against the regulation). Inside the cube, a linear circulation is provided by a 200m zigzagged pathway through the whole building, connecting the library, meeting rooms, offices, and gyms. The journey ends at the roof top restaurant. The pathway also acts as a ventilation channel.
Left, image: Concept Model, Project Netherland Embassy Left Below, image: Unrolled plan of Netherland Embassy Right, photo: Concept Model, Project Jussieu Library Right Below, image: Unrolled Section of Jussieu Library IMAGES FROM OMA.EU
6.4.2 Precedent OMA – Jussieu – Two Libraries
T
he conceptual library design reconfigures the typical library layout. The idea behind this project is to imagine a waling tour as a social carpet. OMA fold the carpet to form a stack of platforms, which is then enclosed as a building. In this way, a single trajectory traverses the entire structure like a warped interior Boulevard. The visitor becomes a Baudelairean flaneur, inspecting and being seduced by a world of books and information and the urban scenario.
59
SIX
'HANSEL AND GRETEL'
6.5
DANGEROUS UNCANNY AS A SPATIAL
A Tale of Surveillance Architecture
EXPERIENCE
6.4.3 Threshold between program area and Faraday cage.
T
he ambiguity of the threshold space between Gingerbread and Faraday cage is aimed to create a space trap to engage participant fall into the Gingerbread area, and meanwhile create an activity tidal area for Faraday cage. he ordinary ritual entrance space will be disappeared by blurring the boundary of the function space and emphasizing the activity space which may automatically shaped by the change of the scale of the Faraday cage area. he threshold is the area where people losing their identity defined by space. When people enter Gingerbread from Faraday cage through threshold is a transition process of free people transfer to a data farm livestock.
T T
Left: Threshold between program area and Faraday cage. Right: The Prisons T.A.Z
6.5 Dangerous / uncanny as a Spatial Experience
T
he uncanny is the psychological experience of something as strangely familiar, rather than simply mysterious. It describes an upsetting experience when deal with a familiar thing or event under an unsettling or taboo context. nd the concept of T.A.Z (Temporary Autonomous Zone) is brought up by anarchist, Hakim Bey in 1991. It shows a spatial strategy for people to against authorities by applying a Guerrilla warfare fugitively by liberating a physical or even an imagined zone. By conduct events in one space before the authorities show up and regathering somewhere else. One of the famous applications of this concept is the Burning Man in Nevada’s Black Rock Desert. y combining both theories, we can have a new strategy to reconfigure the private and public space under the context of surveillance. The surveillance architecture explains the essence of
A
profile is enhanced by space and building. Thus, in a conventional scenario, a chaotic street, or an irregular square or a complex ownership site can be the perfect data privacy space. And most of this space is considered as an uncanny and dangerous space. ll in all, we extract spatial features from space in London to recreate an uncanny space in our Data Farm, providing a spatial experience for people who want to be liberated from surveillance
A
B
61
SIX
'HANSEL AND GRETEL'
6.6
REFINED MASSING DEVELOP -MENT
A Tale of Surveillance Architecture
6.6 Refined Massing Development All massing developments are following two key principals: -All program zones are surrounded by various Faraday cage spaces. -All entrances to the building are camouflaged by the context.
Left: Refined Massing Development of Faraday cage Right: Program massing of the project.
63
SIX
'HANSEL AND GRETEL'
6.7
PROPOSED PLANS, SECTIONS AND ELEVATIONS
A Tale of Surveillance Architecture
Left: Proposal Scheme Master Plan Right: Detail eleveation of a Faraday Cage
65
SIX
'HANSEL AND GRETEL'
6.7
PROPOSED PLANS, SECTIONS AND ELEVATIONS
A Tale of Surveillance Architecture
Left: G Floor Plan Layout Right: 1st Floor Plan Layout
67
SIX
'HANSEL AND GRETEL'
6.7
PROPOSED PLANS, SECTIONS AND ELEVATIONS
A Tale of Surveillance Architecture
Left: -1F Floor Plan Layout Right: -2F FLoor Plan Layout
69
SIX
'HANSEL AND GRETEL'
6.7
PROPOSED PLANS, SECTIONS AND ELEVATIONS
A Tale of Surveillance Architecture
UP:Long Section cross in the middle Below: Elevation from Coal drop yard side.
71
SIX
'HANSEL AND GRETEL'
6.8 SUSTAINABILITY AGENDA
A Tale of Surveillance Architecture
6.9 STRUCTURE STRATEGY
6.8.1 Environment Sustainability
R
unning a data farm which requires a massive server to process and storage all the data collected. Massive heat also will be generated, and they can be recycled for heating. Due to the site is adjacent to the Regent Canal which provides a great opportunity for WSHP water source heat pump. And a CHP system also can be installed to lower the carbon emission of the building. or our specific design, Faraday cage area works as an extra envelop for the Gingerbread area. The whole building will have a better insulation efficiency compared to similar conventional projects
F
6.8.2 Data Sustainability
I
n surveillance age, collecting and generating data is one of the key functions for all buildings. Data sustainability is also an essential resource in the upcoming future. Through a data banking system,
Left: Axno Structure Model Right: Rendering draft from the bridge
flexible program space, and controlled maze-like circulation, data can be fully collected and recycled in our data farm.
6.9 Structure strategy 6.9.1 Faraday Cage
F
araday cage space is aimed to create a data free area, Massive steel structure is used and GRC are also widely used to mimic the street-like atmosphere and lower the weight of the whole structure.
6.9.2 Gingerbread
G
ingerbread will use standardized frame structure to adapt the requirement of rapid change space to make a perfect data collection space.
73
CHAPTER 7
CONCLUSION
75
SEVEN
'HANSEL AND GRETEL'
7. CONCLUSION
A Tale of Surveillance Architecture
T
o conclude, this thesis seeks to explore a new architecture typology: the surveillance architecture for coming surveillance age. This is the period when increasing people realise the surveillance’s ubiquity. This is also the age when public is situated in a dilemmatic situation between the fear of losing privacy and convenient. The surveillance and its corresponded impacts has made Hansel and Gretel this ancient fairy tale more like an ironic allegory. Therefore, this thesis aims to explore architecture’s responses to this inevitable tendency.
U
nder this broad topic, this thesis explore the possible architectural language and typology through DIA (Data Impact Assessment) this starting point. Borrowing from EIA (Environment Impact Assessment), DIA achieved all three objectives of this thesis. Firstly, through DIA this methodology, data/information this factor will be emphasised like environmental factors during design process. Meanwhile, through perspective
of DIA and data, the traditional architectural concept like publicness could be redefined even overthrown. The publicness is no longer only about physical or visual accessibility. The individual data’s privacy and publicness will also influence even determine the publicness level of their situated spaces. This promotes the design process to reconsider the characteristics of public and private space. Furthermore, Architecture then is closely linked with surveillance and data these fields through DIA this bridge. DIA’s role as toolbox also directly offers a concrete architectural solution for surveillance architecture this new typology, which helps to achieved the final ambitions of this thesis.
D
IA inspired another important concept for surveillance architecture, the profile (strength), in other words, the predictability. Profile is the key concept explaining what a surveillance architecture should be. On the one hand, profile offers a clear strategy for surveillance
Up left, Diagram - Data Sensors: Human, Architecture and Activity Up Right, Diagram - Environmental Impact Assessment (EIA)
architecture. For maximum profile strength, controlled or designated circulation pattern from design is necessary. Inversely, the minimum profile may also be demanded out of security consideration. The architecture in surveillance age therefore serves for various profile requirements with differed language while still accord with design for profile this single principle. On the other hand, the profile provides a new approach to understand architecture as well. Concluded from DIA, profile refreshes architectural concept like publicness further than DIA. For instance, street or plaza these traditional public space could be regarded as private space due to their weak profile formation for visitors and vice versa. In one word, profile defines the surveillance architecture.
T
he design process and strategy are beneficial from these methodology. DIA and profile strength offers later data farm project an ideal starting point. Two main design strategies: ginger bread and faraday cage are driven from previous
thoughts. In other words, they are concrete representations of profile strength and DIA. For ginger bread/program space, the high DIA rate as well as maximum profile strength are applied for maximumly collect data from visitors. The faraday cage/in-between space inversely possess low DIA rate and profile strength offering safehousealike atmosphere. Meanwhile, the whole design process whereas strengthens and promotes those methodologies and approaches. The data farm project proves the feasibility of profile strength and DIA. In the end of thesis, we attempts to conclude surveillance architecture with three principles or manifesto:
" Form follows activities. " " Space for profile." "New publicity and privacy. "
77
CHAPTER 8
BIBLIOGRAPHY
EIGHT 8. BINLIOGRAPHY
Zuboff, Shoshana. 2020. The Age of Surveillance Capitalism : The Fight for a Human Future at the New Frontier of Power. First edition. PublicAffairs. Available at: https://search-ebscohost-com.liverpool.idm.oclc.org/login.aspx?direct=true&db=cat0 0003a&AN=lvp.b5511296&site=eds-live&scope=site. [Accessed 05 February 2020].
Revealed: the insidious creep of pseudo-public space in London, 2020. Available at: https://www.theguardian.com/cities/2017/jul/24/revealed-pseudo-public-spacepops-london-investigation-map [Accessed 05 May 2020].
Johnson, K. Martin, S. O'Donnell, J. and Winter, M. 2013. "Reports: NSA Siphons Data from 9 Major Net Firms". USA Today. Online: https://eu.usatoday.com/story/news/2013/06/06/nsa-surveillanceinternet-companies/2398345/ Retrieved May 28, 2020.
Dubal V. 2020. The expansion of mass surveillance to stop coronavirus should worry us all. Online: https://www.theguardian.com/commentisfree/2020/apr/18/mass-surveillance-coronavirustechnology-expansion Retrieved May 28, 2020.
Özer B.O. and Tarakcioglu O. A. 2019. “An Intertextual Analysis of Black Mirror: Panopticism Reflections” The Journal of International Social Research. 12(62). ISSN: 1307-9581. DOI: 10.17719/ jisr.2019.3029
X – The Moonshot Factory. 2020.
Howeler E. 2002. Anxious architectures. The aesthetics of surveillance. Online:
Available at: https://x.company/
http://volumeproject.org/anxious-architectures-the-aesthetics-of-surveillance/
[Accessed 05 January 2020].
Retrieved May 28, 2020.
Flynn, S. and Mackay, A. ed. 2019. Surveillance, Architecture and Control: Discourses on Spatial Culture. Palgrave Macmillan. ISBN 978-3-030-00371-5.
Briskin A. 1998. Stirring of Soul in the Workplace. Berrett-Koehler Publishers: New York. ISBN 9781605096162.
Hobbes, T. 1651. Edited by Brooke C. 2017. Leviathan. Penguin Classics. ISBN-10: 0141395095
Zuboff, S. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. Profile Books. ISBN-10: 1781256845.
Venturi, R. 1984. Complexity and Contradiction in Architecture. The Museum of Modern Art: New York. ISBN-10: 0870702823.
Tschumi, B. 1994. Manhattan Transcripts. John Wiley & Sons. ISBN-10: 1854903810.
The Economists. 2017. Data is giving rise to a new economy. Online: https://www.economist.com/briefing/2017/05/06/data-is-giving-rise-to-a-new-economy Retrieved May 28, 2020. Koolhaus, R. Talk given at the High Level Group meeting on Smart Cities, Brussels, 24 September 2014. Online https://afasiaarchzine.com/2015/01/rem-koolhaas-3/ 2014 Retrieved May 28, 2020.
Spacecaviar. 2015. RAM House. Online: http://www.spacecaviar.net/ram-house/ Retrieved May 28, 2020.
81
CHAPTER 9
LIST OF IMAGE
NINE 9. LIST OF IMAGE
All images included within this report, with the exception of the following image list, were produced by Yongjiang, Liu. Yiteng, Sun. Yajun, Qiu and Jinrun, Yang.
Chapter 2. Thesis Introduction 2.1.3 Data calls for the surveillance architecture
Chapter 3. Literature Review 3.1.4 Architectural Response Page 25. Right below: Cover of book, The Age of Surveillance Capitalism. [Online]
Page 15.
Available at: https://search-ebscohost-com.liverpool.idm.oclc.org/login.aspx?direct=true&db=cat0 0003a&AN=lvp.b5511296&site=eds-live&scope=site.
Left up: Big cooperate utilise human behaviour data as new oil. [Online]
[Accessed 05 February 2020].
Available at: https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuableresource-is-no-longer-oil-but-data [Accessed 05 March 2020].
Chapter 4. Methodology 4.1.3 Assessment method - Scoring system Page 29.
Left below: Behaviour surplus utilisation. [Online] Available at: https://hiddenforces.io/wp-content/uploads/2019/05/EP79RD.pdf [Accessed 05 March 2020].
Right: Panopticon drawing illustration. [Online] Available at: https://www.nytimes.com/2013/07/21/books/review/the-panopticon-by-jenni-fagan. html [Accessed 05 March 2020].
Up Right, Diagram: Environmental Impact Assessment (EIA) Available at: https://www.iisd.org/learning/eia/eia-7-steps/ [Accessed 05 February 2020].
Chapter 5. Site Investigation 5.3 Landscape Situation Page 43. Up Right, Photo - Site photo.
Left: Glass Bar in Chelsea - One direction mirror in back wall of toliet. [Online]
Available at: https://www.archdaily.com/910636/canal-corridor-kings-cross-townshendlandscape-architects/5c53a018284dd13ab300014e-canal-corridor-kings-cross-townshendlandscape-architects-corridor-plan
Available at: http://www.leeser.com/glass-bar
[Accessed 05 February 2020].
Page 17.
[Accessed 01 March 2020]. Right, Diagram: Masterplan of King’s Cross highlight squares, parks and gardens. Right up: RAM House Interior View with radar-absorbent material. [Online]
Available at: LANDSCAPE King’s Cross, APRIL 2014
Available at: http://www.spacecaviar.net/ram-house/
https://www.kingscross.co.uk/media/Kings-Cross-Landscape-Brochure-vlr.pdf
[Accessed 05 March 2020].
[Accessed 05 February 2020].
Right below: Diller + Scofido's, Brasserie Restaurant. [Online]
5.7 Site condition
Available at: https://dsrny.com/project/brasserie
Page 49.
[Accessed 04 April 2020].
Up Right, Photo - Site photo. Available at: https://www.archdaily.com/904676/coal-drops-yard-heatherwick-studio [Accessed 05 February 2020].
85
NINE 9. LIST OF IMAGE
Chapter 6. Design Strategy and Process 6.4.2 Precedent Page 59. Left, image: Concept Model, Project Netherland Embassy Left Below, image: Unrolled plan of Netherland Embassy Right, photo: Concept Model, Project Jussieu Library Right Below, image: Unrolled Section of Jussieu Library Available at: https://OMA.EU [Accessed 04 March 2020].
6.5. Dangerous / uncanny as a Spatial Experience Page 61. Right: The Prisons Available at: https://en.wikipedia.org/wiki/Giovanni_Battista_Piranesi#/media/File:Giovanni_ Battista_Piranesi_-_Le_Carceri_d'Invenzione_-_First_Edition_-_1750_-_08_-_The_Staircase_with_ Trophies.jpg [Accessed 04 May 2020].
87
CHAPTER 10
APPENDIX
TEN
10. APPENDIX 10.1 DIA REPORT DRAFT
10.1 DIA REPORT DRAFT 1.
DATA
1.1. What is Data
D
ata can represent words, pictures, sounds, ideas, facts, measurements, statistics or anything else which can be processed by computers into strings of 1s and 0s that make up digital information.
1.2. The value of Data
D
ata also becomes more useful the more it is used, rather than its energy being lost as heat or light, or permanently converted into another form such as plastic, as when oil is used. Once processed, data often reveals further applications. For example, medical data collected from patients can help a doctor diagnose and treat an individual patient. After that, it can be anonymized and fed into machine learning systems to generate broader insights that can benefit many, many more.
T
reating data like oil – using it once then assuming its usefulness has been depleted and disposing of it – would certainly be a mistake.
A
s the world’s oil reserves dwindle, extracting it becomes increasingly difficult and expensive. Conversely, data is becoming increasingly available as computer technology advances, more of our business and leisure activity moves online, and sensors become more sophisticated.
D
ata – particularly Big Data – also has far more variety than oil. The crude oil which is drilled from the ground is processed in a variety of ways into many different products of course, but in its raw state, it is all the same.
D
ata – in the quantities it is available today – is, in fact, an entirely new commodity, and the rules around how it is stored, treated and used are still being written. Also, data will hopefully cause less disruption and destruction of life on our planet than we have done with oil, over the last century. It’s productive to consider how data is different – the myriad of ways it can be captured, used and reused, and in doing so,
generate value and benefits to humans that will help us tackle big issues from education to healthcare, from reducing hunger to fighting climate change.
T
hus, establishing Data Impact Assessment is crucial for the whole society and each company to understand the actual impact of data collection in buildings and methods to adjust and control the impact.
1.3. Data Impact Assessment
U
nregulated data-mining causes a whole different set of problems – privacy issues as well as the imbalance of power which is caused by information being in the hands of the few, rather than the many. Treating or thinking about data like oil only serves to encourage this dichotomy between the haves and the have-nots in the digital age.
2.
Screening
2.1. What is Screening
S
creening is the first stage of the DIA process which results in a key DIA decision, namely to either conduct the assessment (based on the likely significant impacts) or not conduct it (in the anticipated absence of such impacts). Screening needs to follow specific procedures often described in the legislation, so all the projects follow the same process.
K
ey contributions of screening to a good DIA:
- Facilitates informed decision making by providing clear, well-structured, factual analysis of the effects and consequences of proposed actions. - Influences both project selection and policy design by screening out environmentally and/ or socially unsound proposals, as well as modifying feasible action.
2.2. Why Conduct Screening
A
n essential aspect of conducting an DIA is to determine the level of impact of the proposed project, development or initiative. When we look
at major development projects—especially those involving natural resources, such as mining, hydroelectric dams, or oil extraction— we can say for certain that they will require an environmental and social impact assessment. On the other hand, while the development of a tourism project may seem low-risk at first, a second look could reveal that the project requires large amounts of drinking water, energy, the removal of endangered flora or fauna, and will result in extensive sewage production. It may also lead to increased road and air traffic to deliver supplies, visitors and workers. Finally, the impacts of project could change over time. Thus, during the screening step as well as the whole DIA process, impacts are considered over the lifetime of the project, from the construction phase through to operations and after closing.
M
ost proposals can be screened very quickly because they will have few impacts and will be screened out of the DIA process. Only a limited number of proposals, usually largescale projects, require a full DIA because they will likely have major irreversible impacts on environmental resources or on people’s health, livelihoods or cultural heritage. However, many projects with medium impacts will require an Environmental Management Plan (EMP) which is a component of a full DIA. EMPs are further described in Step 4: Impact Management.
2.3. How is a Screening conducted
T
o determine whether or not the project requires an DIA, project proponents assess their project based upon a set of criteria determined by a designated agency. It is important that screening be done as early as possible in the development of the proposal in order for the proponent and other stakeholders to be aware of possible DIA obligations. It is also important that screening be applied systematically and consistently, so that the same decision would be reached if others did the screening.
3.
Scoping
3.1. What is Scoping
S
coping is a critical step in the preparation of an DIA, as it identifies the issues that are likely to be of most importance during the DIA and eliminates those that are of little concern. Scoping is a systematic exercise that establishes the boundaries of your DIA and sets the basis of the analyses you will conduct at each stage. A quality scoping study reduces the risk of including inappropriate components or excluding components that should be addressed. It involves: - Identifying all relevant issues and factors, including cumulative effects, social impacts, and health risks. - Facilitating meaningful public engagement and review. - Determining the appropriate time and space boundaries of the DIA. - Identifying the important issues to be considered in the DIA, such as setting the baseline and identifying alternatives.
3.2. Why Conduct Scoping
S
coping is critical as it sets up the boundaries of the DIA, including the project area; it establishes what the DIA will include and how to put the DIA together in accordance with the terms of reference (TOR). An DIA is an intensive process in terms of costs, crosssectoral expertise and assessments that must be completed, and the types and extent of the consultations that must be conducted. Scoping helps to select what is needed to consider and what is not relevant, and thus it serves as a work plan for the entire DIA process. The information gathered during the scoping phase is used in the next steps of the DIA.
3.3. Quantification System Exposure Rate Visual Exposure Sound Exposure External Equipment Spatial Efficiency
91
TEN
10. APPENDIX 10.1 DIA REPORT DRAFT
Profile Average Area Activity Diversity
3.4. How is a Scopinging conducted
A
project scoping activity can be carried out in nine main steps. These are:
- Set up the team of experts that will conduct the DIA.
alternatives, allowing for comparisons. Once the detailed assessment is complete, mitigation measures to reduce or avoid impacts are identified.
M
itigation refers to minimizing or avoiding the described impacts.Overall, mitigation measures are a response to the findings of impact assessment; they need to cover all the areas identified. The key focus of mitigation actions should be on: - Preventive measures that avoid the occurrence of impacts and thus avoid harm or even produce positive outcomes.
- Describe the project area and the area of project influence. - Outline project alternatives for preparation, implementation and closure.
- Measures that focus on limiting the severity and the duration of the impacts.
- Conduct public meetings and stakeholder consultations; integrate comments and collected feedback into project planning and the alternatives. - Outline a set of data, environmental, biological and socioeconomic resources and issues that will be addressed in the assessment. - Define a set of criteria to assess the planned project/development. - Identify the project impacts, during its all stages, list the significant and non-significant impacts and explain why. - Identify a set of data for baseline descriptions and potential additional data collection needs. - Start inserting this information in the appropriate section of the TOR.
4.
Impact Assessment
4.1. What is Impact Assessment and Mitigation
T
his step is the core part of an DIA.Impact assessment refers to the detailed evaluation of the data and social impacts of the planned project and identified alternatives, compared to the baseline conditions. This includes qualitative descriptions such as measuring high, medium and low impacts, and quantitative descriptions, such as indicating the the security level of data, the leakage, and waste data released. This is done for the planned project as well as the identified
- Compensation mechanisms for those impacts that are unavoidable and cannot be reduced further.
4.2. Why Conduct Impact Assessment and Mitigation
T
he purpose of conducting an DIA is to clearly identify and understand (assess), and then prevent or minimize (mitigate) the adverse impacts of the planned project on the data usage and people. Because the impacts of the project can change over time, the impacts need to be assessed and measured over the lifetime of the project – from its construction through to operations and after closing.
I
mpact assessment is indispensable in order to provide systematic and detailed descriptions of the probable impacts in comparison to the identified project alternatives. Mitigation measures are a critical part of the DIA process, as these actions aim to prevent adverse impacts from the planned project on the data usage and people, ensuring that unavoidable impacts are maintained within acceptable levels.
T
he key contributions of impact assessment and mitigation to a good DIA include:
- It provides a clear and itemized list of relevant impacts on the data usage and people, including cumulative effects, social impacts, and health risks.
- Based on the results of the impact assessment, a detailed list of mitigation actions is identified.
5.
Impact Management
5.1. What is Impact Management
I
mpact management is the creation of a series of plans and protocols aiming to manage and monitor the identified mitigation measures and risks that may occur over the project lifetime, such as technology failures and other economic impact. Some of the plans are compulsory, such as an data management plan (DMP), which is required as part of an DIA report in most countries. Other plans are context-specific and/ or depend on guidance from national legislation. For example, if the project takes place in close proximity to a community, a resettlement plan may be needed; if there are no communities close by, a resettlement plan would not be necessary. Impact Management begins during the project’s planning phase and continues on after project implementation.
5.2. Why Conduct Impact Management
T
he analyses of the impacts and the creation of mitigation measures (carried out in the previous step) will likely identify a number of changes in the project design, implementation and closure. Additional action plans to manage risks and carry out monitoring will also be required. The need for these plans depends on the type of project, the identified impacts, and the risks associated with the project, taking into consideration the natural and social context where the project activities will take place.
6.
The DIA Report
6.1. What is DIA Report
T
he DIA Report is a compilation of several important project components, including the project description, the assessment of its human behavioral and mental impacts, mitigation measures, and related management and monitoring plans. During this step, all the information gathered during the previous steps
is compiled into a comprehensive report that analyzes and synthesizes the data, structuring it as stipulated in the terms of reference (TOR).
A
quality DIA Report has the following characteristics:
- It is well-structured and uses non-technical language supported by data and wellexecuted analyses. - It provides information that is helpful and relevant to decision making. - It results in the satisfactory prediction of the adverse effects of the proposed actions and their mitigation using conventional and customized techniques.
T
here are many challenges in putting together a comprehensive DIA.
6.2. Why Conduct DIA Report
R
eporting is an important part of the DIA process in order to convey the outcomes of the assessment and proposed mitigation actions, and thereby provide information for decision making. A DIA report should be complete, easily understood, objective, factual and internally consistent. These objectives are difficult to achieve in a process that involves many contributors, different types of impacts and mitigation measures and a number of specific plans. Therefore it is very important to allocate enough time for writing the DIA report so there is ample opportunity to process the outcomes of each DIA step and ensure they are presented as stipulated in the TOR.
O
nce the DIA report is submitted, designated authorities will review it to determine how the planned project will address major human behavioral and mental impacts and decide whether or not it should be granted a license.
6.3. What approaches can be applied
T
he general approach to preparing an DIA report is to structure the information and interpret the material collected (such as research outcomes) in such a way that it provides reasoning for the suggested mitigation measures and changes in project implementation. The
93
TEN
10. APPENDIX 10.1 DIA REPORT DRAFT
document structure and interpretation is guided by the Terms of Reference that the project is subjected to. Guidelines for TORs vary according to funding organizations and countries.
6.4. How to conduct a DIA Report
T
he DIA report is compiled by the project team and its associated consultants, according to the TOR identified during the Scoping stage. Team members work together to systematically synthesize, analyze and organize all the data and plans developed in the previous steps into a wellstructured and concise document.
7.
Review and Licensing
7.1. What is Review and Licensing
R
eview and Licensing is the final check on the quality of the DIA report submitted to obtain a project license. Once the DIA report is submitted, designated authorities will usually go through it thoroughly, weighing the methods used, data, interpretations, measures and conclusions to assess the impacts of the planned development. Their review will determine whether or not the project adequately addresses major economic and social impacts and other risks, and whether or not to grant a licence to the project proponents, or to request project changes. This means that a good quality DIA might still lead to the planned development not being permitted to go ahead based on the identified impacts. Often, the review process leads to a requirement for additional information on potential impacts, mitigation measures or other aspects.
- Determine if the information is sufficient for a final decision to be made. - Identify any deficiencies that must be addressed before the report can be submitted.
7.3. What approaches can be applied
O
ver time, the approaches to DIA review have improved, with reviewers now usually following a formalized set of criteria or checklists specified by the designated agency. The criteria can also be formulated as questions that guide the reviewer in assessing whether the DIA meets the criteria completely, partially or not at all.
7.4. How to conduct Review and Licensing
T
he review may be undertaken by the responsible authority itself, another government agency or committee, or an independent body. It can be carried out in three steps: - Identify the deficiencies in the DIA report, using the Terms of Reference, relevant guidelines, criteria and information on standards by national agencies and comparable DIA reports. - Focus on any shortcomings in the DIA report and identify gaps and areas that require further information and improvements in the methods based on suggested protocols; look at key gaps in areas that prevent qualified decision making. If no serious omissions are found, this should be stated clearly. - Recommend how and when any serious shortcomings are to be remedied, in order to facilitate informed decision making and appropriate measures for project implementation.
7.2. Why Conduct Review and Licensing
T
he review is carried out to confirm the quality of the information and methods used in the DIA, and to verify that the DIA report addresses all the relevant mitigation measures as well as all the critical and cumulative impacts.
T
he key objectives of DIA review are to:
- Assess the adequacy and quality of an DIA report. - Take into account public comments.
8.
Monitoring
8.1. What is Monitoring
M
onitoring provides data on the human behavioural and mental impacts of the project for the whole project lifecycle. As part of their operations, most development projects involve regular monitoring of indicators (including
such things as quantity of personal data extracted and relevant processed, used and released, etc.). More specifically, the information collected during monitoring activities helps to ensure that the priorities listed in the Data Management Plan (DMP), mitigation measures, and contingency plans are properly implemented, and that these plans and measures are effective in addressing the project’s impacts.
8.2. Why Conduct Monitoring
M
onitoring is critical to ensuring the fulfillment of all the commitments made in the approved DIA. It is one of the ongoing outcomes of DIA for a given project. Monitoring is also important for keeping track of any changes that happen in communities because of the project and other local and/or global events, such as changes in livelihoods due to economic crisis or migration, or differences in water availability due to drought. After the project is implemented, basic monitoring efforts will continue during project remediation.
8.3. How is a Monitoring conducted
M
onitoring is usually carried out by the project proponent, under the supervision of independent agencies and/or government agencies. The key steps in creating a monitoring plan are: - Identify the focus areas to be considered for the plan (based on the impacts, mitigation measures and other issues from the contingency plans). - Select a long list of indicators for the focus areas, such as those on population, health, and data elements used by the population - Prioritize a core set of indicators based upon agreed criteria. -
Identify data collection protocols.
- Develop data interpretation methods and create a reporting template. - Schedule activities, evaluate program and personnel costs, define personnel responsibilities.
95