CO-OPTICON | PLURALISM IN THE CONTROL MECHANISMS

Page 1

CO-OPTICON PLURALISM IN THE CONTROL MECHANISMS

Mengdan Liu Syracuse University School of Architecture Fall 2013 Advisors Larry Bowne & Lori Brown 1


CONTENTS

OVERVIEW Forward Existing Condition Contention | Framework


AIRPORT SECURITY|SITE 1. A Tough Departure 1.1 Introduction 1.2 Tension|Exposure|Objectification 1.3 Exodus

PANOPTICON|PROTOTYPE STUDY 2. Panopticon in Security 2.1 Airport Security is a Panopticon 2.2 Surveillance Mechanisms as Necessity

COMPUTER LAB|STUDY 3. “Autonomy“ in Computer Lab 3.1 An Innocuous Watching 3.2 Computer Lab in Two Parts

GOOGLE OFFICE|STUDY 4. Pluralism in a Control Mechanism 4.1 Google Office Studies

PROJECT PROPOSAL 5. Test the Pluralism for Security Check


0 4


OVERVIEW Forward Existing Condition Contention | Framework

5


6


FOREWARD At the airport security check, every traveler suffers to experience the checking and waiting to be checked. Although the target is the very small group of people who break the security rules, the spatial quality resulted that all the travelers are involved and confined in a usually tight, enclosed security check space. Compared to the other areas in the airport, the security is rather a box, with vision and activity highly confined. It is an additional stop in the passengers’ one-directional movements towards the aircrafts. It is a seam the travelers wish they could pass through and not stop. It is a seam space between the place left behind and the one about to enter. At both the security check and Foucault’s panopticon, diverse travelers and inmates share the status of “being watched” in the similar way. Both confine people and limit the activity within an unpleasant space. In panopticon, it is highly controlled by the panoptic visibility on the “watching” side and the ambiguity of “whether being watched or not” on the other, the facility is giant to house as well as to separate hundreds of inmates in one closed building. While the process of security provides an experience as monotonous as in the prison, with the vision, activity, mobility highly restricted by the “controlling” spatial strategy. (low roof, window-less, rails, …) Primary difference of these two being that, the panopticon is intended to provide a disciplinary and captive space for the inmates who violated; the security, on the other side, is mandated and tackle all the passengers, most of whom do not have security issues.

7


Why we are being treated in the same way as inmates at the security even we do not violate? And

why we make airport security such a form of prosecution?

However, different from the solution we see in the airport security or panopticon, the Slocum hall computer lab proposes a more pleasant and efficient self-discipline control mechanism, regarding its no food and drink rule. In the lab, the same psychological influence of being watched and controlled only works on those who “violates”, without causing any potential tension for those who do not. If we draw a parallel line here between the lab and airport security, with the rule for the latter being “no dangerous items for air travel”, one unpleasant character worth noticing is that the supervision and examination of “the rule” becomes the exculsive activity and reason for the space, which I define it as a “control is the only program”; while the efficiency of the lab typology is seen from the way it works as a “control along with the other program”, or “control is one of the programs”, in which the experience from the more engaging program dominates, rather than that from the control mechanism.

8


Google office is an example that broad array of amenities dominate the space, while the condition of “being watched” is relatively undermined. It is a type of “control along with lots of other programs”. By infusing the daily necessities such as free gourmet food, fitness center, laundry…all into the office, Google, the search engine giant is successful in keeping its employees anchoring in the space and enjoy their working under watching, therefore greatly reduced the likelihood that employees let out their work information in an anonymous street corner café. Learning from the benefits of offering distractions and undermine the acknowledgement of “being watched”, my goal is to apply and test the Pluralism idea at the security in airport terminals, ultimately propose an efficient while autonomous security environment.

9


Existing Condition

The contemporary built environment is characterized by mechanisms of control and surveillance, such as airport security, gated and fenced communities. In the cities with rapidly growing technology and crowding traffic, such interventions surely gain us a sense of protection and ease.

10


However, when we consider the life in the modern city, it goes way beyond the barrier of the control mechanisms. In the city we work but we also recreate, we learn and we entertain. As control and surveillance mechanisms start to be fully integrated with our lives, the boundaries between these activities are formed.

0.1 porta-sebastiano, 0.2 1 Wall Street, 0.3, 0.4

11


Contention|Framework

1

2

AIRPORT SECURITY|SITE

PANOPTICON|PROTOTYPE

The objectification of human being has taken importance over individual needs of users over time.

12


3

COMPUTER LAB|A NEUTRAL SETTING

4

CORPORATE OFFICE|PLURALISM

The objectification is a form of violation that will encourage a mass of passive citizens and totalitarian control. Architecture should acknowledge the violation, and operate to promote autonomous controlling settings, by applying pluralism in the current power structure.

13


1 14


AIRPORT SECURTY|SITE 1. A Tough Departure 1.1 Introduction 1.2 Tension|Exposure|Objectification 1.3 Exodus

15


1.1 Introduction

At today’s airport, all the passengers pass through the security without exception. Queuing in a long line before the security becomes inevitable if we leave at a busy airport, or during a travel rush. Knowing that we are important objects for video monitors and authority, our actions are molded to look “normal” and fit in these numerous gazes. We watched how the others behave: what items they hold in hands, where they put the shoes, cell phones or sunglasses. The impulse to have a cigarette to kill time, or to make a phone call to families is desisted, for fear of the embarrassment of getting called to stop and become the focus of attention. Feeling ill at ease, the desire to pass through the gazes mounted, while the line is not moving as fast. The time of waiting and well behave, behind and ahead of someone, seems elongated and deferred. Acknowledging that “someone out there is watching”, help construct a deep sense of self and other. Some eyes are watching me, directly and behind some screens. In movies, this moment is often an overture to horror and scream. The sense of exposure keeps us in suspense. Therefore the waiting in front of the security—no matter short or long, produces a feeling of tension.

1.1 The Terminal Movie Poster

16


Departure 17


Although the waiting lines are linear and have some orders in it, our sights are circuitous rather than one-way. “Looking” becomes the only legitimate thing we could do without causing unnecessary attention. We look around, up, side to side. Other than out of boredom, sometimes the looking has a purpose. We try to recognize ourselves in this process, by identifying and being identified: “I”, as one anonymous passenger, queuing in the line while wondering whether my nail clipper is a problematic item. The wandering sight finally stays at a lady in the middle of the next line, who wears a zipped vest and holds nail clipper with a key chain in hand, which is a similar image of me. The matching identification gains myself subtle sense of peace.

18


6:00 am

!

19


The aforementioned moment is a common scene at the pre-screening zone, the mass “identifying” moments forms a network of public gazes, and the overlapping and interaction of sight imply a potential participation of performance and display. Because this generalized watching moment forms how we act accordingly in the waiting line, and this action would soon deform after we passed the security; it is the “watching” that locates everyone involved: Passengers, security officers, and sometimes families and friends behind and watching. Passengers fear being watched, authority fear the any passengers are not being watched. Thus the tension necessitates a reliable while endurable space to facilitate surveillance video system and help shape the passengers’ actions in the train of the queuing under gazes.

Figure 1.2 Big Sign Little Building

20


Building As Sign

Big Sign Little Building

Just like on the highway everyone must drive either on the right or on the left. Somtimes it doesn’t even matter which is which, only that there is a conformity. The airport security is the same as any public infrastructure, which requires common standards of procedure.

Human Variation in Physical Form As Sign

21


1.2

Tension|Exposure|Objectification

Why do we make the security space full of tension? If we take a look at some parts from the design guidance for the airport security: …..to establish security areas and boundaries, any area designated as requiring control for security and/or safety purposes must have identifiable boundaries for that area to be recognized and managed….natural boundaries such as water or tree lines, or simply geographic coordinates. ---“TSA(Transportation Security Administration): Recommended Security Guidelines for Airport Planning, Design and Construction” p8

…walls surrounding the security checkpoint must be a minimum of 8’ high. Ideally, walls that separate sterile areas from non-sterile areas should be floor to ceiling, and designed without gaps so that no prohibited items could be placed into the secure side of the terminal when the SSCP is closed. Exit lane walls adjacent to the checkpoint are to be 8’ minimum and constructed of transparent material where possible. Where possible, walls or other barriers adjacent to X-ray TSO should prevent public view of the x-ray monitor screen. ---TSA: Checkpoint layout design guide p34

22


INGRESS/PUBLIC

EGRESS/STERILE

23


We could find the field of vision and visual quality for passengers at security is considered as highly restrained purposely. Good design conforms to the activities that it supports; as the activity at the current security is a one-way screening process from security officer towards the passengers, no wonder the airport security designers endeavor to make the space convenient for the exclusive controlling process.

information screening

arrival

24


Figure 1.3 Airport Departure Panorama

ticket counter

25


Existing security condition Although each airport and airport terminal building is unique in terms of physical design and operational requirements, over the past 40 years a number of critically important checkpoint design elements have been identified and integrated to create a typical Transportation Security Administration (TSA) Security Screening Checkpoint (SSCP). Accroding to the TSA Security Design Guidelines:

Proper SSCP design helps avoid a host of problems for the airport and airlines, including terminal and queuing congestion, delays, and unnecessary security risks. ---TSA: Checkpoint layout design guide p7

The problem of stagnant line would be solved alternately if we turn the queuing into a rather spontaneous movement by proposing activities, attrations or distractions.

26


Figure 1.4, 1.5. Security Process

27


28


Figure 1.6--1.12. Public Gazes in Terminals

29


People mover system|Departure flow

Entrance Ticket sales

Ticket check-in

Emigration control

Security check

Departure lounge

Gate lounge

Aircraft

30


Baggage security check

Baggage sort

31


What is the deficiency in the current condition? A typical security layout The current security zone is planned carefully centering on “screening”: The screening of passengers by walkthrough metal detector as well as the screening of luggage by X-ray detection system. The pre-screening zone is divided into a preparation instruction zone, which is pre-occupied with signage and posters, aiming at “instructing and directing passengers for efficient screening flow”(Checkpoint layout, P15); a queuing zone which include room for queuing, as well as tables for passengers to preparing their belongings for screening. TSA requires all checkpoints to be formed as collections of single

“and double-lane team modules as illustrated in “SSCP layouts.”

Modular design enables a controlled and contained screening environment where “sterile” and “non sterile” passengers and baggage are separated from each other. Whenever possible, allowances should be made for flexibility and expandability of the checkpoint space to respond to changes in technology, equipment or processing procedures.

---TSA: Checkpoint layout design guide p8

Architects design the layout of the queue, bearing in mind that it should help the screening operation efficient while not interfering with other travel patterns. They also act as stage directors. They take care of the choreography of the movement through their architecture.

32


The process is characterized by the setting which played out as a serious of obstacles.

33


Screening zone gears the passenger flow walking through a metal-detector gate, while divest of their personal items and pass these through x-ray chamber machine. Everyone and everything is watched in full and thorough view during the screening. And we pass through it and reach the safe zone. At the security gate, state thinking needs a standardized person. The pressure is to break down each human, her or his behaviors, and accompanying artifacts, and to convert each into an actionable item. Excerpt, <Against Security> p88, Harvey Moloch

The problem is obvious here: In the airport security process, our design missed to take into account the feeling of the passengers. Security operation turns those passengers on, even though they do not have security issue. Although the security check is necessary to assure a safe travel, the experience of passing it through is in many ways so similar to that of an inmate in the prison.

34


As the passengers load gets heavier, the size of the obstacle settings start to occupy larger space.

35


INGRESS/PUBLIC

A B C L

J

C J

K

D

E

J H I

C

F

EGRESS/STERILE

36

L


A = Pre-screening Preparation Instruction Zone B = Queuing Space C = Divest & Composure Tables D = Walk-Through Metal Detector (WTMD) E = Carry-on Baggage X-ray (TRX) Machine F = Explosives Trace Detection (ETD) Machine with table G = Explosive Trace Portal (ETP) – (not illustrated) H = Passenger Containment I = Passenger Inspection J = Metallic/Non-metallic Barrier K = Non-metallic ADA Gate L = SSCP Adjacent Walls/Barriers

37


A – PRESCREENING PREPARATION INSTRUCTION ZONE

This zone is an area in front of the SSCP that uses architectural features, simple signage, instructional videos, and “ambassador” staff, trying to create a more efficient throughput by instructing and directing passengers for efficient screening flow.

Simple and effective signage, including including TSA prohibited items, film advisory, notice of private screening, TSA warning signs, airline carry on requirements and pet restrictions, can be used to direct and instruct users of the SSCP, increasing the speed and perception of service.

INGRESS/PUBLIC

A B C

J

C

L J

K

D

E

J

Video monitors may be used to illustrate prohibited items, divesting, loading bags on the conveyor, and walking through the metal detector and ETP.

H I

C

F

EGRESS/STERILE

38

L


Figure 1.13--1.15

39


B – QUEUING SPACE

This space should include room for tables near the screening equipment, for preparing their belongings for screening. Emphasis on efficient queue management, passenger education and divestiture in this area will greatly improve the efficiency of operations for all.

As a general rule in the current security design, the passenger queuing area should be sized to contain a 10 minutes wait of passengers when all lanes of a checkpoint being fed by a particular queuing area are open.

INGRESS/PUBLIC

A B C C

L

Also, lack of an allocated queue space will cause the passenger queue to expand into adjacent areas and will impede the general flow of passengers through the airport.

J

J

K

D

E

J H I

C

F

EGRESS/STERILE

40

L


Figure 1.16

41


J – NON-METALIC BARRIERS

Barriers are required to install to close all gaps exceeding 15” across the front width or façade of the checkpoint, in order to prevent passengers and items from passing into the sterile area without being screened by a WTMD (Walk-through Metal Detector).

In current designs, these barriers are constructed from primarily non-metallic materials, and rigid enough to prevent vibrations that could interfere with the WTMD.

INGRESS/PUBLIC

A B C

J

C

L J

K

D

E

J H I

C

F

EGRESS/STERILE

42

L


Figure 1.17

43


Criticism Fourth Amendment Wear TEXT: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” -Fourth Amendment to the United States Constitution The project is basically an invention of metallic ink formula that shows up on TSA scanners and created a product that would display the 4th amendment. The clothes are designed as a silent protest against the new reality of being searched to the point where we’re basically naked. It is a critique and a thought-provoking way to fuel the debate about safety vs. civil liberties.

http://cargocollective.com/4thamendment 44


45


Criticism Stealth Wear -A Design for Countersurveillance The project explores the aesthetics of privacy and the potential for fashion to challenge authoritarian surveillance. It is a suite of new designs that tackle some of the most pressing and sophisticated forms of surveillance today. The anti-drone hoodie and anti-drone scarf: garments designed to thwart thermal imaging, a technology used widely by UAVs. The XX-shirt: a x-ray shielding print in the shape of a heart, that protects your heart from x-ray radiation.

Adam Harvey / ahprojects.com 46


47


Evolution| US Airport

48


Security Measure Timeline

49


1.3

Exodus

Underground--50

minutes

tes

minu 0 8 g in

Driv

s

0 2 1 -

Bu

50

m


tes

nu mi

51


52


end

53


It’s It’s not not an an airport, airport, it’s it’s

54


ss aa boutique. boutique.

Copenhagen airport Figure 1.17.

55


It’s It’s not not an an airport, airport, it’s it’s 56


ss aa gallery. gallery. Figure 1.18. Jet Blue Terminal in JFK Aiport

57


It’s It’s not not an an airport, airport, it’s it’s aa department department store. store.

58


ss

Figure 1.19. Interior View of Copenhagen Aiport

59


BEFORE arrive

check-in

security

shopping AFTER arrive

60

check-in


shopping

gate lounge

shopping

board aircraft

shopping

security

gate lounge

MAKING PEOPLE ANXIOUS IS THE WHOLE POINT.

61

board aircraft


2 62


PANOPTICON| PROTOTYPE STUDY 2. Panopticon in Security 2.1 Airport Security is a Panopticon 2.2 Surveillance Mechanisms as Necessity

63


2.1 Airport Security is a Panopticon

In panopticon, the centripetal layout implies a clear hierarchy in the positions of “watching” as well as the “being watched”. The panoptic visibility from the “watching” side, as well the ambiguity of “whether being watched or not” on the other, together construct a theater of domination clearly, with the hundreds of cell units on the peripheral ring exposed onstage and the only potential audience hided within the watching tower. The panoptic model has been considered as a prison paradigm for its efficiency in operation and self-discipline. The architecture facilitates the functioning of control by inducing in the inmates a sense of permanent and conscious visibility. The perfection of this architecture

it creates and sustains a continuous controlling relation independent of the apparatus is that

physical person and the person’s exercise.

64


65


2.2 Surveillance Mechanisms as Necessity

Figure 2.1 Security Area

Figure 2.2 Detention Center Interiror

Figure 2.3 Real-Time Airport Security Checkpoint Surveillance

Figure 2.4 Live Video Room in Prison

While when we are queuing at the airport security, as discussed in the last chapter, the state of “watching” is the same unverifiable and visible as in the panopticon. Passengers could constantly see security officers and CCTV cameras ahead, behind and around, from which they are

the presence or absence of the sight is unverifiable, passengers, with this spied upon. Although

acknowledgement, have to keep fully alert about their activities before they pass through this zone. The process implies that, the security is to assume everyone

as potential violator first, and those non-violators would not be distinguished until after a process of “panopticon ” surveillance.

66


RECORDER B

in prison

06:00am 06:10 06:20 06:30 06:40 06:50 07:00am 07:10 07:20 07:30 07:40

Figure 2.5 00:00:00

RECORDER A

07:50 08:00am

airport security checkpoint

08:10

00:01:00 00:02:00

08:20

00:03:00

08:30

00:04:00

08:40 08:50

00:05:00

09:00am 09:10 09:20 09:30 00:10:00

Figure 2.6

09:40 09:50 10:00am 10:10 10:20

00:15:00

10:30 10:40 10:50 11:00am 11:10

00:20:00

11:20 11:30

Figure 2.7

11:40 11:50

00:25:00

00:30:00

00:35:00

Figure 2.8

67


Odds of being a violator for air travel

1 in 29.4 million

However, the panopticon is intended to help enforce the confinement as a punishment for convicting crimes, and to prove itself a crucial instrument of discipline; while for the airport security, although it is set to protect the air travels from any threats and is at least a modestly successful means of control, it is mandated for all the passengers, from their physical body to every personal items, most of whom do not have security issues.

68


06:00pm

07:00pm

08:00pm

09:00pm

10:00pm

11:00pm

Figure 2.9-2.12

69


3 70


COMPUTER LAB|STUDY 3. “Autonomy“ in Computer Lab 3.1 An Innocuous Watching 3.2 Computer Lab in Two Parts

71


3.1 An Innocuous Watching

How could architecture make response to promote a rather healthy and rational process, when the innocuous are involved while the control mechanism is an unavoidable necessity? With this question I start to examine the computer lab in the Slocum hall as a more generic space with control mechanism behind: Facts |The room is occupied with desktops, and is set as a workspace for convenience of students. Same as all other computer labs, it has the general policy that no food or drink is allowed in the room, which would ensure the normal operation of the lab. The lab monitor Ron, whose work time is between 8:00am to 5:00pm on weekdays, deploys the supervision of this policy.

72


73


The tricky part is that, we are conscious of the state of “being watched” by Ron is time-based, as a result the eating pattern in this space is fluctuant and contingent accordingly, which is conveyed in both the sitting pattern and in the stacked-food quantity: During the daytime, students with food are inclined to sit at the corner seats, which are assumed to have more visual obstacles ahead and around, therefore the sight upon entering is framed with a more restrained thus safer visual domain, while leaving a blind zone for hiding and storing the food. This sitting trend is captured most obviously when the 5:00pm draws close. The thing that draws us together in the lab is working on computers, while during the 5:00 pm to 8:00am “unattended” period, the “eating” and “drinking” becomes another official activity appearing on the scene from backstage. Quite a bit of food packs appear alongside the working screens. The space is suddenly pervaded with the smell of food, which becomes an entrapment that empowers the whole room as a working-eating environment.

74


75


76


77


78


79


Travellers

“Lab-ers� mobility for food

80


Anchors

4:00pm

8:00am

8:00pm

5:00pm

81


Travellers

Quantity of food packs appear in the computer lab

monday

82


Anchors

4:00pm

8:00am

(Bookstore opens at 4:30pm)

8:00pm

5:00pm

weekend

83


84


85


86


Guggenheim Museum proposes a decentralized watching which is an opposition of panoptic watching for prisons.

Figure 3.1

Panopticon| “All-seeing� prison|Hierarchical surveillance

Figure 3.2

87


3.2

Computer Lab in Two Parts

If we draw a parallel line here between the lab and airport security, with the rule for the latter being “no dangerous items for air travel”, one unpleasant character worth noticing is that the supervision and examination of “the rule” becomes the exclusive activity and reason for the space, which I define it as a “control is the only program”; while the efficiency of the lab typology is seen from the way it works as a “control along with the other program”, or “control is one of the programs”, in which the experience from the more engaging program dominates, rather than that from the control mechanism.

88


89


PRECEDENT STUDY

DILLER SCOFIDIO+RENFRO

EYEBEAM MUSEUM OF ART AND TECHNOLOGY|CULTURAL Competition entry

By bending and folding a single surface into a ribbon shape, D+S transforms a fairly common design convention which is typically employed as aethetic device, and set a new standard for programmatic employment of folded shapes. The blue “production” side and the gray “presentation” side each possesses a core at opposite ends, thus making it possible for one population ”to pass through the other, acknowledging each other and communicating visually and sometimes physically.”

90


Figure 3.3

91


B

A

92


The gray “presentation” side

The blue “production” side

Figure 3.4-3.7

93


Eyebeam

B

A

Computer Lab A

B

94


Security cross programming

A

B

95


4 96


GOOGLE OFFICE|STUDY 4. Pluralism in a Control Mechanism 4.1 Google Office Studies

97


4.1 Google Office Studies

Google office VS airport security Google, among many of today’s IT companies, has realized the benefit of locking their employees in, in name of helping its employees to achieving its work-life balance, by integrating perks into its work places. Google office is an example that broad array of amenities dominate the space, while the condition of “being watched” is relatively undermined. It is a type of “control along with lots of other programs”. By infusing the daily necessities such as free gourmet food, fitness center, laundry…all into the office, Google, the search engine giant is successful in keeping its employees anchoring in the space and enjoy their working under watching, therefore greatly reduced the likelihood that employees let out their work information in an anonymous street corner café.

98


99


Figure 4.1

Google’s headquarter in New York city for example, is a large open-planned building with rooms and individual workstations scattered across the floors. A generous amounts of the square footages in this building is dedicated for its perks. One may argue Google is attempting to create a miniature city in this building and went as far as painting the street scene onto the walls and –the food trucks into the building.

100

Figure 4.2


Figure 4.3

Figure 4.4

Food Amenities

Disorientation & Euphoria 2.9 million square feet

101


An Acknoledgement of Pluralism “...morale will decline if management views employees as costs rather than assets...companies want to create both an appealing environment to attract and retain employees and make people feel they belong, but they also want to increase productivity. Worries like childcare, cooking, going to the dry cleaners and visiting the doctor off-site during the week, distract employees at the workplace.� ---Nancy Rothbard, Wharton Management Professor

Google Office Streetview 102


Miniature city

t 0f 90 0ft

24

Real NYC Street Experience 103


5 104


PROJECT PROPOSAL 5. Pluralism for Security Check

105


A critique The current security control environment is excessive and it is a process of objectification. The objectifying of human being cultivates a mass of PASSIVE citizens. The state of being passive is dangerous because the authority would easily steer us where it wants us to go, leaving us in an unawareness of any totalitarian trends.

Aircraft

Terminal Entrance

Terminal Entrance

Terminal

Terminal

Security

106


Therefore, I contend the control environment should be in a form of pluralism instead. The physical settings should be instructions that acknowledge the existence of diverse security experiences, and ultimately promote autonomy for users.

Aircraft

Aircraft

Terminal Entrance

Terminal as Security

107


108


APPENDIX & ANNOTATED BIBLIOGRAPHY Outtake Works Glossary Image Credits Annotated Bibliography

109


Outtake Works Case Study: Auburn Prison Vision Relationship Diagram

TENSION AND RELI

Re ten

110


Case Study:Madison Square Garden MADISON SQUARE GARDEN Spatial Behavior Diagram

111


ON EVENT DAY

10AM waiting

food

112

ticket

transportatio


on

113


ON EVENT DAY

intimate space temporality Queue

Event on-going

black space between event and outcomes of desires

power of movement

10AM

movement of power (shifting of power)

-on subway -spatial enclosure as disciplinary device

114

-security checkpoint -pinnacle of control

-event on-going -under consistent control/unconscious of power


SPATIAL PROXEMICS

PU BLIC SPACE

“the organization of space in hours and buildings, and ultimately the layout of towns.”

SOCIAL SPACE

PERSONAL S PA C E

intimate space

INTIMATE S PA C E 1.5 ft (0.45 m)

social space

4 ft (1.2 m)

12 ft (3.6 m)

Edward T. Hall's personal reaction bubbles, showing radius in feet and meters

public space 25 ft (7.6 m)

“Freedom arises through the ability of a 'body' to realize two things: the exercise of power along one's full spectrum of possibilities, both physical and virtual; and secondly but more importantly an evolving awareness in this exercise of power, such that intelligent and self regulating structures form in the 'consciousness' of individuals and groups able to achieve such a state. ” ---Ed Keller

115


Gates 23–29

Gates 30–42

10 minute walk

20 minute walk

D Departure lounge-airport shopping mall

Caffè Italia

Gates 13–22 20 minute walk Lounges B, F, H

19

17

Gates 1–11

16

10 minute walk

Security

15

14

13

Special Assistance

12 11 10 9 8

Security

6

Security

4

5

Boarding

116

C Security

7

1 3

2


Because so much at airport security (and other security settings as well) seems to make so little sense, it is tempting to use the term “security theater” for the whole apparatus and to see it as deliberately engineered to engender supplication and deference to the powerful. Those motivated by significant and serious commitment—including concerned travelers—must join in the performance. Any initiative for change must take on the fact that airports, as with other security venues, are indeed places of threat ambiguity. We don’t know where trouble might be coming from, in what way, from whom, or precisely where.(Molotch, p119)

B Check-in

A

Arrive from ground transportation

Theater of Domination Terminal 3, Heathrow Airport, London

117


Image Credits

Cover Image. By Korye Nelson www.pinterest.com Overview 0.1. Porta-sebastiano in Rome www.nycerome.com 0.2. 1 Wall Street www.thecityreview.com 0.3. Scanning : the aberrant architectures of Diller + Scofidio. Page 95 0.4. By Tarsha Blythe www.pinterest.com Chapter 1 1.1. The Terminal Movie Poster agrandeilusaocaminha.wordpress.com 1.2. “Big Sign Little Building”, Learning from Las Vegas. Page 17. 1.3. Airport Departure Panorama www.colossalwaste.com 1.4. “Bay Area transit, airports beef up security.” www.sfgate.com/news 1.5. -1.6-1.12. -1.13. www.flickr.com 1.14. Security Checkpoint Layout Design/Reconfiguration Guide. Transportation Security Administration. 1.15. www.flickr.com 1.16. Security Checkpoint Layout Design/Reconfiguration Guide. Transportation Security Administration.

118


1.17-1.19.www.pinterest.com Chapter 2 2.1-2.2. www.flickr.com 2.3. Real-Time Airport Security Checkpoint Surveillance Using a Camera Network. Ziyan Wu and Richard J. Radke 2.4. www.wordpress.com 2.5. Photo by Reed Saxon, AP Photo www.thedailybeast.com 2.6-2.7. www.pinterest.com 2.8. www.businessinsider.com 2.9-2.12. www.pinterest.com Chapter 3 3.1. www.jmg-galleries.com 3.2. Heterotopia and the panopticon. www.heterotopiastudies.com 3.3-3.7. Diller Scofidio + Renfro : architecture after images. Chapter 4 4.1-4.4. Inside Google: An Exclusive Look at Its NYC Office live.wsj.com

119


Annotated Bibliography

Surveillance, Vision & Control Mechanisms Studies Dimendberg, Edward. Diller Scofidio + Renfro : architecture after images. Chicago : University of Chicago Press, 2013.Print. Debord, Guy. Society of the spectacle. New York : Zone Books, 1994. Print. Betsky, Aaron, et al. Scanning : the aberrant architectures of Diller + Scofidio. New York: Whitney Museum of American Art ; New York : Distributed by Harry N. Abrams, Inc., 2003. Print. Diller, Elizabeth and Ricardo Scofidio. Flesh : architectural probes. New York : Princeton Architectural Press, 1994. Prison Typologies & Criminology Wright, Richard. In defense of prisons. Westport: Greenwood Press, 1994. Print. Abrams, Laura and Ben Anderson-Nathe. Compassionate Confinement: A Year in the Life of Unit C. New Brunswick: Rutgers University Press, 2013. Print. Lynch, Michael. Big prisons, Big dreams: Crime and the Failure of America’s Penal System. New Brunswick: Rutgers University Press, 2007. Print. Haney, Craig. Reforming punishment : psychological limits to the pains of imprisonment. Washington D.C:American Psychological Association, 2006. Print.

120


Alcatraz : history and design of a landmark / Donald MacDonald and Ira Nadel. San Francisco : Chronicle Books, 2012. Print. Johnston, Norman. Human cage : a brief history of prison architecture. New York: Walker, 1973. Print. Public Transportation Design, Construction & Theory Edwards, Brian. Modern airport terminal : new approaches to airport architecture. New York : Spon Press, 2005. Binney, Marcus. Airport builders. West Sussex : Academy Editions,1999. Print. Le Corbusier. Aircraft. New York: The Studio publications inc,1935. Print. Foster, Norman and Chris Abel. Beijing International Airport : Foster + Partners . Munich ; New York : Prestel, 2010. Print. Powell, Kenneth, Richard Bryant and Philip Sayer. Stansted : Norman Foster and the architecture of flight. London: Fourth Estate Wordsearch, 1992. Print. Transportation Security Administration. Recommended Security Guidelines for Airport Planning, Design and Construction. May 2011. Transportation Security Administration. Security Checkpoint Layout Design/Reconfiguration Guide. November 7, 2006

121


Social Science, Social and Cultural Analysis Molotch, Harvey. Against security : how we go wrong at airports, subways, and other sites of ambiguous danger. Princeton : Princeton University Press, 2012. Print. Molotch, Harvey and Laura Noreフ]. Toilet : public restrooms and the politics of sharing. New York : New York University Press, 2010. Print. Keim, Kevin. You have to pay for the public life : selected essays of Charles W. Moore. Cambridge: MIT Press, 200. Print. Ellin, Nan. Architecture of fear. New York: Princeton Architectural Press, 1997. Print. Urban Design & Planning Okamoto, Rai, Frank E. Williams, Klaus Huboi, Dietrich Kunkel, Carlisle Towery, C. McKim Norton, Stanley B. Tankel, Boris Pushkarev, and William B. Shore. Urban design Manhattan. New York, Viking Press,1969. Print. Others Chung, Judy and Sze Tsung Leong et al. Harvard Design School guide to shopping. New York : Taschen, 2001. Print. Robin Evans. Figures, Doors and Passages.

122


Metabolism, the city of the future : Dreams and visions of reconstruction in postwar and present-day Japan. Tokyo : Mori Art Museum, 2011. Print. Davidson, Cynthia. Anytime. Cambridge: MIT Press,1999. Print. Venturi, Robert, Denise Scott Brown, and Steven Izenour. Learning from Las Vegas. Cambridge, Mass., MIT Press 1972. Print.

123


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.