<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1688-8626</journal-id>
<journal-title><![CDATA[Inmediaciones de la Comunicación]]></journal-title>
<abbrev-journal-title><![CDATA[Inmediac. Comun]]></abbrev-journal-title>
<issn>1688-8626</issn>
<publisher>
<publisher-name><![CDATA[Universidad ORT Uruguay]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1688-86262024000201202</article-id>
<article-id pub-id-type="doi">10.18861/ic.2024.19.2.3725</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Hipervisible: Sobre cámaras de red y sociedades de control]]></article-title>
<article-title xml:lang="en"><![CDATA[Hypervisible: About network cameras and Societies of Control]]></article-title>
<article-title xml:lang="pt"><![CDATA[Hipervisível: Sobre câmeras de rede e sociedades de controle]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lapenda]]></surname>
<given-names><![CDATA[Agustina]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional de San Martín  ]]></institution>
<addr-line><![CDATA[Ciudad Autónoma de Buenos Aires ]]></addr-line>
<country>Argentina</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<volume>19</volume>
<numero>2</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_arttext&amp;pid=S1688-86262024000201202&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_abstract&amp;pid=S1688-86262024000201202&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_pdf&amp;pid=S1688-86262024000201202&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Este artículo reflexiona críticamente sobre el uso de cámaras de red como tecnologías de vigilancia en el contexto de las actuales sociedades de control. El análisis se desarrolla a través de la práctica de observación y recopilación de imágenes provenientes de dispositivos de vigilancia que se transmiten en línea de forma desprotegida. Si estas cámaras no se aseguran debidamente, pueden ser vistas e incluso operadas en forma remota por cualquier persona o robot que esté conectado a Internet. De allí que sus transmisiones puedan ser objeto de usos no previstos e intervenciones anónimas de diversa índole. El trabajo dialoga con estudios clásicos y contemporáneos sobre el tema e indaga el funcionamiento técnico de estos dispositivos, su relación con las prácticas de vigilancia y los discursos de seguridad contemporáneos, su exposición en Internet y el potencial político derivado de los riesgos que promueve su vulnerabilidad.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT This article discusses the use of network cameras as surveillance technologies in the context of today's control societies. The analysis is through the practice of observation and collection of images from surveillance devices that are transmitted online in an unprotected way. If these cameras are not properly secured, they can be viewed and even operated remotely by any person or robot connected to the Internet. Hence, their transmissions can be subject to unintended uses and anonymous interventions of various kinds. The work dialogues with classic and contemporary studies on the subject and investigates the technical functioning of these devices, their relation with surveillance practices and contemporary security discourses, their exposure on the Internet and their political potential derived from the risks promoted by their vulnerability.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[RESUMO Este artigo reflete criticamente sobre o uso de câmeras de rede como tecnologias de vigilância no contexto das atuais sociedades de controle. A análise é desenvolvida através da prática de observação e coleta de imagens de dispositivos de vigilância que são transmitidas online de forma desprotegida. Se essas câmeras não estiverem devidamente protegidas, pode ser visto e até mesmo operado remotamente por qualquer pessoa ou robô conectado à Internet. Assim, as suas transmissões podem estar sujeitas a utilizações imprevistas e intervenções anónimas de vários tipos. O trabalho dialoga com estudos clássicos e contemporâneos sobre o assunto e indaga o funcionamento técnico desses dispositivos, sua relação com as práticas de vigilância e discursos de segurança contemporâneos, sua exposição na Internet e o potencial político derivado dos riscos promovidos pela sua vulnerabilidade.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[cámaras de red]]></kwd>
<kwd lng="es"><![CDATA[vigilancia]]></kwd>
<kwd lng="es"><![CDATA[sociedad de control]]></kwd>
<kwd lng="es"><![CDATA[Internet]]></kwd>
<kwd lng="es"><![CDATA[seguridad.]]></kwd>
<kwd lng="en"><![CDATA[network cameras]]></kwd>
<kwd lng="en"><![CDATA[surveillance]]></kwd>
<kwd lng="en"><![CDATA[Society of Control]]></kwd>
<kwd lng="en"><![CDATA[Internet]]></kwd>
<kwd lng="en"><![CDATA[security]]></kwd>
<kwd lng="pt"><![CDATA[câmeras de rede]]></kwd>
<kwd lng="pt"><![CDATA[vigilância]]></kwd>
<kwd lng="pt"><![CDATA[sociedade de controle]]></kwd>
<kwd lng="pt"><![CDATA[Internet]]></kwd>
<kwd lng="pt"><![CDATA[segurança]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bauman]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Vigilancia líquida]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Ciudad Autónoma de Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Paidós]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bruno]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Controle, flagrante e prazer: regimes escópicos e atencionais da vigilância nas cidades]]></article-title>
<source><![CDATA[Revista FAMECOS]]></source>
<year>2008</year>
<volume>15</volume>
<numero>37</numero>
<issue>37</issue>
<page-range>45-53</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bruno]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[Máquinas de ver, modos de ser: vigilância, tecnologia e subjetividade]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Porto Alegre ]]></publisher-loc>
<publisher-name><![CDATA[Sulina]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cano]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Borrador para un abecedario del desacato]]></source>
<year>2021</year>
<publisher-loc><![CDATA[Ciudad Autónoma de Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Madreselva]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cassin]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Google Me: One-click democracy]]></source>
<year>2018</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Fordham University Pres]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Costa]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[Tecnoceno. Algoritmos, biohackers y nuevas formas de vida]]></source>
<year>2021</year>
<publisher-loc><![CDATA[Ciudad Autónoma de Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Taurus]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<source><![CDATA[Electronic civil disobedience and other unpopular ideas]]></source>
<year>1996</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Autonomedia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Deleuze]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Posdata sobre las sociedades de control]]></article-title>
<source><![CDATA[Polis. Revista Latinoamericana]]></source>
<year>2006</year>
<numero>13</numero>
<issue>13</issue>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farocki]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Desconfiar de las imágenes]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Ciudad Autónoma de Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Caja Negra]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Flusser]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[El universo de las imágenes técnicas: elogio de la superficialidad]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Ciudad Autónoma de Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Caja Negra]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foucault]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Nuevo orden interior y control social]]></article-title>
<source><![CDATA[Saber y verdad]]></source>
<year>1978</year>
<page-range>163-6</page-range><publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[La Piqueta]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foucault]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Seguridad, territorio, población.]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Ciudad Autónoma de Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Fondo de Cultura Económica]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galloway]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Thacker]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[The exploit: a theory of networks]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Minneapolis ]]></publisher-loc>
<publisher-name><![CDATA[University of Minnesota Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galloway]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Protocol: how control exists after decentralization]]></source>
<year>2004</year>
<publisher-loc><![CDATA[London ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="">
<source><![CDATA[Documentary Hacking Google (Episodio 001) (Serie). Youtube.]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hall]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Internet core protocols: the definitive guide]]></source>
<year>2000</year>
<publisher-loc><![CDATA[Sebastopol ]]></publisher-loc>
<publisher-name><![CDATA[O&#8217;Reilly]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koskela]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8216;The other side of surveillance&#8217;: webcams, power and agency]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Lyon]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[.), Theorizing Surveillance: The panopticon and beyond]]></source>
<year>2006</year>
<page-range>163-81</page-range><publisher-loc><![CDATA[Portland ]]></publisher-loc>
<publisher-name><![CDATA[Willan Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lio]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Imágenes del delito. Del uso preventivo a la eficacia mediática de las cámaras de seguridad]]></article-title>
<source><![CDATA[InMediaciones de la Comunicación]]></source>
<year>2024</year>
<volume>19</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>161-87</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Preciado]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Testo yonqui. Sexo, drogas y biopolítica]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Ciudad Autónoma de Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Paidós]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Preciado]]></surname>
<given-names><![CDATA[P. B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Aprendiendo del virus]]></article-title>
<source><![CDATA[El País]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[¿Qué son las sociedades de control?]]></article-title>
<source><![CDATA[Revista Sociedad]]></source>
<year>2008</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Diez preguntas a una posdata misteriosa. Sobre las sociedades de control de Gilles Deleuze]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Estevez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Saidel]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Sacchi]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rios Roso]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Velázquez Ramírez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Libro de Actas de las VI Jornadas de Debates actuales de la teoría política contemporánea]]></source>
<year>2016</year>
<page-range>371-90</page-range><publisher-loc><![CDATA[Rosario ]]></publisher-loc>
<publisher-name><![CDATA[Ediciones Debates Actuales]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rouvroy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Berns]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gubernamentalidad algorítimica y perspectivas de emancipación. ¿La disparidad como condición de individuación a través de la relación?]]></article-title>
<source><![CDATA[Adenda Filosófica]]></source>
<year>2016</year>
<numero>1</numero>
<issue>1</issue>
<page-range>88-116</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Srnicek]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Capitalismo de plataformas]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Ciudad Autónoma de Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Caja Negra]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zuboff]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[La era del capitalismo de la vigilancia. La lucha por un futuro humano frente a las nuevas fronteras del poder]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Paidós]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
