Exploring the consequence of destruction through the rearrangement of internet-sourced portraits using software hacking, custom-scripting, and the manual arrangement of image bytes

phantom5
phantom3
phantom4