Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
hacker_culture [2024/01/08 01:10]
ntnsndr Major revision for Spring 2024
hacker_culture [2024/04/11 18:59]
ntnsndr [Objective 3: Master] typo fix
Line 13: Line 13:
 ## Instructor ## Instructor
  
-Nathan Schneider ("​Professor Schneider"​)  ​+Nathan Schneider ("​Nathan"​ or "​Professor Schneider"​)  ​
 <​nathan.schneider@colorado.edu>​ ([[:​email_etiquette|tips]]) ​     ​ <​nathan.schneider@colorado.edu>​ ([[:​email_etiquette|tips]]) ​     ​
 Armory 1B24    Armory 1B24   
Line 74: Line 74:
  
   * Geeky enthusiasm, insight, and attention to others in class (10 points)   * Geeky enthusiasm, insight, and attention to others in class (10 points)
 +
 +Before this assignment is due, you are welcome to propose the bounty you think you have earned with a one-paragraph explanation. The instructor will determine final bounties, taking your input into account.
  
  
Line 90: Line 92:
   * Clear explanation of the Exploit along with supporting evidence   * Clear explanation of the Exploit along with supporting evidence
   * Creative implementation that develops skills   * Creative implementation that develops skills
-  * Sophisticated ​[[engagement|engagement]] ​with at least one of the module'​s assigned sources+  * Sophisticated engagement with at least one of the module'​s assigned sources
  
 ### Objective 2: Teach ### Objective 2: Teach
Line 111: Line 113:
 *25 points* *25 points*
  
-Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack that for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.+Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.
  
 If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it. If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it.
Line 121: Line 123:
 Bounty rubric: Bounty rubric:
  
-  * Beta version and participation in debugging with substantive comments on two fellow students'​ betas (points) +  * Beta version and participation in debugging with substantive comments on two fellow students'​ betas (points) 
-  * One-minute presentation,​ with a compelling slide, on the last day of class (points) +  * One-minute presentation,​ with a compelling slide, on the last day of class (points) 
-  * Revised final (20 points)+  * Revised final (15 points)
     * Complete report, 1,​800-to-2,​000-word length, written clearly and with instructive illustrations     * Complete report, 1,​800-to-2,​000-word length, written clearly and with instructive illustrations
     * Comprehension of the hack and convincing, accessible analysis of it     * Comprehension of the hack and convincing, accessible analysis of it
Line 132: Line 134:
  
 * This syllabus is a living document and may be revised during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement. * This syllabus is a living document and may be revised during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement.
-Use of laptops and other screen devices ​is not permitted during class discussionsexcept when required for accessibility. Such devices are [[:​screen_devices|likely]] to interfere ​with your learning experience and that of students around ​you. Screens will be frequently used, however, for DiscoTechs and group work.+We will be intentional about any use of screen devices, ​which [[:​screen_devices|risk]] interfering ​with our learning experience and that of students around ​us.
 * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission. * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission.
 * We adhere to basic [[:​university policies]] regarding accessibility and [[:academic honesty]]; we take responsibility for understanding relevant policies and procedures. *Verbum sat sapienti est.* * We adhere to basic [[:​university policies]] regarding accessibility and [[:academic honesty]]; we take responsibility for understanding relevant policies and procedures. *Verbum sat sapienti est.*
Line 141: Line 143:
  
   * Project proposal: April 9   * Project proposal: April 9
-  * Project beta version: April 31+  * Project beta version: April 30
   * Final presentations:​ May 2   * Final presentations:​ May 2
   * Final project: May 2   * Final project: May 2
Line 211: Line 213:
  
   * Tsutomu Shimomura, "​[Catching Kevin](http://​www.wired.com/​1996/​02/​catching/​),"​ _Wired_ (February 1, 1996)   * Tsutomu Shimomura, "​[Catching Kevin](http://​www.wired.com/​1996/​02/​catching/​),"​ _Wired_ (February 1, 1996)
-  * Christopher Hadnagy, "[A Look into the _New_ World of Professional Social Engineering](https://onlinelibrary-wiley-com.colorado.idm.oclc.org/doi/book/10.1002/9781119433729)," in _Social Engineering: ​The Science ​of Human Hacking_ ​(Wiley2018)+  * Robert W. Gehl and Sean T Lawson, "[Pretexting: Recognizing ​the Mitnick Mythology](https://direct.mit.edu/books/oa-monograph/5281/chapter/​3666131/​Pretexting-Recognizing-the-Mitnick-Mythology)," in _Social Engineering: ​How Crowdmasters,​ Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication_ ​(MIT Press2022)
  
 **Exploit: Get someone who doesn'​t know who you are to do something.** Use your identity created in an earlier module, or try another, or use no identity at all. This can be online, over various kinds of networks, or in meatspace. Take a stranger to lunch, or get a stranger to send you a dollar. Make a friend or an enemy. But exercise your capacity to influence the world, without your existing social capital, through crafty engineering of interpersonal interactions. **Exploit: Get someone who doesn'​t know who you are to do something.** Use your identity created in an earlier module, or try another, or use no identity at all. This can be online, over various kinds of networks, or in meatspace. Take a stranger to lunch, or get a stranger to send you a dollar. Make a friend or an enemy. But exercise your capacity to influence the world, without your existing social capital, through crafty engineering of interpersonal interactions.
Line 220: Line 222:
   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)
  
-**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.isaca.org/Journal/archives/​2010/​Volume-1/​Pages/​Performing-a-Security-Risk-Assessment1.aspxabout the [nature](http://​webkay.robinlinus.com/​) of potential ​[threats](https://​panopticlick.eff.org/) and how they might be mitigated. Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.+**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.consumerreports.org/issue/data-privacyon [potential threats](https://​coveryourtracks.eff.org/) and how they might be mitigated. ​What do online services you use [make you agree to](https://​privacyspy.org/​)? ​Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.
  
 ### 11. Disintermediation ### 11. Disintermediation
Line 232: Line 234:
  
   * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021)   * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021)
-  * "[Shenzhen: The Silicon Valley ​of Hardware](https://​www.youtube.com/watch?​v=SGJ5cZnoodY)," ​_Wired_ ​(2016)+  * Fernanda R. Rosa, "[From Community Networks to Shared Networks: The Paths of Latin-Centric Indigenous Networks to a Pluriversal Internet](https://​www-tandfonline-com.colorado.idm.oclc.org/doi/​full/​10.1080/​1369118X.2022.2085614)," ​_Information,​ Communication & Society_ 26, no. 11 (2023)
  
 **Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help. **Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help.