Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
hacker_culture [2024/01/09 12:44]
ntnsndr [Objective 0: Contribute] Added self-reporting option
hacker_culture [2024/04/23 18:40] (current)
ntnsndr [13. Singularity]
Line 13: Line 13:
 ## Instructor ## Instructor
  
-Nathan Schneider ("​Professor Schneider"​)  ​+Nathan Schneider ("​Nathan"​ or "​Professor Schneider"​)  ​
 <​nathan.schneider@colorado.edu>​ ([[:​email_etiquette|tips]]) ​     ​ <​nathan.schneider@colorado.edu>​ ([[:​email_etiquette|tips]]) ​     ​
 Armory 1B24    Armory 1B24   
Line 92: Line 92:
   * Clear explanation of the Exploit along with supporting evidence   * Clear explanation of the Exploit along with supporting evidence
   * Creative implementation that develops skills   * Creative implementation that develops skills
-  * Sophisticated ​[[engagement|engagement]] ​with at least one of the module'​s assigned sources+  * Sophisticated engagement with at least one of the module'​s assigned sources
  
 ### Objective 2: Teach ### Objective 2: Teach
Line 113: Line 113:
 *25 points* *25 points*
  
-Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack that for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.+Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.
  
 If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it. If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it.
Line 123: Line 123:
 Bounty rubric: Bounty rubric:
  
-  * Beta version and participation in debugging with substantive comments on two fellow students'​ betas (points) +  * Beta version and participation in debugging with substantive comments on two fellow students'​ betas (points) 
-  * One-minute presentation,​ with a compelling slide, on the last day of class (points) +  * One-minute presentation,​ with a compelling slide, on the last day of class (points) 
-  * Revised final (20 points)+  * Revised final (15 points)
     * Complete report, 1,​800-to-2,​000-word length, written clearly and with instructive illustrations     * Complete report, 1,​800-to-2,​000-word length, written clearly and with instructive illustrations
     * Comprehension of the hack and convincing, accessible analysis of it     * Comprehension of the hack and convincing, accessible analysis of it
Line 134: Line 134:
  
 * This syllabus is a living document and may be revised during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement. * This syllabus is a living document and may be revised during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement.
-Use of laptops and other screen devices ​is not permitted during class discussionsexcept when required for accessibility. Such devices are [[:​screen_devices|likely]] to interfere ​with your learning experience and that of students around ​you. Screens will be frequently used, however, for DiscoTechs and group work.+We will be intentional about any use of screen devices, ​which [[:​screen_devices|risk]] interfering ​with our learning experience and that of students around ​us.
 * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission. * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission.
 * We adhere to basic [[:​university policies]] regarding accessibility and [[:academic honesty]]; we take responsibility for understanding relevant policies and procedures. *Verbum sat sapienti est.* * We adhere to basic [[:​university policies]] regarding accessibility and [[:academic honesty]]; we take responsibility for understanding relevant policies and procedures. *Verbum sat sapienti est.*
Line 143: Line 143:
  
   * Project proposal: April 9   * Project proposal: April 9
-  * Project beta version: April 31+  * Project beta version: April 30
   * Final presentations:​ May 2   * Final presentations:​ May 2
   * Final project: May 2   * Final project: May 2
Line 213: Line 213:
  
   * Tsutomu Shimomura, "​[Catching Kevin](http://​www.wired.com/​1996/​02/​catching/​),"​ _Wired_ (February 1, 1996)   * Tsutomu Shimomura, "​[Catching Kevin](http://​www.wired.com/​1996/​02/​catching/​),"​ _Wired_ (February 1, 1996)
-  * Christopher Hadnagy, "[A Look into the _New_ World of Professional Social Engineering](https://onlinelibrary-wiley-com.colorado.idm.oclc.org/doi/book/10.1002/9781119433729)," in _Social Engineering: ​The Science ​of Human Hacking_ ​(Wiley2018)+  * Robert W. Gehl and Sean T Lawson, "[Pretexting: Recognizing ​the Mitnick Mythology](https://direct.mit.edu/books/oa-monograph/5281/chapter/​3666131/​Pretexting-Recognizing-the-Mitnick-Mythology)," in _Social Engineering: ​How Crowdmasters,​ Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication_ ​(MIT Press2022)
  
 **Exploit: Get someone who doesn'​t know who you are to do something.** Use your identity created in an earlier module, or try another, or use no identity at all. This can be online, over various kinds of networks, or in meatspace. Take a stranger to lunch, or get a stranger to send you a dollar. Make a friend or an enemy. But exercise your capacity to influence the world, without your existing social capital, through crafty engineering of interpersonal interactions. **Exploit: Get someone who doesn'​t know who you are to do something.** Use your identity created in an earlier module, or try another, or use no identity at all. This can be online, over various kinds of networks, or in meatspace. Take a stranger to lunch, or get a stranger to send you a dollar. Make a friend or an enemy. But exercise your capacity to influence the world, without your existing social capital, through crafty engineering of interpersonal interactions.
Line 222: Line 222:
   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)
  
-**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.isaca.org/Journal/archives/​2010/​Volume-1/​Pages/​Performing-a-Security-Risk-Assessment1.aspxabout the [nature](http://​webkay.robinlinus.com/​) of potential ​[threats](https://​panopticlick.eff.org/) and how they might be mitigated. Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.+**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.consumerreports.org/issue/data-privacyon [potential threats](https://​coveryourtracks.eff.org/) and how they might be mitigated. ​What do online services you use [make you agree to](https://​privacyspy.org/​)? ​Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.
  
 ### 11. Disintermediation ### 11. Disintermediation
Line 234: Line 234:
  
   * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021)   * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021)
-  * "[Shenzhen: The Silicon Valley ​of Hardware](https://​www.youtube.com/watch?​v=SGJ5cZnoodY)," ​_Wired_ ​(2016)+  * Fernanda R. Rosa, "[From Community Networks to Shared Networks: The Paths of Latin-Centric Indigenous Networks to a Pluriversal Internet](https://​www-tandfonline-com.colorado.idm.oclc.org/doi/​full/​10.1080/​1369118X.2022.2085614)," ​_Information,​ Communication & Society_ 26, no. 11 (2023)
  
 **Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help. **Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help.
Line 240: Line 240:
 ### 13. Singularity ### 13. Singularity
  
-  * Alessandro Delfanti and Johan Söderberg, "​[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://www.ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism),"​ _Ephemera_ 18, no. 3 (2018)+  * Alessandro Delfanti and Johan Söderberg, "​[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](https://​ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism),"​ _Ephemera_ 18, no. 3 (2018)
   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)