Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
hacker_culture_and_politics [2016/01/14 18:16] nathanairplane |
— (current) | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | # Hacker Culture and Politics | ||
- | ## What is this course about? | ||
- | |||
- | We are all hackers now. This course chronicles the story of a kind of identity that began among a geeky subculture, then migrated to a murky criminal underground, only to be adopted by management consultants and CEOs. Do hacker formations like Wikileaks, Anonymous, and open-source software represent a new kind of politics, or a rejection of politics as we know it? We will explore the contested figure of the hacker in the past, present, and science-fiction of the Internet. | ||
- | |||
- | Since anyone who has signed up for a course with this name can probably expect to be on some watchlist for all eternity, we'll also have to learn skills. Expect to teach yourself and one another something technical. Hacker politics is not a spectator sport. | ||
- | |||
- | |||
- | ## What are the expectations? | ||
- | |||
- | Basically, students are expected to hack it. This can take different forms for different people. We'll work together to make the expectations clear, and then it's up to you how and to what degree you'd like to meet them. | ||
- | |||
- | ### Objective 0: Be present for something | ||
- | |||
- | Student are expected to attend scheduled meetings and contribute to the class community. Each week, we'll follow a similar pattern: | ||
- | |||
- | * **The first day**, we'll learn a skill from a member of the class and hack on it together. On hacking days, it's a good idea to bring a computer with you. | ||
- | * **The second day**, we'll discuss the readings for the week in light of our experience hacking. Screen devices allowed only for referring to the readings. Notes must be taken on paper. | ||
- | |||
- | Online, the course lives on a private GitLab repository, accessible only to members of the class. | ||
- | |||
- | ### Objective 1: Hack something | ||
- | |||
- | Before every week's second class period, each student should post an "exploit" on the week's GitLab issue. This is a brief blog post detailing something you did with the week's skill, discussed in interaction with the week's texts. It need only be long enough to demonstrate some adventuresome thinking. | ||
- | |||
- | ### Objective 2: Teach something | ||
- | |||
- | We learn from each other. At some point in the course, each student will present to the class a hacker skill that they have learned. One skill per student---you'll sign up ahead of time for a skill and a day to present. In a 10-15 minute presentation, including slides and/or a live demo, share with us not only the skill but the learning process you went through to obtain it. In advance of the presentation, you will also be expected to outline your presentation on the class's GitLab wiki, which classmates may edit and amend. | ||
- | |||
- | ### Objective 3: Reverse-engineer something | ||
- | |||
- | Become a goon. The final project for this course is to write an approximately 1,800-to-2,000-word report on a real-world hack for a relevant establishmentarian organization. If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance, and a recommendation for what your organization should do about it. | ||
- | |||
- | This project includes a built-in debugging and revision process. | ||
- | |||
- | |||
- | ### Bounties | ||
- | |||
- | Grades are not especially conducive to hacking, but we need some equivalent in order for this course to be legible to the university. Therefore, work will be rewarded with bounties. These are functionally pretty much the same as grades, but perhaps giving them a different name will prevent them from killing the learning process in the way that grades normally do. The maximum bounty awarded for each portion of the course is as follows: | ||
- | |||
- | * Objective 0: 20 points | ||
- | * attendance; only absences with documentation from a relevant authority will be excused; more than 3 unexcused absences will result in a loss of 2 points each | ||
- | * thoughtful contributions to the discussion that demonstrate grasp of the readings | ||
- | * evidence of attention to others | ||
- | * good questions | ||
- | * active collaboration in learning and sharing skills | ||
- | * Objective 1: 30 points | ||
- | * clever use of the week's skill | ||
- | * sophisticated engagement with the texts | ||
- | * punctuality | ||
- | * Objective 2: 20 points | ||
- | * demonstrated autodidacticism (with appropriate community help) | ||
- | * ambition of the skill, balanced with realistic expectations | ||
- | * background information on the history and rationale of the task | ||
- | * accessibility and fun of the presentation | ||
- | * usable contribution to the wiki | ||
- | * Objective 3: 30 points | ||
- | * complete beta version: | ||
- | * 1,800-to-2,000-word length | ||
- | * comprehension of the hack and accessible analysis of it | ||
- | * appropriate references to at least three assigned readings | ||
- | * impressive and documented research | ||
- | * correct grammar, correct spelling, coherence | ||
- | * participation in debugging | ||
- | * evidence of revision for final | ||
- | |||
- | Bounties will be compiled in real time on D2L for easy access. The final grade will be calculated by adding up the bounties each student has earned. | ||
- | |||
- | |||
- | ### Terms and conditions | ||
- | |||
- | * When problems arise, we will seek to address them collaboratively---first through dialogue, then through revision of this document, and only if those are inadequate through recourse to outside authorities. | ||
- | * We respect one another's privacy. Content shared in the course will not be shared beyond it. | ||
- | * Use of laptops and other screen devices is discouraged during class time. They are [highly likely](http://www.yorku.ca/ncepeda/laptopFAQ.html) to interfere with your learning experience. Most class activities, unless otherwise stated, neither require or will be improved by them. | ||
- | * We adhere to basic [[university policies]] regarding accessibility and academic integrity; we take responsibility for understanding them and the relevant procedures. *Verbum sat sapienti est.* | ||
- | |||
- | |||
- | |||
- | ## What topics will be covered? | ||
- | |||
- | ### Whois? | ||
- | |||
- | * [Urban Dictionary](http://www.urbandictionary.com/define.php?term=hacker) | ||
- | * Read all the pages | ||
- | * Stephen Wolfram, "[Untangling the Tale of Ada Lovelace](http://blog.stephenwolfram.com/2015/12/untangling-the-tale-of-ada-lovelace/)" (December 10, 2015) | ||
- | * Steven Levy, _Hackers: Heroes of the Computer Revolution_ [chapters 1 and 2](https://www.gutenberg.org/ebooks/729) (1984) | ||
- | * The Mentor, "[The Conscience of a Hacker (aka Hacker Manifesto)](http://phrack.org/issues/7/3.html)," _Phrack_ 1, no. 7 (1986) | ||
- | * Stewart Brand, "['Keep Designing': How the Information Economy is being created and shaped by the Hacker Ethic](http://www.textfiles.com/hacking/eslf0006.txt)", _Whole Earth Magazine_ (May 1985) | ||
- | * Too bad the first letter of every line is missing | ||
- | * For context, read the section on Stewart Brand here: Fred Turner and Christine Larson, "[Network Celebrity: Entrepreneurship and the New Public Intellectuals](http://fredturner.stanford.edu/wp-content/uploads/Turner-Larson-Network-Celebrity-PC-2015.pdf)," _Public Culture_ 27, no. 1 (2015) | ||
- | * Robert Graham, "[No, 'hacker' really does mean 'hacker'](http://blog.erratasec.com/2012/08/no-hacker-really-does-mean-hacker.html)," _Errata Security_ (August 8, 2012) | ||
- | |||
- | **Skill: Hack something.** | ||
- | |||
- | ### School | ||
- | |||
- | * Eric Steven Raymond, "[How to Become a Hacker](http://catb.org/~esr/faqs/hacker-howto.html)" (2001-2015) | ||
- | * Eric Steven Raymond, "[How To Ask Questions The Smart Way](http://catb.org/~esr/faqs/smart-questions.html)" (2001-2014) | ||
- | * Alice Truong, "['Become An iOS Developer In 8 Weeks': The Truth About Hack Schools](https://www.fastcompany.com/3023456/become-an-ios-developer-in-8-weeks-the-truth-about-hack-schools)," _Fast Company_ (December 17, 2013) | ||
- | * Paul Ford, "[What Is Code?](http://www.bloomberg.com/graphics/2015-paul-ford-what-is-code/)" _Businessweek_ (June 11, 2015) | ||
- | |||
- | **Skill: Teach yourself something.** | ||
- | |||
- | ### Craft | ||
- | |||
- | * Neal Stephenson, "[Spew](http://www.wired.com/1994/10/spew/)," _Wired_ (October 1, 1994) | ||
- | * Neal Stephenson, _[In the Beginning... Was the Command Line](http://www.cryptonomicon.com/beginning.html)_ (1999) | ||
- | * Gabriella Coleman, "The Craft and Craftiness of Hacking" in _[Coding Freedom: The Ethics and Aesthetics of Hacking](http://gabriellacoleman.org/Coleman-Coding-Freedom.pdf)_ (Princeton University Press, 2013) | ||
- | * Tsutomu Shimomura, "[Catching Kevin](http://www.wired.com/1996/02/catching/)," _Wired_ (February 1, 1996) | ||
- | |||
- | **Skill: Write a command-line script.** | ||
- | |||
- | |||
- | ### Sharing | ||
- | |||
- | * candyman, "[The Lamahs-Guide to Pirating Software on the Internet](http://www.textfiles.com/piracy/warez.txt)," alt.games.doom (December 27, 1994) | ||
- | * _[Downloaded](http://www.moviefone.com/2013/09/12/downloaded-napster-documentary/)_, directed by Alex Winter (2013) | ||
- | * Yochai Benkler, “[A Free Irresponsible Press: WikiLeaks and the Battle Over the Soul of the Fourth Estate](http://dash.harvard.edu/bitstream/handle/1/10900863/Benkler.pdf?sequence=1),” _Harvard Civil Rights-Civil Liberties Law Review_ 46 (2011) | ||
- | * Nafeez Ahmed, "[The open source revolution is coming and it will conquer the 1% - ex CIA spy](http://www.theguardian.com/environment/earth-insight/2014/jun/19/open-source-revolution-conquer-one-percent-cia-spy)," _The Guardian_ (June 19, 2014) | ||
- | * _[The Internet's Own Boy: The Story of Aaron Swartz](https://archive.org/details/TheInternetsOwnBoyTheStoryOfAaronSwartz)_, directed by Brian Knappenberger (2014) | ||
- | |||
- | **Skill: Set a valuable piece of information free.** | ||
- | |||
- | ### Law | ||
- | |||
- | Hacking IP: | ||
- | |||
- | * Gabriella Coleman, "The Tale of Two Legal Regimes" and "Code Is Speech" in _[Coding Freedom: The Ethics and Aesthetics of Hacking](http://gabriellacoleman.org/Coleman-Coding-Freedom.pdf)_ (Princeton University Press, 2013) | ||
- | * Richard Stallman, _[The GNU Manifesto](http://www.gnu.org/gnu/manifesto.html)_ (1985-1993) | ||
- | |||
- | Hacking corporate structure: | ||
- | |||
- | * Dymitri Kliener, _[The Telekommunist Manifesto](http://telekommunisten.net/the-telekommunist-manifesto/)_ (Network Notebooks, 2010) | ||
- | * Read pp. 20-25, 33-43 | ||
- | * Trebor Scholz and Nathan Schneider, "[The People’s Uber: Why The Sharing Economy Must Share Ownership](http://www.fastcoexist.com/3051845/the-peoples-uber-why-the-sharing-economy-must-share-ownership)," _Fast Company_ (October 7, 2015) | ||
- | |||
- | **Skill: Devise a license.** | ||
- | |||
- | ### Order | ||
- | |||
- | * Jeremy Adam Smith, "[How to Design the Commons (or, Elinor Ostrom Explained!)](http://www.shareable.net/blog/how-to-design-the-commons)," _Shareable_ (December 10, 2009) | ||
- | * Maxigas, "[Hacklabs and hackerspaces – tracing two genealogies](http://peerproduction.net/issues/issue-2/peer-reviewed-papers/hacklabs-and-hackerspaces)," _The Journal of Peer Production_ | ||
- | * Liz Henry, "[The Rise of Feminist Hackerspaces and How to Make Your Own](https://modelviewculture.com/pieces/the-rise-of-feminist-hackerspaces-and-how-to-make-your-own)," _Model View Culture_ (February 3, 2014) | ||
- | * Nathan Schneider, "[Can Monasteries Be a Model for Reclaiming Tech Culture for Good?](http://www.thenation.com/article/can-monasteries-be-model-reclaiming-tech-culture-good/)," _The Nation_ (August 27, 2014) | ||
- | |||
- | Gittip/Gratipay, the <del>first</del>second "open company": | ||
- | |||
- | * Chad Whitacre, "[The First Open Company](http://blog.gittip.com/post/26350459746/the-first-open-company/)," Gittip blog (July 2, 2012) | ||
- | * "[Gittip Crisis](http://geekfeminism.wikia.com/wiki/Gittip_crisis)," Geek Feminism Wiki | ||
- | |||
- | **Skill: Submit a bug report or feature request to an open-source project.** | ||
- | |||
- | |||
- | ### Security | ||
- | |||
- | * Andrea Peterson, "[Everything you need to know about encryption: Hint, you’re already using it](https://www.washingtonpost.com/news/the-switch/wp/2015/12/08/you-already-use-encryption-heres-what-you-need-to-know-about-it/) | ||
- | * Chris Stokel-Walker, "[The Internet Is Being Protected By Two Guys Named Steve](http://www.buzzfeed.com/chrisstokelwalker/the-internet-is-being-protected-by-two-guys-named-st)," _Buzzfeed_ (April 25, 2014) | ||
- | * Julia Angwin, "[The World’s Email Encryption Software Relies on One Guy, Who is Going Broke](https://www.propublica.org/article/the-worlds-email-encryption-software-relies-on-one-guy-who-is-going-broke)," _ProPublica_ (February 5, 2015) | ||
- | * Raj Samani and Charles McFarland, _[Hacking the Human Operating System: The role of social engineering within cybersecurity](http://www.mcafee.com/us/resources/reports/rp-hacking-human-os.pdf)_, McAfee Labs (2015) | ||
- | * Nathan Schneider, "[The Joy of Slow Computing](http://www.newrepublic.com/article/121832/pleasure-do-it-yourself-slow-computing)," _The New Republic_ (May 19, 2015) | ||
- | |||
- | **Skill: Encrypt a form of digital communication.** | ||
- | |||
- | |||
- | ### Culture | ||
- | |||
- | * Lawrence Lessig, "[\<free_culture\>](https://randomfoo.net/oscon/2002/lessig/)," O.Reilly Open Source Conference (July 24, 2002) | ||
- | * Watch Flash presentation | ||
- | * David Garcia and Geert Lovink, "[The ABC of Tactical Media](http://www.nettime.org/Lists-Archives/nettime-l-9705/msg00096.html)," nettime mailing list (May 16, 1997) | ||
- | * Mark Dery, *[Culture Jamming: Hacking, Slashing, and Sniping in the Empire of Signs](http://markdery.com/?page_id=154)* (Open Magazine Pamphlet Series, 1993) | ||
- | |||
- | **Skill: Make a remix.** | ||
- | |||
- | |||
- | ### Anonymity | ||
- | |||
- | * YouTube prelude: [Interview with a hacker](https://www.youtube.com/watch?v=_DKijrPGr2U) | ||
- | * David Auerbach, "[Anonymity as Culture: A Treatise](https://www.canopycanopycanopy.com/contents/anonymity_as_culture__treatise)," _Triple Canopy_ 15 (December 1, 2011) | ||
- | * Gabriella Coleman, "[Our Weirdness Is Free](https://www.canopycanopycanopy.com/issues/15/contents/our_weirdness_is_free)," _Triple Canopy_ 15 (December 1, 2011) | ||
- | * _[We Are Legion: The Story of the Hacktivists](https://www.youtube.com/watch?v=-zwDhoXpk90)_, directed by Brian Knappenberger (2012) | ||
- | * Adrian Chen, " [The Truth About Anonymous’s Activism](http://www.thenation.com/article/truth-about-anonymouss-activism/)," _The Nation_ (November 11, 2014) | ||
- | |||
- | Another use of anonymity and geopolitics: | ||
- | |||
- | * Cormac Herley, "[Why do Nigerian Scammers Say They are from Nigeria?](http://research.microsoft.com/pubs/167719/WhyFromNigeria.pdf)" (2012?) | ||
- | * Erika Eichelberger, "[What I Learned Hanging Out With Nigerian Email Scammers](http://www.motherjones.com/politics/2014/03/what-i-learned-from-nigerian-scammers)," _Mother Jones_ (March 20, 2014) | ||
- | |||
- | **Skill: Create a robust pseudonym.** | ||
- | |||
- | ### Power | ||
- | |||
- | * Adrian Chen, "[The Agency](http://www.nytimes.com/2015/06/07/magazine/the-agency.html)," _The New York Times Magazine_ (June 2, 2015) | ||
- | * Anna Litvinenko, "[Social Media and Perspectives of Liquid Democracy: The Example of Political Communication in the Pirate Party in Germany](http://search.proquest.com/openview/21945d09e5ee9513145c7aa07f6863e8/1?pq-origsite=gscholar)," _European Conference on e-Government_ (June 2012) | ||
- | * Kim-Mai Cutler, "[A Conversation With DemocracyOS, The YC Non-Profit That Built A Latin American Political Party](http://techcrunch.com/2015/04/17/democracyos-2/)," _TechCrunch_ (April 17, 2015) | ||
- | * Sebastian Kubitschko, "[The Role of Hackers in Countering Surveillance and Promoting Democracy](http://www.cogitatiopress.com/ojs/index.php/mediaandcommunication/article/view/281), _Media and Communication_ 3, no. 2 (2015) | ||
- | |||
- | **Skill: Social-engineer something.** | ||
- | |||
- | ### Money | ||
- | |||
- | * William Gibson, "[Burning Chrome](http://mith.umd.edu/digitalstorytelling/wp-content/uploads/GibsonW_Burning_Chrome.pdf)," _Omni_ (1982) | ||
- | * Satoshi Nakamoto, "[Bitcoin: A Peer-to-Peer Electronic Cash System](https://bitcoin.org/bitcoin.pdf)" (the "Bitcoin Whitepaper") (undated) | ||
- | * Nathan Schneider, "[After the Bitcoin Gold Rush](http://www.newrepublic.com/article/121089/how-small-bitcoin-miners-lose-crypto-currency-boom-bust-cycle)," _The New Republic_ (February 24, 2015) | ||
- | * Meghan, "[Bitcoin Doesn't Need Women](http://www.bitcoinnotbombs.com/bitcoin-doesnt-need-women/)," _Bitcoin Not Bombs_ (January 8, 2014) | ||
- | * Nathan Schneider, "[On the Lam With Bank Robber Enric Duran](https://www.vice.com/read/be-the-bank-you-want-to-see-in-the-world-0000626-v22n4)," _Vice_ (April 7, 2015) | ||
- | * Nathan Schneider, "[Why the Tech Elite Is Getting Behind Universal Basic Income](https://www.vice.com/read/something-for-everyone-0000546-v22n1)," _Vice_ (January 6, 2015) | ||
- | |||
- | **Skill: Get some bitcoins.** | ||
- | |||
- | |||
- | ### Gentrification | ||
- | |||
- | * Josh Constine, "[The Nerdy Address Of Facebook’s New Headquarters? 1 Hacker Way](http://techcrunch.com/2011/12/05/1-hacker-way/)," _TechCrunch_ (December 5, 2011) | ||
- | * Brett Scott, "[The Hacker Hacked](https://aeon.co/essays/how-yuppies-hacked-the-original-hacker-ethos)," _Aeon_ (December 26, 2014) | ||
- | * Misha Glenny, [Hire the Hackers](https://www.ted.com/talks/misha_glenny_hire_the_hackers)," TED Talk (July 2011) | ||
- | * Nathan Schneider, "[Our Generation of Hackers](https://www.vice.com/read/our-generation-of-hackers-111)," _Vice_ (November 11, 2014) | ||
- | |||
- | **Skill: Co-opt something.** | ||
- | |||
- | ### Wiki | ||
- | |||
- | What remains to be read? We'll decide together as a class. | ||
- | |||
- | **Skill: What remains to be learned?** | ||
- | |||
- | |||
- | ### Reverse-engineering | ||
- | |||
- | Peer review the final project and conclude the course. | ||
- | |||
- | --- | ||
- | |||
- | ## What should I be checking out to keep up with hacker culture? | ||
- | |||
- | * _[Ars Technica](http://arstechnica.com/)_ | ||
- | * [Geek Feminism Wiki](http://geekfeminism.wikia.com/wiki/Geek_Feminism_Wiki) | ||
- | * [Hacker News](https://news.ycombinator.com/) | ||
- | * _[Lifehacker](http://lifehacker.com/)_ | ||
- | * [Lwn.net](https://lwn.net/) | ||
- | * _[Model View Culture](https://modelviewculture.com/)_ | ||
- | * [Slashdot](http://slashdot.org/) | ||
- | * [Textfiles](http://www.textfiles.com/directory.html) | ||
- | * _[ThreatLevel](http://www.wired.com/threatlevel/)_ | ||
- | |||
- | |||
- | ## To whom is credit due for the composition of this class? | ||
- | |||
- | Quite a bit of the material came from [this course with the same name](http://gabriellacoleman.org/wp-content/uploads/2012/09/Coleman-Hacker-syllabus-2012-FINAL.pdf) offered by Gabriella Coleman. Read [my profile of her here](https://chronicle.com/article/Hacking-the-World/138163/). | ||
- | |||
- | --- | ||
- | |||
- | [ [[note:hacker_culture_and_politics|Notes]] ] |