Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
hacker_culture_and_politics [2016/02/24 16:27] – [Security] nathanairplane | hacker_culture_and_politics [2016/09/26 16:23] (current) – removed nathanairplane | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | # Hacker Culture and Politics | ||
- | ## What is this course about? | ||
- | |||
- | We are all hackers now. This course chronicles the story of a kind of identity that began among a geeky subculture, then migrated to a murky criminal underground, | ||
- | |||
- | Since anyone who has signed up for a course with this name can probably expect to be on some watchlist for all eternity, we'll also have to learn skills. Expect to teach yourself and one another something technical. Hacker politics is not a spectator sport. | ||
- | |||
- | |||
- | ## What are the expectations? | ||
- | |||
- | Basically, students are expected to hack it. This can take different forms for different people. We'll work together to make the expectations clear, and then it's up to you how and to what degree you'd like to meet them. | ||
- | |||
- | ### Objective 0: Be present | ||
- | |||
- | Student are expected to attend scheduled meetings and contribute to the class community. Each week, we'll follow a similar pattern: | ||
- | |||
- | * **The first day**, we'll learn a skill from a member of the class and hack on it together. On hacking days, it's a good idea to bring a computer with you. | ||
- | * **The second day**, we'll discuss the readings for the week in light of our experience hacking. Screen devices allowed only for referring to the readings. Notes must be taken on paper. | ||
- | |||
- | Online, the course lives on a private GitLab repository, accessible only to members of the class. | ||
- | |||
- | ### Objective 1: Hack | ||
- | |||
- | Before every week's second class period, each student should post an " | ||
- | |||
- | ### Objective 2: Teach | ||
- | |||
- | We learn from each other. At some point in the course, each student will present to the class a hacker skill that they have learned. One skill per student---you' | ||
- | |||
- | ### Objective 3: Reverse-engineer | ||
- | |||
- | Become a goon. The final project for this course is to write an approximately 1, | ||
- | |||
- | This project includes a built-in debugging and revision process. | ||
- | |||
- | |||
- | ### Bounties | ||
- | |||
- | Grades are not especially conducive to hacking, but we need some equivalent in order for this course to be legible to the university. Therefore, work will be rewarded with bounties. These are functionally pretty much the same as grades, but perhaps giving them a different name will prevent them from killing the learning process in the way that grades normally do. The maximum bounty awarded for each portion of the course is as follows: | ||
- | |||
- | * Objective 0: 20 points | ||
- | * attendance; only absences with documentation from a relevant authority will be excused; more than 3 unexcused absences will result in a loss of 2 points each | ||
- | * thoughtful contributions to the discussion that demonstrate grasp of the readings | ||
- | * evidence of attention to others | ||
- | * good questions | ||
- | * active collaboration in learning and sharing skills | ||
- | * Objective 1: 30 points | ||
- | * clever use of the week's skill | ||
- | * sophisticated engagement with the texts | ||
- | * punctuality | ||
- | * Objective 2: 20 points | ||
- | * demonstrated autodidacticism (with appropriate community help) | ||
- | * ambition of the skill, balanced with realistic expectations | ||
- | * background information on the history and rationale of the task | ||
- | * accessibility and fun of the presentation | ||
- | * usable contribution to the wiki | ||
- | * Objective 3: 30 points | ||
- | * complete beta version: | ||
- | * 1, | ||
- | * comprehension of the hack and accessible analysis of it | ||
- | * appropriate references to at least three assigned readings | ||
- | * impressive and documented research | ||
- | * correct grammar, correct spelling, coherence | ||
- | * participation in debugging | ||
- | * evidence of revision for final | ||
- | |||
- | Bounties will be compiled in real time on D2L for easy access. The final grade will be calculated by adding up the bounties each student has earned. | ||
- | |||
- | |||
- | ### Terms and conditions | ||
- | |||
- | * When problems arise, we will seek to address them collaboratively---first through dialogue, then through revision of this document, and only if those are inadequate through recourse to outside authorities. | ||
- | * We respect one another' | ||
- | * Use of laptops and other screen devices is discouraged during class time. They are [highly likely](http:// | ||
- | * We adhere to basic [[university policies]] regarding accessibility and academic integrity; we take responsibility for understanding them and the relevant procedures. *Verbum sat sapienti est.* | ||
- | |||
- | |||
- | |||
- | ## What topics will be covered? | ||
- | |||
- | ### Whois? | ||
- | |||
- | * [Urban Dictionary](http:// | ||
- | * Read all the pages | ||
- | * Stephen Wolfram, " | ||
- | * Steven Levy, _Hackers: Heroes of the Computer Revolution_ [chapters 1 and 2](https:// | ||
- | * The Mentor, "[The Conscience of a Hacker (aka Hacker Manifesto)](http:// | ||
- | * Stewart Brand, " | ||
- | * Too bad the first letter of every line is missing | ||
- | * For context, read the section on Stewart Brand here: Fred Turner and Christine Larson, " | ||
- | * Robert Graham, "[No, ' | ||
- | |||
- | **Skill: Hack something.** | ||
- | |||
- | ### School | ||
- | |||
- | * Eric Steven Raymond, "[How to Become a Hacker](http:// | ||
- | * Eric Steven Raymond, "[How To Ask Questions The Smart Way](http:// | ||
- | * Alice Truong, " | ||
- | * Paul Ford, "[What Is Code? | ||
- | |||
- | **Skill: Teach yourself something.** | ||
- | |||
- | ### Craft | ||
- | |||
- | * Neal Stephenson, " | ||
- | * Neal Stephenson, _[In the Beginning... Was the Command Line](http:// | ||
- | * Gabriella Coleman, "The Craft and Craftiness of Hacking" | ||
- | * Tsutomu Shimomura, " | ||
- | |||
- | **Skill: Write a script that does something neat.** | ||
- | |||
- | |||
- | ### Sharing | ||
- | |||
- | * candyman, "[The Lamahs-Guide to Pirating Software on the Internet](http:// | ||
- | * Yochai Benkler, “[A Free Irresponsible Press: WikiLeaks and the Battle Over the Soul of the Fourth Estate](http:// | ||
- | * Nafeez Ahmed, "[The open source revolution is coming and it will conquer the 1% - ex CIA spy](http:// | ||
- | |||
- | And watch one of the following films: | ||
- | |||
- | * _[Downloaded](http:// | ||
- | * _[The Internet' | ||
- | |||
- | **Skill: Set a valuable piece of information free.** | ||
- | |||
- | ### Law | ||
- | |||
- | Hacking intellectual property: | ||
- | |||
- | * Richard Stallman, _[The GNU Manifesto](http:// | ||
- | * Gabriella Coleman, "The Tale of Two Legal Regimes" | ||
- | |||
- | Hacking corporate structure: | ||
- | |||
- | * Dymitri Kliener, _[The Telekommunist Manifesto](http:// | ||
- | * Read pp. 20-25, 33-43 | ||
- | * Trebor Scholz and Nathan Schneider, "[The People’s Uber: Why The Sharing Economy Must Share Ownership](http:// | ||
- | |||
- | **Skill: Devise a license.** | ||
- | |||
- | ### Order | ||
- | |||
- | * Jeremy Adam Smith, "[How to Design the Commons (or, Elinor Ostrom Explained!)](http:// | ||
- | * Gabriella Coleman, "Two Ethical Moments in Debian," | ||
- | * Maxigas, " | ||
- | * Liz Henry, "[The Rise of Feminist Hackerspaces and How to Make Your Own](https:// | ||
- | * Nathan Schneider, " | ||
- | |||
- | Gittip/ | ||
- | |||
- | * Chad Whitacre, "[The First Open Company](http:// | ||
- | * " | ||
- | |||
- | **Skill: Submit a bug report or feature request to an open-source project.** | ||
- | |||
- | |||
- | ### Security | ||
- | |||
- | * Andrea Peterson, " | ||
- | * Chris Stokel-Walker, | ||
- | * Julia Angwin, "[The World’s Email Encryption Software Relies on One Guy, Who is Going Broke](https:// | ||
- | * Raj Samani and Charles McFarland, _[Hacking the Human Operating System: The role of social engineering within cybersecurity](http:// | ||
- | * [Install Tor](https:// | ||
- | * Supplemental: | ||
- | |||
- | **Skill: Encrypt a form of digital communication.** | ||
- | |||
- | |||
- | ### Culture | ||
- | |||
- | * Lawrence Lessig, " | ||
- | * Watch Flash presentation | ||
- | * David Garcia and Geert Lovink, "[The ABC of Tactical Media](http:// | ||
- | * Mark Dery, *[Culture Jamming: Hacking, Slashing, and Sniping in the Empire of Signs](http:// | ||
- | |||
- | **Skill: Make a remix.** | ||
- | |||
- | |||
- | ### Anonymity | ||
- | |||
- | * YouTube prelude: [Interview with a hacker](https:// | ||
- | * David Auerbach, " | ||
- | * Gabriella Coleman, "[Our Weirdness Is Free](https:// | ||
- | * _[We Are Legion: The Story of the Hacktivists](https:// | ||
- | * Adrian Chen, " [The Truth About Anonymous’s Activism](http:// | ||
- | |||
- | Another use of anonymity and geopolitics: | ||
- | |||
- | * Cormac Herley, "[Why do Nigerian Scammers Say They are from Nigeria? | ||
- | * Erika Eichelberger, | ||
- | |||
- | **Skill: Create a robust pseudonym.** | ||
- | |||
- | ### Power | ||
- | |||
- | * Adrian Chen, "[The Agency](http:// | ||
- | * Anna Litvinenko, " | ||
- | * Kim-Mai Cutler, "[A Conversation With DemocracyOS, | ||
- | * Sebastian Kubitschko, "[The Role of Hackers in Countering Surveillance and Promoting Democracy](http:// | ||
- | |||
- | **Skill: Social-engineer something.** | ||
- | |||
- | ### Money | ||
- | |||
- | * William Gibson, " | ||
- | * Satoshi Nakamoto, " | ||
- | * Nathan Schneider, " | ||
- | * Meghan, " | ||
- | * Nathan Schneider, "[On the Lam With Bank Robber Enric Duran](https:// | ||
- | * Nathan Schneider, "[Why the Tech Elite Is Getting Behind Universal Basic Income](https:// | ||
- | |||
- | **Skill: Get some bitcoins.** | ||
- | |||
- | |||
- | ### Gentrification | ||
- | |||
- | * Josh Constine, "[The Nerdy Address Of Facebook’s New Headquarters? | ||
- | * Brett Scott, "[The Hacker Hacked](https:// | ||
- | * Misha Glenny, [Hire the Hackers](https:// | ||
- | * Nathan Schneider, "[Our Generation of Hackers](https:// | ||
- | |||
- | **Skill: Co-opt something.** | ||
- | |||
- | ### Wiki | ||
- | |||
- | What remains to be read? We'll decide together as a class. | ||
- | |||
- | **Skill: What remains to be learned?** | ||
- | |||
- | |||
- | ### Reverse-engineering | ||
- | |||
- | Peer review the final project and conclude the course. | ||
- | |||
- | --- | ||
- | |||
- | ## What should I be checking out to keep up with hacker culture? | ||
- | |||
- | * _[Ars Technica](http:// | ||
- | * [Geek Feminism Wiki](http:// | ||
- | * [Hacker News](https:// | ||
- | * _[Lifehacker](http:// | ||
- | * [Lwn.net](https:// | ||
- | * _[Model View Culture](https:// | ||
- | * [Slashdot](http:// | ||
- | * [Textfiles](http:// | ||
- | * _[ThreatLevel](http:// | ||
- | |||
- | |||
- | ## To whom is credit due for the composition of this class? | ||
- | |||
- | Quite a bit of the material came from [this course with the same name](http:// | ||
- | |||
- | --- | ||
- | |||
- | [ [[note: |