**This is an old revision of the document!**
it seems to me sometimes I've entered some inverted zone, some mirror world where the dorkiest shit in the world is completely dominant. The world has dorkified itself.—Mercer in Dave Eggers, The Circle (2013)
What is this course about?
Are we all hackers now? This course chronicles the story of a kind of identity that began among geeky tinkerers and a murky criminal underground, only to be adopted by management consultants and CEOs. How has hacker culture helped form our technological lives? Do hacker formations like Wikileaks, Anonymous, and open-source software represent a new kind of politics, or a rejection of politics as we know it? We will explore the contested figure of the hacker in the past, present, and science-fiction of the internet.
This course includes assigned texts, class discussions, guest speakers, and a significant component of hands-on practice. All levels of technological prowess are welcome, but expect to learn some skills and to help teach others. Hacker culture is not a spectator sport.
- Gain familiarity with the varieties of meaning and mystique surrounding hacker culture
- Acquire some hacker skills and the confidence to acquire more independently
- Apply lessons from and against hacker cultures in entrepreneurial practice
What are the expectations?
Basically, students are expected to hack it. This can take different forms for different people. We'll work together to make the expectations clear, and then it's up to you how and to what degree you'd like to meet them.
We will use two platforms to carry out our work for the course:
Objective 0: Contribute
Students are responsible for contributing to both meatspace and virtual discussions. No attendance will be taken in class. However, showing up and participating in all scheduled meetings will help you get the most you can out of the course, and absence is not particularly compatible with participation. Most weeks will follow a common pattern:
- The first meeting, plan to have completed the assigned texts for in-class discussion. Be ready to raise insights and questions from the texts. If we have a guest speaker, be prepared to ask excellent questions. Annotations on the texts are due at this time. One strategy is to take great notes on Hypothesis, print them out from your profile page, and bring them to class.
- The second meeting, be ready for a more practice-oriented DiscoTech. Plan to have done some preparatory work on that week's Exploit—the skill we'll be learning together. We'll share our ideas, however preliminary, and we'll work on them in class, so plan to have a screen device with you.
Objective 1: Hack
Each week, each student should contribute an Exploit—a hack that addresses the week's topic in a creative way, reflecting technical ingenuity (though not necessarily expertise) and engagement with the week's texts. Exploits are due in Canvas by sunrise on Saturday morning.
Each Exploit should include a README text that explains the nature and rationale of the hack, referencing relevant assigned texts. You may add supplementary files (code, screenshots, videos, etc.) in any open format you like. But the README text should include a full explanation and rationale. Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Also: do not break the law.
Objective 2: Teach
We learn from each other. Each week, usually during the second meeting, a group of students will present to the class about a hacker skill related to that week's topic and Exploit assignment. This presentation will generally precede the week's DiscoTech, so aim to offer something useful—a skill that fellow students may or may not choose to use as part of their own Exploits. Each presentation should be no more than 10 minutes long, with slides and/or a live demo. Slides should be turned in on Canvas before the class period of the presentation begins.
Following the presentation, student presenters will lead the DiscoTech, using whatever format they like to invite participation, collaboration, and sharing of ideas.
Objective 3: Master
Become a goon. The final project for this course is to write an illustrated, 1,800-to-2,000-word report on a real-world hack for a relevant establishmentarian organization. If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance, and a recommendation for what your organization should do about it.
The final product itself should be a convincing hoax in the voice and visual character of the organization it supposedly represents. For examples of what this could look like, peruse Imperva's Hacker Intelligence Reports or Wired's Hack Briefs.
This project includes a built-in debugging and revision process.
Grades are not especially conducive to hacking, but we need some equivalent in order for this course to be legible to the university. Therefore, work will be rewarded with bounties. These are functionally the same as grades, but perhaps giving them a different name will prevent them from killing the learning process in the way that grades normally do. The maximum bounty awarded for each portion of the course is as follows:
- Objective 0: 25 points
- impressive listening and contributions in class discussion (10 points)
- impressive critical thinking and prolificacy in online annotations (10 points)
- geeky enthusiasm in both (5 points)
- Objective 1: 30 points
- clear explanation along with supporting files in open formats
- adventuresome and rigorous thinking
- creative implementation and stretching of skills
- sophisticated engagement with at least one of the module's assigned texts
- Objective 2: 20 points
- accessible and fun introduction to a skill and its significance (5 points)
- how others can go about learning it—what basic steps, what resources? (5 points)
- cultural context and history that surrounds it, relation to hacker culture (5 points)
- well-planned, effective DiscoTech facilitation (5 points)
- Objective 3: 25 points
- project proposal (2 points)
- complete beta version (5 points)
- participation in debugging with substantive comments (5 points)
- revised final (15 points)
- 1,800-to-2,000-word length with correct grammar, correct spelling, coherence
- comprehension of the hack and convincing, accessible analysis of it
- voice and layout in character with instructive illustrations
- impressive and documented research with both scholarly and primary sources
- appropriate references to at least three assigned texts
Bounties will be compiled in (more or less) real time on Canvas for easy access. The final grade will be calculated by adding up the bounties each student has earned. Based on the stated bounty structure, grades will be awarded as follows: A (94-100), A- (90-93), B+ (87-89), B (83-86), B- (80-82), C+ (77-79), C (73-76), C- (70-72), D+ (67-69), D (63-66), D- (60-62), F (0-59).
Terms and conditions
- This syllabus is a living document and may be revised by consent of a quorum of all present at any given class time. The current, binding form will be maintained on Canvas.
- When problems arise, we will seek to address them collaboratively—first through dialogue, then through revision of this document, and only if those are inadequate through recourse to outside authorities.
- We respect one another's privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission.
- Use of laptops and other screen devices is not permitted in class, except during DiscoTech sessions or for purposes of accessibility. Such devices are highly likely to interfere with your learning experience and that of students around you. Most class discussions, unless otherwise stated, neither require nor will be improved by them.
- We adhere to basic university policies regarding accessibility and academic integrity; we take responsibility for understanding them and the relevant procedures. Verbum sat sapienti est.
All due dates are at 2 p.m. Mountain Time.
- Project proposal due: April 3
- Project beta version due: April 19
- Debugging comments due: April 24
- Final project due: May 3
What topics will be covered?
- Steven Levy, Hackers: Heroes of the Computer Revolution chapters 1 and 2 (1984)
- Stewart Brand, “'Keep Designing': How the Information Economy is being created and shaped by the Hacker Ethic”, Whole Earth Magazine (May 1985); too bad the first letter of every line is missing
- For context, read the section on Stewart Brand here: Fred Turner and Christine Larson, “Network Celebrity: Entrepreneurship and the New Public Intellectuals,” Public Culture 27, no. 1 (2015)
- Robert Graham, “No, 'Hacker' Really Does Mean 'Hacker',” Errata Security (August 8, 2012)
Exploit: How are you already a hacker? The word hacker can mean a lot of things. Although it has tended to be associated with certain breeds of techies, let's use it capaciously to help introduce ourselves to each other. How have you tinkered or tweaked in your life? How have you broken in, broken out, or revealed something that was supposed to be hidden? Review the Urban Dictionary definitions, find yourself in there, and tell us about it.
- Eric Steven Raymond, “How to Become a Hacker” (2001-2015)
- Shawna Scott, “The Code School-Industrial Complex,” Model View Culture (January 21, 2015)
- Paul Ford, “What Is Code?” Businessweek (June 11, 2015)
- How to DiscoTech Detroit Digital Justice Coalition 4 (2012)
- Sarabeth Berk et al., Future-casting CU Boulder as the First Public University that Hacks the Academy, CU Boulder Academic Futures Whitepaper (December 2017)
- The Mentor, “The Conscience of a Hacker (aka Hacker Manifesto),” Phrack 1, no. 7 (1986)
- Paul Graham, “Hackers and Painters” (May 2003)
- Also, don't miss: Hrag Vartanian, “Putin Says Hackers Are Like Artists 'Who Wake Up in the Morning in a Good Mood and Start Painting',” Hyperallergic (June 1,2017)
- Gabriella Coleman, “The Craft and Craftiness of Hacking,” in Coding Freedom: The Ethics and Aesthetics of Hacking (Princeton University Press, 2013)
- Tsutomu Shimomura, “Catching Kevin,” Wired (February 1, 1996)
- Jay Kirby and Lori Emerson, “As If, or, Using Media Archaeology to Reimagine Past, Present, and Future: An Interview with Lori Emerson,” International Journal of Communication 10 (June 2016)
Exploit: Do something worthwhile with an old machine. Dig up an old, obsolete machine and have fun with it. What's lying around your house or our campus collecting dust? What neat software have most people forgotten about? What can it do that a fancy smartphone can't? Pay a visit to the Media Archaeology Lab on campus and play around. Show us what you can do with a neglected tool.
- Ron Rosenbaum, “Secrets of the Little Blue Box,” Esquire (October 1971)
- Gabriella Coleman, “The Tale of Two Legal Regimes” in Coding Freedom: The Ethics and Aesthetics of Hacking (Princeton University Press, 2013)
- Jim Hamerly and Tom Paquin with Susan Walton, “Freeing the Source: The Story of Mozilla,” in Open Sources: Voices from the Open Source Revolution, Chris DiBona, Sam Ockman and Mark Stone, eds. (O'Reilly, 1999)
- Lawrence Lessig, “\<free_culture\>,” O.Reilly Open Source Conference (July 24, 2002)—watch Flash presentation if you can
Exploit: Set a valuable piece of information free. Lots of data and knowledge are caught up in places that aren't accessible—in offline archives, behind paywalls or private intranets, trapped in someone's mind. Following the hacker dictum “information wants to be free,” let something loose in a way that will facilitate its flow. Post it online in an appropriate spot, or share it with those who will, or find a liberating offline place for it, like a flyer or a megaphone. Be sure to explain what makes the information valuable and how what you do with it is meaningfully liberating.
- William E. Scheuerman, “Digital Disobedience and the Law,” New Political Science 38, no. 3 (2016)
- Dymitri Kliener, The Telekommunist Manifesto (Network Notebooks, 2010), pp. 20-25, 33-43
- Part One in Trebor Scholz and Nathan Schneider (eds.), Ours to Hack and to Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet (OR Books, 2016)
- Explore The Internet of Ownership
And watch one of the following films:
- Citizenfour, directed by Laura Poitras (2014)
- The Internet's Own Boy: The Story of Aaron Swartz, directed by Brian Knappenberger (2014)
Exploit: Devise a clever license or corporate structure. Following in the tradition of legal hacks, from Richard Stallman's GNU Manifesto to Dymitri Kleiner's copyleft license, develop a hack of your own. What would you love to be able to do that current IP or corporate structrues tend not to allow? How can you tweak them? Like the Green Bay Packers, you could imagine a company that has to give everything to charity if it ever sells out. Or a copyright notice that empowers some colors of cats but not others. Do your best to make to both radically impactful and actually enforceable.
- Jeremy Adam Smith, “How to Design the Commons (or, Elinor Ostrom Explained!),” Shareable (December 10, 2009)
- Eric Steven Raymond, “How To Ask Questions The Smart Way” (2001-2014)
- A sort-of reply: Julia Evans, “How to Ask Good Questions” (December 31, 2016)
- Roger Hodge, “First, Let's Get Rid of All the Bosses,” The New Republic (October 4, 2015)
- Coraline Ada Ehmke, “The Dehumanizing Myth of Meritocracy,” Model View Culture (May 19, 2015)
Exploit: Submit a bug report or feature request to an open-source project. Critical to any open-source project is the participation of the community. For those of us who are not amazing software engineers, one of the best (and most rewarding) ways of participating is through feedback. Identify which software that you use is open-source—Canvas and Hypothesis are a start—and try to find where the developers communicate with users. (It's usually in the Issues section of the project's GitHub page.) Write to them with a bug you've noticed or a feature you'd like to see. Keep in mind Raymond's essay on questions to help ensure your recommendation is usefully phrased and well researched.
- Gabriella Coleman, “Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle,” in The Social Media Reader (New York University Press, 2012)
- Donna Haraway, “A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century,” in Simians, Cyborgs and Women: The Reinvention of Nature (Routledge, 1991)
- Lisa Nakamura, “Race in/for Cyberspace: Identity Tourism and Racial Passing on the Internet,” in Works and Days 13 (1995)
- Leonie Maria Tanczer, “Hacktivism and the Male-Only Stereotype,” New Media & Society 18, no. 8 (2016)
Exploit: Create an identity. Who you appear to be can change what you can do. Try on a new online mask—on a social network, for instance, or across a few. Form a profile, take on a character, and see what happens. What can you do that you might not otherwise try?
- We Are Legion: The Story of the Hacktivists, directed by Brian Knappenberger (2012)
- J. Nathan Matias, “The Real Name Fallacy,” The Coral Project (January 5, 2017)
- LA Crypto Crew, “How to Become Anonymous Online,” Hyperallergic (December 2, 2016)
- Erika Eichelberger, “What I Learned Hanging Out With Nigerian Email Scammers,” Mother Jones (March 20, 2014)
Exploit: Get someone who doesn't know who you are to do something worthwhile. Use your identity created in the previous module, or try another, or use no identity at all. This can be online, over various kinds of networks, or in meatspace. Take a stranger to lunch, or get a stranger to send you a dollar. Make a friend, or not. But exercise your capacity to influence the world without doing it as you.
- Andrea Peterson, “Everything You Need to Know about Encryption: Hint, You're Already Using It,” The Washington Post (December 8, 2015)
- Andy Greenberg, “Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us,” Wired (July 31, 2016)
- Priyanka Kaura, “Imagine Otherwise: Simone Browne on Resisting Surveillance & Creative Collaborations,” Imagine Otherwise (May 4, 2016)
- Dan Geer, “Prediction and The Future of Cybersecurity” (October 5, 2016)
Exploit: Audit your communication practices and identify improvements. Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some research about the nature of potential threats and how they might be mitigated. Check out software listed at PRISM Break, if the dangers are digital. Try out a few patches, and determine whether they're worth the trouble.
- Lori Emerson, “Making the Invisible Visible: Hacking, Glitch, Defamiliarization in Digital Literature,” in Reading Writing Interfaces: From the Digital to the Bookbound (University of Minnesota Press, 2014)
- Antti Silvast and Markku Reun, “Multiple Users, Diverse Users: Appropriation of Personal Computers by Demoscene Hackers,” in Hacking Europe: From Computer Cultures to Demoscenes, G. Alberts and R. Oldenziel, eds. (Springer, 2014)
- Casey Fiesler, “An Archive of Their Own: A Case Study of Feminist HCI and Values in Design,” CHI'2016 (May 7-12, 2016)
- “Shenzhen: The Silicon Valley of Hardware,” Wired (2016)
Exploit: Make a remix. Take something out there and turn it into something else. Mash up music or video into something surprising, or rewrite a book. Make some fan-fiction. Save a website's HTML code to your computer and mess with it. Explore the possibilities of free culture, or what culture would be like if it were really free. Show us what you can come up with.
- Satoshi Nakamoto, “Bitcoin open source implementation of P2P currency,” P2P Foundation Ning (February 11, 2009)
- Nathan Schneider, “After the Bitcoin Gold Rush,” The New Republic (February 24, 2015)
- Meghan, “Bitcoin Doesn't Need Women,” Bitcoin Not Bombs (January 8, 2014)
- Matthew Leising, “The Ether Thief,” Bloomberg (June 13, 2017)
- Nathan Schneider, “Why the Tech Elite Is Getting Behind Universal Basic Income,” Vice (January 6, 2015)
- If you like, some related fiction: “Read the Into the Black Contest's Winning Story, Set in a Future Where Economics Are Also Humane,” io9 (January 24, 2018)
Exploit: Get some of a crypto-asset and conduct transactions. One way or another—from an exchange, or a friend, or a classmate—obtain some quantity of a Bitcoin-like asset and carry out a transaction or two or more. If you can do something useful with it, all the better. Share a record of the transaction on the appropriate blockchain. Consider popular online wallets like Blockchain.info and Coinbase, or something else. Probably avoid “core” wallets because they could download several gigs of data to your hard drive before they can even get started.
- Mattathias Schwartz, “Cyberwar for Sale,” The New York Times Magazine (January 4, 2017)
- Sophie Toupin, “Gesturing Towards 'Anti-Colonial Hacking' and Its Infrastructure,” Journal of Peer Production 9 (2016)
- Christian Blum and Christina Isabel Zuber, “Liquid Democracy: Potentials, Problems, and Perspectives,” Journal of Political Philosophy 24, no. 2 (2016)
- Nathan Heller, “Estonia, the Digital Republic,” The New Yorker (December 18–25, 2017)
Exploit: Devise a tool that disrupts a gatekeeper. What is in the way of something worth doing? What systems do you encounter that are needlessly cumbersome or inefficient? Who is leeching profits without contributing any useful value? Come up with an idea—you don't have to implement it, especially if it's risky—that would clear the way. Bypass a government or skirt around a middleman. Get the goods.
- Mark Zuckerberg, “The Hacker Way,” Wired (February 1, 2012)
- Brett Scott, “The Hacker Hacked,” Aeon (August 10, 2015)
- Virginia Heffernan, “Now That Tech Runs the World, Let's Retire the Hacker Ideal,” Wired (January 31, 2018)
- “Don't Be Evil: Fred Turner on Utopias, Frontiers, and Brogrammers,” Logic 3 (2017)
Exploit: Co-opt something. Notice something that is fresh, original, grassroots, and authentic, and devise a plan for transforming it into something palatable and safe for a dominant class, especially if it's profitable. Entice some of the originators to sell out. Reflect on what doing that feels like, and consider what the consequences might be for the originating communities.
Debug the final project with peers and conclude the course.