View allAll Photos Tagged socialhacking
Check out Renewin' Strathewen
Now published at seldomlogical.com/2009/09/12/a-benevolent-social-hack
Updated link to original statement by PM.
A benevolent social hack
Today I witnessed a social hack by a UK hacker who in the space of a month turned around 60 years of history. What did it take? A simple idea, a measure of determination some imagination and a bit of luck. What did he achieve? He persuaded the government of the United Kingdom with the help of fellow citizens, to acknowledge the maltreatment of a fellow citizen. But this was no ordinary citizen.
What is a Hacker?
You might have heard of Hackers in the media. [0] Those pesky 12 year-old boys and their computers at it again. Breaking into Government computers and causing millions of dollars damage. If you listen to the media, Hackers are also responsible for numerous other electronic sins when the most likely explanation is probably a poor choice of operating system. [1] Hackers have something of an image problem. In fact the term Hacker has been hijacked and misused. It used to mean a person who playfully enjoyed puzzles, reveled in understanding complicated technology by gaining access to machinery they had no permission to access. Hackers tend to be benevolent. Less interested in exploiting for gain [2], more interested in mastery and exploits to show amongst their friends. [3]
Instead, the media cottoned onto the term Hackers to describe malevolent behaviour and the broken understanding has persisted ever since. [4] So Instead of using the correct technical term Cracker, the term Hacker has now become synonymous with bad. Here is a simple way to correct this. Whenever you hear the term Hacker in the media, ask yourself is the behaviour benevolent or malevolent? If it's malevolent substitute Hacker for Cracker. If the behaviour is benevolent you are getting a definition closer to the original idea describing a Hacker. So to summarise, Hackers are curious and benevolent by nature. The alike understanding the complex and enjoy creating new things, especially technology. [5]
What is a "social hack"?.
What is a social hack?
Just as Hackers enjoy breaking and rebuilding technology, sometimes malevolent Hackers, Crackers try to re-engineer people. The intent is sometimes playful but the most reported reason is to gain access to information for misuse [6] by exploiting the cognitive biases of humans. [7] I can only think of a few instances of social hacks being done for good instead of evil. [8] But today I witnessed a benevolent social hack. And a big one at that. Now I have an example that probably best illustrates the benevolence of Hackers and what exactly a good "social hack" is. But first a bit of technology history.
A bit of history
If there is a birthplace of modern hackers you might be tempted to think MIT. [9] But you'd be wrong. Modern computer technology has it's birthplace in the United Kingdom. First there was Charles Babbage. Babbage created a mechanical calculating device and with the help of another Ada Lovelace between them the became the original, hardware/software team. [10] Babbage and Lovelace might have supplied the early inspiration but it took the Second World War, another 83 years [11] to encourage the theoretical framework and a complete working example of what we now know as Computers to exist. And at the centre of all this was one man, Alan Mathison Turing. [12]
Turing is the original Hacker, a mathematician, code breaker and computer scientist. Turing had a measurable effect on the infant science of computers with the creation of the
Turing machine" [13] and the thought experiment, "Intelligent Machinery". [14] Turing also designed machines, part electrical, part mechanical to crack the German Enigma and numerous other algorthyms to help crack encrypted messages vital for the German war machine.[15] In the mid to late 1940's, Turing continued to apply himself to the big problem of the time, outlined in "Computing Machinery and Intelligence" [16], software for the Manchester Mark 1 [17] and developed the "Turing Test" [18] as a means to test if a machine is in fact intelligent.
What is a social hack again?
Enough of the history, lets get back to social hacks. Turing was clearly a man of his time able to influence the future course of computer technology for a better world. But Turing was also a man born into the wrong time. Turing's crime was his sexuality. In a time where sexual orientation was not a choice but the law, Turing was persecuted. Turing was also subject to unethical medical procedures by the UK Government. The same Allied government who turned to ordinary people like Turing to help to defeat Nazi Germany. To defeat the Nazi regime and put a stop to the extermination of Jews, Gypsies, homosexuals and anyone else who didn't fit into the master plan.
So the idea behind a social hack is to somehow change the way people behave, perceive or do things through some mechanism. A social hack is much harder to achieve than a playing around with technology. A social hack relies on being able to persuade other people to do something they might not have thought of, want to do or imagined possible. A good social hack is done, for a greater good. A good social hack improves some aspect of society without personal gain.
A social hack howto
Almost a month ago a UK Hacker and nerd, John Graham-Cumming, wrote about [19] a petition [20] he was forming to get the UK Government to apologise formally to Alan Turing for the treatment he received at their hand. Well almost a month later after many emails, blog posts, twits later, John has got the Prime Minister, Gordon Brown on behalf of the government of United Kingdom to publicly apologise to Alan Turing, his treatment and formally recognise the importance of Alan Turing's technical and scientific application to the war effort. [21] And the contribution he made to science and technology in general. Probably the most rewarding part was also the discovery of members of Turing's existing family who now get some closure. In 2012 it will be the centenary of the birth of Turing London on June 23. [22] For nerds and people who work in computing, the Turing year is going to be big. Maybe not as big as Y2K, but big enough.
So thanks John for this benevolent "social hack". A reminder that Hackers do good things. A reminder that in a just society, people and Hackers alike should be judged by their achievements and not their race, religion, sex or orientation.
Reference
[0] Bruce Stirling, "The Hacker Crackdown",
[Accessed Friday, 11th September 2009]
www.mit.edu/hacker/hacker.html
[1] Wikipedia, "Storm botnet: In 2007 a Storm botnet controlled by criminal gangs estimated to total between 150,000 to 1 million PC's to enable a distributed denial of service attack. It was reported that up to 80% of the machines involved used Microsoft Windows operating system."
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Storm_botnet
[2] It has been known for Hackers have exploited their knowledge to gain access and excessive CPU access and I suspect the fascination for lock picking probably has a very practical reason behind it. Historically this was a necessity as access to precious processing time was limited. Limited enough to hack a solution. You can read more about early Hackers here by "Eric Steven Raymond", "A Brief History of Hackerdom",
[Accessed Friday, 11th September 2009]
www.catb.org/~esr/writings/cathedral-bazaar/hacker-histor...
[3] Woz.org, Steve Wozniak, "Letters-General Questions Answered (Woz on hacking)",
[Accessed Friday, 11th September 2009]
www.woz.org/letters/general/59.html
[4] The confusion between Hackers and Crackers means to use the word Hacker means Bad to most people.
[5] catb.org, Eric Steven Raymond, "The basic difference is this: hackers build things, crackers break them."
[Accessed Friday, 11th September 2009]
catb.org/~esr/faqs/hacker-howto.html#what_is
[6] Scientific American, Herbert H. Thompson, "How I Stole Someone's Identity",
[Accessed Friday, 11th September 2009]
www.scientificamerican.com/article.cfm?id=anatomy-of-a-so...
[7] Wikipedia, "A cognitive biases is a hickup in rational thought that can be used by Crackers to socially engineer a human for malevolhttp://www.computer50.org/mark1/MM1.htmlent (bad) reasons.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/List_of_cognitive_biases
[8] Dashes.com, Anil Dash, "Bill Gates and the Greatest Tech Hack Ever" I have a bit of trouble with this one but it's worth looking at despite the involvement of Microsoft.
[Accessed Friday, 11th September 2009]
dashes.com/anil/2008/06/bill-gates-and-the-http://www.cs....
[9] mitadmissions.org, Michael Snively, "Hacking/Snively's Blog: If you've never seen "Hackers" then you're depriving yourself and should make a point of getting on that train.* I get asked about hacking at MIT a lot, which is natural;"
[Accessed Friday, 11th September 2009]
www.mitadmissions.org/topics/life/hacks_traditions/hackin...
[10] Wikipedia, Ada Lovelace, "She is mainly known for having written a description of Charles Babbage's early mechanical general-purpose computer, the analytical engine. She is today appreciated as the "first programmer" since she was writing programs—that is, encoding an algorithm in a form to be processed by a machine—for a machine that Babbage had not yet built.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Ada_Lovelace
[11] computerhistory.org, Charles Babbage, "1849 is the year Babbage is reported to have created a version of his analytical machine."
[Accessed Friday, 11th September 2009]
www.computerhistory.org/babbage/ number10.gov.uk
[12] alanturing.net, "Born 23 June 1912 in London, died 7 June 1954 in Cheshire, United Kingdom. Computer scientist, mathematician and cryptographer.",
[Accessed Friday, 11th September 2009]
[13] Wikipedia, "Turing machine",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Turing_machine#Informal_description
[14] Wikipedia, "Computing Machinery and Intelligence. A paper written in 1950 for 'Mind' in which Turing discusses artificial intelligence, proposes the 'Turing test' of intelligence and asks important questions such as, 'can machines think?'",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Computing_Machinery_and_Intelligence\
[15] Wikipedia, "Cryptanalysis: Where Turing works at Bletchley Park during the Second World War in order to crack German cryptographic cyphers. "
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Cryptanalysis
[16] abelard.org, A. M. Turing, "Computing machinery and intelligence"
[Accessed Friday, 11th September 2009]
www.abelard.org/turpap/turpap.php
[17] computer50.org, "Manchester Mark 1: By April 1949 was generally available for computation in scientific research in the University. With the integration of a high speed magnetic drum by the Autumn (the ancestor of today's disc) this was the first machine with a fast electronic and magnetic two-level store. It in turn was the basis of the first commercially available computer, the Ferranti Mark 1, the first machine off the production line being delivered in February 1951."
[Accessed Friday, 11th September 2009]
www.computer50.org/mark1/MM1.html22
[18] Wikipedia, "Turing test"
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Early_computers_and_the...
[19] jgc.org, John Graham-Cumming<, "Alan Turing deserves an apology from the British Government ",
[Accessed Friday, 11th September 2009]
www.jgc.org/blog/2009/06/alan-turing-deserves-apology-fro...
[20] number10.gov.uk, John Graham-Cumming, "number10.gov.uk: E-Petitions: Submitted by John Graham-Cumming – Deadline to sign up by: 20 January 2010 – Signatures: 31,172"
[Accessed Friday, 11th September 2009]
petitions.number10.gov.uk/turing/
[21] number10.gov.uk, "Treatment of Alan Turing was 'appalling'"
[Accessed Friday, 11th September 2009]
[22] cs.swan.ac.uk, "THE ALAN TURING YEAR",
[Accessed Friday, 11th September 2009]
next >>>
artist in the DC area has been placing fake legs in interesting places. This time he struck outside the North Farragut Metro station.
artist in the DC area has been placing fake legs in interesting places. This time he struck outside the North Farragut Metro station.
A Guide to Dark Web #analytics #bergieweb #bigdata #charterweb #commonweb #darkweb #datamining #deepweb #DigitalMedia #hacking #marianasweb #socialhacking #surfaceweb fedotov.co/guide-dark-web/
"This new Cyber info war will be faught by mercenary social engineers with technical acumen and who have fully embraced their inner #sociopath." - James Scott
#narcissist #psychopath #humanhacker #SocialEngineering #socialhacking #security #rootsector #redistribute
Never give up! (Video) And here's best motivation I've seen so far... This Bear Cub is Proof You Should Never Give Up (Video) #motivation #socialhacking fedotov.co/never-give-up/
this is my favourite pedbar sticker, the rest are at www.pedbar.com.
the idea is to print them out and stick them on unsuspecting Urban Assault Vehicles.
#vagoids #hackermeeting 💻 #MOCA #2004 #metroolografix 👹 #hacking #cyberpunk sal@keybit.net hal@keybit.net vic@keybit.net #hackingsociale 🎥#elettritv💻📲 #cybernetica #freesoftware 📉 📈#ubuntu #musicaorginale #socialhacking #softwarelibero 🐂 #gnuisnotunix #webtvmusicale #punk #rock 🔊 #music #sottosuolo #webtv #underground 🌊 #pescara #adriatico #italy #tibervalley #italia 📷 di #elettritv ]; )::\⚡/>> vagoids.keybit.net/elettrisonanti