Provocations
- Speculate: What if...
- Simulate: Imagine you...
- Postulate: You think...
- Correlate: What else...
- Emulate: See if you can...
- Calculate: Figure out...
- Articulate: Give words...
- Communicate: Explain...
- Activate: Create an experience...
- Advocate: Argue a side...
- Fabricate: Make a model...
- How would things be different if...
- What are the reasons for...
- Suppose that..
- What is the purpose of...
- What would change if...
Introduction
Building on an existing idea to create something better. Making products do things they were never intended to do. Reverse engineering products to defeat protection and security mechanisms. These types of self-expression can be found throughout recorded history. (http://makezine.com)“Today, because knowledge is available on every Internet-connected device, what you know matters far less than what you can do with what you know. The capacity to innovate — the ability to solve problems creatively or bring new possibilities to life — and skills like critical thinking, communication and collaboration are far more important than academic knowledge." —Tony Wagner , NYT
Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be a hacker you enjoy problem solving, improving your skills, and exercising your intelligence.
The term “Hacker” has a severe PR problem. Mention the word and it conjures up images of an unwashed, unkempt programmer, sitting in a dark room behind a lit screen for days on end, and probably up to no good. But this is far from the whole story.
Hacking, in its purest form, is an egalitarian, collaborative engineering process that breaks down complex systems, examines how they function, and then combines the countless small efforts from a multitude of individuals to improve, augment or repurpose the initial system. We should never have to settle for what we are presented with if it doesn’t meet our needs or values; the ultimate goal of hacking is to modify a system to serve an identified purpose with elegance, efficiency and versatility. This process has been used to create and continually refine many of the most well-loved and thoroughly understood systems we humans take collective pride in: democracy, internal combustion car engines, or the perfectly brewed cup of coffee. While hacking is perceived as inherently anti-authoritarian, most likely because it relies on participation from all points, and does not require or lend itself to executive direction during the process; all participants learn from their own contributions, successes and failures as well as those of others.
This course will unpack this term and examine both well known and unfamiliar examples of hacked discoveries throughout modern history, including Watson and Crick hacking the structure of DNA without doing any original research, for example. There will be a rigorous hands-on component that will comprise the majority of class time, and will take many forms: physical computing, 3D printing, circuitry, manipulating and altering the biology of E. coli, fungal cells or plant systems, baking bread, experimenting with molecular gastronomy, designing card games, writing Wikis, and on and on. We will work on improving/repurposing/reimagining pre-existing things (a recipe, a piece of furniture, a piece of personal electronics, or a morning routine), as well as creating solutions de novo to fulfill personal, community or social needs the class identifies, and share the resulting work with the world. Absolutely no specific skills or knowledge of anything technical is required, but a willingness to try new things, contribute continually on any scale and share ideas constantly are mandatory.
Hacking, in its purest form, is an egalitarian, collaborative engineering process that breaks down complex systems, examines how they function, and then combines the countless small efforts from a multitude of individuals to improve, augment or repurpose the initial system. We should never have to settle for what we are presented with if it doesn’t meet our needs or values; the ultimate goal of hacking is to modify a system to serve an identified purpose with elegance, efficiency and versatility. This process has been used to create and continually refine many of the most well-loved and thoroughly understood systems we humans take collective pride in: democracy, internal combustion car engines, or the perfectly brewed cup of coffee. While hacking is perceived as inherently anti-authoritarian, most likely because it relies on participation from all points, and does not require or lend itself to executive direction during the process; all participants learn from their own contributions, successes and failures as well as those of others.
This course will unpack this term and examine both well known and unfamiliar examples of hacked discoveries throughout modern history, including Watson and Crick hacking the structure of DNA without doing any original research, for example. There will be a rigorous hands-on component that will comprise the majority of class time, and will take many forms: physical computing, 3D printing, circuitry, manipulating and altering the biology of E. coli, fungal cells or plant systems, baking bread, experimenting with molecular gastronomy, designing card games, writing Wikis, and on and on. We will work on improving/repurposing/reimagining pre-existing things (a recipe, a piece of furniture, a piece of personal electronics, or a morning routine), as well as creating solutions de novo to fulfill personal, community or social needs the class identifies, and share the resulting work with the world. Absolutely no specific skills or knowledge of anything technical is required, but a willingness to try new things, contribute continually on any scale and share ideas constantly are mandatory.
Helpful Information
Schedule
1-2 classes | Introduction to Documentation | Pathbrite, Evernote Set up evernote and Pathbrite accounts. Post a profile Rules: Criticism Only call out failure of another if you can help them recognize another perspective, and do this with diplomacy. Look for root causes to characterize the failure instead of assigning blame. |
1 class | Introduction to The Design Process | The Deep Dive
|
1 week | What is Hacking | From On The Media: Hardware Hacking Hire The Hackers Inside the Lair of the Hardware Hacker Senate Advocates The Jargon File The Lost Art of Phone Phreaking Wargames Emmanuel Goldstein Hacker Law Internet Crisis Word Watcher |
1-2 weeks | Introduction / Safety / Basic Electronics / Soldering / Breadboards | Lesson: Basic Electronics Using a Multimeter Electromagnetism Activities:
Collins Ch. 3 and 5 Documenting:
Homework 1: Look up Richard Lerman's miniature instruments made with piezo disks or any other Piezo instrument. Write a description of both the instrument and how it is played. Homework 2: Look up Jérôme Noetinger, Andy Keep, Nathan Davis and describe how they have used magnetic music. Describe your own idea for an electronic instrument. |
2 weeks | Tape Heads |
Tape Head Hack
Be Laurie Anderson for a day. Acquire or remove a tape head from a casette player and connect it to a mini amp.Play back recorded material. Homework: Research Nam June Paik's 1963/2000 "Random Access" magnetic tape piece. Collect at least one image. Describe the piece and the technology involved, then write your thoughts about it and recreate a smaller version. ( Or research Laurie Anderson's Tape Bow Violin (1977). Collect at least one image. Describe the piece and the technology involved, then write your thoughts about it and recreate your own version. Laurie Anderson - Home Of The Brave (1986) FULL 22:12. Documentation: Once you have successfully created your magnetic tape piece, make a short (2 min < 5 min) video documenting your tools, techniques, and outcomes. Upload your video to google video, youtube, or other online resource (TBD) and link to it in your digital portfolio before class time on the due date |
1 week | Circuit Bending |
NAND, Schmitt Triggers and 3D Printing
Design your own simple oscillator. Documentation: Once you have successfully created your hack, make a short (2 min < 5 min) video documenting your tools, techniques, and outcomes. Upload your video to google video, youtube, or other online resource (TBD) and link to it in your digital portfolio before class time on the due date |
1 week | Circuit Bending/Blinky Lights |
A Hex Inverter Audio Oscillator
Design your own audio oscillator. Documentation: Once you have successfully created your hack (whether just the breadboarded circuit or a prototype), make a short (2 min < 5 min) video documenting your tools, techniques, and outcomes. Upload your video to google video, youtube, or other online resource (TBD) and link to it in your digital portfolio before class time on the due date |
2-3 weeks | More Circuit Bending |
A Preamp and a CMOS Hex Inverter and more 3D Printing
Design your own sound generator. Build all the circuits and choose one to create a prototype. Feel free to experiment with components to construct your own circuit. Documentation: Once you have successfully created your hack, make a short (2 min < 5 min) video documenting your tools, techniques, and outcomes. Upload your video to google video, youtube, or other online resource (TBD) and link to it in your digital portfolio before class time on the due date |
1 week | Hardware Hacking Toys |
Reading: Collins Ch. 12 and 13 Using some form of existing electronics, implement a hardware hack that results in audio, visual, physical, or other output. You may replicate ideas presented in Nicolas Collins’ book if you wish, or invent your own. Documentation: Once you have successfully created your hack, make a short (2 min < 5 min) video documenting your tools, techniques, and outcomes. Upload your video to google video, youtube, or other online resource (TBD) and link to it in your digital portfolio before class time on the due date |
1 week | Sensor Instrument |
Arduino, MIDI and GarageBand
Using some form of sensing technology build a versatile sensor instrument. This instrument should include at least one sensing mechanism, a hardware interface to the computer, and software mapping/processing of the sensor data. Aim for interesting relationships between sensed states and resultant outcomes. Be subtle. Make sure that there is a way to control the outcome. Your instrument can be easy to learn, but difficult to master. Documentation Once you have successfully created your sensor instrument, make a short (5 min) video documenting your tools, techniques, and outcomes. Upload your video to google video, youtube, or other online resource (TBD) and link to it in your digital portfolio before class time on the due date. |
1 week | 3D model from your genome | 3dna is a Python script which derives a 3d model suitable for printing from raw genome data avaliable from services such as 23andme. www.gullicksonlaboratories.com Generate a printable 3D model from your genome
|
1 week | Microbes and electricity | MUDWATT™ MFC KIT This device generates low levels of electricity from microbes interacting with soil. Explore the power of microbes with the MudWatt™ Microbial Fuel Cell (MFC) Kit. Fill the kit with soil, along with anything you find in your refrigerator. Within days the attached LED light will start to blink using only the power produced by the electricity-generating microbes in your soil! |
1 week | Microbes and electricity | The EMG SpikerBox kit Learn about muscle physiology through electromyograms (EMGs). You will have an understanding of neuron/muscle communication, and you will listen to the electrical impulses of muscles at rest and during contraction.
|
1 class | Glass recycling | Glass is an easily recyclable material that must be separated and sorted by color for the best quality of final products. In today’s recycling industry, waste materials are separated by hand by workers on a conveyor line. This process could be automated through the use of infrared sensors. Create a circuit that uses an infrared sensor to differentiate the colors of different glass. The outputted values are read through a serial port and can be tagged by color, allowing an apparatus to automatically determine the color of a material. |
1 week | DIY sensing | Spectrometer A spectrometer is a device that breaks light into a spectrum. Every element has an associated spectra. This means that recording of the spectra of different elements can provide a reliable means of identifying elements. If a certain spectrum is similar to the spectrum of a known element, you can reasonably associate that observed element with the known element. A spectrometer is a simple device. It collects light from an object and directs that light onto a diffraction grating or spectrum, which leads light onto mirrors, which directs the light to a charged coupled device (CCD) chip, or a flat surface, which allows the spectrum to be read. The light coming from the object is filtered into a small sliver by a collector. The thin sliver of light hits a prism or defraction grating, which splits the light into spectral lines of color, which represents the object's spectrum.The spectrum is reflected off mirrors until it reaches the chip or flat surface. Spectral lines can be identified by wavelength. Refraction vs DiffractionRefraction is important to the concept of spectrum because the angle of bending is dependent on the color (frequency or wavelength). Since white light (like light from the sun) contains a wide spectrum of colors, you can see light shining through a prism or sun-catcher "split" into a rainbow of colors. The shorter wavelength light (blue, violet and ultraviolet) refracts more than longer wavelength light (yellow, red and infrared) when transitioning from low density (air) to high density (glass).A very thin, flat sheet of material constructed with a set of reflective lines and transparent spaces is called a diffraction grating or phase grating. The result of a ray of white light striking a diffraction grating is similar to the effect of a prism in that they both produce a rainbow spectrum. However, diffraction gratings have the advantage of being physically thin and often inexpensive. In fact, the PublicLab spectrometers use an inner layer of a common DVD disk as a diffraction grating because of the narrow spacing of the DVD "lines" which are imprinted there; designed to store digital data. Diffraction produces a symmetrical pair of spectra plus the original non-diffracted light in the same direction at the source (0-deg). The prism refraction angle is higher for UV light while the diffraction angle is lower for UV light.
Light waves add and cancel from the effect of the lines and spaces of a diffraction grating. The angle of diffraction where the waves add is in direct proportion to the wavelength of the light passing through the spaces.
Parts:
|
IKEA hacking | www.ikeahackers.net /www.apartmenttherapy.com people.ischool.berkeley.edu |
|
1 class | Hacking and Art | http://www.stealthisfilm.com/Part1/
From their origins in the trash room of a non-profit in Manhattan to their emergence as the instigators of an international art movement, Graffiti Research Lab: The Complete First Season documents the adventures of an architect and an engineer who quit their day jobs to develop high-tech tools for the art underground. The film follows the GRL and their network of graffiti artist collaborators (and commercial imitators) across four continents as they write on skyscrapers with lasers, mock advertisers with homemade tools, get in trouble with The Department of Homeland Security and make activism fun again. Primarily using video footage from point-and-shoot digital cameras (“The Pocket School”) and found-content on the web, the movie’s visual style draws as much from the art of the power point presentation and viral media as conventional documentary cinema. Narrated by GRL co-founders, Roth and Powderly, The Complete First Season makes a humorous and insightful argument for free speech in public, open source in pop culture, the hacker spirit in graffiti and not asking for permission in general. The film was premiered at the Sundance Film Festival in 2008. Available 24/7 on The Pirate Bay.GRL Activity:TBD |
Homework | Problem Solving Basics and Computer Programming | |
2 classes | Scratch | |
4 classes | SNAP/BYOB Intro |
|
1 Week | SNAP/BYOB |
|
1-2 weeks | Microcontrollers | Makey Makey Assignment: Documentation: Once you have successfully created your hack, make a short (2 min < 5 min) video documenting your tools, techniques, and outcomes. Upload your video to google video, youtube, or other online resource (TBD) and send the link before class time on the due date Reading: Scratch MaKey MaKey Quick Start Guide |
4 weeks | Lessons:
Activities:
Once you have successfully implemented your sensor, make a short (5min) video documenting your tools, techniques, and outcomes. On a Mac, you may wish to use the application iShowU to collate video of your demonstration with video screen shots of the resultant data, etc. Upload your video to google video, youtube, or other online resource and send the link before class time on the due date. References Mims, Forrest. Electronic Sensor Circuits & Projects. |
|
1 Week | Actuator Instrument |
Assignment Using an interface construct an instrument that acts on the physical world based on computer generated commands. Actuators include motors, stepper motors, solenoids, electromagnets, muscle wire, etc. You may, but need not, incorporate sensors to control the function of the actuators. Documentation Once you have successfully created your actuator instrument, make a short (5min) video documenting your tools, techniques, and outcomes. Upload your video to google video, youtube, or other online resource (TBD) and link to it in your digital portfolio before class time on the due date. |
Hackers |
Reading: Heroes of the Computer Revolution [pp 17-49, 70-90, 102-017, 115-123 Write a response to the reading and post your response on (TBD) | |
Reading: "Secrets of the Little Blue Box" by Ron Rosenbaum http://www.lospadres.info/thorg/lbb.html Crashing the System Hackers [pp. 201-243] a-strange-brew-s-buzz-lingers-in-silicon-valley Write a response to the reading and post your response on (TBD) |
||
Blown to Bits |
Blown To Bits
bitsbook.com/blog/ Chapter 2 describes the various ways in which or personal privacy is compromised by the digital explosion. Metadata in a word document
Take an inventory of your digital footprints and fingerprints.
Digital footprint:
For digital fingerprints, you may not have made a conscious decision to trade-off privacy for any reason. However, now that you are aware of the tradeoffs, list the reason that best fits, or indicate that you plan to change your behavior in the future. Visit this website: www.komar.org/cgi-bin/ip_to_country.pl Explain how the site can determine:
|
|
Blown to Bits (Bits in the Air) | Chapter 8 Blown To Bits |
|
Blown To Bits |
Using three search engines:
Much of the power of search technology to influence users comes from presenting results in an ordered list. Users generally believe that the top links are “better.” There are, however, alternatives to presenting results in a simple list. Take a look at several of the alternatives and share your thoughts and observations. Some examples:
Google tracks everything that everyone queries. Privacy issues aside, the results are fascinating. You can find them at www.google.com/trends. Pick a topic and look at the results. What conclusions do you draw? Include the topic and date and time that you searched. | |
Blown To Bits | SSNs are issued following a structure based upon the state and time of issue. In particular, the first 3 digits are assigned to particular states, and digits 4-5 are issued based on the time of issue.
|
|
Blown To Bits and Encryption | Using the key “HarryLewis” create a Vigenère cipher and encrypt the message: “BlowntoBitsRocks.”
The following cipher text was encrypted using a Vigenère cipher. Decipher it.
GWKLI CICBV WKPTM OBZLH FCDVF PTNFP SOOAT QJBUD IIMLI SKYST WATQV KOOBF HOBNX QEDOS JOSJX LISGK NMTYB WBIFB MGEOM SUQLL SISSO IJMJH SZSMV ATSGO OAXLI SKYST WATQV KOOBF HPSMB CLWPT OXFVZ AOSSB JVZVF JSVPX FWOHH RBBAS TVOZQ MGWER IBJVZ LISZK TBWWD OROJB BKOCK ZPALA CZSSO XKAOQ WZMMM GSSAO NJXJF JSBZB AAOUH RBBTF ZCBOT IRKXF WDFAL AOUGN SIPKP FDRPB HYSOD RTMOW SMHRJ VZAGR WQJBB RFRHR FEHJM RVKTM GGVUV NJADK BBRWF UHJZQ VSQAM GTOJO JBTDM TCBBA EGOUO CDQOA MWNKU QHFDO BUFMI HSCRE DQGYD CAZVB XJTOB NEQLC EFWFF ATFEU ZYCIE UPADE UMKFF HKYSS LUBBA KLMBL BJOSM IUDFH COWMK QXVSB FQGLI SKYST WSMAC CUQGK UOBDM GBFDS BDVZB WTUCX FJRGU VSBTU TQIOJ OEZXS NSRDI MLWUV WXHAV GVZRR BXIWO WBEUW IABBT KOBTK JSGYS QGFJU VDNIK WTPID OWPAU QOXII IHFBO XEQLT FUWXO QGYUC VKQXX FSWUR UVHOH CJOSV FWOHG KOLMZ FCHRF ZBFTH WDVBB GOGCP ICFSO GCMJM MAFGO BFLXU JRWXH EASUI GOUWF SLSCP UPBKQ CHOOB BSMSJ OSGHF FBSOE AMGLB CGXPT LJGQR BVZAO UWXUP XOPFZ NBATJ FGIVU WYLIW GOYXE GTWCX PNWAH WHKMQ GXPFA KUQHF FJSBZ WGWTV CEMLD FPKKR BBWWD WGSPV LSSSP OJVZE BRSDI IMOJZ ZKGNX UUHVO JZEAW SGDIM EAWSG YGBAW JFQRJ TWJFB OXEOK SORQR JTWJF BOXEM OWSMC XFEAG DCAOT IYLFF The ciphertext above is quite long making it easier to break. Why is that so? What would happen if the text were exactly the same length as the key? Complete the following exercise: Suppose g=43, p = 19 . If your “secret code” is 17, using the Diffie-Hellman key exchange protocol,
| |
Blown To Bits | Write about some aspect of society, industry, the arts, education, etc., that is being transformed by the information revolution. Your topic should be on something that is being done differently today than it was five years ago or that will be different five years from now. Keep the ideas small, don't write about college admissions, but maybe “How the availability of statistical data on high school sports players might affect college recruitment”
| |
1 week | IFTTT |
|
2 weeks | Electric Imp |
|
4-5 weeks | Raspberry Pis |
|
Documentation | Evernote, Blogger, Google Sites |
Electronics / Soldering / Breadboards | Electromagnetism, Reading Schematics |
Opening something up | Tape recorders |
Circuit Bending |
NAND, Schmitt Triggers and 3D Printing A Hex Inverter Audio Oscillator A Preamp and a CMOS Hex Inverter and more 3D Printing |
Programming | Scratch, SNAP, Makey Makey |
Microcontrollers | Arduino |
Microbes and electricity | MUDWATT™ MFC KIT The EMG SpikerBox kit |
Color Sensing | Arduino Spectrometer |
genome | 3dna is a Python script which derives a 3d model suitable for printing from raw genome data avaliable from services such as 23andme. |
IKEA hacking | www.ikeahackers.net /www.apartmenttherapy.com people.ischool.berkeley.edu |
IFTTT |
|
Electric Imp, Spark Core, Arduino, Raspberry Pi | |
Design Thinking | Introduction to The Design Process:The Deep Dive. Write a blog post about how one might combine hacking with the design process. Stanford D. school: The Gift-Giving Project Wallet Project Solving our own problem: Unattended backpacks |
Bio Hacking | Synthetic Bio lab with genomikon kit |
Wireless Rube Goldberg | Build a wireless Rube Goldberg machine that travels across neighborhoods |