Homework for week 3:
-
Readings:
- “Of Secret Codes, Abbreviations, and Knowledge Lost and Gained” http://blog.thehenryford.org/2009/05/27/of-secret-codes-abbreviations-and-knowledge-lost-and-gained/
- RNC 2004 in 160 Characters – http://www.scribd.com/doc/5403691/RNC04-in-160-Character-Bytes
- TXTmob: Text Messaging For Protest Swarms http://web.media.mit.edu/~tad/pub/txtmob_chi05.pdf
- MobileActive: Mobile Apps for Data Collection: http://mobileactive.org/wiki/Mobile_Applications_for_Data_Collection
-
Tasks
-
Listen to an online police or fire scanner stream for two hours and document what you hear. Specifically listen for codes, protocol and other methods of communicating complex information. Blog your report and post the link as a comment to this blog.
Online scanner links: http://melsgarage.com/, http://www.police-scanner.info/live-police-scanners.htm, http://www.scannermaster.com/Online_Scanners_s/197.htm - Invent your own spoken, typed or visual image code, along with a reason for its use, that could be communicated through a mobile device using texting, image sharing, bluetooth or any other aspect of the mobile device. Document this code, post it to your blog, and share a sample of it via 41411/ITP2800, on Twitter #itp2800 or another mobile medium of your choice.
- Come up with a list of at least three real world organizations, communities or specific people that will benefit or may want to collaborate with you on your proposed cause. IDENTIFY a contact point within at least one of these groups and call or email them to begin a conversation about your idea. If they don’t respond immediately that is fine, but you must take the first step in communicating what you plan to do
-
Listen to an online police or fire scanner stream for two hours and document what you hear. Specifically listen for codes, protocol and other methods of communicating complex information. Blog your report and post the link as a comment to this blog.
Here’s what we talked about in class:
I announced my work in porting the Tor Project to Android. Tor is an “onion router” web proxy that allows web surfers in places like Iran and China get free, anonymous access to the web. Having secure, anonymous browsing that can route around censorship is a critical component of my Guardian secure smartphone project.
The story of Alan Turing and his impact on computing came up briefly and I just wanted to make sure everyone knew the amazing yet tragic story of his life. Just recently, an online, crowd-sourced petition effort pressured the British Government to issue a formal apology for causing his suicide, and countless others who were persecuted for their sexuality.
At some point in class, I drew a diagram that I quite enjoyed sharing, and will attempt to recreate here, since I unfortunately didn’t get a photo or capture it using the smart board. The drawing below is an attempt to demonstrate the various layers of network communication layers, both the physical medium and the amount of government/state and corporate control at each layer. Ultimately, the best opportunities for using networks with less control lie at the LAN layer and the Global layer…. though there are opportunities and technologies at all layers.
I also realized that I hadn’t given the class a background on myself, and decided to share a talk I had recently given at Parsons on my life and work. The presentation tells my story through the various computing hardware and devices I’ve owned, used, hacked and programmed in my life. Notice that the devices get smaller, more powerful and more connected over time. The slides are posted below, and then a video from the talk I gave at Parsons is below that.
the audio starts after a minute or so…
Finally, we reviewed week 2 homework, specifically “mobile videos shot under duress” and the first draft of proposals for the cause they’d like to work on and the technology they plan to use.
You can search #itp2800 on Twitter and ITP2800 on Delicious to see links to some of the homework.
That’s all for week 3…. leave a comment here if you have any questions or feedback.
I was actually introduced to Alan Turing and his life's work through Neal Stephenson's Cryptonomicon. It's an awesome book and although it's fiction, it still draws on many real historical people and events. To people in the class that haven't read it, I highly recommend!
I was actually introduced to Alan Turing and his life's work through Neal Stephenson's Cryptonomicon. It's an awesome book and although it's fiction, it still draws on many real historical people and events. To people in the class that haven't read it, I highly recommend!
My scanner blog post can be found here: http://uhrblogger.com/mobile-activism/fdny-scan…
My code post can be found here: http://uhrblogger.com/mobile-activism/stegatweet/
I listened to a police scanner and also heard that weird Morse Code beeping, but I thought it was a printer or something.
Here's my scanner post: http://antoniusitp2800.tumblr.com/post/19920583…
I listened to a police scanner and also heard that weird Morse Code beeping, but I thought it was a printer or something.
Here's my scanner post: http://antoniusitp2800.tumblr.com/post/19920583…
I asked in class if anyone had read Cryptonomicon and no one had. Glad to know there is at least one!
I asked in class if anyone had read Cryptonomicon and no one had. Glad to know there is at least one!
Short code assignment here: http://blog.jasonrosado.com/?p=177
Scanner assignment: tbd
— Jason Rosado
Short code assignment here: http://blog.jasonrosado.com/?p=177
Scanner assignment: http://blog.jasonrosado.com/?p=191
Also, my project/cause is http://givkwik which seeks to make micro-donations available through the mobile device for other causes, so I'd like to offer up to the rest of the class to work with each of you to make sure your cause is represented in our initial Givkwik iPhone app. Just give me a shout – jason.rosado@givkwik.com
— Jason Rosado
I listened to the Hudson Falls PD scanner for an hour and found 4 protocols being followed:
1.Time reported on a regular basis
2.Every case has a no assigned to it
3.Every police car has a number by which they identify themselves(not very sure of this)
4.Fire and ambulance assistance message is preceded by a loud beep
Had no luck understanding the codes, although there were numbers being sent back and forth. Full post can be found here: http://itp.nyu.edu/blogs/dra247/2009/09/29/poli…
Here's my blog link: http://yassera.tumblr.com/
It's a code 303! http://itp.nyu.edu/~mdc368/blog/?p=346
my police scanner link http://www.mustafab.com/blog/?p=280
my language link http://www.mustafab.com/blog/?p=307
http://itp.nyu.edu/~shc341/forfun/
I listened to the Hudson Falls PD scanner for an hour and found 4 protocols being followed:
1.Time reported on a regular basis
2.Every case has a no assigned to it
3.Every police car has a number by which they identify themselves(not very sure of this)
4.Fire and ambulance assistance message is preceded by a loud beep
Had no luck understanding the codes, although there were numbers being sent back and forth. Full post can be found here: http://itp.nyu.edu/blogs/dra247/2009/09/29/poli…
It's a code 303! http://itp.nyu.edu/~mdc368/blog/?p=346
my police scanner link http://www.mustafab.com/blog/?p=280
my language link http://www.mustafab.com/blog/?p=307
http://itp.nyu.edu/~shc341/forfun/
The link in your article to Scanner Master is dead. Here a link you can replace it with that has similar information on where to listen online: http://www.zipscanners.com/scanner-resources/police-scanner-resources-forums-links/