Homework for week 3:
- “Of Secret Codes, Abbreviations, and Knowledge Lost and Gained” http://blog.thehenryford.org/2009/05/27/of-secret-codes-abbreviations-and-knowledge-lost-and-gained/
- RNC 2004 in 160 Characters – http://www.scribd.com/doc/5403691/RNC04-in-160-Character-Bytes
- TXTmob: Text Messaging For Protest Swarms http://web.media.mit.edu/~tad/pub/txtmob_chi05.pdf
- MobileActive: Mobile Apps for Data Collection: http://mobileactive.org/wiki/Mobile_Applications_for_Data_Collection
Listen to an online police or fire scanner stream for two hours and document what you hear. Specifically listen for codes, protocol and other methods of communicating complex information. Blog your report and post the link as a comment to this blog.
Online scanner links: http://melsgarage.com/, http://www.police-scanner.info/live-police-scanners.htm, http://www.scannermaster.com/Online_Scanners_s/197.htm
- Invent your own spoken, typed or visual image code, along with a reason for its use, that could be communicated through a mobile device using texting, image sharing, bluetooth or any other aspect of the mobile device. Document this code, post it to your blog, and share a sample of it via 41411/ITP2800, on Twitter #itp2800 or another mobile medium of your choice.
- Come up with a list of at least three real world organizations, communities or specific people that will benefit or may want to collaborate with you on your proposed cause. IDENTIFY a contact point within at least one of these groups and call or email them to begin a conversation about your idea. If they don’t respond immediately that is fine, but you must take the first step in communicating what you plan to do
- Listen to an online police or fire scanner stream for two hours and document what you hear. Specifically listen for codes, protocol and other methods of communicating complex information. Blog your report and post the link as a comment to this blog.
Here’s what we talked about in class:
I announced my work in porting the Tor Project to Android. Tor is an “onion router” web proxy that allows web surfers in places like Iran and China get free, anonymous access to the web. Having secure, anonymous browsing that can route around censorship is a critical component of my Guardian secure smartphone project.
The story of Alan Turing and his impact on computing came up briefly and I just wanted to make sure everyone knew the amazing yet tragic story of his life. Just recently, an online, crowd-sourced petition effort pressured the British Government to issue a formal apology for causing his suicide, and countless others who were persecuted for their sexuality.
At some point in class, I drew a diagram that I quite enjoyed sharing, and will attempt to recreate here, since I unfortunately didn’t get a photo or capture it using the smart board. The drawing below is an attempt to demonstrate the various layers of network communication layers, both the physical medium and the amount of government/state and corporate control at each layer. Ultimately, the best opportunities for using networks with less control lie at the LAN layer and the Global layer…. though there are opportunities and technologies at all layers.
I also realized that I hadn’t given the class a background on myself, and decided to share a talk I had recently given at Parsons on my life and work. The presentation tells my story through the various computing hardware and devices I’ve owned, used, hacked and programmed in my life. Notice that the devices get smaller, more powerful and more connected over time. The slides are posted below, and then a video from the talk I gave at Parsons is below that.
the audio starts after a minute or so…
Finally, we reviewed week 2 homework, specifically “mobile videos shot under duress” and the first draft of proposals for the cause they’d like to work on and the technology they plan to use.
That’s all for week 3…. leave a comment here if you have any questions or feedback.