Founding a Hackerspace

Total Page:16

File Type:pdf, Size:1020Kb

Founding a Hackerspace Founding a Hackerspace An Interactive Qualifying Project Report Submitted to: Project Advisor: Francis Hoy Faculty of Worcester Polytechnic Institute in partial fulfillment for the requirement for the Degree of Bachelor of Science Submitted by Joseph Schlesinger Md Monirul Islam Kelly MacNeill Date: Professor Frank Hoy Project Advisor Abstract This report is the written component of our project that explores the hackerspace phenomenon. The report discusses the background and history of hackerspaces along with the social context of the modern hackerspace. Interviews of various hackerspaces were conducted and analyzed in order to gain insight into their operation and management. The research conducted was used to establish a hackerspace as a for-profit business. We describe the process of launching this entity, MakeIt Labs LLC in Lowell, MA. Also included is the business plan created for MakeIt Labs. Acknowledgements We would like to show our gratitude to the many individuals and organizations that helped us with our project by supplying us with data about the hackerspace community. These individuals allowed us know first-hand what it was like to be part of the maker community. Specifically, we would like to thank the founders and members of the following hackerspaces for giving their valuable time and valuable information: Hacker Dojo, NYC Resistor, Sprout & Co, BUILDS, and Noisebridge. Our appreciation goes to all the people who have put information about hackerspaces online. Finally, we would like to thank our project advisor, Frank Hoy, for his assistance and guidance throughout the project experience. Authorship page This project report was produced by Md Monirul Islam, Kelly MacNeill and Joseph Schlesinger. The authors of each section are listed below. However, each member proofread and edited this report. Abstract: ............................................................................................................................ Md Monirul Islam Acknowledgements: .......................................................................................................... Md Monirul Islam Authorship page: ............................................................................................................... Md Monirul Islam List of Figures: ................................................................................................................... Md Monirul Islam Chapter I: Executive Summary: ......................................................................................... Md Monirul Islam Chapter II: Introduction: ......................................................................................................... Kelly MacNeill Chapter III: Background What is a hackerspace?: ..................................................................................................... Kelly MacNeill What is a hacker?: .............................................................................................................. Kelly MacNeill Why do hackerspaces exist?: ........................................................................................ Md Monirul Islam The Hacker Ethic: ................................................................................................................ Kelly MacNeill What does it mean to be a member of a hackerspace?:..................................................... Kelly MacNeill The History of Hacking: ....................................................................................................... Kelly MacNeill Chapter IV: Procedure Research Methodology: ...................................................................................................... Kelly MacNeill Interview Methodology: ............................................................................................... Md Monirul Islam Building a Hackerspace (from the perspective of Joseph Schlesinger): ...................... Joseph Schlesinger Chapter V: Results Interviews: .................................................................................................................... Md Monirul Islam MakeIt Labs: ................................................................................................................. Joseph Schlesinger Business Plan: ................................................................................ Kelly MacNeill and Md Monirul Islam Chapter VI: Analysis of Results The Evolution of the Modern Hackerspace: ................................................................. Md Monirul Islam Communication In Hackerspaces: ................................................................................ Md Monirul Islam Inter-hackerspace communication: .............................................................................. Md Monirul Islam Chat: ......................................................................................................................... Md Monirul Islam Email: ........................................................................................................................ Md Monirul Islam Telephone: ................................................................................................................ Md Monirul Islam Planet Feeds: ............................................................................................................ Md Monirul Islam Webinar: ................................................................................................................... Md Monirul Islam The Commercialization of Hackerspaces: ........................................................................... Kelly MacNeill Chapter VII: Conclusion: .......................................................................................................... Kelly MacNeill Bibliography: ............................................................................................................................ Kelly Macneill Appendix A: Business Report: .......................................................................................................... Joseph Schlesinger Appendix B Noisebridge - Hackerspace Questionnaires: ................................................................. Md Monirul Islam Hacker Dojo - Hackerspace Questionnaires: .................................................................... Joe Schlesinger BUILDS - Hackerspace Questionnaires: .............................................................................. Kelly MacNeill Sprouts - Hackerspace Questionnaires: .............................................................................. Kelly MacNeill NYC Resistor- Hackerspace Questionaires: ................................................................... Md Monirul Islam Contents Abstract ......................................................................................................................................................... 2 Acknowledgements ....................................................................................................................................... 3 Authorship page ............................................................................................................................................ 4 List of Figures ................................................................................................................................................ 8 Chapter I: Executive Summary ...................................................................................................................... 9 Chapter II: Introduction .............................................................................................................................. 11 Chapter III: Background .............................................................................................................................. 13 What is a hackerspace? .......................................................................................................................... 13 What is a hacker? ................................................................................................................................... 15 Why do hackerspaces exist? ................................................................................................................... 16 What is the hacker ethic? ....................................................................................................................... 17 What does it mean to be a member of a hackerspace? ......................................................................... 18 What is the history of hacking? .............................................................................................................. 19 Chapter IV: Procedure ................................................................................................................................. 20 Research Methodology ........................................................................................................................... 20 Interview Methodology .......................................................................................................................... 20 Narrative: Building a hackerspace from the perspective of Joseph Schlesinger .................................... 21 Chapter V: Results ....................................................................................................................................... 23 Interviews ..............................................................................................................................................
Recommended publications
  • Impact of the Maker Movement
    Impact of the maker movement Developed by Deloitte Center for the Edge and Maker Media from the Maker Impact Summit Dec. 2013 I AM A MAKER with my own two hands I forge the future from my imagining my work, my sweat with these tools i can build worlds here i put wire and foam transistor and plastic rubber metal and wood together to make something new what does it do where will this take us new places new worlds all from my workshop Malcolm S. Hoover, 2014 TABLE OF CONTENTS A Future of Potential 4 Overview 7 Letters from Conveners 10 How to Read This Document 14 How might the Maker Movement have an impact on… 15 • Manufacturing 16 • Education 19 • Government and Public Policy 22 • Citizen Science 25 • Retail 28 What Happens Next? 30 Participants 32 Other Images from the Summit 38 A FUTURE OF POTENTIAL We are on the cusp of an opportunity to more fully We are in a correction of sorts. Driven by the goal of scale tap into our creative potential, driven by significant efficiencies and low costs, the supply chain has been technological innovation that is democratizing the means stretched to the far extremes, like a bungee cord, and now of production and enabling connections between resources it’s starting to come back as the underlying economics and markets. Realizing this opportunity will require change. Where will we end up? We’ve learned in the last re-thinking and redesigning all of our major institutions, 15 years that experimentation is the key to innovation.
    [Show full text]
  • Ethics in Security Testing
    Ethics in Security Testing Title Prepared by: Nick Dunn, Managing Security Consultant Table of contents Executive summary ................................................................... 3 Introduction ................................................................................4 Professional ethics .................................................................... 6 The hacker ethic ........................................................................ 9 Reconciling the ethical stances ............................................... 12 Conclusion ............................................................................... 16 References .............................................................................. 18 About NCC Group ................................................................... 20 2 NCC Group Whitepaper ©2018 Executive summary This paper discusses the similarities and differences between professional ethics in the information security industry and ethics in the hacker community. Sources of conflict between the two and shared values of the two are discussed in order to find some reconciliation and come to an understanding of how a shared set of ethics is possible. A reconciled set of ethics allows hackers to function within the corporate world without compromising their principles and allows the commercial world to benefit from some of the more progressive ideas within the hacker community. A reconciled set of ethics allows hackers to function within the corporate world without compromising their principles
    [Show full text]
  • Burning Man's Mathematical Underbelly
    City University of New York (CUNY) CUNY Academic Works Publications and Research New York City College of Technology 2018 Burning Man’s Mathematical Underbelly Seth S. Cottrell CUNY New York City College of Technology How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/ny_pubs/306 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Burning Man’s Mathematical Underbelly A math degree can take you to a lot of places, both physically and figuratively, and if you play your cards right, you too can argue counterfactual definiteness with a shaman. First in 2008, and several times since, a fellow math PhD and I traveled to the Burning Man art festival to sit in the desert and talk with the locals about whatever they happened to be curious about. Burning Man began in 1986, when a group of people (who would argue endlessly over any finite list of their names) decided to assemble annually on a San Francisco beach and burn a wooden human effigy. In 1990, membership and a lack of fire permits forced Burning Man to combine with Zone #4, a “Dadaist temporary autonomous zone” piloted by the Cacophony Society, in the Black Rock Desert 110 miles outside of Reno, Nevada. Figure 1: Although The Man itself changes very little from year to year, his surroundings do. In this version from 2009, he’s surrounded by a forest of two by fours.
    [Show full text]
  • Greek Society in Crisis and in Motion: Building the Material Bases for an Alternative Society from the Bottom up Georgia Bekridaki and Antonios Broumas
    Interface: a journal for and about social movements Article Volume 9 (1): 230 – 255 (2017) Bekridaki and Broumas, Greek society in crisis Greek society in crisis and in motion: building the material bases for an alternative society from the bottom up Georgia Bekridaki and Antonios Broumas Abstract In the last six years, Greece has been hit by a vicious circle of relentless neoliberal restructuring programs. During the years of the crisis, throughout the country urban and rural communities of struggle have been formed, which tend to employ instituent practices and to acquire constitutive characteristics, in order to collectively address unmet social needs / desires and ensure their collective survival. In this context, socially reproductive commons in germ form have emerged with social and solidarity economy initiatives in their peripheries, alternative forms of life in common have been shaped and societies have been set in motion with the potential to establish the material foundations of their collective autonomy. Within this huge gap of social (re)production, the constituent power of social movements emerges in germ form as a resurgent force with the potential to address these needs and desires and, correspondingly, shape life in common. In the neoliberal era, it is this potential of a constituent counter - power that has the capacity to constitute the contending power to the dominant force of the capital - state complex. Keywords: Greece, social movements, mutual aid, commons, social and solidarity economy, constituent power. Introduction Greece is at the forefront of a social war raging throughout the south and, gradually spreading towards the north of Europe. On the one side, capital loots wealth and accumulates social power from vulnerable populations directly by dispossession of small property, public wealth and the commons and less by the traditional means of extracting value through exploitation (Harvey 2014: 65).
    [Show full text]
  • Consumer Cynicism: Developing a Scale to Measure Underlying Attitudes Influencing Marketplace Shaping and Withdrawal Behaviours Amanda E
    bs_bs_banner International Journal of Consumer Studies ISSN 1470-6423 Consumer cynicism: developing a scale to measure underlying attitudes influencing marketplace shaping and withdrawal behaviours Amanda E. Helm1, Julie Guidry Moulard2 and Marsha Richins3 1Division of Business, Xavier University of Louisiana, New Orleans, LA 70125, USA 2College of Business, Louisiana Tech University, Ruston, LA 71272, USA 3Department of Marketing, College of Business, University of Missouri, Columbia, MO 65211, USA Keywords Abstract Consumer activism, consumer rebellion, consumer cynicism, consumer skepticism, This article develops the construct of consumer cynicism, characterized by a perception of consumer alienation, consumer trust. a pervasive, systemic lack of integrity in the marketplace and investigates how cynical consumers behave in the marketplace. The construct was developed based on a qualitative Correspondence study and triangulated through developing a scale and investigating antecedents and Amanda E. Helm, Division of Business, Xavier consequential marketplace behaviours. The cynicism construct is uniquely suited to explain University of Louisiana, New Orleans, LA the underlying psychological processes hinted at in practitioner perceptions of the growing 70125, USA. E-mail: [email protected] mistrust and consumer research about rebellion behaviours, as well as to offer insight on consumers’ response to the increasingly sophisticated market. Previous research has doi: 10.1111/ijcs.12191 offered a glimpse of extreme rebellion behaviours such
    [Show full text]
  • Review/Of/The/Research/ Literature
    Working/Paper/Series// SWPS/2014)08/ May,%2014% Community)based/digital/fabrica5on/ workshops:/A/review/of/the/research/ literature// Sabine/Hielscher// and/Adrian/Smith/ SPRU.Working.Paper.Series/ The/SPRU/Working/Paper/Series/aims/to/accelerate/the/public/availability/of/the/research/undertaken/ by/ SPRU)associated/ people/ of/ all/ categories,/ and/ excep5onally,/ other/ research/ that/ is/ of/ considerable/interest/within/SPRU./It/presents/research/results/that/in/whole/or/part/are/suitable/for/ submission/to/a/refereed/journal,/to/a/sponsor,/to/a/major/conference/or/to/the/editor/of/a/book./Our/ inten5on/is/to/provide/access/to/early/copies/of/SPRU/research./ Editors( Contact( Tommaso&Ciarli& [email protected]/ Daniele&Rotolo& [email protected]/ Associate(Editors& Area& Florian&Kern& Energy& [email protected]/ Paul&Nightingale&& Science,&&&Technology&Policy& [email protected]/ Matias&Ramirez& Development& [email protected]/ Joe&Tidd&&& Technology&Innovation&Management& [email protected]/ Carlos&Sato& [email protected]/ Maria&Savona&&& Economics&of&Technological&Change& [email protected]/ Mariana&Mazzucato& [email protected]/ Andrew&Stirling& Transitions& [email protected]/ Caitriona&McLeish& Civil&military&interface&& [email protected]/ Administrator( Jenny&Lieu& [email protected]/ Disclaimer/ The/works/available/here/are/the/responsibility/of/the/individual/author(s)/and/do/not/necessarily/ represent/the/views/of/other/SPRU/researchers./As/maLers/of/policy/and/prac5ce,/SPRU/does/not/
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • The Evolution of Lisp
    1 The Evolution of Lisp Guy L. Steele Jr. Richard P. Gabriel Thinking Machines Corporation Lucid, Inc. 245 First Street 707 Laurel Street Cambridge, Massachusetts 02142 Menlo Park, California 94025 Phone: (617) 234-2860 Phone: (415) 329-8400 FAX: (617) 243-4444 FAX: (415) 329-8480 E-mail: [email protected] E-mail: [email protected] Abstract Lisp is the world’s greatest programming language—or so its proponents think. The structure of Lisp makes it easy to extend the language or even to implement entirely new dialects without starting from scratch. Overall, the evolution of Lisp has been guided more by institutional rivalry, one-upsmanship, and the glee born of technical cleverness that is characteristic of the “hacker culture” than by sober assessments of technical requirements. Nevertheless this process has eventually produced both an industrial- strength programming language, messy but powerful, and a technically pure dialect, small but powerful, that is suitable for use by programming-language theoreticians. We pick up where McCarthy’s paper in the first HOPL conference left off. We trace the development chronologically from the era of the PDP-6, through the heyday of Interlisp and MacLisp, past the ascension and decline of special purpose Lisp machines, to the present era of standardization activities. We then examine the technical evolution of a few representative language features, including both some notable successes and some notable failures, that illuminate design issues that distinguish Lisp from other programming languages. We also discuss the use of Lisp as a laboratory for designing other programming languages. We conclude with some reflections on the forces that have driven the evolution of Lisp.
    [Show full text]
  • Hackerspaces
    d WP4 | CASE STUDY Report: Hackerspaces Theme [ssh.2013.3.2-1][Social Innovation- Empowering People, changing societies] Project Full Title: “Transformative Social Innovation Theory project” Grant Agreement n. 613169 This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 613169 Suggested citation: Sabine Hielscher, Adrian Smith, Mariano Fressoli (2015) WP4 Case Study Report: Hackerspaces, Report For the TRANSIT FP7 Project, SPRU, University oF Sussex, Brighton. Acknowledgements: We wish to thank everyone in the Hackerspace scene who helped us with our research, whether through interviews, welcoming us to Hackerspaces and events, or putting us in touch with others. We also thank our colleagues in the TRANSIT project, at SPRU, at UNQ and Fundación Cenit For their help and encouragement with the research. Finally, we thank the European Commission and their FP7 research programme For Funding the TRANSIT project. Date: 14 January 2015 Authors: Sabine Hielscher, Adrian Smith, Mariano Fressoli Contact person: Adrian Smith Table of contents 1 Introduction to Hackerspaces 2 Methodology 2.1 Researcher relations to the case 2.2 Methods 3 Analysis of transnational network(ing) 3.1 Transnational networking: Hackerspaces 3.2 Aspects of ‘innovation’ and ‘change’ of the transnational network(ing) 3.3 Aspects of empowerment and disempowerment of the transnational network(ing) 3.4 Other issues about the transnational networking 4 Local initiative
    [Show full text]
  • Transnationality, Morality, and Politics of Computing Expertise
    UNIVERSITY OF CALIFORNIA Los Angeles Transnationality, Morality, and Politics of Co!"#ting Ex"ertise A dissertation s#%!i&ed in partial satis action o t'e re(#ire!ents for t'e degree )octor o P'iloso"'y in Anthro"ology %y L#is Feli"e Rosado M#rillo *+,- . Co"yright by L#is Feli"e Rosado M#rillo 2+,- A/STRACT OF T0E DISSERTATION Transnationality, Morality, and Politics o Co!"#ting E$"ertise %y L#is Feli"e Rosado M#rillo )octor o P'iloso"'y in Anthro"ology Uni1ersity o Cali ornia, Los Angeles, 2+,- Pro essor C'risto"'er M2 Kelty, C'air In this dissertation I e$amine t'e alterglo%alization o co!"#ter e$"ertise 5it' a oc#s on t'e creation o "olitical, econo!ic, !oral, and tec'nical ties among co!"#ter tec'nologists 5'o are identi6ed %y "eers and sel 7identi y as 8co!"#ter 'ac9ers2: ;e goal is to in1estigate 'o5 or!s o collaborati1e 5or9 are created on a local le1el alongside glo%al "ractices and disco#rses on co!"#ter 'ac9ing, linking local sites 5it' an e!ergent transnational do!ain o tec'nical e$c'ange and "olitical action. In order to ad1ance an #nderstanding o the e$"erience and "ractice o 'ac9ing %eyond its !ain axes o acti1ity in <estern Euro"e and the United States, I descri%e and analy4e "ro=ects and career trajectories o program!ers, engineers, and hac9er acti1ists w'o are ii !e!%ers o an international networ9 o co!!#nity s"aces called 8'ac9ers"aces: in the Paci6c region.
    [Show full text]
  • A Topological Space for Design, Participation and Production. Tracking Spaces of Transformation
    The Journal of Peer Production New perspectives on the implications of peer production for social change Journal of Peer Production Issue 13: OPEN http://peerproduction.net — ISSN 2213-5316 A TOPOLOGICAL SPACE FOR DESIGN, PARTICIPATION AND PRODUCTION. TRACKING SPACES OF TRANSFORMATION Sandra Álvaro Sánchez ‘Space of transformation’ is a concept borrowed from Serres’ communication theory and here redefined after the evolution of the post-digital milieu and the materialistic critique of the same. Hackerspaces, fablabs, medialabs and other shared machines shops are defined here as spaces of transformation, places for the encounter between humans and non-humans, where disciplines are bridged together, hitherto severed, giving place to collective practices related to education, production and society. Shared machine shops are sited locally but also connected globally. Online, they share innovative forms of production, education and collective organization, giving place to a complex ecosystem. This article presents an analysis of the topology of this ecosystem conducted by means of tracking and visualizing the online interactions between the hackerspaces listed at the platform Hackerspaces.org. The application of network analysis is aimed to answer the research questions: First, how shared machine shops are locally and globally connected? Second, what links hackerspaces among them and these with new social issues? The concept of shared machine shops as spaces of transformation and the study of their mutual relations allows for an understanding of the transformative capacity of these spaces and how they are producing a new space for social innovation through its mutual interchange of information. Keywords: hackerspaces, network analysis, design, social innovation, space of transformation development of new organizational forms related to By Sandra Álvaro Sánchez peer-production, and the prototyping of new material products, linked to entrepreneurship and Download as PDF innovation, as well as, of new educational projects.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]