Nppd Foia Log - Fy 2015

Total Page:16

File Type:pdf, Size:1020Kb

Nppd Foia Log - Fy 2015 NPPD FOIA LOG - FY 2015 Request ID Requested Date Requester Name Request Description 2014-NPFO-00396 10/23/2014 Pearson, Sam All staff memos, emails, interagency or congressional correspondence available at the Department of Homeland Securitys National Protection and Programs Directorate dated May 1, 2014 through June 8, 2014, related to the release of the report of the interagency task force on chemical safety ("A Shared Commitment: Improving Chemical Facility Safety and Security") on or around June 6, 2014. 2015-NPFO-00001 10/1/2014 Donaldson, Leslie numbers of vehicles acquired by NPPD in 2012, and of those, how many were electric or hybrid powered 2015-NPFO-00002 10/2/2014 Requesting report # N14003010 dated 09/26/2014 2015-NPFO-00003 10/1/2014 requesting video footage sept 15th 2014 at foley federal courthouse spokane, wa 10/1/2014 requesting incident report # N14003027 for a slip and fall that occur at building 2015-NPFO-00004 (b)(6) 2015-NPFO-00005 10/1/2014 reopen case, 2014-NPFO-00443 requester sent coi 2015-NPFO-00006 10/3/2014 incident report incident occured 08/04/2014 2015-NPFO-00008 10/6/2014 Ross, Shaun Copies of all records pertaining to the firing, termination, resignation of Federal Police Officer who was worked at the Atlanta Airport, and Federal Protective Services. 2015-NPFO-00009 10/7/2014 requesting two citation 4595676 and 459677 issued in July 2014 2015-NPFO-00010 10/7/2014 (b)(6) requesting N14002995 2015-NPFO-00011 10/9/2014 Incident Reports 2015-NPFO-00012 10/15/2014 Santos, Rose hereby request a copy of the following documents identified to HSHQDC13Q00029: 1. copies of the proposals/responses submitted in response to this RFQ (Request for Quotation). 2015-NPFO-00013 10/16/2014 Case N14003126 requesting incident report 2015-NPFO-00014 10/14/2014 Requesting incident report for Oct 7th in GSA Bldg 2015-NPFO-00015 10/15/2014 (b)(6) Requesting Incident Report D14008316 in el paso tx 2015-NPFO-00016 10/16/2014 incident report 2015-NPFO-00017 10/16/2014 File a missing secure form 2015-NPFO-00019 10/20/2014 Burton, Tom seeking records, including but not limited to emails, reports, memos, letters and analyses, related to planning for Ebola outbreaks and danger, from June 1, 2014 to the present. 2015-NPFO-00020 10/20/2014 Requesting incident report date Jan 15 2014 # B14000550 2015-NPFO-00021 10/20/2014 Incident Report # N14003234 Incident occured in the Reagan Building Garage 2015-NPFO-00022 10/21/2014 (b)(6) Requesting case # N14002907 2015-NPFO-00023 10/22/2014 requesting case # P14009825 incident happend Ferico Degetau Federal Bld. 2015-NPFO-00024 10/23/2014 Incident Report CCN: P14011087 car incident on OCT 18th 2014 1 NPPD FOIA LOG - FY 2015 2015-NPFO-00025 10/23/2014 Curtis, Jennifer I would like to submit a formal request for an incident report for property damage that occurred to one of our insureds vehicles at the premises located 74 N. Washington Ave., Battle Creek, MI 49037. Our insured advised she completed an incident report at the scene with one of the Department of Homeland Security Officers. We would like a copy of the report for our insurance claim. 2015-NPFO-00026 10/21/2014 Clarity, Paula Copies of US Department of Homeland Security, Office of Procurement Operations Contract ID NOS. HSHQE2-12-R- 00001; and HSHQE2-13-D-00001. 2015-NPFO-00027 10/23/2014 Santos, Rose a copy of documents identified to HSHQDC14Q000181 2015-NPFO-00028 10/28/2014 Requesting incident report CCN#N14003341 2015-NPFO-00029 10/27/2014 (b)(6) Requesting Incident Report B14010397 2015-NPFO-00030 10/28/2014 Requesting video footage from 10/17/2014 2015-NPFO-00031 10/29/2014 Carr, Ellie GSA 2552 Reports from dates March 1, 2012-February 28, 2013 2015-NPFO-00032 10/28/2014 seeking documents and audio pertaining to herself (b)(6) 2015-NPFO-00033 10/28/2014 requesting all doucments pertaining to herself from 1995-2001 2015-NPFO-00034 11/3/2014 Gonzalez, Ursula 3rd party requesting incident report on behalf o (b)(6) 2015-NPFO-00035 10/31/2014 Requesting Incident Report D14011252 (b)(6) 2015-NPFO-00036 11/3/2014 Incident Report on accident that happen on August 5th, 2014 chicago loop post office 2015-NPFO-00037 10/29/2014 Reilly, Steve * A copy of all records from The United States Computer Emergency Readiness Team (US-CERT)s database of incident tickets for all incident tickets submitted to US-CERT by federal agencies between Oct. 1, 2011 and Oct. 1, 2014. 2015-NPFO-00038 11/4/2014 Requesting incident report occured Nov 3rd 2014 in Md. (b)(6) 2015-NPFO-00039 11/4/2014 Requesting all documents pertaining to himself 2015-NPFO-00041 10/29/2014 Dejuliis, Ralph requested POTENTIAL TACTICS AND TARGETS IN ISIL-LINKED WESTERN ATTACKS 2015-NPFO-00042 10/16/2014 Documents and audio sept 30th 2013 2015-NPFO-00043 11/6/2014 (b)(6) Incident Report P14011210 2015-NPFO-00044 11/12/2014 Requesting Vido clip from Austin Tx VA XRay/Mag station at apprx. 1230 on July 30th 2014 2015-NPFO-00045 11/14/2014 Harrah, Aaron 3rd party request asking on behalf of (b)(6) injuries at parkersburg west virginia on May 14, 2013 requesting all information pertaining to the accident. 2015-NPFO-00046 11/14/2014 (b)(6) Requesting Incident Report N14003517 on Nov 6th 2014 2015-NPFO-00047 11/6/2014 Pearson, Sam original FOIA request letter(s) from the requestor, the response to said FOIA request(s) from your agency, including all letters, attachments, enclosures, appeals or any other documents that were provided with the response to said FOIA request. The FOIA request(s) and their response(s) that we are requesting are listed below by their control numbers: #NPPD12F251. 2015-NPFO-00048 11/6/2014 Santos, Rose Copy of your agency's required 2015 OMB Submission 2 NPPD FOIA LOG - FY 2015 2015-NPFO-00049 11/16/2014 all records, emails, certifications, rating forms, certification lists, promotion lists, and any other paperwork and/or information pertinent to Job Announcement Number: FS904581-SW13. This announcement was posted from 6/24/2013 through 7/8/2013. (b)(6) 2015-NPFO-00050 11/16/2014 all records, emails, certifications, rating forms, certification lists, promotion lists, and any other paperwork and/or information pertinent to Job Announcement Number: FS3577374MPDE-ET10. This announcement was posted from 7/8/2010 through 7/21/2010. 2015-NPFO-00051 11/13/2014 Sandvik, Runa request a list of all personnel currently authorized to use the Nationwide Wireless Priority Service (WPS) by the National Communications System in the Department of Homeland Security. 2015-NPFO-00052 11/18/2014 Pellor, Michael request a copy of contract HSHQE5-14-D-00003, awarded on solicitation number HSHQE5-13-R-00003 2015-NPFO-00053 11/18/2014 documents related to his OWCP claim for an incident that occured on Feb 13, 2014 2015-NPFO-00054 11/18/2014 incident report from July 15, 2014 2015-NPFO-00055 11/17/2014 Incident report #N140003597 2015-NPFO-00056 11/14/2014 (b)(6) incident report related to a slip and fall on 1/16/14 at 26 Federal Plaze 2015-NPFO-00057 11/13/2014 Incident report N1100343 dtd 10/5/11 and any witness statements 2015-NPFO-00058 11/17/2014 incident report 14003278 dtd 10-21-14 at FAA HQ 2015-NPFO-00059 11/17/2014 Campbell, Nekeisha request contract #: HSHQEC-14-D-00006 2015-NPFO-00060 10/31/2014 McDuffie, Alyssa copy of records regarding ARES GROUP 2015-NPFO-00061 11/19/2014 Leopold, Jason request any and all records, which includes but is not limited to intelligence bulletins, threat assessments, reports, emails, memoranda, in the possession of certain divisions of the Department of Homeland Security (see offices this request is addressed to above) that mentions or refers to the protests in Ferguson, Missouri, the shooting death of African American teenager Michael Brown and the pending Grand Jury decision in the case against Ferguson Police Department officer Darren Wilson 2015-NPFO-00062 11/19/2014 Street, Jon requesting receipt records showing a list of items which were purchased by the DHS's Federal Protective Service from TacticalGear.com on November 9, 2014. 2015-NPFO-00063 11/25/2014 Sheehan, Nina RE client (b)(6) Incident report from 4/18/13 at FBI property in Manasass, VA 2015-NPFO-00064 11/24/2014 Incident report N4003654 form 11/20/14 2015-NPFO-00065 11/21/2014 video and/or incident report of Ted Weiss Federal Building from 8-12 PM on 10/21/14 2015-NPFO-00066 11/26/2014 Incident report B140012349 2015-NPFO-00067 11/21/2014 any incident reports on the protesters at 888 First Street Washington DC on 11/3/14 - N14003400 2015-NPFO-00068 12/2/2014 (b)(6) incident report B14002687 2015-NPFO-00069 11/26/2014 Requesting Incident Report # N14003620 2015-NPFO-00070 11/12/2014 request copy of Incident Report pertaining to herself 2015-NPFO-00071 11/12/2014 Requesting video footage 2015-NPFO-00072 11/22/2014 Robinson, Wills Security breaches of IT equipment. Changes in IT equipment that have come as a result of concerns over security or alleged cyber attacks. Breaches in security that have resulted in stolen data and what data this was. These documents can be from the last 10 years. 3 NPPD FOIA LOG - FY 2015 2015-NPFO-00073 12/3/2014 Deans, Lynnard requested contract number: HXHQEC-14-D0006. 2015-NPFO-00074 11/6/2014 Incident Report N14003446 2015-NPFO-00075 12/3/2014 (b)(6) seeks incident report but further infomation needed 2015-NPFO-00076 11/18/2014 Scott, Shannon All Cyber incidents where DHS as either been requested by local government agencies and/or DHS had to step in and help with the incident.
Recommended publications
  • Hackerspaces
    d WP4 | CASE STUDY Report: Hackerspaces Theme [ssh.2013.3.2-1][Social Innovation- Empowering People, changing societies] Project Full Title: “Transformative Social Innovation Theory project” Grant Agreement n. 613169 This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 613169 Suggested citation: Sabine Hielscher, Adrian Smith, Mariano Fressoli (2015) WP4 Case Study Report: Hackerspaces, Report For the TRANSIT FP7 Project, SPRU, University oF Sussex, Brighton. Acknowledgements: We wish to thank everyone in the Hackerspace scene who helped us with our research, whether through interviews, welcoming us to Hackerspaces and events, or putting us in touch with others. We also thank our colleagues in the TRANSIT project, at SPRU, at UNQ and Fundación Cenit For their help and encouragement with the research. Finally, we thank the European Commission and their FP7 research programme For Funding the TRANSIT project. Date: 14 January 2015 Authors: Sabine Hielscher, Adrian Smith, Mariano Fressoli Contact person: Adrian Smith Table of contents 1 Introduction to Hackerspaces 2 Methodology 2.1 Researcher relations to the case 2.2 Methods 3 Analysis of transnational network(ing) 3.1 Transnational networking: Hackerspaces 3.2 Aspects of ‘innovation’ and ‘change’ of the transnational network(ing) 3.3 Aspects of empowerment and disempowerment of the transnational network(ing) 3.4 Other issues about the transnational networking 4 Local initiative
    [Show full text]
  • Transnationality, Morality, and Politics of Computing Expertise
    UNIVERSITY OF CALIFORNIA Los Angeles Transnationality, Morality, and Politics of Co!"#ting Ex"ertise A dissertation s#%!i&ed in partial satis action o t'e re(#ire!ents for t'e degree )octor o P'iloso"'y in Anthro"ology %y L#is Feli"e Rosado M#rillo *+,- . Co"yright by L#is Feli"e Rosado M#rillo 2+,- A/STRACT OF T0E DISSERTATION Transnationality, Morality, and Politics o Co!"#ting E$"ertise %y L#is Feli"e Rosado M#rillo )octor o P'iloso"'y in Anthro"ology Uni1ersity o Cali ornia, Los Angeles, 2+,- Pro essor C'risto"'er M2 Kelty, C'air In this dissertation I e$amine t'e alterglo%alization o co!"#ter e$"ertise 5it' a oc#s on t'e creation o "olitical, econo!ic, !oral, and tec'nical ties among co!"#ter tec'nologists 5'o are identi6ed %y "eers and sel 7identi y as 8co!"#ter 'ac9ers2: ;e goal is to in1estigate 'o5 or!s o collaborati1e 5or9 are created on a local le1el alongside glo%al "ractices and disco#rses on co!"#ter 'ac9ing, linking local sites 5it' an e!ergent transnational do!ain o tec'nical e$c'ange and "olitical action. In order to ad1ance an #nderstanding o the e$"erience and "ractice o 'ac9ing %eyond its !ain axes o acti1ity in <estern Euro"e and the United States, I descri%e and analy4e "ro=ects and career trajectories o program!ers, engineers, and hac9er acti1ists w'o are ii !e!%ers o an international networ9 o co!!#nity s"aces called 8'ac9ers"aces: in the Paci6c region.
    [Show full text]
  • A Topological Space for Design, Participation and Production. Tracking Spaces of Transformation
    The Journal of Peer Production New perspectives on the implications of peer production for social change Journal of Peer Production Issue 13: OPEN http://peerproduction.net — ISSN 2213-5316 A TOPOLOGICAL SPACE FOR DESIGN, PARTICIPATION AND PRODUCTION. TRACKING SPACES OF TRANSFORMATION Sandra Álvaro Sánchez ‘Space of transformation’ is a concept borrowed from Serres’ communication theory and here redefined after the evolution of the post-digital milieu and the materialistic critique of the same. Hackerspaces, fablabs, medialabs and other shared machines shops are defined here as spaces of transformation, places for the encounter between humans and non-humans, where disciplines are bridged together, hitherto severed, giving place to collective practices related to education, production and society. Shared machine shops are sited locally but also connected globally. Online, they share innovative forms of production, education and collective organization, giving place to a complex ecosystem. This article presents an analysis of the topology of this ecosystem conducted by means of tracking and visualizing the online interactions between the hackerspaces listed at the platform Hackerspaces.org. The application of network analysis is aimed to answer the research questions: First, how shared machine shops are locally and globally connected? Second, what links hackerspaces among them and these with new social issues? The concept of shared machine shops as spaces of transformation and the study of their mutual relations allows for an understanding of the transformative capacity of these spaces and how they are producing a new space for social innovation through its mutual interchange of information. Keywords: hackerspaces, network analysis, design, social innovation, space of transformation development of new organizational forms related to By Sandra Álvaro Sánchez peer-production, and the prototyping of new material products, linked to entrepreneurship and Download as PDF innovation, as well as, of new educational projects.
    [Show full text]
  • Magier Der Digitalen Welt Wer Bezahlt Die Hackerszene?
    SWR2 Feature Magier der digitalen Welt Wer bezahlt die Hackerszene? Von Anna Loll Sendung: Mittwoch, 20. März 2019 Redaktion: Wolfram Wessels Regie: Wolfram Wessels Produktion: SWR 2019 SWR2 Feature können Sie auch im SWR2 Webradio unter www.SWR2.de und auf Mobilgeräten in der SWR2 App hören – oder als Podcast nachhören: http://www1.swr.de/podcast/xml/swr2/feature.xml Bitte beachten Sie: Das Manuskript ist ausschließlich zum persönlichen, privaten Gebrauch bestimmt. Jede weitere Vervielfältigung und Verbreitung bedarf der ausdrücklichen Genehmigung des Urhebers bzw. des SWR. Kennen Sie schon das Serviceangebot des Kulturradios SWR2? Mit der kostenlosen SWR2 Kulturkarte können Sie zu ermäßigten Eintrittspreisen Veranstaltungen des SWR2 und seiner vielen Kulturpartner im Sendegebiet besuchen. Mit dem Infoheft SWR2 Kulturservice sind Sie stets über SWR2 und die zahlreichen Veranstaltungen im SWR2-Kulturpartner-Netz informiert. Jetzt anmelden unter 07221/300 200 oder swr2.de Die neue SWR2 App für Android und iOS Hören Sie das SWR2 Programm, wann und wo Sie wollen. Jederzeit live oder zeitversetzt, online oder offline. Alle Sendung stehen sieben Tage lang zum Nachhören bereit. Nutzen Sie die neuen Funktionen der SWR2 App: abonnieren, offline hören, stöbern, meistgehört, Themenbereiche, Empfehlungen, Entdeckungen … Kostenlos herunterladen: www.swr2.de/app OT Atahan Cetinkaya: „Also ein Hacker, das ist so ein Typ, der in anderen Computern... Daten da so … knackt er halt das Schloss und kommt in Daten rein, die bisschen privat sind und macht dann mit dem Computer alles, was er will.“ OT Mitch Altman: „… and that's we're doing everything we're doing because it's super enjoyable and we love it.
    [Show full text]
  • Executive Director's Report
    EBD #12.31 CD #23.1 2014-2015 Report to Council and Executive Board June 19, 2015 Keith Michael Fiels Executive Director ALA’s New Chief Financial Officer Mark Leon, CPA, has been appointed to the position of ALA’s Chief Financial Officer. Mark has been the CFO of Neighborhood Housing Services of Chicago since 2010. Prior to that, he served as CFO of the Noble Network of Charter Schools, and as a principal consultant with Diamond Management and Technology, Inc. He has a Bachelor of Science degree from Georgetown University and an MBA from The University of Chicago Graduate School of Business. Mark also spent three years with the U.S. Peace Corps serving in Mali and Mauritania, West Africa, as a Small Business Development Consultant. ALA OFFICES ALA Library and Knowledge Management The new ALA catalog In the past year, the ALA Library staff have migrated the ALA Library’s catalog and related functions to OCLC’s WorldShare®Management Services (WMS). Although record clean-up and resolution of issues identified in the data migration continue, the cut over from the legacy system to WMS was complete in February. In addition to migrating the catalog, the ALA Library staff collaborated with several other units to rebuild the intranet function of the legacy system into “staff only” pages off http://www.ala.org/support/, along with a guide to the online resources managed by the ALA Library, at http://www.ala.org/support/ala-digital-library. In the four months of active usage, inter-library loan requests have increased, with staff requests nearly doubling and requests to borrow, increasing by a third.
    [Show full text]
  • Ethical Considerations for Research on Communal Publics
    Selected Papers of #AoIR2017: The 18th Annual Conference of the Association of Internet Researchers Tartu, Estonia / 18-21 October 2017 Tracing Controversies in Hacker Networks: Ethical Considerations for Research on Communal Publics This paper reflects on the ethical implications of research tracing controversies in digital, communal publics. It addresses two interrelated questions: How private or public are communication platforms used by digitally networked communities? And how should Internet researchers assess, define and treat online environments which are technically public, but suggest varying privacy expectations on the part of involved users? These questions are relevant to a wide range of Internet research. Privacy expectations have been discussed with regards to the ethics of using Twitter, Facebook, as well as other social media data (Zimmer and Proferes 2014; Ess 2013, 35ff.; Markham and Buchanan 2012, 6ff.; Zimmer 2010). In this paper, I focus on ethical implications of communal debates on controversial subjects. Specifically, I examine how gender- and diversity-related tensions and incidents have been discussed in hacker communities. I argue that the content reflecting such controversies commonly travels across various platforms which imply different degrees of privacy expectations and therefore require distinct ethical considerations. I particularly highlight the relevance of three factors for ethical decision-making when analysing controversies: the privacy expectations suggested by traversed platforms and users’ interactions; the vulnerability and public/private status of affected individuals; and the (moral) concerns which are at stake in respective debates. Within hacker communities, issues related to gender and diversity have increasingly been subject of controversial discussions. This is on the one hand linked to the emergence of feminist hackerspaces and ‘geek feminism’ (Fox et al.
    [Show full text]
  • 1 United States District Court for the District Of
    Case 1:15-cv-00999 Document 1 Filed 06/24/15 Page 1 of 16 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA JASON LEOPOLD, ) ) ) Judge _____________ ) Civil Action No. ____________ and ) ) ) ALEXA O’BRIEN, ) ) ) ) ) vs. ) ) NATIONAL SECURITY AGENCY, ) 9800 Savage Rd. ) Fort Meade, MD 20755, ) ) ) DEPARTMENT OF HOMELAND ) SECURITY, ) 245 Murray Lane, SW ) Washington, DC 20528 ) ) ) DEPARTMENT OF JUSTICE, ) 950 Pennsylvania Ave., NW ) Washington, DC 20530, ) ) DEPARTMENT OF DEFENSE, ) ) 1400 Defense Pentagon ) Washington, DC 20301-1400, ) ) CENTRAL INTELLIGENCE AGENCY, ) Washington, DC 20505 ) ) and ) ) DEPARTMENT OF STATE, ) 2201 C St., NW ) Washington, DC 20520 ) ) ) DEFENDANTS ) 1 Case 1:15-cv-00999 Document 1 Filed 06/24/15 Page 2 of 16 COMPLAINT THE PARTIES 1. Plaintiff Jason Leopold is a citizen of California. 2. Mr. Leopold is an investigative reporter for VICE News covering a wide-range of issues, including Guantanamo, national security, counterterrorism, civil liberties, human rights, and open government. Additionally, his reporting has been published in The Guardian, The Wall Street Journal, The Financial Times, Salon, CBS Marketwatch, The Los Angeles Times, The Nation, Truthout, Al Jazeera English and Al Jazeera America. 3. Plaintiff Alexa O’Brien is a citizen of New York. 4. Ms. O’Brien is a national security investigative journalist. Her work has been published in The Cairo Review of Global Affairs, Guardian UK, Salon, and The Daily Beast, and she has been featured on BBC, PBS’ Frontline, On The Media, and Public Radio International. For her “outstanding work” she was shortlisted for the 2013 Martha Gellhorn Prize for Journalism in the UK. 5.
    [Show full text]
  • Founding a Hackerspace
    Founding a Hackerspace An Interactive Qualifying Project Report Submitted to: Project Advisor: Francis Hoy Faculty of Worcester Polytechnic Institute in partial fulfillment for the requirement for the Degree of Bachelor of Science Submitted by Joseph Schlesinger Md Monirul Islam Kelly MacNeill Date: Professor Frank Hoy Project Advisor Abstract This report is the written component of our project that explores the hackerspace phenomenon. The report discusses the background and history of hackerspaces along with the social context of the modern hackerspace. Interviews of various hackerspaces were conducted and analyzed in order to gain insight into their operation and management. The research conducted was used to establish a hackerspace as a for-profit business. We describe the process of launching this entity, MakeIt Labs LLC in Lowell, MA. Also included is the business plan created for MakeIt Labs. Acknowledgements We would like to show our gratitude to the many individuals and organizations that helped us with our project by supplying us with data about the hackerspace community. These individuals allowed us know first-hand what it was like to be part of the maker community. Specifically, we would like to thank the founders and members of the following hackerspaces for giving their valuable time and valuable information: Hacker Dojo, NYC Resistor, Sprout & Co, BUILDS, and Noisebridge. Our appreciation goes to all the people who have put information about hackerspaces online. Finally, we would like to thank our project advisor, Frank Hoy, for his assistance and guidance throughout the project experience. Authorship page This project report was produced by Md Monirul Islam, Kelly MacNeill and Joseph Schlesinger.
    [Show full text]
  • Modernity, Capitalism and Liberalism in Hacker Culture
    This is r0ket science! Modernity, Capitalism and Liberalism in Hacker Culture By Dunajcsik Péter maxigas Submitted to Central European University Department of Sociology and Social Anthropology In partial fulfillment of the requirements for the degree of Master of Arts Supervisors: Jean-Louis Fabiani Jakob Rigi Budapest, Hungary 2012 CEU eTD Collection This is r0ket science! Modernity, Capitalism and Liberalism in Hacker Culture 2011 August, Finowfurt airport, Germany. Around 5000 hackers gather for a week in tents and hangars to celebrate knowledge, sharing and creativity. The conference is called Chaos Communication Camp, and all participants receive a conference badge called the r0ket. It displays your name on an LCD panel, but it does much more than that: it is a primitive computer and wireless device designed to trigger all the cultural allergies of hackers. You can play the famous retro game Space Invaders on it, and the high scores of the game are shared amongst the crowd. Two hours after takeoff the high score system is already hacked: somebody leads the top of the list with -27500 points. Before the end of the conference, the badge is used as a component in a Do It Yourself Geiger counter, as a remote control for drones, as an electronic torch, and a dozen other amazing purposes. It has no price and it cannot be bought, but anybody can build one from basic components following the online documentation. It is a typical result of the work that goes on in more than 500 hackerspaces around the world. CEU eTD Collection A serious attempt to dissect the relevance of the hacker movement should first and foremost start by looking at practice.
    [Show full text]
  • Cypherpunks: Freedom and the Future of the Internet and the Snowden Files Judy Anderson Concordia University - Portland
    Concordia University - Portland CU Commons Faculty Research Concordia University Libraries 2015 Cypherpunks: Freedom and the Future of the Internet and The Snowden Files Judy Anderson Concordia University - Portland Follow this and additional works at: https://commons.cu-portland.edu/libfacultyresearch Part of the Library and Information Science Commons CU Commons Citation Anderson, Judy, "Cypherpunks: Freedom and the Future of the Internet and The Snowden Files" (2015). Faculty Research. 27. https://commons.cu-portland.edu/libfacultyresearch/27 This Book Review is brought to you for free and open access by the Concordia University Libraries at CU Commons. It has been accepted for inclusion in Faculty Research by an authorized administrator of CU Commons. For more information, please contact [email protected]. The following review by Judy Anderson covers two books. Cypherpunks: Freedom and the Future of the Internet Julian Assange with Jacob Appelbaum, Andy Moller- Magun, and Jérémie Zimmermann. New York: OR Books, 2012. 186 pp. $16 The Snowden Files Luke Harding. New York: Vintage Books, 2014. 346 pp. $14.95 The continuing saga of WikiLeaks and the fate of Edward Snowden remain a story of conflicting viewpoints. Those interested in exploring the reasoning behind such hacking and exposure will find that Cypherpunks supplies the back- ground and philosophy of the techies who feel strongly that the Internet must remain a free zone for privacy in communication, economic activity, and move- ment/travel. The Snowden Files shows another, more reserved, approach but with the same end—to alert people to the government’s invasion of their per- sonal privacy that, legally, it is only permitted access after proper procedures are followed against specific individuals.
    [Show full text]
  • Peer Production with Use of 3D Printing at Hackerspaces
    Vanguard of the 3D printed future: Peer production with use of 3D printing at hackerspaces By Daniel Wykretowicz Submitted to Central European University Department of Sociology and Social Anthropology In partial fulfillment of the requirements for the degree of Master of Arts Supervisors: Jakob Rigi Andreas Dafinger CEU eTD Collection Budapest, Hungary 2013 April 15, 2013. metalab, Vienna Andreas is printing a 3D scanned object. Even though it was a test run, he did not have to alternate the scanned file. He just pressed 'scan' and then 'print'.“It works almost as good as the Replicator from Star Trek” - I thought. In the approximately same time the first fully 3D printed gun called CEU eTD Collection “liberator” was proven functional. It was fabricated for the cost of less than 25$ with an inexpensive desktop 3D printer similar to the one at metalab. It fired 9 rounds. (Forbes 2013) Acknowledgements In a first place, I would like to thank my supervisor Jakob Rigi for encouraging me to explore a reality of hackerspaces. I would also like to thank my second supervisor Andreas Dafinger for the active feedback during my research and afterwards. On behalf of Jascha, one of my informants, I would like to thank NASA and European Space Agency for bringing humans to the space. I dedicate this thesis to all the people who keep the information free. CEU eTD Collection i Table of Contents Acknowledgements...............................................................................................................................i Table of Contents..................................................................................................................................ii
    [Show full text]
  • Le « Hack » Ou Innover L’Adapter À Leurs Besoins
    SHOWROOM HEIG-VD – Route de Cheseaux 1 Horaires : 10h-16h L’HISTOIRE DU HACKING Dans l’imaginaire collectif, on associe volontiers les hackers à des pirates, voire à des robins des bois de l’informatique. Mais qu’en est-il réellement ? Cette exposition montre comment le hacking est intimement lié au développement de l’informatique : il propose une vision atypique et souvent disruptive de la technologie qui a influencé, entre autres, la conception de l’ordinateur personnel et d’Internet. Les hackers peuvent être des bidouilleurs, des professionnels, des militants, des pirates, mais aussi des femmes – si elles sont peu nombreuses, elles n’en jouent pas moins un rôle important. Ces différentes figures du hacking partagent une même passion pour défricher les terres inconnues et pour l’innovation. Au cours de son histoire, le hacking a participé à la création de nouvelles technologies et de nouvelles activités professionnelles, comme en témoignent l’Orientation Sécurité informatique et le Pôles Y-Security de la HEIG-VD. Exposition du 22 octobre au 27 novembre 2020 Haute Ecole d’Ingénierie et de Gestion du Canton de Vaud, Yverdon-les-Bains Ce document est sous licence CC BY-SA 4.0 Les crédits pour les illustrations se trouvent en fin de document. LE HACKING, QU’EST-CE QUE C’EST ? Pratiquer le hacking c’est démonter quelque chose pour en Le terme hacking comprendre les différents composants – autrement dit de l’ingénierie est dérivé du verbe inversée. Les hackers veulent mettre les mains dans le cambouis, to hack qui signifie « avoir une expérience de première main.
    [Show full text]