{"id":752,"date":"2022-06-28T11:02:01","date_gmt":"2022-06-28T02:02:01","guid":{"rendered":"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/?post_type=lexicon&#038;p=752"},"modified":"2022-06-28T11:08:10","modified_gmt":"2022-06-28T02:08:10","slug":"hacktivism","status":"publish","type":"lexicon","link":"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/en\/lexicon\/752\/","title":{"rendered":"Hacktivism"},"content":{"rendered":"\n<p>The term \u201chacktivism\u201d is a combination of the words \u201chack\u201d and \u201cactivism\u201d and refers to intentional hacking for social and political change.<\/p>\n\n\n\n<p>Here, a hack is an act, often performed in design, that intervenes in an existing system (technology) to create a new value beyond mere rational improvement. Massachusetts Institute of Technology (MIT), one of the birthplaces of hacking, has constructed a system of a unit of length called a smoot (one smoot is 67 inches\/170.18 cm), which is attributed to the height of a real person, Oliver Smoot. This system was used to calculate the total length of the nearby Harvard Bridge (364.4 smoot + an ear) in the 1950s. Levy\u2019s Hackers (1984) focused on \u201chackers,\u201d those who are passionate about hacking computers, and interviewed more than 100 people, including Richard Stallman, a proponent of free software. It introduces their ethics of access to systems, free use of information, and suspicion of authority. In this way, hacks that attempt to discover unexpected uses for various technologies, rather than simply using systems that have been built with sometimes large amounts of capital invested, can be seen as intelligent and sophisticated pranks that rebel against existing value systems, so to speak. The R2-D2 (car stop) on the Ohashi campus of Kyushu University is one example of this.<\/p>\n\n\n\n<p>Activism, however, is a term sometimes translated as \u201caggressive activism,\u201d and in the past it was often used to describe political protest or opposition, and in more confrontational cases was often confused with terrorism. In recent years, however, the term has been used to refer to active efforts for change that do not necessarily involve protest or opposition, such as shareholder activism, which refers to demands by shareholders for improved governance and increased corporate value.<\/p>\n\n\n\n<p>Hacktivism, a combination of the two terms, as well as activism, originally meant hacking as a political statement of intent. Pretty Good Privacy (PGP), a pioneering encryption technology announced by Phil Zimmerman in 1991, appealed for the realization of a society that respected the freedom and privacy of its citizens to the maximum extent possible by encrypting individual e-mails and files with this technology. One of his activities was to publish the source code of cryptography, which the US government regarded as a weapon at the time, as a book so that it could be legally used in countries other than the United States.<\/p>\n\n\n\n<p>Alexandra Samuel classifies this hacktivism into three categories based on its origin (hackers\/artists) and orientation (transgressive\/outlaw): political cracking, performative hacktivism, and political coding.<\/p>\n\n\n\n<p>Political cracking is a movement that is willing to deviate from the law to achieve its goals, such as a Distributed Denial of Service (DDoS) attack that makes websites inaccessible by massively requesting data from servers on the Internet.<\/p>\n\n\n\n<p>Performative hacktivism is a practice conducted by artists, often in the form of artworks. One example is The Hacking Monopolism Trilogy by Alessandro Ludovico and Paolo Cirio; \u201cGWEI (Google Will Eat Itself)\u201d (2005), which uses Google\u2019s AdSense advertising revenue program to purchase Google stock with Google\u2019s own funds; \u201cAmazon Noir\u201d (2006), which creates a book from Amazon\u2019s content search function; and \u201cFace to Facebook\u201d (2011), which builds a fictional dating site from the data of public Facebook photos. These works critique the very mechanisms of these companies, which have become the foundation of the Internet, through the construction of a working system.<\/p>\n\n\n\n<p>The third type, political coding, is an attempt to circumvent political measures by hacking. De-Content Scramble System (DeCSS) (1999), a program to lift restrictions on access to DVD videos by Jon Reck Johansen, and a series of activities to circumvent censorship on the Internet by Hacktivismo (1999\u2013) are early examples. If we consider various cryptocurrencies such as Satoshi Nakamoto\u2019s Bitcoin (2008) as an example of hacking the centralized monetary system of the state, then it can be said that the plan is succeeding well.<\/p>\n\n\n\n<p>In recent years, the target of hacking has expanded to physical space again, after passing through the interior of computers and the Internet. Among them are \u201cUSB Dead Drops\u201d (2010) by Aram Bartholl and his colleagues, in which USB sticks are embedded in the walls of public spaces to enable anonymous file sharing separated from the Internet (see figure). Simon Weckert\u2019s \u201cGoogle Maps Hacks\u201d (2020), in which he created traffic jams on Google Maps by carrying 99 smartphones in a wheelbarrow, is a good example of a hack that has the initial mischievousness of a hack, but also warns against the non-anonymity of the Internet and our over-reliance on online information. These attempts are positioned as theatrical hacktivism according to Samuel\u2019s definition. In terms of questioning the system that exists as a matter of course through individual practice, they correspond to the trends of tactical urbanism, which promotes the transformation of urban space through small actions by citizens, and personal fabrication, which aims to shift manufacturing from mass production of a small number of products by large corporations to mass production of a large number of products by individuals.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/wp-content\/uploads\/2021\/05\/1920px-Dead_Drops_by_Aram_Bartholl_sthemessage_in_Kunstenlab_6636685395-1024x768.jpg\" alt=\"\" class=\"wp-image-486\" srcset=\"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/wp-content\/uploads\/2021\/05\/1920px-Dead_Drops_by_Aram_Bartholl_sthemessage_in_Kunstenlab_6636685395-1024x768.jpg 1024w, https:\/\/www.cdfr.design.kyushu-u.ac.jp\/wp-content\/uploads\/2021\/05\/1920px-Dead_Drops_by_Aram_Bartholl_sthemessage_in_Kunstenlab_6636685395-300x225.jpg 300w, https:\/\/www.cdfr.design.kyushu-u.ac.jp\/wp-content\/uploads\/2021\/05\/1920px-Dead_Drops_by_Aram_Bartholl_sthemessage_in_Kunstenlab_6636685395-768x576.jpg 768w, https:\/\/www.cdfr.design.kyushu-u.ac.jp\/wp-content\/uploads\/2021\/05\/1920px-Dead_Drops_by_Aram_Bartholl_sthemessage_in_Kunstenlab_6636685395-1536x1152.jpg 1536w, https:\/\/www.cdfr.design.kyushu-u.ac.jp\/wp-content\/uploads\/2021\/05\/1920px-Dead_Drops_by_Aram_Bartholl_sthemessage_in_Kunstenlab_6636685395-720x540.jpg 720w, https:\/\/www.cdfr.design.kyushu-u.ac.jp\/wp-content\/uploads\/2021\/05\/1920px-Dead_Drops_by_Aram_Bartholl_sthemessage_in_Kunstenlab_6636685395-1200x900.jpg 1200w, https:\/\/www.cdfr.design.kyushu-u.ac.jp\/wp-content\/uploads\/2021\/05\/1920px-Dead_Drops_by_Aram_Bartholl_sthemessage_in_Kunstenlab_6636685395.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Aram Bartholl, Dead Drops, 2010<\/figcaption><\/figure>\n<\/div>\n\n\n<p>At a time when not only individual lives but also corporate activities and even national trends are influenced by technological platforms such as social networking sites, if we take our faculty\u2019s slogan of \u201chumanizing technology\u201d as an outpouring of individual will, then we cannot ignore the hacktivist attitude of intervening in existing systems and actively working to change them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"\u53c2\u8003\u66f8\u7c4d\">References<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Levy, Steven (1984), <em>Hackers: Heroes of the Computer Revolution<\/em>, Anchor Press\/Doubleday.\uff08\u30b9\u30c6\u30a3\u30fc\u30d6\u30f3\u30fb\u30ec\u30d3\u30fc\uff081987\uff09\u300e\u30cf\u30c3\u30ab\u30fc\u30ba\u300f\u53e4\u6a4b\u82b3\u6075\u30fb\u677e\u7530\u4fe1\u5b50\u8a33\u3001\u5de5\u5b66\u793e\uff09<\/li><li>Samuel, Alexandra Whitney (2004), <em>Hacktivism and the Future of Political Participation<\/em>, Harvard University.<\/li><\/ul>\n","protected":false},"featured_media":0,"template":"","lexicon_category":[],"class_list":["post-752","lexicon","type-lexicon","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/en\/wp-json\/wp\/v2\/lexicon\/752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/en\/wp-json\/wp\/v2\/lexicon"}],"about":[{"href":"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/en\/wp-json\/wp\/v2\/types\/lexicon"}],"wp:attachment":[{"href":"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/en\/wp-json\/wp\/v2\/media?parent=752"}],"wp:term":[{"taxonomy":"lexicon_category","embeddable":true,"href":"https:\/\/www.cdfr.design.kyushu-u.ac.jp\/en\/wp-json\/wp\/v2\/lexicon_category?post=752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}