computers – This Magazine https://this.org Progressive politics, ideas & culture Thu, 07 Oct 2010 14:17:10 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.4 https://this.org/wp-content/uploads/2017/09/cropped-Screen-Shot-2017-08-31-at-12.28.11-PM-32x32.png computers – This Magazine https://this.org 32 32 Guerrilla Gardening video game sows digital seeds of change https://this.org/2010/10/07/guerrilla-gardening-video-game/ Thu, 07 Oct 2010 14:17:10 +0000 http://this.org/magazine/?p=1959 Screenshots from the forthcoming indie video game Guerrilla Gardening

Screenshots from the forthcoming indie video game Guerrilla Gardening

Can a gardening video game change the world for the better?

In a medium that features an overwhelming focus on war-themed shoot-’em-ups, a video game about social change through gardening is a definite change of pace. And if the duo behind Guerrilla Gardening have their way, it will also inspire players to raise a trowel and start sowing the seeds of revolution themselves.

In development for nearly two years, Guerrilla Gardening features a unique mix of stealth and puzzle gameplay. Your goal is to overthrow an evil dictatorship by inspiring citizens to make a change. To do this, you’ll have to plant flowers around government propaganda to make the citizens happy, while avoiding the ever-vigilant police.

According to artist-designer Miguel Sternberg, the idea came from a blog post about the burgeoning guerrilla gardening movement.

“I had already sort of been thinking about games that were about protest and social change and street art,” he explains. “Then I read about guerrilla gardening and I was like, ‘Oh, wait, this basically takes all of the things I’ve been sketching about in my notebook as ideas and lets me put them all into one game.’”

Along with his partner, programmer Andrew Pilkiw, Sternberg hopes the game’s theme will help their company, Spooky Squid Games, reach new audiences.

“Like most indie developers, we’re doing it for ourselves, making the sort of game we’d like to play,” says Sternberg. “But I also think that along with hitting the hardcore indie gaming set, it will also hit people who are interested in the theme: the fact that it’s a gardening game.”

As for when Guerrilla Gardening will finally be released, the team says simply, “When it’s done.”

]]>
From a Toronto basement, Citizen Lab fights tyranny online https://this.org/2010/03/22/citizen-lab-internet-web-security/ Mon, 22 Mar 2010 12:44:41 +0000 http://this.org/magazine/?p=1427 As the internet becomes a global battlefield, a clutch of Canadian programmers are subverting oppressive regimes, aiding online dissidents, and mapping the murky new world of digital geopolitics

Users vs governmentsThe Dalai Lama is charged with watching over Buddhist tradition, but on March 29, 2009 The New York Times revealed a shadowy presence was secretly watching him, invisibly sending information about the religious leader to his anonymous attackers. When the story broke, the office of the Dalai Lama believed it was dealing with an ordinary computer virus. It turned out to be something more widespread, organized, and ominous.

Long before The New York Times, Canada’s Citizen Lab was on the case. Based at the University of Toronto, Citizen Lab is a global leader in documenting and analyzing the exercise of political power in cyberspace. The Lab’s 10-month investigation into the virus that had lodged in the Dalai Lama’s desktop revealed it was in fact just one of 1,295 compromised computers in 103 countries, many found in embassies, government agencies, and significantly, Tibetan expatriate organizations. The researchers at Citizen Lab dubbed the network GhostNet, which spread through a malicious software program—“malware,” in technical circles—called Gh0st RAT. Gh0st RAT spread via email to high value targets: diplomats, politicians, the Dalai Lama. Once installed on a target’s computer it provides barrier-free access to an intruder, giving them full control of the system as if it were their own. This allowed the thieves to bring sensitive documents back to four control servers in China. Worse, Gh0st RAT allows its operators to take control of an entire computer in real-time, giving them the unfettered ability to see and hear their targets through the computer’s webcam and microphone.

It’s virtually impossible to determine whether GhostNet was a work of cyber-espionage by the Chinese government or a single hacker who wanted to make it look that way. In January 2010, search giant Google admitted they were one of 30 companies attacked by the latest version of Gh0st RAT and threatened to shut down the Chinese version of its site. Computer security firm Verisign reported it had traced the attacks back to “a single foreign entity consisting either of agents of the Chinese state or proxies thereof.” Beyond China, countries around the world are increasingly using the internet for espionage and intelligence-gathering. Observers report more viruses, more trojan horses, more botnets, more surveillance, more censorship and more denial-of-service attacks. The tactics are being used by governments and independent groups alike for intelligence gathering, terrorism, national security and religious or political propaganda. Most of it happens secretly, obscured by layers of technical complexity. In the early 2000s, China was a leader in cyber-espionage, but it has lately been joined by more players: Saudi Arabia, Russia, North Korea, Iran, the U.S., and Canada.

We are witnessing, the Citizen Lab researchers believe, the weaponization of cyberspace.

“I realized there was a major geopolitical contest going on in the domain of telecommunications,” says Professor Ron Deibert, Citizen Lab’s founder and head researcher. “The information environment today is mediated through telecommunications. So being able to control, access and retain information through those networks are vital sources of intelligence. This was happening, but it wasn’t being talked about.”

Deibert isn’t new to the intelligence game. He worked as policy analyst for satellite reconnaissance in the Canadian Ministry of Foreign Affairs, but it wasn’t until he wrote a book about major technological shifts in history, and started researching his PhD—documenting how rapid technological changes of the information age affected global politics—that he began investigating the war that would set him on the path to being the “M” behind the Citizen Lab.

“Our technological advantage is key to America’s military dominance,” said U.S. President Barack Obama in a May 2009 speech on his administration’s plans for the militarization of the internet. “From now on, our digital infrastructure—the networks and computers we depend on every day—will be treated as they should be: a strategic national asset. Protecting this infrastructure will be a national security priority…. We will deter, prevent, detect and defend against attacks, and recover quickly from any disruptions or damage.” In the same speech he assured the world his security plan would not infringe on internet freedom or personal privacy. The U.S. Department of Justice, however, argues (though far less publically) it can’t be sued for illegally intercepting phone calls or emails—unless they admit what they’re doing is illegal, which they won’t.

It’s this kind of secrecy (in the name of national security or not) that Citizen Lab exposes. The small team of researchers and benevolent hackers, who work in the basement of the Munk Centre for International Studies at Devonshire Place in Toronto, watch the watchers and document the shadow war most are too busy updating their Facebook pages to notice. But more than that, Deibert wants to see Canada put its peacemaking reputation to work to lead the way in drafting a constitution for cyberspace among the nations of the G8. He believes Canada can be a leading guardian of the free and open internet, a valuable global commons worth preserving, on par in importance with land, sea, air and space.

Oppressive regimes get the upper hand

Average internet users—the ones doing their banking, their shopping, or their FarmVille cultivating on the brightly lit thoroughfares of the web—are relatively safe from the cyber-spooks of the world. But if you challenge your government, expose injustice, or work for humanitarian ends in hostile places like China, Iran, Syria, Sudan, and Pakistan, it can become a dark, threatening place pretty quickly.

Deibert wanted to expose these injustices on behalf of citizens everywhere, but quickly discovered there were places he couldn’t go as a political scientist. So, with a research grant from the Ford Foundation, he launched the Citizen Lab in 2001 and began assembling a team dedicated to his two-pronged mission: monitoring and analyzing information warfare, and documenting patterns of internet censorship and surveillance.

The first major partner for the Citizen Lab was the SecDev Group, an Ottawa-based think tank that engages in evidence-based research targeting countries at risk from violence and insecurity. Its CEO, Rafal Rohozinski, was the man originally responsible for connecting all the countries in the former Soviet Union to the internet.

That meant he knew everyone who was anyone when it came to cyber-espionage in a region known for its deep ranks of hackers. This was the beginning of a vast network of agents who would later prove invaluable to all Citizen Lab operations. In those first days together with Rohozinski, Deibert also developed the methodology from which all Citizen Lab missions stem: A combination of technical reconnaissance, interrogation, field investigation, data mining, and analysis. In other words, the very same techniques used by government intelligence agencies like the National Security Agency in the U.S. and its Canadian equivalent, Communications Security Establishment Canada (CSEC). But this time, the expertise would be in the hands of the people.

“We wanted to take that combination of technical and human intelligence to turn it on its head,” Deibert said. “These organizations are using these techniques for national security purposes. They are watching everybody else, no one is watching them, and we wanted to watch them.”

Next, Deibert needed a powerhouse legal team. “We don’t break Canadian laws, but we do break the law in just about every other country,” he says. That’s why he partnered with the Berkman Center for Internet and Society. Based at Harvard Law School, this gives Deibert and his team access to a network of some of the best legal scholars in the country.

None was more vital than the final piece of the puzzle. All wars need soldiers and Citizen Lab needed the very best computer scientists, programmers, software developers and data analysts. All of whom were handpicked by Deibert from an unlikely recruitment pool: his own political science course.

“I came from a country where those in power were willfully blocking access to the net,” says Singapore-born James tay. “I knew Citizen Lab was something i wanted to do.”

The Munk Centre has all the architectural hallmarks of an English boarding school, left over from its days as a men’s university residence at the turn of the century. Few visitors have any idea what goes on beneath their feet in Citizen Lab’s dimly lit basement headquarters, but two of Deibert’s lieutenants have agreed to let me ride along on one of their online patrols.

Born and raised in Singapore, research associate James Tay has a personal stake in Citizen Lab’s mission. “I came from a country where those in power were willfully blocking access to the net. I just thought it wasn’t right, so when I heard about the lab tracking censorship and finally holding these governments accountable, I was like, ‘Okay, yeah, this is something I want to do.’”

That’s why, when riots broke out in Iran following its corrupted June 12, 2009, election, Tay was at Citizen Lab, keeping Iran’s lines of communication open. The Iranian government was blocking opposition leader Mir-Hossein Mousavi Khamenei’s website, along with Western-run sites such as YouTube and Twitter. Opposition supporters needed a way to stay connected online, to share information and coordinate their response to the crackdown.

The battering ram that broke through Iran’s online barriers is called Psiphon. Developed first by Citizen Lab, the software is now its own commercial entity, helping to fund the lab’s academic research. Through small chinks in the Iranian government’s armour, Tay was able to send a short, crucial message to people inside Iran who needed unrestricted access to the web: the snippet of text he was charged with sneaking over the border through TweetDeck—software that communicates through Twitter without requiring an actual visit to its website— was an encrypted link to the Psiphon web server, a tunnel through the blockaded border that allowed users to see the web unhindered by Iran’s online filters. Once connected, Psiphon is simple to use: It appears as a second address bar in the web browser and delivers internet traffic through proxy sites that haven’t been blocked yet. Block one, and the data simply changes its route to the user. During the crisis, Tay was trusted with making sure Psiphon ran without Iranian governmental interference, allowing thousands of people to liberate their internet connections.

“Psiphon is open-source and free to the user, but the BBC and big media pay us money for the right to spread our proxy to their readers and viewers,” says Tay.

Psiphon isn’t for everyone, though. It doesn’t provide anonymity, for one, something that Psiphon users are made aware of before using it. Even so, many Iranians still used the service, often at great personal risk.

“Some of them were trying to organize rallies,” says Tay. “I saw that on Twitter a lot.”

But even more dangerous research is directed by the lab, just collecting the data risks the threat of imprisonment or torture if discovered by the offending country’s oppressive government. The project is known as The OpenNet Initiative.

If you stumble upon a site a sitting government doesn’t agree with, it may simply look like a problem with your internet connection. But that error page could be a fake. “These governments may publicly claim to block sites to protect the morals of their citizens, then use the same technique to block the site of a politician they don’t agree with,” says Jonathan Doda, Citizen Lab’s software developer for OpenNet. “They set up the error page because they don’t want people to know. The good news is they’re pretty easy to spot.”

“What’s most popular these days is proxy based blocking,” Doda says—in which a country’s internet connection is shunted through a single gateway that allows a regime to filter all the web traffic in and out— “or some American filtering software—the same thing you find in libraries and schools or some private businesses.” In every case, the country’s internet service provider intercepts your connection and substitutes an error page.

Sometimes, the error is legitimate. After all, internet connectivity in many parts of the world can be slow and unreliable. That’s why Doda must gather evidence of governments’ intent through extensive testing. His team accesses sites multiple times and compares what happens from within Canada to what happens from inside the suspected country.

Users fight back

Doda’s been programming since he was a kid, making software in BASIC on his PC Jr. It was fairly easy for him to create “rTurtle,” the software that collects the data, looking for anomalies like dummy IP addresses, weird-looking address headers and missing keywords in the returned page. The lab needed a way to test within the offending countries, but the lists of blocked sites are determined by religious or political elites and implemented by centralized internet providers in target countries—closed systems that are virtually impossible to penetrate as an outsider.

But Rafal Rohozinski’s international reach gave Citizen Lab the ability to recruit agents within those ISPs and other high-value positions in repressive countries’ internet hierarchies. “In Central Asia alone, we have a network of about 40 individuals working for us,” says Deibert. Some of them are literally putting their life on the line—guilty of treason for working with Citizen Lab.

“Going to Burma and running the software that Jonathan developed in an internet café—that’s life-threatening research,” says Deibert. “The person doing that would have to be aware of the risks.” Those risks range from arrest, imprisonment, and interrogation, to torture and death. Deibert knows people have been arrested under similar circumstances, so OpenNet’s work requires a delicate protocol.

“Jonathan might not know the names of testers in certain countries. I might not even know their names,” says Deibert. “They’ll have a key and it’ll be used to unlock that data they need to run the software. We don’t know who they are. There will be a person who mediates their communication with us. If Jonathan were sent to Syria and got captured, he wouldn’t be able to give out a tester’s name.” For everything at stake, you’d never know the risks by stepping into the lab. Among the islands of computer terminals and the big red vinyl couch off to one side, the only thing remotely James Bond-ish is a hollow world globe stocked with contraband cigars and bottles of alcohol from the countries they’ve visited. But for all they do for others, the Citizen Lab largely ignores internet censorship and surveillance at home.

“I’m not worried as much about Canada. We have a government that’s largely accountable. Despite all the problems, we still live in a democracy that includes the benefits of humanitarian law and respect for human rights. If I did this research in Uzbekistan, I’d be jailed and tortured within the hour,” says Deibert.

Canada has cyber secrets of its own that often escape public notice. There are two bills before parliament collectively called “lawful access” meant to aid law enforcement in obtaining information needed to make an arrest. (Both bills were put on hold when parliament prorogued in December, but they appear to be Conservative government priorities and are likely to be reintroduced.)

“The approach we’ve taken is to respect civil liberties to the fullest extent possible by recreating in the cyber world the exact same principles that have been applied in the analog world. In order for police to obtain the content of emails, or intercept phone calls over the net, they will require a warrant,” says Peter Van Loan, Canadian Minister of Public Safety.

That isn’t the whole story, says David Fewer, director of the Canadian Internet Policy and Public Interest Clinic, based at the University of Ottawa’s Faculty of Law.

At the moment, police can’t force ISPs to hand over a customer’s name and address without a warrant, but the lawful access legislation will allow them to do just that.

“It’s bad enough that ISPs can give over that information if they want,” says Fewer. “Obviously our view is it shouldn’t be made available.” For now, there’s an unofficial compromise: for child pornography allegations, most ISPs give up the information, but for other crime such as fraud, police still need a warrant. Fewer says the informal understanding isn’t good enough.

“The system should be formalized, so there’s a formal response across the board,” Fewer says. “Police should be obliged to get a warrant except in cases of imminent harm, akin to a search warrant.” But police forces are currently demanding search warrant standards be relaxed. “There are sliding scales they’re demanding on certain search warrants. Ordinarily, police have to give ‘probable cause’ and they want that standard to be replaced with ‘reasonable suspicion.’”

Canada’s democratic laws don’t keep you immune from the government’s roving eye in cyberspace, either. “We have to start with the assumption that everything we do on the internet is public,” says Deibert, “and then work backwards and say, ‘What of my communication is private?’ Since potentially, at every step along the way, you can be monitored.”

In your terms of service agreement with Rogers or Bell they have the right to retain, store or turnover any information they provide you as a service including web history, web addresses, emails, and chat logs to the Canadian government for intelligence gathering and law enforcement purposes. CIPPIC is fighting various court battles around the disclosure of user identity to thirdparties online.

“We need courts to carve out some mechanism for preserving respect for privacy online,” says Fewer, “because privacy is a human right.”

Deibert wants the nations of the world to establish their own formalized treaty for the internet, one that treats cyberspace as a public commons and halts the aggressive arms race that threatens to further erode our basic rights. But drafting such an agreement will prove difficult, as security concerns continue to override basic rights.

Citizen Lab's agents are often unknown, even to Deibert himself. “going to burma and running our software in an internet café—that’s life-threatening research,” he says.

Incidents like GhostNet demonstrate that even when all signs point to a massive national espionage plot, online attacks are difficult to trace, and governments nearly always enjoy plausible deniability.

“Even when we have lots of evidence that indicates a country may be behind it, the government denies any association,” says Van Loan. “Attacks are extremely hard to trace. What would likely happen is wholesome, good players would follow it, but the bad operators would continue to operate outside of it.”

And such a treaty could abuse as much as protect. “Anonymity is viewed [by governments] as a tool of terrorists and hate-mongers and—in the negative sense— whistle-blowers,” says Fewer. He fears any such treaty would inevitably morph into a cyberspace trade agreement, further tightening abusive intellectual property laws and scaling back civil liberties at an accelerated pace. “You need a tragedy for anything good to come out of a treaty like that. The International Declaration of Human Rights was the result of the First World War.”

With six billion people on the planet facing global problems, Deibert says the real tragedy is losing the open and unfettered ability to communicate globally, but Van Loan sees no other choice. “It is really the new arms race. Every time we erect new barriers and protections some smart, tech-savvy individual comes along and finds ways around those defenses.”

For the moment, it will have to be enough to know that Citizen Lab will be watching the watchers. James Tay admits he takes his work a little too seriously. “I don’t sleep,” he says. “This isn’t your typical 9-5 job. I regularly find myself responding to emails in the middle of the night. Ron wants us to sleep, but this isn’t a job for me. It’s something I live and breathe.”

]]>
Canadian independent video-game designers score big internationally https://this.org/2009/09/23/independent-video-games/ Wed, 23 Sep 2009 16:27:49 +0000 http://this.org/magazine/?p=701 Gameplay in Critter Crunch for the Playstation 3. Image courtesy Capybara Games.

Gameplay in Critter Crunch for the Playstation 3. Image courtesy Capybara Games.

On May 5, 2006, 35 Toronto area video-game developers converged in one spot with a particular goal in mind: to create an entire game, start to finish, in just three days. It was a daunting task, but in the end 10 completed games were assembled, while seven others came just short of the deadline. The Toronto Game Jam—or TOJam as it is more commonly known—is now in its fourth year and is a superb showcase of the ever-growing independent game development community that has formed in Canada’s biggest city.

Canada has been at the forefront of the games industry for some time, but, in traditional Canadian fashion, has been rather quiet about it. Cities like Vancouver and Montreal are home to some of the biggest development studios on the planet; meanwhile a lack of major studios has made Toronto a hotbed for independent game developers.

One of the games to come out of that very first TOJam, titled Bubble Thing, was created in its entirety by just one man: Jonathan Mak. Mak followed this up with a game called Everyday Shooter, which he describes as “an album of games exploring the expressive power of abstract shooters.” In many ways it plays like a traditional arcade game, but its abstract visuals and organic sound design made people take notice. This included folks at Sony Computer Entertainment, who upon seeing the game at the 2007 Independent Games Festival (IGF), asked Mak to create a version of Everyday Shooter for the PlayStation 3, where it became a critical and commercial success.

This story isn’t unique. In fact, a Toronto-based developer is almost always in the running at the IGF. Metanet Software grabbed the Audience Choice award in 2005 for its game N, while Capybara Games snagged two awards in 2008 for their puzzle game Critter Crunch. Both studios have gone on to create new versions of these awardwinning games for traditional gaming platforms. “Toronto really doesn’t have any ‘large’ studios,” Capybara co-founder Nathan Vella explains. “There just weren’t a lot of opportunities to get a job in gaming here, assuming you go the traditional route.”

Because of this, Vella and several other members of the Toronto chapter of the International Game Developers Association eventually decided to forge their own path, and thus Capybara was born. They started out small, working mostly on projects for mobile phones, but have since expanded to create titles for the PS3, iPhone, and Nintendo DS.

Vella also believes that the early success of pioneers like Metanet and Mak has a lot to do with the current state of the city’s development scene. “They made awesome games that got critical acclaim and commercial success,” he says. “They helped put Toronto on the map, and inspired a lot of people who maybe didn’t think it was possible to survive as an indie here.”

It also doesn’t hurt that government programs like the Ontario Media Development Corporation help to fund just these sorts of companies.

“Metanet certainly wouldn’t be here without support from the OMDC, who have allowed us to travel to industry events and realize our ideas by providing us with funding,” co-founders Mare Sheppard and Raigan Burns explain via email. “Other funding through Telefilm and the Arts Councils has also been important. It’s a great city to be a small games developer in—there is so much enthusiasm and support that makes it possible to get closer to success.”

The landscape may soon change though, as Ubisoft, one of the largest game publishers in the world, will be opening up a studio in the city’s downtown core by the end of this year. The studio is expected to create 800 new jobs over the next decade and is costing the Ontario government $263 million. What effect this will have on the thriving indie community remains to be seen, but it doesn’t seem to faze the Metanet duo of Sheppard and Burns.

“We indies will keep doing what we do.”

]]>
Friday FTW: Gay geek hero Alan Turing gets apology from UK government https://this.org/2009/09/11/alan-turing-apology/ Fri, 11 Sep 2009 15:49:51 +0000 http://this.org/?p=2475 Alan Mathison Turing, computing pioneer and forgotten gay icon.

Alan Mathison Turing, computing pioneer and forgotten gay icon.

Alan Turing, pioneer of the digital computer, codebreaking war hero, and godfather of geeks everywhere, got a posthumous apology yesterday — many years overdue — from the British government. Prime Minister Gordon Brown issued a statement acknowledging the government’s “appalling” treatment of Turing when it tried and convicted him of “gross indecency” based on his sexuality, and sentenced him to chemical castration in 1952.

The apology came after more than 30,000 Britons signed an online petition asking the government to apologize for this injustice.

The statement reads, in part:

Turing was a quite brilliant mathematician, most famous for his work on breaking the German Enigma codes. It is no exaggeration to say that, without his outstanding contribution, the history of World War Two could well have been very different. He truly was one of those individuals we can point to whose unique contribution helped to turn the tide of war. The debt of gratitude he is owed makes it all the more horrifying, therefore, that he was treated so inhumanely. In 1952, he was convicted of ‘gross indecency’ – in effect, tried for being gay. His sentence – and he was faced with the miserable choice of this or prison – was chemical castration by a series of injections of female hormones. He took his own life just two years later.

Thousands of people have come together to demand justice for Alan Turing and recognition of the appalling way he was treated. While Turing was dealt with under the law of the time and we can’t put the clock back, his treatment was of course utterly unfair and I am pleased to have the chance to say how deeply sorry I and we all are for what happened to him. […]

So on behalf of the British government, and all those who live freely thanks to Alan’s work I am very proud to say: we’re sorry, you deserved so much better.

]]>
5 better ways to recycle your old computer https://this.org/2009/09/08/e-waste-recycling/ Tue, 08 Sep 2009 13:07:30 +0000 http://this.org/magazine/?p=631 There are better ways than the scrap heap to deal with an old computer. Creative Commons photo by Flickr user ÇP.

There are better ways than the scrap heap to deal with an old computer. Creative Commons photo by Flickr user ÇP.

You know it’s wrong to toss your e-waste in the trash but you also know that too often e-waste ends up in a country like India or China, where labourers are exposed to toxic fumes and cancer-causing dioxins as they strip down old electronics, and discarded heavy metals end up contaminating local soil and water.

Unfortunately, there are no national standards for e-waste recyclers, so making sure your old PC isn’t being illegally shipped overseas requires a bit of work on your part. Here are five tips to help you out with that process:

  1. Contact your province’s recycling council or your regional district office for a list of recommended recyclers. Bear in mind these recyclers are only “recommendations,” so you’ll have to exercise due diligence. Ask whether they carry an ISO number, which certifies they adhere to internationally recognized business and environmental standards. Also ask how they recycle e-waste. Locally? In what types of facilities? Some recyclers will send components to specialized smelters in Europe, but that’s rare. Any mention of sending e-waste to India, Africa, or China should raise red flags.
  2. Find a reputable computer refurbishment centre such as reBOOT or Industry Canada’s Computers for Schools. Both agencies will give new life to your end-of-life hardware and distribute it to a non-profit or charity. You can find your nearest reBOOT or Computers for Schools program on their websites.
  3. Living in Western Canada? Then drop off your e-waste at London Drugs. This electronics and pharmacy chain even accepts hardware purchased elsewhere for a nominal fee—$5 for a laptop, $10 for a desktop.
  4. Consider returning your hardware to its retailer or manufacturer. Most national electronics retailers use reputable recyclers, as do manufacturers like Dell, Apple, and HP, which all have programs that allow you to mail back discontinued hardware.
  5. Here’s one option that’s so easy, it doesn’t even require you to find a recycler: reducing. “Most of us who email and surf the web don’t need anything more powerful than a Pentium III,” says Vancouver reBOOT general manager Robert Gilson. So think twice before you buy your next cellphone or laptop. You’ll do the environment—and your wallet—a favour.
]]>
Queerly Canadian #18: Apologizing to Alan Turing, forgotten gay icon https://this.org/2009/08/24/alan-turing-gay-icon/ Mon, 24 Aug 2009 12:34:09 +0000 http://this.org/?p=2307 Alan Mathison Turing, computing pioneer and forgotten gay icon.

Alan Mathison Turing, computing pioneer and forgotten gay icon.

The other day I stumbled across a petition asking that the British government apologize to Alan Turing for “the tragic consequences of prejudice that ended [his] life and career,” and formally acknowledge the significance of his work.

Here’s some background. Alan Turing is most readily associated with the Turing Test, which sought to demonstrate whether a machine could think. The test, basically, involves a text-based conversation a human conducts with another human and with a Turing Machine. If he can’t tell whether he’s conversing with a human or machine, the machine passes the test.

The 1950s paper in which Turing laid out the test, and the conception of intelligence that it embodied, became one of the most influential in philosophical literature. It is still essential to most philosophical discussion of artificial intelligence and the essence of human consciousness.

Even more significantly, Turing was a codebreaker during the Second World War, ultimately devising a machine that could decipher the Germans’ Enigma Code. The Enigma Machine was so useful that some historians claim the information it intercepted hastened the end of the war by as much as two years.

Turing was also gay, a crime for which he was criminally prosecuted and chemically castrated. The conviction ended his career, and at the age of 41 he committed suicide.

Turing’s treatment at the hands of his own government is a detail absent from many histories of his work, and certainly absent from Enigma, the 2001 movie about the development of the codebreaking machine that substitutes Turing with a heterosexual character called Tom Jericho.

It’s particularly gratifying to see the tech community, which launched the campaign and petition, take on the cause of homophobia. And I think, even so many years after the fact, that the apology they are demanding on Turing’s behalf is warranted. Especially when you consider what it might have meant for the Second World War, and for students of the philosophy of mind, if Turing’s conviction had happened earlier in his career, before he could do the work for which he became known.

Of course, Turing was far from the only man to be convicted of “gross indecency” under the act that criminalized homosexuality before it was repealed in 1956 (’76 in Scotland)—Oscar Wilde being the most famous example. With this in mind, I wonder if this petition should go further.

Perhaps we should be asking that an apology be extended to all those who fell afoul of anti-homosexuality laws and had their careers cut short on the cusp of greatness—those whose contributions we will never know.

The petition is available to British residents and expats here: http://petitions.number10.gov.uk/turing/

]]>
Whatever happened to “Hackers”? https://this.org/2009/05/25/hackers-hacktivists/ Mon, 25 May 2009 16:03:52 +0000 http://this.org/magazine/?p=226 The hype’s died down, but cybercrime still thrives

In the 1980s and ’90s, the term hacker struck fear into a public still new to the web — basement-dwelling loafers who were happy to take down a network or website for bragging rights. Since then new online fears have popped up that have reduced hackers to the title of an early Angelina Jolie movie. So what happened to all the geeks? Did they all leave the basement and get normal jobs? Not quite, says Craig Silverman, co-author of Mafiaboy: How I Cracked the Internet and Why It’s Still Broken. Hackers are still very much around and often responsible for our latest set of computer-related fears.

A map of global internet usage compiled by opte.org. For details of the mapping project, see their website. Creative Commons licensed.

A map of global internet usage compiled by opte.org. For details of the mapping project, see their website. Creative Commons licensed.

Operating mostly out of Eastern Europe and Russia, cyber-gangs can make a lot of money either stealing and selling personal information, or using denial-of-service attacks to blackmail businesses, says Silverman. Victimized companies will sometimes purposely keep these attacks under wraps to avoid the negative attention. “That can hurt their stock price, that can hurt their brand,” Silverman says, which may be why we’re hearing about hacking less.

Other hackers have gone undercover — working with governments. “There is an arms race in cyberspace that’s very troublesome,” says Ronald J. Deibert, director of Toronto’s Citizen Lab at the University of Toronto. He explains that states develop or contract out network attacks against other governments, or to take down websites they find threatening.

But there are still hackers out there who are happy to be in the spotlight. “Hacktivists,” like Deibert and his colleagues at the Citizen Lab, use their hacking skills for good, to subvert censorship or uncover wrongdoing. In March, Citizen Lab made international headlines when they revealed a massive, Chinese-based cyber-spy ring called GhostNet that was tageting computers belonging to everyone from the offices of the Dalai Lama to foreign embassies. The thrill of exploration that inspired hackers from the beginning still exists, Silverman says. “There are still people who are enamoured with the internet and technology and computers, and just want to gain knowledge, and they take things apart. And that’s sort of the core hacker ethic.”

]]>