‘The Face Painter’

The term hacking originated in the 1950s from MIT Tech Model Railroad Club. If you look back to its origin, you will find that hacking in its time was not malicious activity and “hackers weren’t seen as evil”, with the term being related to light-hearted situations such as practical jokes in class.

Slowly, over the years this meaning has transformed and shifted into a negative light, conditioning us to see hacking as we do today; as malicious activity of evil people who steal our data and identities.

For my remediation this week I remixed a variety of sounds I associate with hackers and hacking into a SoundCloud. In creating this remediation, I began to notice my brain has been wired to associate hackers with these specific sounds as I have been heavily influenced by movies and the media, which in my case, has only conveyed hackers in a frightening, negative context.

 

 

 

 

LET’S BE FRIENDS / FOLLOW MY SOCIALS ♡

Twitter: @__nicolepap

Instagram: @__nicolepap

Etsy: TheFramedCollective

RedBubble: TFCollective

TikTok: @__nicolepap

 

 

 

 

4 thoughts on “‘The Face Painter’

  1. what a great use of audio and well crafted remediation! I like the manner in which you are exploring the history of hacking and portraying it in different lights!

    It is interesting that you used anonymous as your example! Whilst their work is often very serious and leads to dramatic consequences, they tend to do so in a humorous manner. A few years ago the CEO of a company that specialises in cyber security had bragged that his company had infiltrated anonymous, only to have their website shut down, and incriminating emails posted onto the CEOs twitter feed. Read about it here:

    https://www.livescience.com/33599-best-hacks-anonymous-hacktivism.html

    Great work! keep it up!

    Liked by 1 person

  2. Hey Nicole! Really good post. I found it super creative how you created a souncloud of sounds to represent your thoughts. Like yourself, I also relate hackers as frightening and in a negative context. However, after researching deeper into hackers I have learnt so much. For instance, Computer offenders, for their own private benefit, victimise others. Computer hackers are unathorised users who break in and out of computer systems to rob, alter, hijack or ruin data, often through the installation of hazards. I also found that health care is the top industry to be hacked in the deep dark web. I would recommend having a read of this SNS technology article – https://www.snstechnologies.net/general-information-on-hacking.php – it provides great insight to this topic! However, really awesome blog 🙂

    Liked by 1 person

  3. Hey Nic,
    I loved your remediation! Hearing all those sounds brings back memories of watching films like Tron and Mission Impossible, where hacking has been a prominent for a while. It’s amazing how shady Hacking seems, when originally it started as a way of testing computers and coding to help improve. I don’t think it’s fair to refer to all Hackers as evil and unlawful, since most Hackers simply aim to improve upon and share information and coding.

    One source I found for this topic gives an overview of the different classes of people within the Hacking Culture, and only one of those classes, the Black Hat Hacker, uses Hacking for malicious purposes or self-gain, whereas the other seven classes use hacking for entertainment or security purposes.

    Feel free to check out my take on this topic!

    Hayden.

    https://curleyh.home.blog/2019/10/09/hacker-culture/
    http://subcultureslist.com/hacker-culture/

    Liked by 1 person

  4. You’ve perfectly captured the sounds I too associate with the term “hacker”. This “evil”, “malicious”, anonymous person that steals your data is nothing like the original term from the 1950s. I think as we’ve technologically developed, the internet has become a more unpredictable, hard to control place, and it is this uncertainty that has in fact created this “hacker” persona. The article that I posted on my twitter this week comments on the difference between a “hacker” and a “cracker”, and the motivations behind the two. Give it a read if you get the chance:

    https://securitytrails.com/blog/hacker-vs-cracker

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s