For my video editing assignment, I decided to create a highlight tape from one of our recent lacrosse games. The video contains all the goals from our game against Army on February 18th. Unfortunately, the audio was removed for copyright reasons, but here is a link to the video anyways. Professor Howlett, if you would like to see the video with the audio, I’d be happy to send it to you.

I’m going to have to start off by saying that, being a computer science major, I have a tendency to not only sympathize with hackers and their “wrongdoings” but to applaud them. We live in a world where you can do anything on the Internet. You can literally survive without every having to leave your house thanks to the Internet. The problem with the way the Internet works is it’s so expansive and can be added to by basically anyone, it’s hard to tell what information can be trusted. On the other hand, when something does become public and gets posted online, as is a common occurrence with hacker-related incidents, it can be spread all across the globe in seconds. The precedent that hacking is a good thing can be a dangerous one. This was illustrated in the most recent season of South Park, in which a Danish company creates a computer program that can display any person’s Internet history with the click of the button, and it understandably causes absolute chaos. This, while a very unrealistic example, can give you an idea of the capabilities of hackers. If you pissed off a hacker, he/she could expose your entire existence on the internet. Thankfully, most hackers use their skills for one of two reasons: they hack whoever they want but only do so for personal reasons (boredom is a common one) and never actually use it to harm anyone, or to expose information that is misleading or being censored for whatever reason. A large majority of hackers have a kind of moral compass that is guided by what has become known as the “hacker ethic”, which, as defined by the phrase’s creator Steven Levy, is a “shorthand for a mix of aesthetic and pragmatic imperatives: a commitment to information freedom, a mistrust of authority, a heightened dedication to meritocracy, and the firm belief that computers can be the basis for beauty and a better world”. Under this ethic many hackers have done the Internet justice. Examples include Edward Snowden exposing the NSA’s illegal surveillance of American citizens and the “hacktivist” group Anonymous who, among countless other campaigns, exposed the Church of Scientology’s recruiting video of Tom Cruise falsely advertising the “benefits” that the church could offer its members, after they gave the church several hundred dollars a year in membership fees of course.

Advertisements

One thought on “Troll Trace and iMovie

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s