SlideShare a Scribd company logo
Theft-based civic hacking: a
review




Stefan Magdalinski
Saturday 16th January 2010
                               1
Civic Hacking:

Fixing democracy by using
democracy’s own existing,
broken, rules.




                            2
1998: UpMyStreet.com




                       3
Tribute!




           4
2000: FaxYourMP.com




                      5
2005: WriteToThem.com




                        6
2005: WriteToThem.com League Tables




                                      7
2004: TheyWorkForYou.com




                           8
2004: The Official Hansard




                             9
A debate, done properly




                          10
Slice and Dice and All Things Nice




                                     11
2008 WhatDoTheyKnow.com – FOIA Filer & Archiver




                                             12
2005 FarmSubsidy.org




                       13
Farmsubsidy.org Results




    By 2010 full transparency on all
   end recipients of EU farm, fisheries
        & infrastructure subsidies




                                          14
Farmsubsidy.org Results




    By 2010 full transparency on all
   end recipients of EU farm, fisheries
        & infrastructure subsidies


           ~ $100 billion/year


                                          14
Recipe for Theft-Based Activism:

    1.   Identify broken civic institution
    2.   Liberate data from said institution
    3.   Build civic tools that are too useful to turn off
    4.   Leave with citizens for x years
    5.   Watch said institution reform
    6.   Doesn't necessarily need lots of users/money



                                                       15
Results


   Licensing:

   Ask forgiveness, not permission?




                                  16
Results


   Licensing:

   Ask forgiveness, not permission?

    No! the correct response is
    ‘Go F**k Yourself!’

    - this data is our right.


                                  16
Question:

What online democratic tools are there
in RSA, and what do you need?




                                 17
Thank You
stefan@whitelabel.org
http://www.twitter.com/smagdali




                                  18

More Related Content

Similar to Civic Hacking: a review

Oxford social media workshop
Oxford social media workshopOxford social media workshop
Oxford social media workshop
Catherine Howe
 
Open Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involvedOpen Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involved
Hack the Hood
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
tolshinoda
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
Jyrki Kasvi
 
32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making
Kirsten Fiedler
 
Transparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill LutzTransparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill Lutz
Clarity2010
 
Why College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing SerWhy College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing Ser
April Ford
 
Free Essay On Swot Analysis
Free Essay On Swot AnalysisFree Essay On Swot Analysis
Free Essay On Swot Analysis
Lydia Jana
 
Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014
IL Group (CILIP Information Literacy Group)
 
LECTURE 4 - Cyberculture
LECTURE 4 - CybercultureLECTURE 4 - Cyberculture
LECTURE 4 - Cyberculture
Kim Flintoff
 
[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli
e-Democracy Conference
 
Key Note Presentation - Jani Makraduli
Key Note Presentation - Jani MakraduliKey Note Presentation - Jani Makraduli
Key Note Presentation - Jani Makraduli
e-Democracy Conference
 
Se emp ppt
Se emp pptSe emp ppt
Se emp ppt
Catherine Howe
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
Teodoro Llanes II
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Saptarshi Ghosh
 
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In MarathiJai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Lisa Young
 
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
Pam Fenno
 
Piracy, Policy, Participation
Piracy, Policy, ParticipationPiracy, Policy, Participation
Piracy, Policy, Participation
Rob Jewitt
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...
Terry O'Brien
 
Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...
Steven Clift
 

Similar to Civic Hacking: a review (20)

Oxford social media workshop
Oxford social media workshopOxford social media workshop
Oxford social media workshop
 
Open Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involvedOpen Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involved
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making
 
Transparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill LutzTransparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill Lutz
 
Why College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing SerWhy College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing Ser
 
Free Essay On Swot Analysis
Free Essay On Swot AnalysisFree Essay On Swot Analysis
Free Essay On Swot Analysis
 
Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014
 
LECTURE 4 - Cyberculture
LECTURE 4 - CybercultureLECTURE 4 - Cyberculture
LECTURE 4 - Cyberculture
 
[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli
 
Key Note Presentation - Jani Makraduli
Key Note Presentation - Jani MakraduliKey Note Presentation - Jani Makraduli
Key Note Presentation - Jani Makraduli
 
Se emp ppt
Se emp pptSe emp ppt
Se emp ppt
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In MarathiJai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
 
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
 
Piracy, Policy, Participation
Piracy, Policy, ParticipationPiracy, Policy, Participation
Piracy, Policy, Participation
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...
 
Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Civic Hacking: a review