Biographical information

Name

John McNabb

Biography

IT PROFESSIONAL
Desktop Support Tech, Atlantic Trust, Boston
South Shore PC Services
Infrastructure Security Labs
AUTHOR
Chapter: “Chemical and Biological Threats Against Public Water Systems” Weapons of Mass Destruction and Terrorism, 2d Ed. by Howard & Forest ,McGraw-Hill, 2012 (including cyber threats).
Journal of the New England Water Works Association, four articles including two on cyber security.
Working on book Drinking Water Critical Infrastructure Security expected to be completed early 2017
Write SF, unpublished so far.
PRESENTATIONS ON CYBERSECURITY:
2012 – Black Hat Summit @ DESIGN West, HOPE Number 9, ICSJWG, Source Boston, Thotcon
2011 – Shmoocon, Black Hat USA, DEFCON 19
2010 – The Next HOPE, DEFCON 18
EDUCATION:
Bowdoin College, B.A., 1978 – psychology major

Previous Works

Chapter: “Chemical and Biological Threats Against Public Water Systems” Weapons of Mass Destruction and Terrorism, 2d Ed. by Howard & Forest ,McGraw-Hill, 2012

Best known for

PRESENTATIONS ON CYBERSECURITY:
2012 – Black Hat Summit @ DESIGN West, HOPE Number 9, ICSJWG, Source Boston, Thotcon
2011 – Shmoocon, Black Hat USA, DEFCON 19
2010 – The Next HOPE, DEFCON 18
EDUCATION:

Occupation

IT Professional research sybersecurity and SF & hacking

Story Ideas and Burning Questions

Now writing a paper & researching the interaction between hackers, computing, and science fiction within the feedback loop of technology and science fiction. Science fiction does not predict the future, it shapes it. Technology inspires science fiction writers. Science fiction as a whole then creates an awareness and desire in society to improve the technological climate. A story may also inspire a technologist or hacker to pursue innovation. This improved technology inspires other writers and the feedback loop keeps turning. There also have been a few examples of ideas in science fiction stories documented to have inspired an actual improvement in computing technology.
Science fiction has produced many stories about computers, but unfortunately – before cyberpunk – only a few which imagined the personal computers and the internet. The talk will discuss the history of computing in science fiction, focusing on two of those exceptions – “A Logic Named Joe” (1946), and The Shockwave Rider (1975) and several key cyberpunk stories including Snow Crash, True Names, and Neuromancer. Cyberpunk stories usually feature a hacker as the hero/heroine who successfully battles an oppressive government and/or corporation, and is therefore very popular with hackers who can identify with the protagonist.
There has always been a close relationship between hackers and science fiction. There is an overlap between hacker culture, cyberpunk culture, and science fiction culture. Hackers are avid readers of science fiction. One of the first uses (unsanctioned) of the proto-internet, the ARPANET, was to discuss science fiction. Hackers use science fiction to inform their software design and inspire their computing innovations. The original definition of the word “hacker” is someone almost obsessively interested in technology and who finds unintended uses for devices to improve their function. In that way, hackers played a key role in the development of computing and as inspiration for science fiction writers.