derisory term meant something vastly different in its heyday. Hackers then, as now, were concerned about how things fit together, what makes things tick. Generally, many early hackers concerned themselves with understanding the nature of the telephone system, which encouraged the development of “blue boxes” and war dialers such as Ton Loc. Public bulletin boards (such as Prestel) had security flaws exposed and various services disrupted.
Most of the information that we include for each node and edge is
straightforward to obtain from the Twitter stream. However, there
are some data processing aspects that require special handling:
Mapping user names to IDs: The Twitter stream relates the tweets
with internal user identiﬁers, while user mentions are expressed as
user names. To match them, we use the Twitter API to resolve the
user-id and user-name reference.
URL shortening: A tweet is constrained to 140 characters, so most
URLs are shortened using a URL shortening service such as http: