DeltaHacks celebrates 11 years of empowering students to innovate and create positive change across various fields through hackathon 

On Jan. 11 and 12, 2025, DeltaHacks hosted its 11th annual hackathon for change in the Peter George Centre for Living and Learning, dedicated to empowering students to create positive change in their communities through projects in health care, sustainability, education and technology.

This year, approximately 500 people participated in the 24-hour hackathon, developing innovative projects while engaging in networking opportunities and workshops. After the event, participants presented their projects the following day to a panel of judges who evaluated them based on social impact, technical skill, originality and presentation. 

DeltaHacks organizes four main hacking challenges, each focusing on a broad category such as best environmental hack, best productivity hack, best health hack and best community-building hack. Participants are encouraged to create projects that align with these categories. 

Additionally, DeltaHacks hosted sponsor challenges, where sponsors organized specific hacks. In an interview, Parisha Nizam, co-president of DeltaHacks, mentioned that the National Society of Black Engineers and Procter & Gamble partnered on a challenge aimed at creating a financial app to help students in the Black community overcome biases when seeking financial assistance and resources. 

In addition to the hackathon, DeltaHacks organized a variety of workshops, including sponsor-led sessions like the Dyson Fan Event, Apple Swift Challenge and an Introduction to Cohere workshop. Professional development opportunities were also offered, such as a Resume Roast and a guide to preparing a strong hackathon presentation. To foster community, DeltaHacks hosted fun activities, including a Fire Noodle challenge, karaoke night and late-night games.

Nizam highlighted that the hackathon kicked off with an opening ceremony featuring speeches from key sponsors, including Reserve Power, Swift, Manulife and Procter & Gamble, along with a performance by the McMaster Marching Band.

“Our team really worked hard on elevating the hacker experience. We worked hard on just making the overall organization better. I think our food choices were really good too. This year, we were also able to get an actual photo booth, where we had our own themed photo prints,” said Nizam.

Our team really worked hard on elevating the hacker experience. We worked hard on just making the overall organization better.

Parisha Nizam, Co-President
DeltaHacks

Nizam noted that DeltaHacks focuses on catering to the local community and collaborating with sponsors. According to Nizam, unlike many other hackathons that have a more general focus, DeltaHacks is specifically dedicated to creating positive social impact.

“We’ve seen people coming out of the hack saying they learned something new from the workshops they attended, or they gained new friendships, or they actually landed internships because of the sponsors that are there. There's a lot of opportunities for people to actually get something out of the hackathon while also having fun,” said Nizam.

We’ve seen people coming out of the hack saying they learned something new from the workshops they attended, or they gained new friendships, or they actually landed internships because of the sponsors that are there. There's a lot of opportunities for people to actually get something out of the hackathon while also having fun.

Parisha Nizam, Co-President
DeltaHacks

The project titled WhaleBeing won first place and the Dyson Innovation Challenge with their web app, which features a prediction model that maps how ship routes interact with blue whale habitats.

Nizam shared that, for the first time this year, DeltaHacks aimed to give back to the community by allowing the first-place winner to select a charity to receive a $500 donation. WhaleBeing chose to donate the funds to a whale conservation organization.

Nizam noted that while the hackathon is their main event, DeltaHacks encourages students to participate in club events and workshops held throughout the year. For more information, interested individuals can visit their Instagram page.

Anonymous is responsible for many online attacks, but the members are hiding in plain sight.

Ryan Mallough

Silhouette Staff

 

In 2008, they targeted the Church of Scientology for Internet censorship after the Church had a video that had been leaked to YouTube removed from the site; in 2009 they helped to launch Anonymous Iran as a support platform for Iranians whose Internet is heavily censored; in 2011 they hacked HBGary Federal, an American security firm; and in February they brought down the Central Intelligence Agency website.

They are Anonymous. They are Legion. They do not forgive. They do not forget. Expect them.

When the Internet became available for public use in the ‘90s, neither governments nor consumers had any idea as to what they had, or what it would become. To date the Internet has allowed its users nearly absolute freedom, and as a result any attempt at regulation is now viewed as a government overstepping its authority. The Internet has become, in the view of its users, the final frontier, a vast, endless space unbound by laws, regulations or government restriction.

Anonymous, and similar “hacktivist” groups, have positioned themselves as the guardians of that freedom, attacking those who would threaten it without prejudice.

But who watches the watchmen?

The recent emergence of over-regulation attempts in the United States (the Stop Online Piracy Act) and Canada (Bill C-31) on the Internet stem from a lack of understanding from the generation in charge. Those who have lived half their lives without it are failing to grasp exactly what the Internet is.

However, just because they have been overzealous in their attempts to protect Internet users does not mean Internet users don’t need protection. Like with any great invention, there are those who seek to use the Internet and the freedom it provides to do harm, and they deal in the most important resource there is: intelligence.

Global leaders, still very much of the baby boomer era, continue to view the world through realist-tinted glasses. It used to be that when you caught someone in your national archives stealing information, they would be labelled as a spy, an agent acting on behalf of a foreign country, states interacting with states. However, this logic no longer applies to the interactions occurring on the state level. There are third party organizations that act independently of states but with the same level of influence. The realist lens cannot cope.

The spy is no longer in the room but thousands of miles away, and answers to no state. So where does Anonymous fit? The most recent label is that of a “cyber-terrorist” organization.

It is difficult to deny that Anonymous and similar hacktivist groups share several characteristics with terrorist organizations. They operate on an internal ideology with its own system of morality. They attack those who conflict with their internal ideology without prejudice, and their attacks are ideologically motivated. They promote their cause through threat and by instilling fear in those who oppose them; and like many modern terrorists organizations, Anonymous claims allegiance to no specific government or nation, but only to their cause – an intangible concept.

There is very little difference in ideologies behind the absolute freedom of Anonymous’ Internet utopia and the Ireland envisioned by the IRA.

Furthermore, while there is no universal definition, the United Kingdom’s Terrorism Act 2000 sets out one of the most comprehensive interpretations of terrorism in use today. Section 1(b) notes that terrorism is “the use of threat that is designed to influence the government or an international governmental organization or to intimidate the public or a section of the public,” adding in Section 1(c) that terrorism is also “the use or threat ... made for the purpose of advancing a political, religious or ideological cause.” Section 2 (d) and (e) add actions that create “a serious risk to the health or safety of the public or a section of the public” and are “designed seriously to interfere with or seriously disrupt an electronic system.” Under this understanding of terrorism, Anonymous’ 2011 service disruptions actions against Visa in the wake of Wikileaks or their 2012 attack on the Central Intelligence Agency website, as well as their general modus operandi of threatening to publicize sensitive information if their demands are not met, all fall under this definition of terrorism.

Yet Anonymous fails to meet the most integral aspect of terrorist activity: the intent to cause bodily harm or death. In fact, hacktivist organizations, as well as information distributors such as Wikileaks, have so far shown remarkable restraint when it comes to parcelling out the information they have acquired. However, that does not discount the possibility they one day could.

It is often overlooked that these groups elect not to share certain information with the public, either by personal choice or because the information is highly sensitive. That is where hacktivism organizations become threats, both to governments and the public.

In a time where the phrase “knowledge is power” is paramount, these groups are sitting on a powder keg of information, distributed at their will. Equally, if not more dangerous is that anyone who amasses that amount of information will become a target for theft by organizations who would use it to cause harm. Anonymous may not have reached the level of “terrorist threat” yet, but their information acquiring and distribution capabilities, as well as their disdain for anyone who would impose any restriction on their domain, have them well on their way.

They are Anonymous. They are Legion. They do not forgive. They do not forget.

But we’re the ones who will pay for their battles.

Subscribe to our Mailing List

© 2025 The Silhouette. All Rights Reserved. McMaster University's Student Newspaper.
magnifiercrossmenu