2756 lines
84 KiB
Plaintext
2756 lines
84 KiB
Plaintext
|
|
|||
|
|
|||
|
HACKING AWAY AT THE COUNTERCULTURE
|
|||
|
|
|||
|
by
|
|||
|
|
|||
|
ANDREW ROSS
|
|||
|
|
|||
|
Princeton University
|
|||
|
Copyright (c) 1990 by Andrew Ross, all rights reserved.
|
|||
|
_Postmodern Culture_ vol. 1, no. 1 (Sep. 1990).
|
|||
|
|
|||
|
|
|||
|
|
|||
|
[1] Ever since the viral attack engineered in November
|
|||
|
|
|||
|
of 1988 by Cornell University hacker Robert Morris on
|
|||
|
|
|||
|
the national network system Internet, which includes
|
|||
|
|
|||
|
the Pentagon's ARPAnet data exchange network, the
|
|||
|
|
|||
|
nation's high-tech ideologues and spin doctors have
|
|||
|
|
|||
|
been locked in debate, trying to make ethical and
|
|||
|
|
|||
|
economic sense of the event. The virus rapidly
|
|||
|
|
|||
|
infected an estimated six thousand computers around the
|
|||
|
|
|||
|
country, creating a scare that crowned an open season
|
|||
|
|
|||
|
of viral hysteria in the media, in the course of which,
|
|||
|
|
|||
|
according to the Computer Virus Industry Association in
|
|||
|
|
|||
|
Santa Clara, the number of known viruses jumped from
|
|||
|
|
|||
|
seven to thirty during 1988, and from three thousand
|
|||
|
|
|||
|
infections in the first two months of that year to
|
|||
|
|
|||
|
thirty thousand in the last two months. While it
|
|||
|
|
|||
|
caused little in the way of data damage (some richly
|
|||
|
|
|||
|
inflated initial estimates reckoned up to $100m in
|
|||
|
|
|||
|
down time), the ramifications of the Internet virus
|
|||
|
|
|||
|
have helped to generate a moral panic that has all but
|
|||
|
|
|||
|
transformed everyday "computer culture."
|
|||
|
|
|||
|
[2] Following the lead of DARPA's (Defence Advance
|
|||
|
|
|||
|
Research Projects Agency) Computer Emergency Response
|
|||
|
|
|||
|
Team at Carnegie-Mellon University, anti-virus response
|
|||
|
|
|||
|
centers were hastily put in place by government and
|
|||
|
|
|||
|
defence agencies at the National Science Foundation,
|
|||
|
|
|||
|
the Energy Department, NASA, and other sites. Plans
|
|||
|
|
|||
|
were made to introduce a bill in Congress (the
|
|||
|
|
|||
|
Computer Virus Eradication Act, to replace the 1986
|
|||
|
|
|||
|
Computer Fraud and Abuse Act, which pertained solely to
|
|||
|
|
|||
|
government information), that would call for prison
|
|||
|
|
|||
|
sentences of up to ten years for the "crime" of
|
|||
|
|
|||
|
sophisticated hacking, and numerous government agencies
|
|||
|
|
|||
|
have been involved in a proprietary fight over the
|
|||
|
|
|||
|
creation of a proposed Center for Virus Control,
|
|||
|
|
|||
|
modelled, of course, on Atlanta's Centers for Disease
|
|||
|
|
|||
|
Control, notorious for its failures to respond
|
|||
|
|
|||
|
adequately to the AIDS crisis.
|
|||
|
|
|||
|
[3] In fact, media commentary on the virus scare has
|
|||
|
|
|||
|
run not so much tongue-in-cheek as hand-in-glove with
|
|||
|
|
|||
|
the rhetoric of AIDS hysteria--the common use of terms
|
|||
|
|
|||
|
like killer virus and epidemic; the focus on hi-risk
|
|||
|
|
|||
|
personal contact (virus infection, for the most part,
|
|||
|
|
|||
|
is spread on personal computers, not mainframes); the
|
|||
|
|
|||
|
obsession with defense, security, and immunity; and the
|
|||
|
|
|||
|
climate of suspicion generated around communitarian
|
|||
|
|
|||
|
acts of sharing. The underlying moral imperative being
|
|||
|
|
|||
|
this: You can't trust your best friend's software any
|
|||
|
|
|||
|
more than you can trust his or her bodily fluids--safe
|
|||
|
|
|||
|
software or no software at all! Or, as Dennis Miller
|
|||
|
|
|||
|
put it on _Saturday Night Live_, "Remember, when you
|
|||
|
|
|||
|
connect with another computer, you're connecting to
|
|||
|
|
|||
|
every computer that computer has ever connected to."
|
|||
|
|
|||
|
This playful conceit struck a chord in the popular
|
|||
|
|
|||
|
consciousness, even as it was perpetuated in such sober
|
|||
|
|
|||
|
quarters as the Association for Computing Machinery,
|
|||
|
|
|||
|
the president of which, in a controversial editorial
|
|||
|
|
|||
|
titled "A Hygiene Lesson," drew comparisons not only
|
|||
|
|
|||
|
with sexually transmitted diseases, but also with a
|
|||
|
|
|||
|
cholera epidemic, and urged attention to "personal
|
|||
|
|
|||
|
systems hygiene."^1^ In fact, some computer scientists
|
|||
|
|
|||
|
who studied the symptomatic path of Morris's virus
|
|||
|
|
|||
|
across Internet have pointed to its uneven effects upon
|
|||
|
|
|||
|
different computer types and operating systems, and
|
|||
|
|
|||
|
concluded that "there is a direct analogy with
|
|||
|
|
|||
|
biological genetic diversity to be made."^2^ The
|
|||
|
|
|||
|
epidemiology of biological virus, and especially AIDS,
|
|||
|
|
|||
|
research is being closely studied to help implement
|
|||
|
|
|||
|
computer security plans, and, in these circles, the new
|
|||
|
|
|||
|
witty discourse is laced with references to antigens,
|
|||
|
|
|||
|
white blood cells, vaccinations, metabolic free
|
|||
|
|
|||
|
radicals, and the like.
|
|||
|
|
|||
|
[4] The form and content of more lurid articles like
|
|||
|
|
|||
|
_Time_'s infamous (September 1988) story, "Invasion of
|
|||
|
|
|||
|
the Data Snatchers," fully displayed the continuity of
|
|||
|
|
|||
|
the media scare with those historical fears about
|
|||
|
|
|||
|
bodily invasion, individual and national, that are
|
|||
|
|
|||
|
often considered endemic to the paranoid style of
|
|||
|
|
|||
|
American political culture.^3^ Indeed, the rhetoric of
|
|||
|
|
|||
|
computer culture, in common with the medical discourse
|
|||
|
|
|||
|
of AIDS research, has fallen in line with the paranoid,
|
|||
|
|
|||
|
strategic style of Defence Department rhetoric. Each
|
|||
|
|
|||
|
language-repertoire is obsessed with hostile threats to
|
|||
|
|
|||
|
bodily and technological immune systems; every event is
|
|||
|
|
|||
|
a ballistic manoeuver in the game of microbiological
|
|||
|
|
|||
|
war, where the governing metaphors are indiscriminately
|
|||
|
|
|||
|
drawn from cellular genetics and cybernetics alike. As
|
|||
|
|
|||
|
a counterpoint to the tongue-in-cheek AI tradition of
|
|||
|
|
|||
|
seeing humans as "information-exchanging environments,"
|
|||
|
|
|||
|
the imagined life of computers has taken on an
|
|||
|
|
|||
|
organicist shape, now that they too are subject to
|
|||
|
|
|||
|
cybernetic "sickness" or disease. So, too, the
|
|||
|
|
|||
|
development of interrelated systems, such as Internet
|
|||
|
|
|||
|
itself, has further added to the structural picture of
|
|||
|
|
|||
|
an interdependent organism, whose component members,
|
|||
|
|
|||
|
however autonomous, are all nonetheless affected by the
|
|||
|
|
|||
|
"health" of each individual constituent. The growing
|
|||
|
|
|||
|
interest among scientists in developing computer
|
|||
|
|
|||
|
programs that will simulate the genetic behavior of
|
|||
|
|
|||
|
living organisms (in which binary numbers act like
|
|||
|
|
|||
|
genes) points to a future where the border between
|
|||
|
|
|||
|
organic and artificial life is less and less distinct.
|
|||
|
|
|||
|
[5] In keeping with the increasing use of biologically
|
|||
|
|
|||
|
derived language to describe mutations in systems
|
|||
|
|
|||
|
theory, conscious attempts to link the AIDS crisis with
|
|||
|
|
|||
|
the information security crisis have pointed out that
|
|||
|
|
|||
|
both kinds of virus, biological and electronic, take
|
|||
|
|
|||
|
over the host cell/program and clone their carrier
|
|||
|
|
|||
|
genetic codes by instructing the hosts to make replicas
|
|||
|
|
|||
|
of the viruses. Neither kind of virus, however, can
|
|||
|
|
|||
|
replicate themselves independently; they are pieces of
|
|||
|
|
|||
|
code that attach themselves to other cells/programs--
|
|||
|
|
|||
|
just as biological viruses need a host cell, computer
|
|||
|
|
|||
|
viruses require a host program to activate them. The
|
|||
|
|
|||
|
Internet virus was not, in fact, a virus, but a worm, a
|
|||
|
|
|||
|
program that can run independently and therefore
|
|||
|
|
|||
|
_appears_ to have a life of its own. The worm
|
|||
|
|
|||
|
replicates a full version of itself in programs and
|
|||
|
|
|||
|
systems as it moves from one to another, masquerading
|
|||
|
|
|||
|
as a legitimate user by guessing the user passwords of
|
|||
|
|
|||
|
locked accounts. Because of this autonomous existence,
|
|||
|
|
|||
|
the worm can be seen to behave as if it were an
|
|||
|
|
|||
|
organism with some kind of purpose or teleology, and
|
|||
|
|
|||
|
yet it has none. Its only "purpose" is to reproduce
|
|||
|
|
|||
|
and infect. If the worm has no inbuilt antireplication
|
|||
|
|
|||
|
code, or if the code is faulty, as was the case with
|
|||
|
|
|||
|
the Internet worm, it will make already-infected
|
|||
|
|
|||
|
computers repeatedly accept further replicas of itself,
|
|||
|
|
|||
|
until their memories are clogged. A much quieter worm
|
|||
|
|
|||
|
than that engineered by Morris would have moved more
|
|||
|
|
|||
|
slowly, as one supposes a "worm" should, protecting
|
|||
|
|
|||
|
itself from detection by ever more subtle camouflage,
|
|||
|
|
|||
|
and propagating its cumulative effect of operative
|
|||
|
|
|||
|
systems inertia over a much longer period of time.
|
|||
|
|
|||
|
[6] In offering such descriptions, however, we must be
|
|||
|
|
|||
|
wary of attributing a teleology/intentionality to worms
|
|||
|
|
|||
|
and viruses which can be ascribed only, and, in most
|
|||
|
|
|||
|
instances, speculatively, to their authors. There is
|
|||
|
|
|||
|
no reason why a cybernetic "worm" might be expected to
|
|||
|
|
|||
|
behave in any fundamental way like a biological worm.
|
|||
|
|
|||
|
So, too, the assumed intentionality of its author
|
|||
|
|
|||
|
distinguishes the human-made cybernetic virus from the
|
|||
|
|
|||
|
case of the biological virus, the effects of which are
|
|||
|
|
|||
|
fated to be received and discussed in a language
|
|||
|
|
|||
|
saturated with human-made structures and narratives of
|
|||
|
|
|||
|
meaning and teleological purpose. Writing about the
|
|||
|
|
|||
|
folkloric theologies of significance and explanatory
|
|||
|
|
|||
|
justice (usually involving retribution) that have
|
|||
|
|
|||
|
sprung up around the AIDS crisis, Judith Williamson has
|
|||
|
|
|||
|
pointed to the radical implications of this collision
|
|||
|
|
|||
|
between an intentionless virus and a meaning-filled
|
|||
|
|
|||
|
culture:
|
|||
|
|
|||
|
Nothing could be more meaningless than a
|
|||
|
|
|||
|
virus. It has no point, no purpose, no plan;
|
|||
|
|
|||
|
it is part of no scheme, carries no inherent
|
|||
|
|
|||
|
significance. And yet nothing is harder for
|
|||
|
|
|||
|
us to confront than the complete absence of
|
|||
|
|
|||
|
meaning. By its very definition,
|
|||
|
|
|||
|
meaninglessness cannot be articulated within
|
|||
|
|
|||
|
our social language, which is a system _of_
|
|||
|
|
|||
|
meaning: impossible to include, as an
|
|||
|
|
|||
|
absence, it is also impossible to exclude--
|
|||
|
|
|||
|
for meaninglessness isn't just the opposite
|
|||
|
|
|||
|
of meaning, it is the end of meaning, and
|
|||
|
|
|||
|
threatens the fragile structures by which we
|
|||
|
|
|||
|
make sense of the world.^4^
|
|||
|
|
|||
|
[7] No such judgment about meaninglessness applies to
|
|||
|
|
|||
|
the computer security crisis. In contrast to HIV's
|
|||
|
|
|||
|
lack of meaning or intentionality, the meaning of
|
|||
|
|
|||
|
cybernetic viruses is always already replete with
|
|||
|
|
|||
|
social significance. This meaning is related, first of
|
|||
|
|
|||
|
all, to the author's local intention or motivation,
|
|||
|
|
|||
|
whether psychic or fully social, whether wrought out
|
|||
|
|
|||
|
of a mood of vengeance, a show of bravado or technical
|
|||
|
|
|||
|
expertise, a commitment to a political act, or in
|
|||
|
|
|||
|
anticipation of the profits that often accrue from the
|
|||
|
|
|||
|
victims' need to buy an antidote from the author.
|
|||
|
|
|||
|
Beyond these local intentions, however, which are
|
|||
|
|
|||
|
usually obscure or, as in the Morris case, quite
|
|||
|
|
|||
|
inscrutable, there is an entire set of social and
|
|||
|
|
|||
|
historical narratives that surround and are part of the
|
|||
|
|
|||
|
"meaning" of the virus: the coded anarchist history of
|
|||
|
|
|||
|
the youth hacker subculture; the militaristic
|
|||
|
|
|||
|
environments of search-and-destroy warfare (a virus has
|
|||
|
|
|||
|
two components--a carrier and a "warhead"), which,
|
|||
|
|
|||
|
because of the historical development of computer
|
|||
|
|
|||
|
technology, constitute the family values of information
|
|||
|
|
|||
|
techno-culture; the experimental research environments
|
|||
|
|
|||
|
in which creative designers are encouraged to work; and
|
|||
|
|
|||
|
the conflictual history of pure and applied ethics in
|
|||
|
|
|||
|
the science and technology communities, to name just a
|
|||
|
|
|||
|
few. A similar list could be drawn up to explain the
|
|||
|
|
|||
|
widespread and varied _response_ to computer viruses,
|
|||
|
|
|||
|
from the amused concern of the cognoscenti to the
|
|||
|
|
|||
|
hysteria of the casual user, and from the research
|
|||
|
|
|||
|
community and the manufacturing industry to the morally
|
|||
|
|
|||
|
aroused legislature and the mediated culture at large.
|
|||
|
|
|||
|
Every one of these explanations and narratives is the
|
|||
|
|
|||
|
result of social and cultural processes and values;
|
|||
|
|
|||
|
consequently, there is very little about the virus
|
|||
|
|
|||
|
itself that is "meaningless." Viruses can no more be
|
|||
|
|
|||
|
seen as an objective, or necessary, result of the
|
|||
|
|
|||
|
"objective" development of technological systems than
|
|||
|
|
|||
|
technology in general can be seen as an objective,
|
|||
|
|
|||
|
determining agent of social change.
|
|||
|
|
|||
|
[8] For the sake of polemical economy, I would note
|
|||
|
|
|||
|
that the cumulative effect of all the viral hysteria
|
|||
|
|
|||
|
has been twofold. Firstly, it has resulted in a
|
|||
|
|
|||
|
windfall for software producers, now that users' blithe
|
|||
|
|
|||
|
disregard for makers' copyright privileges has eroded
|
|||
|
|
|||
|
in the face of the security panic. Used to fighting
|
|||
|
|
|||
|
halfhearted rearguard actions against widespread piracy
|
|||
|
|
|||
|
practices, or reluctantly acceding to buyers' desire
|
|||
|
|
|||
|
for software unencumbered by top-heavy security
|
|||
|
|
|||
|
features, software vendors are now profiting from the
|
|||
|
|
|||
|
new public distrust of program copies. So, too, the
|
|||
|
|
|||
|
explosion in security consciousness has hyperstimulated
|
|||
|
|
|||
|
the already fast-growing sectors of the security system
|
|||
|
|
|||
|
industry and the data encryption industry. In line
|
|||
|
|
|||
|
with the new imperative for everything from
|
|||
|
|
|||
|
"vaccinated" workstations to "sterilized" networks, it
|
|||
|
|
|||
|
has created a brand new market of viral vaccine vendors
|
|||
|
|
|||
|
who will sell you the virus (a one-time only
|
|||
|
|
|||
|
immunization shot) along with its antidote--with names
|
|||
|
|
|||
|
like Flu Shot +, ViruSafe, Vaccinate, Disk Defender,
|
|||
|
|
|||
|
Certus, Viral Alarm, Antidote, Virus Buster,
|
|||
|
|
|||
|
Gatekeeper, Ongard, and Interferon. Few of the
|
|||
|
|
|||
|
antidotes are very reliable, however, especially since
|
|||
|
|
|||
|
they pose an irresistible intellectual challenge to
|
|||
|
|
|||
|
hackers who can easily rewrite them in the form of ever
|
|||
|
|
|||
|
more powerful viruses. Moreover, most corporate
|
|||
|
|
|||
|
managers of computer systems and networks know that by
|
|||
|
|
|||
|
far the great majority of their intentional security
|
|||
|
|
|||
|
losses are a result of insider sabotage and
|
|||
|
|
|||
|
monkeywrenching.
|
|||
|
|
|||
|
[9] In short, the effects of the viruses have been to
|
|||
|
|
|||
|
profitably clamp down on copyright delinquency, and to
|
|||
|
|
|||
|
generate the need for entirely new industrial
|
|||
|
|
|||
|
production of viral suppressors to contain the fallout.
|
|||
|
|
|||
|
In this respect, it is easy to see that the appearance
|
|||
|
|
|||
|
of viruses could hardly, in the long run, have
|
|||
|
|
|||
|
benefited industry producers more. In the same vein,
|
|||
|
|
|||
|
the networks that have been hardest hit by the security
|
|||
|
|
|||
|
squeeze are not restricted-access military or corporate
|
|||
|
|
|||
|
systems but networks like Internet, set up on trust to
|
|||
|
|
|||
|
facilitate the open academic exchange of data,
|
|||
|
|
|||
|
information and research, and watched over by its
|
|||
|
|
|||
|
sponsor, DARPA. It has not escaped the notice of
|
|||
|
|
|||
|
conspiracy theorists that the military intelligence
|
|||
|
|
|||
|
community, obsessed with "electronic warfare," actually
|
|||
|
|
|||
|
stood to learn a lot from the Internet virus; the virus
|
|||
|
|
|||
|
effectively "pulsed the system," exposing the
|
|||
|
|
|||
|
sociological behaviour of the system in a crisis
|
|||
|
|
|||
|
situation.^5^
|
|||
|
|
|||
|
The second effect of the virus crisis has been
|
|||
|
|
|||
|
more overtly ideological. Virus-conscious fear and
|
|||
|
|
|||
|
loathing have clearly fed into the paranoid climate of
|
|||
|
|
|||
|
privatization that increasingly defines social
|
|||
|
|
|||
|
identities in the new post-Fordist order. The result--
|
|||
|
|
|||
|
a psycho-social closing of the ranks around fortified
|
|||
|
|
|||
|
private spheres--runs directly counter to the ethic
|
|||
|
|
|||
|
that we might think of as residing at the architectural
|
|||
|
|
|||
|
heart of information technology. In its basic assembly
|
|||
|
|
|||
|
structure, information technology is a technology of
|
|||
|
|
|||
|
processing, copying, replication, and simulation, and
|
|||
|
|
|||
|
therefore does not recognize the concept of private
|
|||
|
|
|||
|
information property. What is now under threat is the
|
|||
|
|
|||
|
rationality of a shareware culture, ushered in as the
|
|||
|
|
|||
|
achievement of the hacker counterculture that pioneered
|
|||
|
|
|||
|
the personal computer revolution in the early seventies
|
|||
|
|
|||
|
against the grain of corporate planning.
|
|||
|
|
|||
|
[10] There is another story to tell, however, about the
|
|||
|
|
|||
|
emergence of the virus scare as a profitable
|
|||
|
|
|||
|
ideological moment, and it is the story of how teenage
|
|||
|
|
|||
|
hacking has come to be increasingly defined as a
|
|||
|
|
|||
|
potential threat to normative educational ethics and
|
|||
|
|
|||
|
national security alike. The story of the creation of
|
|||
|
|
|||
|
this "social menace" is central to the ongoing attempts
|
|||
|
|
|||
|
to rewrite property law in order to contain the effects
|
|||
|
|
|||
|
of the new information technologies that, because of
|
|||
|
|
|||
|
their blindness to the copyrighting of intellectual
|
|||
|
|
|||
|
property, have transformed the way in which modern
|
|||
|
|
|||
|
power is exercised and maintained. Consequently, a
|
|||
|
|
|||
|
deviant social class or group has been defined and
|
|||
|
|
|||
|
categorised as "enemies of the state" in order to help
|
|||
|
|
|||
|
rationalize a general law-and-order clampdown on free
|
|||
|
|
|||
|
and open information exchange. Teenage hackers' homes
|
|||
|
|
|||
|
are now habitually raided by sheriffs and FBI agents
|
|||
|
|
|||
|
using strong-arm tactics, and jail sentences are
|
|||
|
|
|||
|
becoming a common punishment. Operation Sundevil, a
|
|||
|
|
|||
|
nationwide Secret Service operation in the spring of
|
|||
|
|
|||
|
1990, involving hundreds of agents in fourteen cities,
|
|||
|
|
|||
|
is the most recently publicized of the hacker raids
|
|||
|
|
|||
|
that have produced several arrests and seizures of
|
|||
|
|
|||
|
thousands of disks and address lists in the last two
|
|||
|
|
|||
|
years.^6^
|
|||
|
|
|||
|
[11] In one of the many harshly punitive prosecutions
|
|||
|
|
|||
|
against hackers in recent years, a judge went so far as
|
|||
|
|
|||
|
to describe "bulletin boards" as "hi-tech street
|
|||
|
|
|||
|
gangs." The editors of _2600_, the magazine that
|
|||
|
|
|||
|
publishes information about system entry and
|
|||
|
|
|||
|
exploration that is indispensable to the hacking
|
|||
|
|
|||
|
community, have pointed out that any single invasive
|
|||
|
|
|||
|
act, such as that of trespass, that involves the use of
|
|||
|
|
|||
|
computers is considered today to be infinitely more
|
|||
|
|
|||
|
criminal than a similar act undertaken without
|
|||
|
|
|||
|
computers.^7^ To use computers to execute pranks,
|
|||
|
|
|||
|
raids, frauds or thefts is to incur automatically the
|
|||
|
|
|||
|
full repressive wrath of judges urged on by the moral
|
|||
|
|
|||
|
panic created around hacking feats over the last two
|
|||
|
|
|||
|
decades. Indeed, there is a strong body of pressure
|
|||
|
|
|||
|
groups pushing for new criminal legislation that will
|
|||
|
|
|||
|
define "crimes with computers" as a special category of
|
|||
|
|
|||
|
crime, deserving "extraordinary" sentences and punitive
|
|||
|
|
|||
|
measures. Over that same space of time, the term
|
|||
|
|
|||
|
_hacker_ has lost its semantic link with the
|
|||
|
|
|||
|
journalistic _hack,_ suggesting a professional toiler
|
|||
|
|
|||
|
who uses unorthodox methods. So, too, its increasingly
|
|||
|
|
|||
|
criminal connotation today has displaced the more
|
|||
|
|
|||
|
innocuous, amateur mischief-maker-cum-media-star role
|
|||
|
|
|||
|
reserved for hackers until a few years ago.
|
|||
|
|
|||
|
[12] In response to the gathering vigor of this "war on
|
|||
|
|
|||
|
hackers," the most common defences of hacking can be
|
|||
|
|
|||
|
presented on a spectrum that runs from the appeasement
|
|||
|
|
|||
|
or accommodation of corporate interests to drawing up
|
|||
|
|
|||
|
blueprints for cultural revolution. (a) Hacking
|
|||
|
|
|||
|
performs a benign industrial service of uncovering
|
|||
|
|
|||
|
security deficiencies and design flaws. (b) Hacking,
|
|||
|
|
|||
|
as an experimental, free-form research activity, has
|
|||
|
|
|||
|
been responsible for many of the most progressive
|
|||
|
|
|||
|
developments in software development. (c) Hacking,
|
|||
|
|
|||
|
when not purely recreational, is an elite educational
|
|||
|
|
|||
|
practice that reflects the ways in which the
|
|||
|
|
|||
|
development of high technology has outpaced orthodox
|
|||
|
|
|||
|
forms of institutional education. (d) Hacking is an
|
|||
|
|
|||
|
important form of watchdog counterresponse to the use
|
|||
|
|
|||
|
of surveillance technology and data gathering by the
|
|||
|
|
|||
|
state, and to the increasingly monolithic
|
|||
|
|
|||
|
communications power of giant corporations. (e)
|
|||
|
|
|||
|
Hacking, as guerrilla know-how, is essential to the
|
|||
|
|
|||
|
task of maintaining fronts of cultural resistance and
|
|||
|
|
|||
|
stocks of oppositional knowledge as a hedge against a
|
|||
|
|
|||
|
technofascist future. With all of these and other
|
|||
|
|
|||
|
arguments in mind, it is easy to see how the social and
|
|||
|
|
|||
|
cultural _management_ of hacker activities has become a
|
|||
|
|
|||
|
complex process that involves state policy and
|
|||
|
|
|||
|
legislation at the highest levels. In this respect,
|
|||
|
|
|||
|
the virus scare has become an especially convenient
|
|||
|
|
|||
|
vehicle for obtaining public and popular consent for
|
|||
|
|
|||
|
new legislative measures and new powers of
|
|||
|
|
|||
|
investigation for the FBI.^8^
|
|||
|
|
|||
|
[13] Consequently, certain celebrity hackers have been
|
|||
|
|
|||
|
quick to play down the zeal with which they pursued
|
|||
|
|
|||
|
their earlier hacking feats, while reinforcing the
|
|||
|
|
|||
|
_deviant_ category of "technological hooliganism"
|
|||
|
|
|||
|
reserved by moralizing pundits for "dark-side" hacking.
|
|||
|
|
|||
|
Hugo Cornwall, British author of the bestselling
|
|||
|
|
|||
|
_Hacker's Handbook_, presents a Little England view of
|
|||
|
|
|||
|
the hacker as a harmless fresh-air enthusiast who
|
|||
|
|
|||
|
"visits advanced computers as a polite country rambler
|
|||
|
|
|||
|
might walk across picturesque fields." The owners of
|
|||
|
|
|||
|
these properties are like "farmers who don't mind
|
|||
|
|
|||
|
careful ramblers." Cornwall notes that "lovers of
|
|||
|
|
|||
|
fresh-air walks obey the Country Code, involving such
|
|||
|
|
|||
|
items as closing gates behind one and avoiding damage
|
|||
|
|
|||
|
to crops and livestock" and suggests that a similar
|
|||
|
|
|||
|
code ought to "guide your rambles into other people's
|
|||
|
|
|||
|
computers; the safest thing to do is simply browse,
|
|||
|
|
|||
|
enjoy and learn." By contrast, any rambler who
|
|||
|
|
|||
|
"ventured across a field guarded by barbed wire and
|
|||
|
|
|||
|
dotted with notices warning about the Official Secrets
|
|||
|
|
|||
|
Act would deserve most that happened thereafter."^9^
|
|||
|
|
|||
|
Cornwall's quaint perspective on hacking has a certain
|
|||
|
|
|||
|
"native charm," but some might think that this
|
|||
|
|
|||
|
beguiling picture of patchwork-quilt fields and benign
|
|||
|
|
|||
|
gentleman farmers glosses over the long bloody history
|
|||
|
|
|||
|
of power exercised through feudal and postfeudal land
|
|||
|
|
|||
|
economy in England, while it is barely suggestive of
|
|||
|
|
|||
|
the new fiefdoms, transnational estates, dependencies,
|
|||
|
|
|||
|
and principalities carved out of today's global
|
|||
|
|
|||
|
information order by vast corporations capable of
|
|||
|
|
|||
|
bypassing the laws and territorial borders of sovereign
|
|||
|
|
|||
|
nation-states. In general, this analogy with
|
|||
|
|
|||
|
"trespass" laws, which compares hacking to breaking and
|
|||
|
|
|||
|
entering other people's homes restricts the debate to
|
|||
|
|
|||
|
questions about privacy, property, possessive
|
|||
|
|
|||
|
individualism, and, at best, the excesses of state
|
|||
|
|
|||
|
surveillance, while it closes off any examination of
|
|||
|
|
|||
|
the activities of the corporate owners and
|
|||
|
|
|||
|
institutional sponsors of information technology (the
|
|||
|
|
|||
|
almost exclusive "target" of most hackers).^10^
|
|||
|
|
|||
|
[14] Cornwall himself has joined the lucrative ranks of
|
|||
|
|
|||
|
ex-hackers who either work for computer security firms
|
|||
|
|
|||
|
or write books about security for the eyes of worried
|
|||
|
|
|||
|
corporate managers.^11^ A different, though related,
|
|||
|
|
|||
|
genre is that of the penitent hacker's "confession,"
|
|||
|
|
|||
|
produced for an audience thrilled by tales of high-
|
|||
|
|
|||
|
stakes adventure at the keyboard, but written in the
|
|||
|
|
|||
|
form of a computer security handbook. The best example
|
|||
|
|
|||
|
of the "I Was a Teenage Hacker" genre is Bill (aka "The
|
|||
|
|
|||
|
Cracker") Landreth's _Out of the Inner Circle_: The
|
|||
|
|
|||
|
True Story of a Computer Intruder Capable of Cracking
|
|||
|
|
|||
|
the Nation's Most Secure Computer Systems_, a book
|
|||
|
|
|||
|
about "people who can't `just say no' to computers."
|
|||
|
|
|||
|
In full complicity with the deviant picture of the
|
|||
|
|
|||
|
hacker as "public enemy," Landreth recirculates every
|
|||
|
|
|||
|
official and media cliche about subversive
|
|||
|
|
|||
|
conspiratorial elites by recounting the putative
|
|||
|
|
|||
|
exploits of a high-level hackers' guild called the
|
|||
|
|
|||
|
Inner Circle. The author himself is presented in the
|
|||
|
|
|||
|
book as a former keyboard junkie who now praises the
|
|||
|
|
|||
|
law for having made a good moral example of him:
|
|||
|
|
|||
|
If you are wondering what I am like, I can
|
|||
|
|
|||
|
tell you the same things I told the judge in
|
|||
|
|
|||
|
federal court: Although it may not seem like
|
|||
|
|
|||
|
it, I am pretty much a normal American
|
|||
|
|
|||
|
teenager. I don't drink, smoke or take
|
|||
|
|
|||
|
drugs. I don't steal, assault people, or
|
|||
|
|
|||
|
vandalize property. The only way in which I
|
|||
|
|
|||
|
am really different from most people is in my
|
|||
|
|
|||
|
fascination with the ways and means of
|
|||
|
|
|||
|
learning about computers that don't belong to
|
|||
|
|
|||
|
me.^12^
|
|||
|
|
|||
|
Sentenced in 1984 to three years probation, during
|
|||
|
|
|||
|
which time he was obliged to finish his high school
|
|||
|
|
|||
|
education and go to college, Landreth concludes: "I
|
|||
|
|
|||
|
think the sentence is very fair, and I already know
|
|||
|
|
|||
|
what my major will be...." As an aberrant sequel to
|
|||
|
|
|||
|
the book's contrite conclusion, however, Landreth
|
|||
|
|
|||
|
vanished in 1986, violating his probation, only to face
|
|||
|
|
|||
|
later a stiff five-year jail sentence--a sorry victim,
|
|||
|
|
|||
|
no doubt, of the recent crackdown.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
_Cyber-Counterculture_?
|
|||
|
|
|||
|
[15] At the core of Steven Levy's bestseller _Hackers_
|
|||
|
|
|||
|
(1984) is the argument that the hacker ethic, first
|
|||
|
|
|||
|
articulated in the 1950s among the famous MIT students
|
|||
|
|
|||
|
who developed multiple-access user systems, is
|
|||
|
|
|||
|
libertarian and crypto-anarchist in its right-to know
|
|||
|
|
|||
|
principles and its advocacy of decentralized
|
|||
|
|
|||
|
technology. This hacker ethic, which has remained the
|
|||
|
|
|||
|
preserve of a youth culture for the most part, asserts
|
|||
|
|
|||
|
the basic right of users to free access to all
|
|||
|
|
|||
|
information. It is a principled attempt, in other
|
|||
|
|
|||
|
words, to challenge the tendency to use technology to
|
|||
|
|
|||
|
form information elites. Consequently, hacker
|
|||
|
|
|||
|
activities were presented in the eighties as a romantic
|
|||
|
|
|||
|
countercultural tendency, celebrated by critical
|
|||
|
|
|||
|
journalists like John Markoff of the _New York Times_,
|
|||
|
|
|||
|
by Stewart Brand of _Whole Earth Catalog_ fame, and by
|
|||
|
|
|||
|
New Age gurus like Timothy Leary in the flamboyant
|
|||
|
|
|||
|
_Reality Hackers_. Fuelled by sensational stories
|
|||
|
|
|||
|
about phone phreaks like Joe Egressia (the blind eight-
|
|||
|
|
|||
|
year old who discovered the tone signal of phone
|
|||
|
|
|||
|
company by whistling) and Cap'n Crunch, groups like the
|
|||
|
|
|||
|
Milwaukee 414s, the Los Angeles ARPAnet hackers, the
|
|||
|
|
|||
|
SPAN Data Travellers, the Chaos Computer Club of
|
|||
|
|
|||
|
Hamburg, the British Prestel hackers, _2600_'s BBS,
|
|||
|
|
|||
|
"The Private Sector," and others, the dominant media
|
|||
|
|
|||
|
representation of the hacker came to be that of the
|
|||
|
|
|||
|
"rebel with a modem," to use Markoff's term, at least
|
|||
|
|
|||
|
until the more recent "war on hackers" began to shape
|
|||
|
|
|||
|
media coverage.
|
|||
|
|
|||
|
[16] On the one hand, this popular folk hero persona
|
|||
|
|
|||
|
offered the romantic high profile of a maverick though
|
|||
|
|
|||
|
nerdy cowboy whose fearless raids upon an impersonal
|
|||
|
|
|||
|
"system" were perceived as a welcome tonic in the gray
|
|||
|
|
|||
|
age of technocratic routine. On the other hand, he was
|
|||
|
|
|||
|
something of a juvenile technodelinquent who hadn't yet
|
|||
|
|
|||
|
learned the difference between right and wrong---a
|
|||
|
|
|||
|
wayward figure whose technical brilliance and
|
|||
|
|
|||
|
proficiency differentiated him nonetheless from, say,
|
|||
|
|
|||
|
the maladjusted working-class J.D. street-corner boy of
|
|||
|
|
|||
|
the 1950s (hacker mythology, for the most part, has
|
|||
|
|
|||
|
been almost exclusively white, masculine, and middle-
|
|||
|
|
|||
|
class). One result of this media profile was a
|
|||
|
|
|||
|
persistent infantilization of the hacker ethic--a way
|
|||
|
|
|||
|
of trivializing its embryonic politics, however finally
|
|||
|
|
|||
|
complicit with dominant technocratic imperatives or
|
|||
|
|
|||
|
with entrepreneurial-libertarian ideology one perceives
|
|||
|
|
|||
|
these politics to be. The second result was to
|
|||
|
|
|||
|
reinforce, in the initial absence of coercive jail
|
|||
|
|
|||
|
sentences, the high educational stakes of training the
|
|||
|
|
|||
|
new technocratic elites to be responsible in their use
|
|||
|
|
|||
|
of technology. Never, the given wisdom goes, has a
|
|||
|
|
|||
|
creative elite of the future been so in need of the
|
|||
|
|
|||
|
virtues of a liberal education steeped in Western
|
|||
|
|
|||
|
ethics!
|
|||
|
|
|||
|
[17] The full force of this lesson in computer ethics
|
|||
|
|
|||
|
can be found laid out in the official Cornell
|
|||
|
|
|||
|
University report on the Robert Morris affair. Members
|
|||
|
|
|||
|
of the university commission set up to investigate the
|
|||
|
|
|||
|
affair make it quite clear in their report that they
|
|||
|
|
|||
|
recognize the student's academic brilliance. His
|
|||
|
|
|||
|
hacking, moreover, is described, as a "juvenile act"
|
|||
|
|
|||
|
that had no "malicious intent" but that amounted, like
|
|||
|
|
|||
|
plagiarism, the traditional academic heresy, to a
|
|||
|
|
|||
|
dishonest transgression of other users' rights. (In
|
|||
|
|
|||
|
recent years, the privacy movement within the
|
|||
|
|
|||
|
information community--a movement mounted by liberals
|
|||
|
|
|||
|
to protect civil rights against state gathering of
|
|||
|
|
|||
|
information--has actually been taken up and used as a
|
|||
|
|
|||
|
means of criminalizing hacker activities.) As for the
|
|||
|
|
|||
|
consequences of this juvenile act, the report proposes
|
|||
|
|
|||
|
an analogy that, in comparison with Cornwall's _mature_
|
|||
|
|
|||
|
English country rambler, is thoroughly American,
|
|||
|
|
|||
|
suburban, middle-class and _juvenile_. Unleashing the
|
|||
|
|
|||
|
Internet worm was like "the driving of a golf-cart on a
|
|||
|
|
|||
|
rainy day through most houses in the neighborhood. The
|
|||
|
|
|||
|
driver may have navigated carefully and broken no
|
|||
|
|
|||
|
china, but it should have been obvious to the driver
|
|||
|
|
|||
|
that the mud on the tires would soil the carpets and
|
|||
|
|
|||
|
that the owners would later have to clean up the
|
|||
|
|
|||
|
mess."^13^
|
|||
|
|
|||
|
[18] In what stands out as a stiff reprimand for his
|
|||
|
|
|||
|
alma mater, the report regrets that Morris was educated
|
|||
|
|
|||
|
in an "ambivalent atmosphere" where he "received no
|
|||
|
|
|||
|
clear guidance" about ethics from "his peers or
|
|||
|
|
|||
|
mentors" (he went to Harvard!). But it reserves its
|
|||
|
|
|||
|
loftiest academic contempt for the press, whose
|
|||
|
|
|||
|
heroization of hackers has been so irresponsible, in
|
|||
|
|
|||
|
the commission's opinion, as to cause even further
|
|||
|
|
|||
|
damage to the standards of the computing profession;
|
|||
|
|
|||
|
media exaggerations of the courage and technical
|
|||
|
|
|||
|
sophistication of hackers "obscures the far more
|
|||
|
|
|||
|
accomplished work of students who complete their
|
|||
|
|
|||
|
graduate studies without public fanfare," and "who
|
|||
|
|
|||
|
subject their work to the close scrutiny and evaluation
|
|||
|
|
|||
|
of their peers, and not to the interpretations of the
|
|||
|
|
|||
|
popular press."^14^ In other words, this was an inside
|
|||
|
|
|||
|
affair, to be assessed and judged by fellow
|
|||
|
|
|||
|
professionals within an institution that reinforces its
|
|||
|
|
|||
|
authority by means of internally self-regulating codes
|
|||
|
|
|||
|
of professionalist ethics, but rarely addresses its
|
|||
|
|
|||
|
ethical relationship to society as a whole (acceptance
|
|||
|
|
|||
|
of defence grants, and the like). Generally speaking,
|
|||
|
|
|||
|
the report affirms the genteel liberal ideal that
|
|||
|
|
|||
|
professionals should not need laws, rules, procedural
|
|||
|
|
|||
|
guidelines, or fixed guarantees of safe and responsible
|
|||
|
|
|||
|
conduct. Apprentice professionals ought to have
|
|||
|
|
|||
|
acquired a good conscience by osmosis from a liberal
|
|||
|
|
|||
|
education rather than from some specially prescribed
|
|||
|
|
|||
|
course in ethics and technology.
|
|||
|
|
|||
|
[19] The widespread attention commanded by the Cornell
|
|||
|
|
|||
|
report (attention from the Association of Computing
|
|||
|
|
|||
|
Machinery, among others) demonstrates the industry's
|
|||
|
|
|||
|
interest in how the academy invokes liberal ethics in
|
|||
|
|
|||
|
order to assist in the managing of the organization of
|
|||
|
|
|||
|
the new specialized knowledge about information
|
|||
|
|
|||
|
technology. Despite or, perhaps, because of the
|
|||
|
|
|||
|
report's steadfast pledge to the virtues and ideals of
|
|||
|
|
|||
|
a liberal education, it bears all the marks of a
|
|||
|
|
|||
|
legitimation crisis inside (and outside) the academy
|
|||
|
|
|||
|
surrounding the new and all-important category of
|
|||
|
|
|||
|
computer professionalism. The increasingly specialized
|
|||
|
|
|||
|
design knowledge demanded of computer professionals
|
|||
|
|
|||
|
means that codes that go beyond the old professionalist
|
|||
|
|
|||
|
separation of mental and practical skills are needed to
|
|||
|
|
|||
|
manage the division that a hacker's functional talents
|
|||
|
|
|||
|
call into question, between a purely mental pursuit and
|
|||
|
|
|||
|
the pragmatic sphere of implementing knowledge in the
|
|||
|
|
|||
|
real world. "Hacking" must then be designated as a
|
|||
|
|
|||
|
strictly _amateur_ practice; the tension, in hacking,
|
|||
|
|
|||
|
between _interestedness_ and _disinterestedness_ is
|
|||
|
|
|||
|
different from, and deficient in relation to, the
|
|||
|
|
|||
|
proper balance demanded by professionalism.
|
|||
|
|
|||
|
Alternately, hacking can be seen as the amateur flip
|
|||
|
|
|||
|
side of the professional ideal--a disinterested love in
|
|||
|
|
|||
|
the service of interested parties and institutions. In
|
|||
|
|
|||
|
either case, it serves as an example of professionalism
|
|||
|
|
|||
|
gone wrong, but not very wrong.
|
|||
|
|
|||
|
[20] In common with the two responses to the virus
|
|||
|
|
|||
|
scare described earlier--the profitable reaction of the
|
|||
|
|
|||
|
computer industry and the self-empowering response of
|
|||
|
|
|||
|
the legislature-- the Cornell report shows how the
|
|||
|
|
|||
|
academy uses a case like the Morris affair to
|
|||
|
|
|||
|
strengthen its own sense of moral and cultural
|
|||
|
|
|||
|
authority in the sphere of professionalism,
|
|||
|
|
|||
|
particularly through its scornful indifference to and
|
|||
|
|
|||
|
aloofness from the codes and judgements exercised by
|
|||
|
|
|||
|
the media--its diabolic competitor in the field of
|
|||
|
|
|||
|
knowledge. Indeed, for all the trumpeting about
|
|||
|
|
|||
|
excesses of power and disrespect for the law of the
|
|||
|
|
|||
|
land, the revival of ethics, in the business and
|
|||
|
|
|||
|
science disciplines in the Ivy League and on Capitol
|
|||
|
|
|||
|
Hill (both awash with ethical fervor in the post-Boesky
|
|||
|
|
|||
|
and post-Reagan years), is little more than a weak
|
|||
|
|
|||
|
liberal response to working flaws or adaptational
|
|||
|
|
|||
|
lapses in the social logic of technocracy.
|
|||
|
|
|||
|
[21] To complete the scenario of morality play example-
|
|||
|
|
|||
|
making, however, we must also consider that Morris's
|
|||
|
|
|||
|
father was chief scientist of the National Computer
|
|||
|
|
|||
|
Security Center, the National Security Agency's public
|
|||
|
|
|||
|
effort at safeguarding computer security. A brilliant
|
|||
|
|
|||
|
programmer and codebreaker in his own right, he had
|
|||
|
|
|||
|
testified in Washington in 1983 about the need to
|
|||
|
|
|||
|
deglamorise teenage hacking, comparing it to "stealing
|
|||
|
|
|||
|
a car for the purpose of joyriding." In a further
|
|||
|
|
|||
|
Oedipal irony, Morris Sr. may have been one of the
|
|||
|
|
|||
|
inventors, while at Bell Labs in the 1950s, of a
|
|||
|
|
|||
|
computer game involving self-perpetuating programs that
|
|||
|
|
|||
|
were a prototype of today's worms and viruses. Called
|
|||
|
|
|||
|
Darwin, its principles were incorporated, in the
|
|||
|
|
|||
|
eighties, into a popular hacker game called Core War,
|
|||
|
|
|||
|
in which autonomous "killer" programs fought each other
|
|||
|
|
|||
|
to the death.^15^
|
|||
|
|
|||
|
[22] With the appearance, in the Morris affair, of a
|
|||
|
|
|||
|
patricidal object who is also the Pentagon's guardian
|
|||
|
|
|||
|
angel, we now have many of the classic components of
|
|||
|
|
|||
|
countercultural cross-generational conflict. What I
|
|||
|
|
|||
|
want to consider, however, is how and where this
|
|||
|
|
|||
|
scenario differs from the definitive contours of such
|
|||
|
|
|||
|
conflicts that we recognize as having been established
|
|||
|
|
|||
|
in the sixties; how the Cornell hacker Morris's
|
|||
|
|
|||
|
relation to, say, campus "occupations" today is
|
|||
|
|
|||
|
different from that evoked by the famous image of armed
|
|||
|
|
|||
|
black students emerging from a sit-in on the Cornell
|
|||
|
|
|||
|
campus; how the relation to technological ethics
|
|||
|
|
|||
|
differs from Andrew Kopkind's famous statement
|
|||
|
|
|||
|
"Morality begins at the end of a gun barrel" which
|
|||
|
|
|||
|
accompanied the publication of the do-it-yourself
|
|||
|
|
|||
|
Molotov cocktail design on the cover of a 1968 issue of
|
|||
|
|
|||
|
the _New York Review of Books_; or how hackers' prized
|
|||
|
|
|||
|
potential access to the networks of military systems
|
|||
|
|
|||
|
warfare differs from the prodigious Yippie feat of
|
|||
|
|
|||
|
levitating the Pentagon building. It may be that, like
|
|||
|
|
|||
|
the J.D. rebel without a cause of the fifties, the
|
|||
|
|
|||
|
disaffiliated student dropout of the sixties, and the
|
|||
|
|
|||
|
negationist punk of the seventies, the hacker of the
|
|||
|
|
|||
|
eighties has come to serve as a visible public example
|
|||
|
|
|||
|
of moral maladjustment, a hegemonic test case for
|
|||
|
|
|||
|
redefining the dominant ethics in an advanced
|
|||
|
|
|||
|
technocratic society. (Hence the need for each of
|
|||
|
|
|||
|
these deviant figures to come in different versions--
|
|||
|
|
|||
|
lumpen, radical chic, and Hollywood-style.)
|
|||
|
|
|||
|
[23] What concerns me here, however, are the different
|
|||
|
|
|||
|
conditions that exist today for recognizing
|
|||
|
|
|||
|
countercultural expression and activism. Twenty years
|
|||
|
|
|||
|
later, the technology of hacking and viral guerrilla
|
|||
|
|
|||
|
warfare occupies a similar place in countercultural
|
|||
|
|
|||
|
fantasy as the Molotov Cocktail design once did. While
|
|||
|
|
|||
|
I don't, for one minute, mean to insist on such
|
|||
|
|
|||
|
comparisons, which aren't particularly sound anyway, I
|
|||
|
|
|||
|
think they conveniently mark a shift in the relation of
|
|||
|
|
|||
|
countercultural activity to technology, a shift in
|
|||
|
|
|||
|
which a software-based technoculture, organized around
|
|||
|
|
|||
|
outlawed libertarian principles about free access to
|
|||
|
|
|||
|
information and communication, has come to replace a
|
|||
|
|
|||
|
dissenting culture organized around the demonizing of
|
|||
|
|
|||
|
abject hardware structures. Much, though not all, of
|
|||
|
|
|||
|
the sixties counterculture was formed around what I
|
|||
|
|
|||
|
have elsewhere called the _technology of folklore_--an
|
|||
|
|
|||
|
expressive congeries of preindustrialist, agrarianist,
|
|||
|
|
|||
|
Orientalist, antitechnological ideas, values, and
|
|||
|
|
|||
|
social structures. By contrast, the cybernetic
|
|||
|
|
|||
|
countercultures of the nineties are already being
|
|||
|
|
|||
|
formed around the _folklore of technology_--mythical
|
|||
|
|
|||
|
feats of survivalism and resistance in a data-rich
|
|||
|
|
|||
|
world of virtual environments and posthuman bodies--
|
|||
|
|
|||
|
which is where many of the SF-and technology-conscious
|
|||
|
|
|||
|
youth cultures have been assembling in recent
|
|||
|
|
|||
|
years.^16^
|
|||
|
|
|||
|
[24] There is no doubt that this scenario makes
|
|||
|
|
|||
|
countercultural activity more difficult to recognize
|
|||
|
|
|||
|
and therefore to define as politically significant. It
|
|||
|
|
|||
|
was much easier, in the sixties, to _identify_ the
|
|||
|
|
|||
|
salient features and symbolic power of a romantic
|
|||
|
|
|||
|
preindustrialist cultural politics in an advanced
|
|||
|
|
|||
|
technological society, especially when the destructive
|
|||
|
|
|||
|
evidence of America's supertechnological invasion of
|
|||
|
|
|||
|
Vietnam was being daily paraded in front of the public
|
|||
|
|
|||
|
eye. However, in a society whose technopolitical
|
|||
|
|
|||
|
infrastructure depends increasingly upon greater
|
|||
|
|
|||
|
surveillance, cybernetic activism necessarily relies on
|
|||
|
|
|||
|
a much more covert politics of identity, since access
|
|||
|
|
|||
|
to closed systems requires discretion and
|
|||
|
|
|||
|
dissimulation. Access to digital systems still
|
|||
|
|
|||
|
requires only the authentication of a signature or
|
|||
|
|
|||
|
pseudonym, not the identification of a real
|
|||
|
|
|||
|
surveillable person, so there exists a crucial
|
|||
|
|
|||
|
operative gap between authentication and
|
|||
|
|
|||
|
identification. (As security systems move toward
|
|||
|
|
|||
|
authenticating access through biological signatures--
|
|||
|
|
|||
|
the biometric recording and measurement of physical
|
|||
|
|
|||
|
characteristics such as palm or retinal prints, or vein
|
|||
|
|
|||
|
patterns on the backs of hands--the hacker's staple
|
|||
|
|
|||
|
method of systems entry through purloined passwords
|
|||
|
|
|||
|
will be further challenged.) By the same token,
|
|||
|
|
|||
|
cybernetic identity is never used up, it can be
|
|||
|
|
|||
|
recreated, reassigned, and reconstructed with any
|
|||
|
|
|||
|
number of different names and under different user
|
|||
|
|
|||
|
accounts. Most hacks, or technocrimes, go unnoticed or
|
|||
|
|
|||
|
unreported for fear of publicising the vulnerability of
|
|||
|
|
|||
|
corporate security systems, especially when the hacks
|
|||
|
|
|||
|
are performed by disgruntled employees taking their
|
|||
|
|
|||
|
vengeance on management. So, too, authoritative
|
|||
|
|
|||
|
identification of any individual hacker, whenever it
|
|||
|
|
|||
|
occurs, is often the result of accidental leads rather
|
|||
|
|
|||
|
than systematic detection. For example, Captain
|
|||
|
|
|||
|
Midnight, the video pirate who commandeered a satellite
|
|||
|
|
|||
|
a few years ago to interrupt broadcast TV viewing, was
|
|||
|
|
|||
|
traced only because a member of the public reported a
|
|||
|
|
|||
|
suspicious conversation heard over a crossed telephone
|
|||
|
|
|||
|
line.
|
|||
|
|
|||
|
[25] Eschewing its core constituency among white males
|
|||
|
|
|||
|
of the pre-professional-managerial class, the hacker
|
|||
|
|
|||
|
community may be expanding its parameters outward.
|
|||
|
|
|||
|
Hacking, for example, has become a feature of the young
|
|||
|
|
|||
|
adult mystery-and-suspense novel genre for girls.^17^
|
|||
|
|
|||
|
The elitist class profile of the hacker prodigy as that
|
|||
|
|
|||
|
of an undersocialized college nerd has become
|
|||
|
|
|||
|
democratized and customized in recent years; it is no
|
|||
|
|
|||
|
longer exclusively associated with institutionally
|
|||
|
|
|||
|
acquired college expertise, and increasingly it dresses
|
|||
|
|
|||
|
streetwise. In a recent article which documents the
|
|||
|
|
|||
|
spread of the computer underground from college whiz
|
|||
|
|
|||
|
kids to a broader youth subculture termed "cyberpunks,"
|
|||
|
|
|||
|
after the movement among SF novelists, the original
|
|||
|
|
|||
|
hacker phone phreak Cap'n Crunch is described as
|
|||
|
|
|||
|
lamenting the fact that the cyberculture is no longer
|
|||
|
|
|||
|
an "elite" one, and that hacker-valid information is
|
|||
|
|
|||
|
much easier to obtain these days.^18^
|
|||
|
|
|||
|
[26] For the most part, however, the self-defined
|
|||
|
|
|||
|
hacker underground, like many other
|
|||
|
|
|||
|
protocountercultural tendencies, has been restricted to
|
|||
|
|
|||
|
a privileged social milieu, further magnetised by the
|
|||
|
|
|||
|
self-understanding of its members that they are the
|
|||
|
|
|||
|
apprentice architects of a future dominated by
|
|||
|
|
|||
|
knowledge, expertise, and "smartness," whether human or
|
|||
|
|
|||
|
digital. Consequently, it is clear that the hacker
|
|||
|
|
|||
|
cyberculture is not a dropout culture; its
|
|||
|
|
|||
|
disaffiliation from a domestic parent culture is often
|
|||
|
|
|||
|
manifest in activities that answer, directly or
|
|||
|
|
|||
|
indirectly, to the legitimate needs of industrial R&D.
|
|||
|
|
|||
|
For example, this hacker culture celebrates high
|
|||
|
|
|||
|
productivity, maverick forms of creative work energy,
|
|||
|
|
|||
|
and an obsessive identification with on-line endurance
|
|||
|
|
|||
|
(and endorphin highs)--all qualities that are valorised
|
|||
|
|
|||
|
by the entrepreneurial codes of silicon futurism. In a
|
|||
|
|
|||
|
critique of the myth of the hacker-as-rebel, Dennis
|
|||
|
|
|||
|
Hayes debunks the political romance woven around the
|
|||
|
|
|||
|
teenage hacker:
|
|||
|
|
|||
|
They are typically white, upper-middle-class
|
|||
|
|
|||
|
adolescents who have taken over the home
|
|||
|
|
|||
|
computer (bought, subsidized, or tolerated
|
|||
|
|
|||
|
by parents in the hope of cultivating
|
|||
|
|
|||
|
computer literacy). Few are politically
|
|||
|
|
|||
|
motivated although many express contempt for
|
|||
|
|
|||
|
the "bureaucracies" that hamper their
|
|||
|
|
|||
|
electronic journeys. Nearly all demand
|
|||
|
|
|||
|
unfettered access to intricate and intriguing
|
|||
|
|
|||
|
computer networks. In this, teenage hackers
|
|||
|
|
|||
|
resemble an alienated shopping culture
|
|||
|
|
|||
|
deprived of purchasing opportunities more
|
|||
|
|
|||
|
than a terrorist network.^19^
|
|||
|
|
|||
|
[27] While welcoming the sobriety of Hayes's critique,
|
|||
|
|
|||
|
I am less willing to accept its assumptions about the
|
|||
|
|
|||
|
political implications of hacker activities. Studies
|
|||
|
|
|||
|
of youth subcultures (including those of a privileged
|
|||
|
|
|||
|
middle-class formation) have taught us that the
|
|||
|
|
|||
|
political meaning of certain forms of cultural
|
|||
|
|
|||
|
"resistance" is notoriously difficult to read. These
|
|||
|
|
|||
|
meanings are either highly coded or expressed
|
|||
|
|
|||
|
indirectly through media--private peer languages,
|
|||
|
|
|||
|
customized consumer styles, unorthodox leisure
|
|||
|
|
|||
|
patterns, categories of insider knowledge and
|
|||
|
|
|||
|
behavior--that have no fixed or inherent political
|
|||
|
|
|||
|
significance. If cultural studies of this sort have
|
|||
|
|
|||
|
proved anything, it is that the often symbolic, not
|
|||
|
|
|||
|
wholly articulate, expressivity of a youth culture can
|
|||
|
|
|||
|
seldom be translated directly into an articulate
|
|||
|
|
|||
|
political philosophy. The significance of these
|
|||
|
|
|||
|
cultures lies in their embryonic or _protopolitical_
|
|||
|
|
|||
|
languages and technologies of opposition to dominant or
|
|||
|
|
|||
|
parent systems of rules. If hackers lack a "cause,"
|
|||
|
|
|||
|
then they are certainly not the first youth culture to
|
|||
|
|
|||
|
be characterized in this dismissive way. In
|
|||
|
|
|||
|
particular, the left has suffered from the lack of a
|
|||
|
|
|||
|
cultural politics capable of recognizing the power of
|
|||
|
|
|||
|
cultural expressions that do not wear a mature
|
|||
|
|
|||
|
political commitment on their sleeves.
|
|||
|
|
|||
|
So, too, the escalation of activism-in-the-
|
|||
|
|
|||
|
professions in the last two decades has shown that it
|
|||
|
|
|||
|
is a mistake to condemn the hacker impulse on account
|
|||
|
|
|||
|
of its class constituency alone. To cede the "ability
|
|||
|
|
|||
|
to know" on the grounds that elite groups will enjoy
|
|||
|
|
|||
|
unjustly privileged access to technocratic knowledge is
|
|||
|
|
|||
|
to cede too much of the future. Is it of no political
|
|||
|
|
|||
|
significance at all that hackers' primary fantasies
|
|||
|
|
|||
|
often involve the official computer systems of the
|
|||
|
|
|||
|
police, armed forces, and defence and intelligence
|
|||
|
|
|||
|
agencies? And that the rationale for their fantasies
|
|||
|
|
|||
|
is unfailingly presented in the form of a defence of
|
|||
|
|
|||
|
civil liberties against the threat of centralized
|
|||
|
|
|||
|
intelligence and military activities? Or is all of
|
|||
|
|
|||
|
this merely a symptom of an apprentice elite's
|
|||
|
|
|||
|
fledgling will to masculine power? The activities of
|
|||
|
|
|||
|
the Chinese student elite in the pro-democracy movement
|
|||
|
|
|||
|
have shown that unforeseen shifts in the political
|
|||
|
|
|||
|
climate can produce startling new configurations of
|
|||
|
|
|||
|
power and resistance. After Tiananmen Square, Party
|
|||
|
|
|||
|
leaders found it imprudent to purge those high-tech
|
|||
|
|
|||
|
engineer and computer cadres who alone could guarantee
|
|||
|
|
|||
|
the future of any planned modernization program. On
|
|||
|
|
|||
|
the other hand, the authorities rested uneasy knowing
|
|||
|
|
|||
|
that each cadre (among the most activist groups in the
|
|||
|
|
|||
|
student movement) is a potential hacker who can have
|
|||
|
|
|||
|
the run of the communications house if and when he or
|
|||
|
|
|||
|
she wants.
|
|||
|
|
|||
|
[28] On the other hand, I do agree with Hayes's
|
|||
|
|
|||
|
perception that the media have pursued their romance
|
|||
|
|
|||
|
with the hacker at the cost of underreporting the much
|
|||
|
|
|||
|
greater challenge posed to corporate employers by their
|
|||
|
|
|||
|
employees. It is in the arena of conflicts between
|
|||
|
|
|||
|
workers and management that most high-tech "sabotage"
|
|||
|
|
|||
|
takes place. In the mainstream everyday life of office
|
|||
|
|
|||
|
workers, mostly female, there is a widespread culture
|
|||
|
|
|||
|
of unorganized sabotage that accounts for infinitely
|
|||
|
|
|||
|
more computer downtime and information loss every year
|
|||
|
|
|||
|
than is caused by destructive, "dark-side" hacking by
|
|||
|
|
|||
|
celebrity cybernetic intruders. The sabotage, time
|
|||
|
|
|||
|
theft, and strategic monkeywrenching deployed by office
|
|||
|
|
|||
|
workers in their engineered electromagnetic attacks on
|
|||
|
|
|||
|
data storage and operating systems might range from the
|
|||
|
|
|||
|
planting of time or logic bombs to the discrete use of
|
|||
|
|
|||
|
electromagnetic Tesla coils or simple bodily friction:
|
|||
|
|
|||
|
"Good old static electricity discharged from the
|
|||
|
|
|||
|
fingertips probably accounts for close to half the
|
|||
|
|
|||
|
disks and computers wiped out or down every year."^20^
|
|||
|
|
|||
|
More skilled operators, intent on evening a score with
|
|||
|
|
|||
|
management, often utilize sophisticated hacking
|
|||
|
|
|||
|
techniques. In many cases, a coherent networking
|
|||
|
|
|||
|
culture exists among female console operators, where,
|
|||
|
|
|||
|
among other things, tips about strategies for slowing
|
|||
|
|
|||
|
down the temporality of the work regime are circulated.
|
|||
|
|
|||
|
While these threats from below are fully recognized in
|
|||
|
|
|||
|
their boardrooms, corporations dependent upon digital
|
|||
|
|
|||
|
business machines are obviously unwilling to advertize
|
|||
|
|
|||
|
how acutely vulnerable they actually are to this kind
|
|||
|
|
|||
|
of sabotage. It is easy to imagine how organised
|
|||
|
|
|||
|
computer activism could hold such companies for ransom.
|
|||
|
|
|||
|
As Hayes points out, however, it is more difficult to
|
|||
|
|
|||
|
mobilize any kind of labor movement organized upon such
|
|||
|
|
|||
|
premises:
|
|||
|
|
|||
|
Many are prepared to publicly oppose the
|
|||
|
|
|||
|
countless dark legacies of the computer age:
|
|||
|
|
|||
|
"electronic sweatshops," Military technology,
|
|||
|
|
|||
|
employee surveillance, genotoxic water, and
|
|||
|
|
|||
|
ozone depletion. Among those currently
|
|||
|
|
|||
|
leading the opposition, however, it is
|
|||
|
|
|||
|
apparently deemed "irresponsible" to recommend
|
|||
|
|
|||
|
an active computerized resistance as a source
|
|||
|
|
|||
|
of worker's power because it is perceived as
|
|||
|
|
|||
|
a medium of employee crime and "terrorism."
|
|||
|
|
|||
|
^21^
|
|||
|
|
|||
|
_Processed World_, the "magazine with a bad attitude"
|
|||
|
|
|||
|
with which Hayes has been associated, is at the
|
|||
|
|
|||
|
forefront of debating and circulating these questions
|
|||
|
|
|||
|
among office workers, regularly tapping into the
|
|||
|
|
|||
|
resentments borne out in on-the-job resistance.
|
|||
|
|
|||
|
[29] While only a small number of computer users would
|
|||
|
|
|||
|
recognize and include themselves under the label of
|
|||
|
|
|||
|
"hacker," there are good reasons for extending the
|
|||
|
|
|||
|
restricted definition of _hacking_ down and across the
|
|||
|
|
|||
|
caste system of systems analysts, designers,
|
|||
|
|
|||
|
programmers, and operators to include all high-tech
|
|||
|
|
|||
|
workers, no matter how inexpert, who can interrupt,
|
|||
|
|
|||
|
upset, and redirect the smooth flow of structured
|
|||
|
|
|||
|
communications that dictates their positions in the
|
|||
|
|
|||
|
social networks of exchange and determines the
|
|||
|
|
|||
|
temporality of their work schedules. To put it in
|
|||
|
|
|||
|
these terms, however, is not to offer any universal
|
|||
|
|
|||
|
definition of hacker agency. There are many social
|
|||
|
|
|||
|
agents, for example, in job locations that are
|
|||
|
|
|||
|
dependent upon the hope of technological _reskilling_,
|
|||
|
|
|||
|
for whom sabotage or disruption of communicative
|
|||
|
|
|||
|
rationality is of little use; for such people,
|
|||
|
|
|||
|
definitions of hacking that are reconstructive, rather
|
|||
|
|
|||
|
than deconstructive, are more appropriate. A good
|
|||
|
|
|||
|
example is the crucial role of worker technoliteracy in
|
|||
|
|
|||
|
the struggle of labor against automation and
|
|||
|
|
|||
|
deskilling. When worker education classes in computer
|
|||
|
|
|||
|
programming were discontinued by management at the Ford
|
|||
|
|
|||
|
Rouge plant in Dearborn, Michigan, union (UAW) members
|
|||
|
|
|||
|
began to publish a newsletter called the _Amateur
|
|||
|
|
|||
|
Computerist_ to fill the gap.^22^ Among the columnists
|
|||
|
|
|||
|
and correspondents in the magazine have been veterans
|
|||
|
|
|||
|
of the Flint sit-down strikes who see a clear
|
|||
|
|
|||
|
historical continuity between the problem of labor
|
|||
|
|
|||
|
organization in the thirties and the problem of
|
|||
|
|
|||
|
automation and deskilling today. Workers' computer
|
|||
|
|
|||
|
literacy is seen as essential not only to the
|
|||
|
|
|||
|
demystification of the computer and the reskilling of
|
|||
|
|
|||
|
workers, but also to labor's capacity to intervene in
|
|||
|
|
|||
|
decisions about new technologies that might result in
|
|||
|
|
|||
|
shorter hours and thus in "work efficiency" rather than
|
|||
|
|
|||
|
worker efficiency.
|
|||
|
|
|||
|
[30] The three social locations I have mentioned above
|
|||
|
|
|||
|
all express different class relations to technology:
|
|||
|
|
|||
|
the location of an apprentice technical elite,
|
|||
|
|
|||
|
conventionally associated with the term "hacking"; the
|
|||
|
|
|||
|
location of the female high-tech office worker,
|
|||
|
|
|||
|
involved in "sabotage"; and the location of the shop-
|
|||
|
|
|||
|
floor worker, whose future depends on technological
|
|||
|
|
|||
|
reskilling. All therefore exhibit different ways of
|
|||
|
|
|||
|
_claiming back_ time dictated and appropriated by
|
|||
|
|
|||
|
technological processes, and of establishing some form
|
|||
|
|
|||
|
of independent control over the work relation so
|
|||
|
|
|||
|
determined by the new technologies. All, then, fall
|
|||
|
|
|||
|
under a broad understanding of the politics involved in
|
|||
|
|
|||
|
any extended description of hacker activities.
|
|||
|
|
|||
|
|
|||
|
[This file is continued in ROSS-2 990]
|
|||
|
|
|||
|
[Andrew Ross, "Hacking Away at the Counter-culture,"
|
|||
|
part 2, continued from ROSS-1 990. Distributed by
|
|||
|
_Postmodern Culture_ in vol. 1, no. 1 (Sep. 1990);
|
|||
|
copyright (c) 1990 by Andrew Ross, all rights reserved]
|
|||
|
|
|||
|
_The Culture and Technology Question_
|
|||
|
|
|||
|
[31] Faced with these proliferating practices in the
|
|||
|
|
|||
|
workplace, on the teenage cult fringe, and increasingly
|
|||
|
|
|||
|
in mainstream entertainment, where, over the last five
|
|||
|
|
|||
|
years, the cyberpunk sensibility in popular fiction,
|
|||
|
|
|||
|
film, and television has caught the romance of the
|
|||
|
|
|||
|
popular taste for the outlaw technology of
|
|||
|
|
|||
|
human/machine interfaces, we are obliged, I think, to
|
|||
|
|
|||
|
ask old kinds of questions about the new silicon order
|
|||
|
|
|||
|
which the evangelists of information technology have
|
|||
|
|
|||
|
been deliriously proclaiming for more than twenty
|
|||
|
|
|||
|
years. The postindustrialists' picture of a world of
|
|||
|
|
|||
|
freedom and abundance projects a sunny millenarian
|
|||
|
|
|||
|
future devoid of work drudgery and ecological
|
|||
|
|
|||
|
degradation. This sunny social order, cybernetically
|
|||
|
|
|||
|
wired up, is presented as an advanced evolutionary
|
|||
|
|
|||
|
phase of society in accord with Enlightenment ideals of
|
|||
|
|
|||
|
progress and rationality. By contrast, critics of this
|
|||
|
|
|||
|
idealism see only a frightening advance in the
|
|||
|
|
|||
|
technologies of social control, whose owners and
|
|||
|
|
|||
|
sponsors are efficiently shaping a society, as Kevin
|
|||
|
|
|||
|
Robins and Frank Webster put it, of "slaves without
|
|||
|
|
|||
|
Athens" that is actually the inverse of the "Athens
|
|||
|
|
|||
|
without slaves" promised by the silicon
|
|||
|
|
|||
|
positivists.^23^
|
|||
|
|
|||
|
[32] It is clear that one of the political features of
|
|||
|
|
|||
|
the new post-Fordist order--economically marked by
|
|||
|
|
|||
|
short-run production, diverse taste markets, flexible
|
|||
|
|
|||
|
specialization, and product differentiation--is that
|
|||
|
|
|||
|
the New Right has managed to appropriate not only the
|
|||
|
|
|||
|
utopian language and values of the alternative
|
|||
|
|
|||
|
technology movements but also the marxist discourse of
|
|||
|
|
|||
|
the "withering away of the state" and the more
|
|||
|
|
|||
|
compassionate vision of local, decentralized
|
|||
|
|
|||
|
communications first espoused by the libertarian left.
|
|||
|
|
|||
|
It must be recognized that these are very popular
|
|||
|
|
|||
|
themes and visions, (advanced most famously by Alvin
|
|||
|
|
|||
|
Toffler and the neoliberal Atari Democrats, though also
|
|||
|
|
|||
|
by leftist thinkers such as Andre Gortz, Rudolf Bahro,
|
|||
|
|
|||
|
and Alain Touraine)--much more popular, for example,
|
|||
|
|
|||
|
than the tradition of centralized technocratic planning
|
|||
|
|
|||
|
espoused by the left under the Fordist model of mass
|
|||
|
|
|||
|
production and consumption.^24^ Against the
|
|||
|
|
|||
|
postindustrialists' millenarian picture of a
|
|||
|
|
|||
|
postscarcity harmony, in which citizens enjoy
|
|||
|
|
|||
|
decentralized, access to free-flowing information, it
|
|||
|
|
|||
|
is necessary, however, to emphasise how and where
|
|||
|
|
|||
|
actually existing cybernetic capitalism presents a
|
|||
|
|
|||
|
gross caricature of such a postscarcity society.
|
|||
|
|
|||
|
[33] One of the stories told by the critical left about
|
|||
|
|
|||
|
new cultural technologies is that of monolithic,
|
|||
|
|
|||
|
panoptical social control, effortlessly achieved
|
|||
|
|
|||
|
through a smooth, endlessly interlocking system of
|
|||
|
|
|||
|
networks of surveillance. In this narrative,
|
|||
|
|
|||
|
information technology is seen as the most despotic
|
|||
|
|
|||
|
mode of domination yet, generating not just a
|
|||
|
|
|||
|
revolution in capitalist production but also a
|
|||
|
|
|||
|
revolution in living--"social Taylorism"--that touches
|
|||
|
|
|||
|
all cultural and social spheres in the home and in the
|
|||
|
|
|||
|
workplace.^25^ Through routine gathering of
|
|||
|
|
|||
|
information about transactions, consumer preferences,
|
|||
|
|
|||
|
and creditworthiness, a harvest of information about
|
|||
|
|
|||
|
any individual's whereabouts and movements, tastes,
|
|||
|
|
|||
|
desires, contacts, friends, associates, and patterns of
|
|||
|
|
|||
|
work and recreation becomes available in the form of
|
|||
|
|
|||
|
dossiers sold on the tradable information market, or is
|
|||
|
|
|||
|
endlessly convertible into other forms of intelligence
|
|||
|
|
|||
|
through computer matching. Advanced pattern
|
|||
|
|
|||
|
recognition technologies facilitate the process of
|
|||
|
|
|||
|
surveillance, while data encryption protects it from
|
|||
|
|
|||
|
public accountability.^26^
|
|||
|
|
|||
|
[34] While the debate about privacy has triggered
|
|||
|
|
|||
|
public consciousness about these excesses, the liberal
|
|||
|
|
|||
|
discourse about ethics and damage control in which that
|
|||
|
|
|||
|
debate has been conducted falls short of the more
|
|||
|
|
|||
|
comprehensive analysis of social control and social
|
|||
|
|
|||
|
management offered by left political economists.
|
|||
|
|
|||
|
According to one marxist analysis, information is seen
|
|||
|
|
|||
|
as a new kind of commodity resource which marks a break
|
|||
|
|
|||
|
with past modes of production and that is becoming the
|
|||
|
|
|||
|
essential site of capital accumulation in the world
|
|||
|
|
|||
|
economy. What happens, then, in the process by which
|
|||
|
|
|||
|
information, gathered up by data scavenging in the
|
|||
|
|
|||
|
transactional sphere, is systematically converted into
|
|||
|
|
|||
|
intelligence? A surplus value is created for use
|
|||
|
|
|||
|
elsewhere. This surplus information value is more than
|
|||
|
|
|||
|
is needed for public surveillance; it is often
|
|||
|
|
|||
|
information, or intelligence, culled from consumer
|
|||
|
|
|||
|
polling or statistical analysis of transactional
|
|||
|
|
|||
|
behavior, that has no immediate use in the process of
|
|||
|
|
|||
|
routine public surveillance. Indeed, it is this
|
|||
|
|
|||
|
surplus, bureaucratic capital that is used for the
|
|||
|
|
|||
|
purpose of forecasting social futures, and consequently
|
|||
|
|
|||
|
applied to the task of managing the behavior of mass or
|
|||
|
|
|||
|
aggregate units within those social futures. This
|
|||
|
|
|||
|
surplus intelligence becomes the basis of a whole new
|
|||
|
|
|||
|
industry of futures research which relies upon computer
|
|||
|
|
|||
|
technology to simulate and forecast the shape,
|
|||
|
|
|||
|
activity, and behavior of complex social systems. The
|
|||
|
|
|||
|
result is a possible system of social management that
|
|||
|
|
|||
|
far transcends the questions about surveillance that
|
|||
|
|
|||
|
have been at the discursive center of the privacy
|
|||
|
|
|||
|
debate.^27^
|
|||
|
|
|||
|
[35] To further challenge the idealists' vision of
|
|||
|
|
|||
|
postindustrial light and magic, we need only look
|
|||
|
|
|||
|
inside the semiconductor workplace itself, which is
|
|||
|
|
|||
|
home to the most toxic chemicals known to man (and
|
|||
|
|
|||
|
woman, especially since women of color often make up
|
|||
|
|
|||
|
the majority of the microelectronics labor force), and
|
|||
|
|
|||
|
where worker illness is measured not in quantities of
|
|||
|
|
|||
|
blood spilled on the shop floor but in the less visible
|
|||
|
|
|||
|
forms of chromosome damage, shrunken testicles,
|
|||
|
|
|||
|
miscarriages, premature deliveries, and severe birth
|
|||
|
|
|||
|
defects. In addition to the extraordinarily high
|
|||
|
|
|||
|
stress patterns of VDT operators, semiconductor workers
|
|||
|
|
|||
|
exhibit an occupational illness rate that even by the
|
|||
|
|
|||
|
late seventies was three times higher than that of
|
|||
|
|
|||
|
manufacturing workers, at least until the federal rules
|
|||
|
|
|||
|
for recognizing and defining levels of injury were
|
|||
|
|
|||
|
changed under the Reagan administration. Protection
|
|||
|
|
|||
|
gear is designed to protect the product and the clean
|
|||
|
|
|||
|
room from the workers, and not vice versa. Recently,
|
|||
|
|
|||
|
immunological health problems have begun to appear that
|
|||
|
|
|||
|
can be described only as a kind of chemically induced
|
|||
|
|
|||
|
AIDS, rendering the T-cells dysfunctional rather than
|
|||
|
|
|||
|
depleting them like virally induced AIDS.^28^ In
|
|||
|
|
|||
|
corporate offices, the use of keystroke software to
|
|||
|
|
|||
|
monitor and pace office workers has become a routine
|
|||
|
|
|||
|
part of job performance evaluation programs. Some 70
|
|||
|
|
|||
|
percent of corporations use electronic surveillance or
|
|||
|
|
|||
|
other forms of quantitative monitoring on their
|
|||
|
|
|||
|
workers. Every bodily movement can be checked and
|
|||
|
|
|||
|
measured, especially trips to the toilet. Federal
|
|||
|
|
|||
|
deregulation has meant that the limits of employee work
|
|||
|
|
|||
|
space have shrunk, in some government offices, below
|
|||
|
|
|||
|
that required by law for a two-hundred pound laboratory
|
|||
|
|
|||
|
pig.^29^ Critics of the labor process seem to have
|
|||
|
|
|||
|
sound reasons to believe that rationalization and
|
|||
|
|
|||
|
quantification are at last entering their most
|
|||
|
|
|||
|
primitive phase.
|
|||
|
|
|||
|
[36] These, then, are some of the features of the
|
|||
|
|
|||
|
critical left position--or what is sometimes referred
|
|||
|
|
|||
|
to as the "paranoid" position--on information
|
|||
|
|
|||
|
technology, which imagines or constructs a totalizing,
|
|||
|
|
|||
|
monolithic picture of systematic domination. While
|
|||
|
|
|||
|
this story is often characterized as conspiracy theory,
|
|||
|
|
|||
|
its targets--technorationality, bureaucratic
|
|||
|
|
|||
|
capitalism--are usually too abstract to fit the picture
|
|||
|
|
|||
|
of a social order planned and shaped by a small,
|
|||
|
|
|||
|
conspiring group of centralized power elites.
|
|||
|
|
|||
|
Although I believe that this story, when told inside
|
|||
|
|
|||
|
and outside the classroom, for example, is an
|
|||
|
|
|||
|
indispensable form of "consciousness-raising," it is
|
|||
|
|
|||
|
not always the best story to tell.
|
|||
|
|
|||
|
[37] While I am not comfortable with the "paranoid"
|
|||
|
|
|||
|
labelling, I would argue that such narratives do little
|
|||
|
|
|||
|
to discourage paranoia. The critical habit of finding
|
|||
|
|
|||
|
unrelieved domination everywhere has certain
|
|||
|
|
|||
|
consequences, one of which is to create a siege
|
|||
|
|
|||
|
mentality, reinforcing the inertia, helplessness, and
|
|||
|
|
|||
|
despair that such critiques set out to oppose in the
|
|||
|
|
|||
|
first place. What follows is a politics that can speak
|
|||
|
|
|||
|
only from a victim's position. And when knowledge
|
|||
|
|
|||
|
about surveillance is presented as systematic and
|
|||
|
|
|||
|
infallible, self-censoring is sure to follow. In the
|
|||
|
|
|||
|
psychosocial climate of fear and phobia aroused by the
|
|||
|
|
|||
|
virus scare, there is a responsibility not to be
|
|||
|
|
|||
|
alarmist or to be scared, especially when, as I have
|
|||
|
|
|||
|
argued, such moments are profitably seized upon by the
|
|||
|
|
|||
|
sponsors of control technology. In short, the picture
|
|||
|
|
|||
|
of a seamlessly panoptical network of surveillance may
|
|||
|
|
|||
|
be the result of a rather undemocratic, not to mention
|
|||
|
|
|||
|
unsocialistic, way of thinking, predicated upon the
|
|||
|
|
|||
|
recognition of people solely as victims. It is
|
|||
|
|
|||
|
redolent of the old sociological models of mass society
|
|||
|
|
|||
|
and mass culture, which cast the majority of society as
|
|||
|
|
|||
|
passive and lobotomized in the face of the cultural
|
|||
|
|
|||
|
patterns of modernization. To emphasize, as Robins and
|
|||
|
|
|||
|
Webster and others have done, the power of the new
|
|||
|
|
|||
|
technologies to despotically transform the "rhythm,
|
|||
|
|
|||
|
texture, and experience" of everyday life, and meet
|
|||
|
|
|||
|
with no resistance in doing so, is not only to cleave,
|
|||
|
|
|||
|
finally, to an epistemology of technological
|
|||
|
|
|||
|
determinism, but also to dismiss the capacity of people
|
|||
|
|
|||
|
to make their own uses of new technologies.^30^
|
|||
|
|
|||
|
[38] The seamless "interlocking" of public and private
|
|||
|
|
|||
|
networks of information and intelligence is not as
|
|||
|
|
|||
|
smooth and even as the critical school of hard
|
|||
|
|
|||
|
domination would suggest. In any case, compulsive
|
|||
|
|
|||
|
gathering of information is no _guarantee_ that any
|
|||
|
|
|||
|
interpretive sense will be made of the files or
|
|||
|
|
|||
|
dossiers, while some would argue that the increasingly
|
|||
|
|
|||
|
covert nature of surveillance is a sign that the
|
|||
|
|
|||
|
"campaign" for social control is not going well. One
|
|||
|
|
|||
|
of the most pervasive popular arguments against the
|
|||
|
|
|||
|
panoptical intentions of the masters of technology is
|
|||
|
|
|||
|
that their systems do not work. Every successful hack
|
|||
|
|
|||
|
or computer crime in some way reinforces the popular
|
|||
|
|
|||
|
perception that information systems are not infallible.
|
|||
|
|
|||
|
And the announcements of military-industrial
|
|||
|
|
|||
|
spokespersons that the fully automated battlefield is
|
|||
|
|
|||
|
on its way run up against an accumulated stock of
|
|||
|
|
|||
|
popular skepticism about the operative capacity of
|
|||
|
|
|||
|
weapons systems. These misgivings are born of decades
|
|||
|
|
|||
|
of distrust for the plans and intentions of the
|
|||
|
|
|||
|
military-industrial complex, and were quite evident in
|
|||
|
|
|||
|
the widespread cynicism about the Strategic Defense
|
|||
|
|
|||
|
Initiative. Just to take one empirical example of
|
|||
|
|
|||
|
unreliability, the military communications system
|
|||
|
|
|||
|
worked so poorly and so farcically during the U.S.
|
|||
|
|
|||
|
invasion of Grenada that commanders had to call each
|
|||
|
|
|||
|
other on pay phones: ever since then, the command-and-
|
|||
|
|
|||
|
control code of Arpanet technocrats has been C5--
|
|||
|
|
|||
|
Command, Control, Communication, Computers, and
|
|||
|
|
|||
|
Confusion.^31^ It could be said, of course, that the
|
|||
|
|
|||
|
invasion of Grenada did, after all, succeed, but the
|
|||
|
|
|||
|
more complex and inefficiency-prone such high-tech
|
|||
|
|
|||
|
invasions become (Vietnam is still the best example),
|
|||
|
|
|||
|
the less likely they are to be undertaken with any
|
|||
|
|
|||
|
guarantee of success.
|
|||
|
|
|||
|
[39] I am not suggesting that alternatives can be
|
|||
|
|
|||
|
forged simply by encouraging disbelief in the
|
|||
|
|
|||
|
infallibility of existing technologies (pointing to
|
|||
|
|
|||
|
examples of the appropriation of technologies for
|
|||
|
|
|||
|
radical uses, of course, always provides more visibly
|
|||
|
|
|||
|
satisfying evidence of empowerment), but
|
|||
|
|
|||
|
technoskepticism, while not a _sufficient_ condition of
|
|||
|
|
|||
|
social change, is a _necessary_ condition. Stocks of
|
|||
|
|
|||
|
popular technoskepticism are crucial to the task of
|
|||
|
|
|||
|
eroding the legitimacy of those cultural values that
|
|||
|
|
|||
|
prepare the way for new technological developments:
|
|||
|
|
|||
|
values and principles such as the inevitability of
|
|||
|
|
|||
|
material progress, the "emancipatory" domination of
|
|||
|
|
|||
|
nature, the innovative autonomy of machines, the
|
|||
|
|
|||
|
efficiency codes of pragmatism, and the linear
|
|||
|
|
|||
|
juggernaut of liberal Enlightenment rationality--all
|
|||
|
|
|||
|
increasingly under close critical scrutiny as a wave of
|
|||
|
|
|||
|
environmental consciousness sweeps through the
|
|||
|
|
|||
|
electorates of the West. Technologies do not shape or
|
|||
|
|
|||
|
determine such values. These values already exist
|
|||
|
|
|||
|
before the technologies, and the fact that they have
|
|||
|
|
|||
|
become deeply embodied in the structure of popular
|
|||
|
|
|||
|
needs and desires then provides the green light for the
|
|||
|
|
|||
|
acceptance of certain kinds of technology. The
|
|||
|
|
|||
|
principal rationale for introducing new technologies is
|
|||
|
|
|||
|
that they answer to already existing intentions and
|
|||
|
|
|||
|
demands that may be perceived as "subjective" but that
|
|||
|
|
|||
|
are never actually within the control of any single set
|
|||
|
|
|||
|
of conspiring individuals. As Marike Finlay has
|
|||
|
|
|||
|
argued, just as technology is only possible in given
|
|||
|
|
|||
|
discursive situations, one of which being the desire of
|
|||
|
|
|||
|
people to have it for reasons of empowerment, so
|
|||
|
|
|||
|
capitalism is merely the site, and not the source, of
|
|||
|
|
|||
|
the power that is often autonomously attributed to the
|
|||
|
|
|||
|
owners and sponsors of technology.^32^
|
|||
|
|
|||
|
[40] In fact, there is no frame of technological
|
|||
|
|
|||
|
inevitability that has not already interacted with
|
|||
|
|
|||
|
popular needs and desires, no introduction of new
|
|||
|
|
|||
|
machineries of control that has not already been
|
|||
|
|
|||
|
negotiated to some degree in the arena of popular
|
|||
|
|
|||
|
consent. Thus the power to design architecture that
|
|||
|
|
|||
|
incorporates different values must arise from the
|
|||
|
|
|||
|
popular perception that existing technologies are not
|
|||
|
|
|||
|
the only ones, nor are they the best when it comes to
|
|||
|
|
|||
|
individual and collective empowerment. It was this
|
|||
|
|
|||
|
kind of perception--formed around the distrust of big,
|
|||
|
|
|||
|
impersonal, "closed" hardware systems, and the desire
|
|||
|
|
|||
|
for small, decentralized, interactive machines to
|
|||
|
|
|||
|
facilitate interpersonal communication--that "built"
|
|||
|
|
|||
|
the PC out of hacking expertise in the early seventies.
|
|||
|
|
|||
|
These were as much the partial "intentions" behind the
|
|||
|
|
|||
|
development of microcomputing technology as deskilling,
|
|||
|
|
|||
|
monitoring, and information gathering are the
|
|||
|
|
|||
|
intentions behind the corporate use of that technology
|
|||
|
|
|||
|
today. The growth of public data networks, bulletin
|
|||
|
|
|||
|
board systems, alternative information and media links,
|
|||
|
|
|||
|
and the increasing cheapness of desktop publishing,
|
|||
|
|
|||
|
satellite equipment, and international data bases are
|
|||
|
|
|||
|
as much the result of local political "intentions" as
|
|||
|
|
|||
|
the fortified net of globally linked, restricted-access
|
|||
|
|
|||
|
information systems is the intentional fantasy of those
|
|||
|
|
|||
|
who seek to profit from centralised control. The
|
|||
|
|
|||
|
picture that emerges from this mapping of intentions is
|
|||
|
|
|||
|
not an inevitably technofascist one, but rather the
|
|||
|
|
|||
|
uneven result of cultural struggles over values and
|
|||
|
|
|||
|
meanings.
|
|||
|
|
|||
|
[41] It is in this respect--in the struggle over values
|
|||
|
|
|||
|
and meanings--that the work of cultural criticism takes
|
|||
|
|
|||
|
on its special significance as a full participant in
|
|||
|
|
|||
|
the debate about technology. In fact, cultural
|
|||
|
|
|||
|
criticism is already fully implicated in that debate,
|
|||
|
|
|||
|
if only because the culture and education industries
|
|||
|
|
|||
|
are rapidly becoming integrated within the vast
|
|||
|
|
|||
|
information service conglomerates. The media we study,
|
|||
|
|
|||
|
the media we publish in, and the media we teach within
|
|||
|
|
|||
|
are increasingly part of the same tradable information
|
|||
|
|
|||
|
sector. So, too, our common intellectual discourse has
|
|||
|
|
|||
|
been significantly affected by the recent debates about
|
|||
|
|
|||
|
postmodernism (or culture in a postindustrial world) in
|
|||
|
|
|||
|
which the euphoric, addictive thrill of the
|
|||
|
|
|||
|
technological sublime has figured quite prominently.
|
|||
|
|
|||
|
The high-speed technological fascination that is
|
|||
|
|
|||
|
characteristic of the postmodern condition can be read,
|
|||
|
|
|||
|
on the one hand, as a celebratory capitulation on the
|
|||
|
|
|||
|
part of intellectuals to the new information
|
|||
|
|
|||
|
technocultures. On the other hand, this celebratory
|
|||
|
|
|||
|
strain attests to the persuasive affect associated with
|
|||
|
|
|||
|
the new cultural technologies, to their capacity (more
|
|||
|
|
|||
|
powerful than that of their sponsors and promoters) to
|
|||
|
|
|||
|
generate pleasure and gratification and to win the
|
|||
|
|
|||
|
struggle for intellectual as well as popular consent.
|
|||
|
|
|||
|
[42] Another reason for the involvement of cultural
|
|||
|
|
|||
|
critics in the technology debates has to do with our
|
|||
|
|
|||
|
special critical knowledge of the way in which cultural
|
|||
|
|
|||
|
meanings are produced--our knowledge about the politics
|
|||
|
|
|||
|
of consumption and what is often called the politics of
|
|||
|
|
|||
|
representation. This is the knowledge which
|
|||
|
|
|||
|
demonstrates that there are limits to the capacity of
|
|||
|
|
|||
|
productive forces to shape and determine consciousness.
|
|||
|
|
|||
|
It is a knowledge that insists on the ideological or
|
|||
|
|
|||
|
interpretive dimension of technology as a culture which
|
|||
|
|
|||
|
can and must be used and consumed in a variety of ways
|
|||
|
|
|||
|
that are not reducible to the intentions of any single
|
|||
|
|
|||
|
source or producer, and whose meanings cannot simply be
|
|||
|
|
|||
|
read off as evidence of faultless social reproduction.
|
|||
|
|
|||
|
It is a knowledge, in short, which refuses to add to
|
|||
|
|
|||
|
the "hard domination" picture of disenfranchised
|
|||
|
|
|||
|
individuals watched over by some by some scheming
|
|||
|
|
|||
|
panoptical intelligence. Far from being understood
|
|||
|
|
|||
|
solely as the concrete hardware of electronically
|
|||
|
|
|||
|
sophisticated objects, technology must be seen as a
|
|||
|
|
|||
|
lived, interpretive practice for people in their
|
|||
|
|
|||
|
everyday lives. To redefine the shape and form of that
|
|||
|
|
|||
|
practice is to help create the need for new kinds of
|
|||
|
|
|||
|
hardware and software.
|
|||
|
|
|||
|
[43] One of the latter aims of this essay has been to
|
|||
|
|
|||
|
describe and suggest a wider set of activities and
|
|||
|
|
|||
|
social locations than is normally associated with the
|
|||
|
|
|||
|
practice of hacking. If there is a challenge here for
|
|||
|
|
|||
|
cultural critics, then it might be presented as the
|
|||
|
|
|||
|
challenge to make our knowledge about technoculture
|
|||
|
|
|||
|
into something like a hacker's knowledge, capable of
|
|||
|
|
|||
|
penetrating existing systems of rationality that might
|
|||
|
|
|||
|
otherwise be seen as infallible; a hacker's knowledge,
|
|||
|
|
|||
|
capable of reskilling, and therefore of rewriting the
|
|||
|
|
|||
|
cultural programs and reprogramming the social values
|
|||
|
|
|||
|
that make room for new technologies; a hacker's
|
|||
|
|
|||
|
knowledge, capable also of generating new popular
|
|||
|
|
|||
|
romances around the alternative uses of human
|
|||
|
|
|||
|
ingenuity. If we are to take up that challenge, we
|
|||
|
|
|||
|
cannot afford to give up what technoliteracy we have
|
|||
|
|
|||
|
acquired in deference to the vulgar faith that tells us
|
|||
|
|
|||
|
it is always acquired in complicity, and is thus
|
|||
|
|
|||
|
contaminated by the poison of instrumental rationality,
|
|||
|
|
|||
|
or because we hear, often from the same quarters, that
|
|||
|
|
|||
|
acquired technological competence simply glorifies the
|
|||
|
|
|||
|
inhuman work ethic. Technoliteracy, for us, is the
|
|||
|
|
|||
|
challenge to make a historical opportunity out of a
|
|||
|
|
|||
|
historical necessity.
|
|||
|
|
|||
|
_______________________________________________________
|
|||
|
|
|||
|
NOTES
|
|||
|
|
|||
|
|
|||
|
1. Bryan Kocher, "A Hygiene Lesson,"
|
|||
|
_Communications of the ACM_, 32.1 (January 1989): 3.
|
|||
|
|
|||
|
2. Jon A. Rochlis and Mark W. Eichen, "With
|
|||
|
Microscope and Tweezers: The Worm from MIT's
|
|||
|
Perspective," _Communications of the ACM_, 32.6 (June
|
|||
|
1989): 697.
|
|||
|
|
|||
|
3. Philip Elmer-DeWitt, "Invasion of the Body
|
|||
|
Snatchers," _Time_ (26 September 1988); 62-67.
|
|||
|
|
|||
|
4. Judith Williamson, "Every Virus Tells a Story:
|
|||
|
The Meaning of HIV and AIDS," _Taking Liberties: AIDS
|
|||
|
and Cultural Politics_, ed. Erica Carter and Simon
|
|||
|
Watney (London: Serpent's Tail/ICA, 1989): 69.
|
|||
|
|
|||
|
5. "Pulsing the system" is a well-known
|
|||
|
intelligence process in which, for example, planes
|
|||
|
deliberately fly over enemy radar installations in
|
|||
|
order to determine what frequencies they use and how
|
|||
|
they are arranged. It has been suggested that Morris
|
|||
|
Sr. and Morris Jr. worked in collusion as part of an
|
|||
|
NSA operation to pulse the Internet system, and to
|
|||
|
generate public support for a legal clampdown on
|
|||
|
hacking. See Allan Lundell, _Virus! The Secret World
|
|||
|
of Computer Invaders That Breed and Destroy_ (Chicago:
|
|||
|
Contemporary Books, 1989), 12-18. As is the case with
|
|||
|
all such conspiracy theories, no actual conspiracy need
|
|||
|
have existed for the consequences--in this case, the
|
|||
|
benefits for the intelligence community--to have been
|
|||
|
more or less the same.
|
|||
|
|
|||
|
6. For details of these raids, see _2600: The
|
|||
|
Hacker's Quarterly_, 7.1 (Spring 1990): 7.
|
|||
|
|
|||
|
7. "Hackers in Jail," _2600: The Hacker's
|
|||
|
Quarterly_, 6.1 (Spring 1989); 22-23. The recent
|
|||
|
Secret Service action that shut down _Phrack_, an
|
|||
|
electronic newsletter operating out of St. Louis,
|
|||
|
confirms _2600_'s thesis: a nonelectronic publication
|
|||
|
would not be censored in the same way.
|
|||
|
|
|||
|
8. This is not to say that the new laws cannot
|
|||
|
themselves be used to protect hacker institutions,
|
|||
|
however. _2600_ has advised operators of bulletin
|
|||
|
boards to declare them private property, thereby
|
|||
|
guaranteeing protection under the Electronic Privacy
|
|||
|
Act against unauthorized entry by the FBI.
|
|||
|
|
|||
|
9. Hugo Cornwall, _The Hacker's Handbook_ 3rd ed.
|
|||
|
(London: Century, 1988) 181, 2-6. In Britain, for the
|
|||
|
most part, hacking is still looked upon as a matter for
|
|||
|
the civil, rather than the criminal, courts.
|
|||
|
|
|||
|
10. Discussions about civil liberties and property
|
|||
|
rights, for example, tend to preoccupy most of the
|
|||
|
participants in the electronic forum published as "Is
|
|||
|
Computer Hacking a Crime?" in _Harper's_, 280.1678
|
|||
|
(March 1990): 45-57.
|
|||
|
|
|||
|
11. See Hugo Cornwall, _Data Theft_ (London:
|
|||
|
Heinemann, 1987).
|
|||
|
|
|||
|
12. Bill Landreth, _Out of the Inner Circle: The
|
|||
|
True Story of a Computer Intruder Capable of Cracking
|
|||
|
the Nation's Most Secure Computer Systems_ (Redmond,
|
|||
|
Wash.: Tempus, Microsoft, 1989), 10.
|
|||
|
|
|||
|
13. _The Computer Worm: A Report to the Provost of
|
|||
|
Cornell University on an Investigation Conducted by the
|
|||
|
Commission of Preliminary Enquiry_ (Ithaca, N.Y.:
|
|||
|
Cornell University, 1989).
|
|||
|
|
|||
|
14. _The Computer Worm: A Report to the Provost_,
|
|||
|
8.
|
|||
|
|
|||
|
15. A. K. Dewdney, the "computer recreations"
|
|||
|
columnist at _Scientific American_, was the first to
|
|||
|
publicize the details of this game of battle programs
|
|||
|
in an article in the May 1984 issue of the magazine.
|
|||
|
In a follow-up article in March 1985, "A Core War
|
|||
|
Bestiary of Viruses, Worms, and Other Threats to
|
|||
|
Computer Memories," Dewdney described the wide range of
|
|||
|
"software creatures" which readers' responses had
|
|||
|
brought to light. A third column, in March 1989, was
|
|||
|
written, in an exculpatory mode, to refute any
|
|||
|
connection between his original advertisement of the
|
|||
|
Core War program and the spate of recent viruses.
|
|||
|
|
|||
|
16. Andrew Ross, _No Respect: Intellectuals and
|
|||
|
Popular Culture_ (New York: Routledge, 1989), 212.
|
|||
|
Some would argue, however, that the ideas and values of
|
|||
|
the sixties counterculture were only fully culminated
|
|||
|
in groups like the People's Computer Company, which ran
|
|||
|
Community Memory in Berkeley, or the Homebrew Computer
|
|||
|
Club, which pioneered personal microcomputing. So,
|
|||
|
too, the Yippies had seen the need to form YIPL, the
|
|||
|
Youth International Party Line, devoted to "anarcho-
|
|||
|
technological" projects, which put out a newsletter
|
|||
|
called TAP (alternately the Technological American
|
|||
|
Party and the Technological Assistance Program). In
|
|||
|
its depoliticised form, which eschewed the kind of
|
|||
|
destructive "dark-side" hacking advocated in its
|
|||
|
earlier incarnation, _TAP_ was eventually the
|
|||
|
progenitor of _2600_. A significant turning point, for
|
|||
|
example, was _TAP_'s decision not to publish plans for
|
|||
|
the hydrogen bomb (which the _Progressive_ did)--bombs
|
|||
|
would destroy the phone system, which the _TAP_ phone
|
|||
|
phreaks had an enthusiastic interest in maintaining.
|
|||
|
|
|||
|
17. See Alice Bach's _Phreakers_ series, in which
|
|||
|
two teenage girls enjoy adventures through the use of
|
|||
|
computer technology. _The Bully of Library Place_,
|
|||
|
_Parrot Woman_, _Double Bucky Shanghai_, and _Ragwars_
|
|||
|
(all published by Dell, 1987-88).
|
|||
|
|
|||
|
18. John Markoff, "Cyberpunks Seek Thrills in
|
|||
|
Computerized Mischief," _New York Times_, November 26,
|
|||
|
1988.
|
|||
|
|
|||
|
19. Dennis Hayes, _Behind the Silicon Curtain: The
|
|||
|
Seductions of Work in a Lonely Era_ (Boston, South End
|
|||
|
Press, 1989), 93.
|
|||
|
One striking historical precedent for the hacking
|
|||
|
subculture, suggested to me by Carolyn Marvin, was the
|
|||
|
widespread activity of amateur or "ham" wireless
|
|||
|
operators in the first two decades of the century.
|
|||
|
Initially lionized in the press as boy-inventor heroes
|
|||
|
for their technical ingenuity and daring adventures
|
|||
|
with the ether, this white middle-class subculture was
|
|||
|
increasingly demonized by the U.S. Navy (whose signals
|
|||
|
the amateurs prankishly interfered with), which was
|
|||
|
crusading for complete military control of the airwaves
|
|||
|
in the name of national security. The amateurs lobbied
|
|||
|
with democratic rhetoric for the public's right to
|
|||
|
access the airwaves, and although partially successful
|
|||
|
in their case against the Navy, lost out ultimately to
|
|||
|
big commercial interests when Congress approved the
|
|||
|
creation of a broadcasting monopoly after World War I
|
|||
|
in the form of RCA. See Susan J. Douglas, _Inventing
|
|||
|
American Broadcasting 1899-1922_ (Baltimore: Johns
|
|||
|
Hopkins University Press, 1987), 187-291.
|
|||
|
|
|||
|
20. "Sabotage," _Processed World_, 11 (Summer
|
|||
|
1984), 37-38.
|
|||
|
|
|||
|
21. Hayes, _Behind the Silicon Curtain_, 99.
|
|||
|
|
|||
|
22. _The Amateur Computerist_, available from R.
|
|||
|
Hauben, PO Box, 4344, Dearborn, MI 48126.
|
|||
|
|
|||
|
23. Kevin Robins and Frank Webster, "Athens
|
|||
|
Without Slaves...Or Slaves Without Athens? The
|
|||
|
Neurosis of Technology," _Science as Culture_, 3
|
|||
|
(1988): 7-53.
|
|||
|
|
|||
|
24. See Boris Frankel, _The Post-Industrial
|
|||
|
Utopians_ (Oxford: Basil Blackwell, 1987).
|
|||
|
|
|||
|
25. See, for example, the collection of essays
|
|||
|
edited by Vincent Mosco and Janet Wasko, _The Political
|
|||
|
Economy of Information_ (Madison: University of
|
|||
|
Wisconsin Press, 1988), and Dan Schiller, _The
|
|||
|
Information Commodity_ (Oxford UP, forthcoming).
|
|||
|
|
|||
|
26. Tom Athanasiou and Staff, "Encryption and the
|
|||
|
Dossier Society," _Processed World_, 16 (1986): 12-17.
|
|||
|
|
|||
|
27. Kevin Wilson, _Technologies of Control: The
|
|||
|
New Interactive Media for the Home_ (Madison:
|
|||
|
University of Wisconsin Press, 1988), 121-25.
|
|||
|
|
|||
|
28. Hayes, _Behind the Silicon Curtain_, 63-80.
|
|||
|
|
|||
|
29. "Our Friend the VDT," _Processed World_, 22
|
|||
|
(Summer 1988): 24-25.
|
|||
|
|
|||
|
30. See Kevin Robins and Frank Webster,
|
|||
|
"Cybernetic Capitalism," in Mosco and Wasko, 44-75.
|
|||
|
|
|||
|
31. Barbara Garson, _The Electronic Sweatshop_
|
|||
|
(New York: Simon & Schuster, 1988), 244-45.
|
|||
|
|
|||
|
32. See Marike Finlay's Foucauldian analysis,
|
|||
|
_Powermatics: A Discursive Critique of New Technology_
|
|||
|
(London: Routledge & Kegan Paul, 1987). A more
|
|||
|
conventional culturalist argument can be found in
|
|||
|
Stephen Hill, _The Tragedy of Technology_ (London:
|
|||
|
Pluto Press, 1988).
|
|||
|
|
|||
|
|