2756 lines
84 KiB
Plaintext
2756 lines
84 KiB
Plaintext
|
||
|
||
HACKING AWAY AT THE COUNTERCULTURE
|
||
|
||
by
|
||
|
||
ANDREW ROSS
|
||
|
||
Princeton University
|
||
Copyright (c) 1990 by Andrew Ross, all rights reserved.
|
||
_Postmodern Culture_ vol. 1, no. 1 (Sep. 1990).
|
||
|
||
|
||
|
||
[1] Ever since the viral attack engineered in November
|
||
|
||
of 1988 by Cornell University hacker Robert Morris on
|
||
|
||
the national network system Internet, which includes
|
||
|
||
the Pentagon's ARPAnet data exchange network, the
|
||
|
||
nation's high-tech ideologues and spin doctors have
|
||
|
||
been locked in debate, trying to make ethical and
|
||
|
||
economic sense of the event. The virus rapidly
|
||
|
||
infected an estimated six thousand computers around the
|
||
|
||
country, creating a scare that crowned an open season
|
||
|
||
of viral hysteria in the media, in the course of which,
|
||
|
||
according to the Computer Virus Industry Association in
|
||
|
||
Santa Clara, the number of known viruses jumped from
|
||
|
||
seven to thirty during 1988, and from three thousand
|
||
|
||
infections in the first two months of that year to
|
||
|
||
thirty thousand in the last two months. While it
|
||
|
||
caused little in the way of data damage (some richly
|
||
|
||
inflated initial estimates reckoned up to $100m in
|
||
|
||
down time), the ramifications of the Internet virus
|
||
|
||
have helped to generate a moral panic that has all but
|
||
|
||
transformed everyday "computer culture."
|
||
|
||
[2] Following the lead of DARPA's (Defence Advance
|
||
|
||
Research Projects Agency) Computer Emergency Response
|
||
|
||
Team at Carnegie-Mellon University, anti-virus response
|
||
|
||
centers were hastily put in place by government and
|
||
|
||
defence agencies at the National Science Foundation,
|
||
|
||
the Energy Department, NASA, and other sites. Plans
|
||
|
||
were made to introduce a bill in Congress (the
|
||
|
||
Computer Virus Eradication Act, to replace the 1986
|
||
|
||
Computer Fraud and Abuse Act, which pertained solely to
|
||
|
||
government information), that would call for prison
|
||
|
||
sentences of up to ten years for the "crime" of
|
||
|
||
sophisticated hacking, and numerous government agencies
|
||
|
||
have been involved in a proprietary fight over the
|
||
|
||
creation of a proposed Center for Virus Control,
|
||
|
||
modelled, of course, on Atlanta's Centers for Disease
|
||
|
||
Control, notorious for its failures to respond
|
||
|
||
adequately to the AIDS crisis.
|
||
|
||
[3] In fact, media commentary on the virus scare has
|
||
|
||
run not so much tongue-in-cheek as hand-in-glove with
|
||
|
||
the rhetoric of AIDS hysteria--the common use of terms
|
||
|
||
like killer virus and epidemic; the focus on hi-risk
|
||
|
||
personal contact (virus infection, for the most part,
|
||
|
||
is spread on personal computers, not mainframes); the
|
||
|
||
obsession with defense, security, and immunity; and the
|
||
|
||
climate of suspicion generated around communitarian
|
||
|
||
acts of sharing. The underlying moral imperative being
|
||
|
||
this: You can't trust your best friend's software any
|
||
|
||
more than you can trust his or her bodily fluids--safe
|
||
|
||
software or no software at all! Or, as Dennis Miller
|
||
|
||
put it on _Saturday Night Live_, "Remember, when you
|
||
|
||
connect with another computer, you're connecting to
|
||
|
||
every computer that computer has ever connected to."
|
||
|
||
This playful conceit struck a chord in the popular
|
||
|
||
consciousness, even as it was perpetuated in such sober
|
||
|
||
quarters as the Association for Computing Machinery,
|
||
|
||
the president of which, in a controversial editorial
|
||
|
||
titled "A Hygiene Lesson," drew comparisons not only
|
||
|
||
with sexually transmitted diseases, but also with a
|
||
|
||
cholera epidemic, and urged attention to "personal
|
||
|
||
systems hygiene."^1^ In fact, some computer scientists
|
||
|
||
who studied the symptomatic path of Morris's virus
|
||
|
||
across Internet have pointed to its uneven effects upon
|
||
|
||
different computer types and operating systems, and
|
||
|
||
concluded that "there is a direct analogy with
|
||
|
||
biological genetic diversity to be made."^2^ The
|
||
|
||
epidemiology of biological virus, and especially AIDS,
|
||
|
||
research is being closely studied to help implement
|
||
|
||
computer security plans, and, in these circles, the new
|
||
|
||
witty discourse is laced with references to antigens,
|
||
|
||
white blood cells, vaccinations, metabolic free
|
||
|
||
radicals, and the like.
|
||
|
||
[4] The form and content of more lurid articles like
|
||
|
||
_Time_'s infamous (September 1988) story, "Invasion of
|
||
|
||
the Data Snatchers," fully displayed the continuity of
|
||
|
||
the media scare with those historical fears about
|
||
|
||
bodily invasion, individual and national, that are
|
||
|
||
often considered endemic to the paranoid style of
|
||
|
||
American political culture.^3^ Indeed, the rhetoric of
|
||
|
||
computer culture, in common with the medical discourse
|
||
|
||
of AIDS research, has fallen in line with the paranoid,
|
||
|
||
strategic style of Defence Department rhetoric. Each
|
||
|
||
language-repertoire is obsessed with hostile threats to
|
||
|
||
bodily and technological immune systems; every event is
|
||
|
||
a ballistic manoeuver in the game of microbiological
|
||
|
||
war, where the governing metaphors are indiscriminately
|
||
|
||
drawn from cellular genetics and cybernetics alike. As
|
||
|
||
a counterpoint to the tongue-in-cheek AI tradition of
|
||
|
||
seeing humans as "information-exchanging environments,"
|
||
|
||
the imagined life of computers has taken on an
|
||
|
||
organicist shape, now that they too are subject to
|
||
|
||
cybernetic "sickness" or disease. So, too, the
|
||
|
||
development of interrelated systems, such as Internet
|
||
|
||
itself, has further added to the structural picture of
|
||
|
||
an interdependent organism, whose component members,
|
||
|
||
however autonomous, are all nonetheless affected by the
|
||
|
||
"health" of each individual constituent. The growing
|
||
|
||
interest among scientists in developing computer
|
||
|
||
programs that will simulate the genetic behavior of
|
||
|
||
living organisms (in which binary numbers act like
|
||
|
||
genes) points to a future where the border between
|
||
|
||
organic and artificial life is less and less distinct.
|
||
|
||
[5] In keeping with the increasing use of biologically
|
||
|
||
derived language to describe mutations in systems
|
||
|
||
theory, conscious attempts to link the AIDS crisis with
|
||
|
||
the information security crisis have pointed out that
|
||
|
||
both kinds of virus, biological and electronic, take
|
||
|
||
over the host cell/program and clone their carrier
|
||
|
||
genetic codes by instructing the hosts to make replicas
|
||
|
||
of the viruses. Neither kind of virus, however, can
|
||
|
||
replicate themselves independently; they are pieces of
|
||
|
||
code that attach themselves to other cells/programs--
|
||
|
||
just as biological viruses need a host cell, computer
|
||
|
||
viruses require a host program to activate them. The
|
||
|
||
Internet virus was not, in fact, a virus, but a worm, a
|
||
|
||
program that can run independently and therefore
|
||
|
||
_appears_ to have a life of its own. The worm
|
||
|
||
replicates a full version of itself in programs and
|
||
|
||
systems as it moves from one to another, masquerading
|
||
|
||
as a legitimate user by guessing the user passwords of
|
||
|
||
locked accounts. Because of this autonomous existence,
|
||
|
||
the worm can be seen to behave as if it were an
|
||
|
||
organism with some kind of purpose or teleology, and
|
||
|
||
yet it has none. Its only "purpose" is to reproduce
|
||
|
||
and infect. If the worm has no inbuilt antireplication
|
||
|
||
code, or if the code is faulty, as was the case with
|
||
|
||
the Internet worm, it will make already-infected
|
||
|
||
computers repeatedly accept further replicas of itself,
|
||
|
||
until their memories are clogged. A much quieter worm
|
||
|
||
than that engineered by Morris would have moved more
|
||
|
||
slowly, as one supposes a "worm" should, protecting
|
||
|
||
itself from detection by ever more subtle camouflage,
|
||
|
||
and propagating its cumulative effect of operative
|
||
|
||
systems inertia over a much longer period of time.
|
||
|
||
[6] In offering such descriptions, however, we must be
|
||
|
||
wary of attributing a teleology/intentionality to worms
|
||
|
||
and viruses which can be ascribed only, and, in most
|
||
|
||
instances, speculatively, to their authors. There is
|
||
|
||
no reason why a cybernetic "worm" might be expected to
|
||
|
||
behave in any fundamental way like a biological worm.
|
||
|
||
So, too, the assumed intentionality of its author
|
||
|
||
distinguishes the human-made cybernetic virus from the
|
||
|
||
case of the biological virus, the effects of which are
|
||
|
||
fated to be received and discussed in a language
|
||
|
||
saturated with human-made structures and narratives of
|
||
|
||
meaning and teleological purpose. Writing about the
|
||
|
||
folkloric theologies of significance and explanatory
|
||
|
||
justice (usually involving retribution) that have
|
||
|
||
sprung up around the AIDS crisis, Judith Williamson has
|
||
|
||
pointed to the radical implications of this collision
|
||
|
||
between an intentionless virus and a meaning-filled
|
||
|
||
culture:
|
||
|
||
Nothing could be more meaningless than a
|
||
|
||
virus. It has no point, no purpose, no plan;
|
||
|
||
it is part of no scheme, carries no inherent
|
||
|
||
significance. And yet nothing is harder for
|
||
|
||
us to confront than the complete absence of
|
||
|
||
meaning. By its very definition,
|
||
|
||
meaninglessness cannot be articulated within
|
||
|
||
our social language, which is a system _of_
|
||
|
||
meaning: impossible to include, as an
|
||
|
||
absence, it is also impossible to exclude--
|
||
|
||
for meaninglessness isn't just the opposite
|
||
|
||
of meaning, it is the end of meaning, and
|
||
|
||
threatens the fragile structures by which we
|
||
|
||
make sense of the world.^4^
|
||
|
||
[7] No such judgment about meaninglessness applies to
|
||
|
||
the computer security crisis. In contrast to HIV's
|
||
|
||
lack of meaning or intentionality, the meaning of
|
||
|
||
cybernetic viruses is always already replete with
|
||
|
||
social significance. This meaning is related, first of
|
||
|
||
all, to the author's local intention or motivation,
|
||
|
||
whether psychic or fully social, whether wrought out
|
||
|
||
of a mood of vengeance, a show of bravado or technical
|
||
|
||
expertise, a commitment to a political act, or in
|
||
|
||
anticipation of the profits that often accrue from the
|
||
|
||
victims' need to buy an antidote from the author.
|
||
|
||
Beyond these local intentions, however, which are
|
||
|
||
usually obscure or, as in the Morris case, quite
|
||
|
||
inscrutable, there is an entire set of social and
|
||
|
||
historical narratives that surround and are part of the
|
||
|
||
"meaning" of the virus: the coded anarchist history of
|
||
|
||
the youth hacker subculture; the militaristic
|
||
|
||
environments of search-and-destroy warfare (a virus has
|
||
|
||
two components--a carrier and a "warhead"), which,
|
||
|
||
because of the historical development of computer
|
||
|
||
technology, constitute the family values of information
|
||
|
||
techno-culture; the experimental research environments
|
||
|
||
in which creative designers are encouraged to work; and
|
||
|
||
the conflictual history of pure and applied ethics in
|
||
|
||
the science and technology communities, to name just a
|
||
|
||
few. A similar list could be drawn up to explain the
|
||
|
||
widespread and varied _response_ to computer viruses,
|
||
|
||
from the amused concern of the cognoscenti to the
|
||
|
||
hysteria of the casual user, and from the research
|
||
|
||
community and the manufacturing industry to the morally
|
||
|
||
aroused legislature and the mediated culture at large.
|
||
|
||
Every one of these explanations and narratives is the
|
||
|
||
result of social and cultural processes and values;
|
||
|
||
consequently, there is very little about the virus
|
||
|
||
itself that is "meaningless." Viruses can no more be
|
||
|
||
seen as an objective, or necessary, result of the
|
||
|
||
"objective" development of technological systems than
|
||
|
||
technology in general can be seen as an objective,
|
||
|
||
determining agent of social change.
|
||
|
||
[8] For the sake of polemical economy, I would note
|
||
|
||
that the cumulative effect of all the viral hysteria
|
||
|
||
has been twofold. Firstly, it has resulted in a
|
||
|
||
windfall for software producers, now that users' blithe
|
||
|
||
disregard for makers' copyright privileges has eroded
|
||
|
||
in the face of the security panic. Used to fighting
|
||
|
||
halfhearted rearguard actions against widespread piracy
|
||
|
||
practices, or reluctantly acceding to buyers' desire
|
||
|
||
for software unencumbered by top-heavy security
|
||
|
||
features, software vendors are now profiting from the
|
||
|
||
new public distrust of program copies. So, too, the
|
||
|
||
explosion in security consciousness has hyperstimulated
|
||
|
||
the already fast-growing sectors of the security system
|
||
|
||
industry and the data encryption industry. In line
|
||
|
||
with the new imperative for everything from
|
||
|
||
"vaccinated" workstations to "sterilized" networks, it
|
||
|
||
has created a brand new market of viral vaccine vendors
|
||
|
||
who will sell you the virus (a one-time only
|
||
|
||
immunization shot) along with its antidote--with names
|
||
|
||
like Flu Shot +, ViruSafe, Vaccinate, Disk Defender,
|
||
|
||
Certus, Viral Alarm, Antidote, Virus Buster,
|
||
|
||
Gatekeeper, Ongard, and Interferon. Few of the
|
||
|
||
antidotes are very reliable, however, especially since
|
||
|
||
they pose an irresistible intellectual challenge to
|
||
|
||
hackers who can easily rewrite them in the form of ever
|
||
|
||
more powerful viruses. Moreover, most corporate
|
||
|
||
managers of computer systems and networks know that by
|
||
|
||
far the great majority of their intentional security
|
||
|
||
losses are a result of insider sabotage and
|
||
|
||
monkeywrenching.
|
||
|
||
[9] In short, the effects of the viruses have been to
|
||
|
||
profitably clamp down on copyright delinquency, and to
|
||
|
||
generate the need for entirely new industrial
|
||
|
||
production of viral suppressors to contain the fallout.
|
||
|
||
In this respect, it is easy to see that the appearance
|
||
|
||
of viruses could hardly, in the long run, have
|
||
|
||
benefited industry producers more. In the same vein,
|
||
|
||
the networks that have been hardest hit by the security
|
||
|
||
squeeze are not restricted-access military or corporate
|
||
|
||
systems but networks like Internet, set up on trust to
|
||
|
||
facilitate the open academic exchange of data,
|
||
|
||
information and research, and watched over by its
|
||
|
||
sponsor, DARPA. It has not escaped the notice of
|
||
|
||
conspiracy theorists that the military intelligence
|
||
|
||
community, obsessed with "electronic warfare," actually
|
||
|
||
stood to learn a lot from the Internet virus; the virus
|
||
|
||
effectively "pulsed the system," exposing the
|
||
|
||
sociological behaviour of the system in a crisis
|
||
|
||
situation.^5^
|
||
|
||
The second effect of the virus crisis has been
|
||
|
||
more overtly ideological. Virus-conscious fear and
|
||
|
||
loathing have clearly fed into the paranoid climate of
|
||
|
||
privatization that increasingly defines social
|
||
|
||
identities in the new post-Fordist order. The result--
|
||
|
||
a psycho-social closing of the ranks around fortified
|
||
|
||
private spheres--runs directly counter to the ethic
|
||
|
||
that we might think of as residing at the architectural
|
||
|
||
heart of information technology. In its basic assembly
|
||
|
||
structure, information technology is a technology of
|
||
|
||
processing, copying, replication, and simulation, and
|
||
|
||
therefore does not recognize the concept of private
|
||
|
||
information property. What is now under threat is the
|
||
|
||
rationality of a shareware culture, ushered in as the
|
||
|
||
achievement of the hacker counterculture that pioneered
|
||
|
||
the personal computer revolution in the early seventies
|
||
|
||
against the grain of corporate planning.
|
||
|
||
[10] There is another story to tell, however, about the
|
||
|
||
emergence of the virus scare as a profitable
|
||
|
||
ideological moment, and it is the story of how teenage
|
||
|
||
hacking has come to be increasingly defined as a
|
||
|
||
potential threat to normative educational ethics and
|
||
|
||
national security alike. The story of the creation of
|
||
|
||
this "social menace" is central to the ongoing attempts
|
||
|
||
to rewrite property law in order to contain the effects
|
||
|
||
of the new information technologies that, because of
|
||
|
||
their blindness to the copyrighting of intellectual
|
||
|
||
property, have transformed the way in which modern
|
||
|
||
power is exercised and maintained. Consequently, a
|
||
|
||
deviant social class or group has been defined and
|
||
|
||
categorised as "enemies of the state" in order to help
|
||
|
||
rationalize a general law-and-order clampdown on free
|
||
|
||
and open information exchange. Teenage hackers' homes
|
||
|
||
are now habitually raided by sheriffs and FBI agents
|
||
|
||
using strong-arm tactics, and jail sentences are
|
||
|
||
becoming a common punishment. Operation Sundevil, a
|
||
|
||
nationwide Secret Service operation in the spring of
|
||
|
||
1990, involving hundreds of agents in fourteen cities,
|
||
|
||
is the most recently publicized of the hacker raids
|
||
|
||
that have produced several arrests and seizures of
|
||
|
||
thousands of disks and address lists in the last two
|
||
|
||
years.^6^
|
||
|
||
[11] In one of the many harshly punitive prosecutions
|
||
|
||
against hackers in recent years, a judge went so far as
|
||
|
||
to describe "bulletin boards" as "hi-tech street
|
||
|
||
gangs." The editors of _2600_, the magazine that
|
||
|
||
publishes information about system entry and
|
||
|
||
exploration that is indispensable to the hacking
|
||
|
||
community, have pointed out that any single invasive
|
||
|
||
act, such as that of trespass, that involves the use of
|
||
|
||
computers is considered today to be infinitely more
|
||
|
||
criminal than a similar act undertaken without
|
||
|
||
computers.^7^ To use computers to execute pranks,
|
||
|
||
raids, frauds or thefts is to incur automatically the
|
||
|
||
full repressive wrath of judges urged on by the moral
|
||
|
||
panic created around hacking feats over the last two
|
||
|
||
decades. Indeed, there is a strong body of pressure
|
||
|
||
groups pushing for new criminal legislation that will
|
||
|
||
define "crimes with computers" as a special category of
|
||
|
||
crime, deserving "extraordinary" sentences and punitive
|
||
|
||
measures. Over that same space of time, the term
|
||
|
||
_hacker_ has lost its semantic link with the
|
||
|
||
journalistic _hack,_ suggesting a professional toiler
|
||
|
||
who uses unorthodox methods. So, too, its increasingly
|
||
|
||
criminal connotation today has displaced the more
|
||
|
||
innocuous, amateur mischief-maker-cum-media-star role
|
||
|
||
reserved for hackers until a few years ago.
|
||
|
||
[12] In response to the gathering vigor of this "war on
|
||
|
||
hackers," the most common defences of hacking can be
|
||
|
||
presented on a spectrum that runs from the appeasement
|
||
|
||
or accommodation of corporate interests to drawing up
|
||
|
||
blueprints for cultural revolution. (a) Hacking
|
||
|
||
performs a benign industrial service of uncovering
|
||
|
||
security deficiencies and design flaws. (b) Hacking,
|
||
|
||
as an experimental, free-form research activity, has
|
||
|
||
been responsible for many of the most progressive
|
||
|
||
developments in software development. (c) Hacking,
|
||
|
||
when not purely recreational, is an elite educational
|
||
|
||
practice that reflects the ways in which the
|
||
|
||
development of high technology has outpaced orthodox
|
||
|
||
forms of institutional education. (d) Hacking is an
|
||
|
||
important form of watchdog counterresponse to the use
|
||
|
||
of surveillance technology and data gathering by the
|
||
|
||
state, and to the increasingly monolithic
|
||
|
||
communications power of giant corporations. (e)
|
||
|
||
Hacking, as guerrilla know-how, is essential to the
|
||
|
||
task of maintaining fronts of cultural resistance and
|
||
|
||
stocks of oppositional knowledge as a hedge against a
|
||
|
||
technofascist future. With all of these and other
|
||
|
||
arguments in mind, it is easy to see how the social and
|
||
|
||
cultural _management_ of hacker activities has become a
|
||
|
||
complex process that involves state policy and
|
||
|
||
legislation at the highest levels. In this respect,
|
||
|
||
the virus scare has become an especially convenient
|
||
|
||
vehicle for obtaining public and popular consent for
|
||
|
||
new legislative measures and new powers of
|
||
|
||
investigation for the FBI.^8^
|
||
|
||
[13] Consequently, certain celebrity hackers have been
|
||
|
||
quick to play down the zeal with which they pursued
|
||
|
||
their earlier hacking feats, while reinforcing the
|
||
|
||
_deviant_ category of "technological hooliganism"
|
||
|
||
reserved by moralizing pundits for "dark-side" hacking.
|
||
|
||
Hugo Cornwall, British author of the bestselling
|
||
|
||
_Hacker's Handbook_, presents a Little England view of
|
||
|
||
the hacker as a harmless fresh-air enthusiast who
|
||
|
||
"visits advanced computers as a polite country rambler
|
||
|
||
might walk across picturesque fields." The owners of
|
||
|
||
these properties are like "farmers who don't mind
|
||
|
||
careful ramblers." Cornwall notes that "lovers of
|
||
|
||
fresh-air walks obey the Country Code, involving such
|
||
|
||
items as closing gates behind one and avoiding damage
|
||
|
||
to crops and livestock" and suggests that a similar
|
||
|
||
code ought to "guide your rambles into other people's
|
||
|
||
computers; the safest thing to do is simply browse,
|
||
|
||
enjoy and learn." By contrast, any rambler who
|
||
|
||
"ventured across a field guarded by barbed wire and
|
||
|
||
dotted with notices warning about the Official Secrets
|
||
|
||
Act would deserve most that happened thereafter."^9^
|
||
|
||
Cornwall's quaint perspective on hacking has a certain
|
||
|
||
"native charm," but some might think that this
|
||
|
||
beguiling picture of patchwork-quilt fields and benign
|
||
|
||
gentleman farmers glosses over the long bloody history
|
||
|
||
of power exercised through feudal and postfeudal land
|
||
|
||
economy in England, while it is barely suggestive of
|
||
|
||
the new fiefdoms, transnational estates, dependencies,
|
||
|
||
and principalities carved out of today's global
|
||
|
||
information order by vast corporations capable of
|
||
|
||
bypassing the laws and territorial borders of sovereign
|
||
|
||
nation-states. In general, this analogy with
|
||
|
||
"trespass" laws, which compares hacking to breaking and
|
||
|
||
entering other people's homes restricts the debate to
|
||
|
||
questions about privacy, property, possessive
|
||
|
||
individualism, and, at best, the excesses of state
|
||
|
||
surveillance, while it closes off any examination of
|
||
|
||
the activities of the corporate owners and
|
||
|
||
institutional sponsors of information technology (the
|
||
|
||
almost exclusive "target" of most hackers).^10^
|
||
|
||
[14] Cornwall himself has joined the lucrative ranks of
|
||
|
||
ex-hackers who either work for computer security firms
|
||
|
||
or write books about security for the eyes of worried
|
||
|
||
corporate managers.^11^ A different, though related,
|
||
|
||
genre is that of the penitent hacker's "confession,"
|
||
|
||
produced for an audience thrilled by tales of high-
|
||
|
||
stakes adventure at the keyboard, but written in the
|
||
|
||
form of a computer security handbook. The best example
|
||
|
||
of the "I Was a Teenage Hacker" genre is Bill (aka "The
|
||
|
||
Cracker") Landreth's _Out of the Inner Circle_: The
|
||
|
||
True Story of a Computer Intruder Capable of Cracking
|
||
|
||
the Nation's Most Secure Computer Systems_, a book
|
||
|
||
about "people who can't `just say no' to computers."
|
||
|
||
In full complicity with the deviant picture of the
|
||
|
||
hacker as "public enemy," Landreth recirculates every
|
||
|
||
official and media cliche about subversive
|
||
|
||
conspiratorial elites by recounting the putative
|
||
|
||
exploits of a high-level hackers' guild called the
|
||
|
||
Inner Circle. The author himself is presented in the
|
||
|
||
book as a former keyboard junkie who now praises the
|
||
|
||
law for having made a good moral example of him:
|
||
|
||
If you are wondering what I am like, I can
|
||
|
||
tell you the same things I told the judge in
|
||
|
||
federal court: Although it may not seem like
|
||
|
||
it, I am pretty much a normal American
|
||
|
||
teenager. I don't drink, smoke or take
|
||
|
||
drugs. I don't steal, assault people, or
|
||
|
||
vandalize property. The only way in which I
|
||
|
||
am really different from most people is in my
|
||
|
||
fascination with the ways and means of
|
||
|
||
learning about computers that don't belong to
|
||
|
||
me.^12^
|
||
|
||
Sentenced in 1984 to three years probation, during
|
||
|
||
which time he was obliged to finish his high school
|
||
|
||
education and go to college, Landreth concludes: "I
|
||
|
||
think the sentence is very fair, and I already know
|
||
|
||
what my major will be...." As an aberrant sequel to
|
||
|
||
the book's contrite conclusion, however, Landreth
|
||
|
||
vanished in 1986, violating his probation, only to face
|
||
|
||
later a stiff five-year jail sentence--a sorry victim,
|
||
|
||
no doubt, of the recent crackdown.
|
||
|
||
|
||
|
||
_Cyber-Counterculture_?
|
||
|
||
[15] At the core of Steven Levy's bestseller _Hackers_
|
||
|
||
(1984) is the argument that the hacker ethic, first
|
||
|
||
articulated in the 1950s among the famous MIT students
|
||
|
||
who developed multiple-access user systems, is
|
||
|
||
libertarian and crypto-anarchist in its right-to know
|
||
|
||
principles and its advocacy of decentralized
|
||
|
||
technology. This hacker ethic, which has remained the
|
||
|
||
preserve of a youth culture for the most part, asserts
|
||
|
||
the basic right of users to free access to all
|
||
|
||
information. It is a principled attempt, in other
|
||
|
||
words, to challenge the tendency to use technology to
|
||
|
||
form information elites. Consequently, hacker
|
||
|
||
activities were presented in the eighties as a romantic
|
||
|
||
countercultural tendency, celebrated by critical
|
||
|
||
journalists like John Markoff of the _New York Times_,
|
||
|
||
by Stewart Brand of _Whole Earth Catalog_ fame, and by
|
||
|
||
New Age gurus like Timothy Leary in the flamboyant
|
||
|
||
_Reality Hackers_. Fuelled by sensational stories
|
||
|
||
about phone phreaks like Joe Egressia (the blind eight-
|
||
|
||
year old who discovered the tone signal of phone
|
||
|
||
company by whistling) and Cap'n Crunch, groups like the
|
||
|
||
Milwaukee 414s, the Los Angeles ARPAnet hackers, the
|
||
|
||
SPAN Data Travellers, the Chaos Computer Club of
|
||
|
||
Hamburg, the British Prestel hackers, _2600_'s BBS,
|
||
|
||
"The Private Sector," and others, the dominant media
|
||
|
||
representation of the hacker came to be that of the
|
||
|
||
"rebel with a modem," to use Markoff's term, at least
|
||
|
||
until the more recent "war on hackers" began to shape
|
||
|
||
media coverage.
|
||
|
||
[16] On the one hand, this popular folk hero persona
|
||
|
||
offered the romantic high profile of a maverick though
|
||
|
||
nerdy cowboy whose fearless raids upon an impersonal
|
||
|
||
"system" were perceived as a welcome tonic in the gray
|
||
|
||
age of technocratic routine. On the other hand, he was
|
||
|
||
something of a juvenile technodelinquent who hadn't yet
|
||
|
||
learned the difference between right and wrong---a
|
||
|
||
wayward figure whose technical brilliance and
|
||
|
||
proficiency differentiated him nonetheless from, say,
|
||
|
||
the maladjusted working-class J.D. street-corner boy of
|
||
|
||
the 1950s (hacker mythology, for the most part, has
|
||
|
||
been almost exclusively white, masculine, and middle-
|
||
|
||
class). One result of this media profile was a
|
||
|
||
persistent infantilization of the hacker ethic--a way
|
||
|
||
of trivializing its embryonic politics, however finally
|
||
|
||
complicit with dominant technocratic imperatives or
|
||
|
||
with entrepreneurial-libertarian ideology one perceives
|
||
|
||
these politics to be. The second result was to
|
||
|
||
reinforce, in the initial absence of coercive jail
|
||
|
||
sentences, the high educational stakes of training the
|
||
|
||
new technocratic elites to be responsible in their use
|
||
|
||
of technology. Never, the given wisdom goes, has a
|
||
|
||
creative elite of the future been so in need of the
|
||
|
||
virtues of a liberal education steeped in Western
|
||
|
||
ethics!
|
||
|
||
[17] The full force of this lesson in computer ethics
|
||
|
||
can be found laid out in the official Cornell
|
||
|
||
University report on the Robert Morris affair. Members
|
||
|
||
of the university commission set up to investigate the
|
||
|
||
affair make it quite clear in their report that they
|
||
|
||
recognize the student's academic brilliance. His
|
||
|
||
hacking, moreover, is described, as a "juvenile act"
|
||
|
||
that had no "malicious intent" but that amounted, like
|
||
|
||
plagiarism, the traditional academic heresy, to a
|
||
|
||
dishonest transgression of other users' rights. (In
|
||
|
||
recent years, the privacy movement within the
|
||
|
||
information community--a movement mounted by liberals
|
||
|
||
to protect civil rights against state gathering of
|
||
|
||
information--has actually been taken up and used as a
|
||
|
||
means of criminalizing hacker activities.) As for the
|
||
|
||
consequences of this juvenile act, the report proposes
|
||
|
||
an analogy that, in comparison with Cornwall's _mature_
|
||
|
||
English country rambler, is thoroughly American,
|
||
|
||
suburban, middle-class and _juvenile_. Unleashing the
|
||
|
||
Internet worm was like "the driving of a golf-cart on a
|
||
|
||
rainy day through most houses in the neighborhood. The
|
||
|
||
driver may have navigated carefully and broken no
|
||
|
||
china, but it should have been obvious to the driver
|
||
|
||
that the mud on the tires would soil the carpets and
|
||
|
||
that the owners would later have to clean up the
|
||
|
||
mess."^13^
|
||
|
||
[18] In what stands out as a stiff reprimand for his
|
||
|
||
alma mater, the report regrets that Morris was educated
|
||
|
||
in an "ambivalent atmosphere" where he "received no
|
||
|
||
clear guidance" about ethics from "his peers or
|
||
|
||
mentors" (he went to Harvard!). But it reserves its
|
||
|
||
loftiest academic contempt for the press, whose
|
||
|
||
heroization of hackers has been so irresponsible, in
|
||
|
||
the commission's opinion, as to cause even further
|
||
|
||
damage to the standards of the computing profession;
|
||
|
||
media exaggerations of the courage and technical
|
||
|
||
sophistication of hackers "obscures the far more
|
||
|
||
accomplished work of students who complete their
|
||
|
||
graduate studies without public fanfare," and "who
|
||
|
||
subject their work to the close scrutiny and evaluation
|
||
|
||
of their peers, and not to the interpretations of the
|
||
|
||
popular press."^14^ In other words, this was an inside
|
||
|
||
affair, to be assessed and judged by fellow
|
||
|
||
professionals within an institution that reinforces its
|
||
|
||
authority by means of internally self-regulating codes
|
||
|
||
of professionalist ethics, but rarely addresses its
|
||
|
||
ethical relationship to society as a whole (acceptance
|
||
|
||
of defence grants, and the like). Generally speaking,
|
||
|
||
the report affirms the genteel liberal ideal that
|
||
|
||
professionals should not need laws, rules, procedural
|
||
|
||
guidelines, or fixed guarantees of safe and responsible
|
||
|
||
conduct. Apprentice professionals ought to have
|
||
|
||
acquired a good conscience by osmosis from a liberal
|
||
|
||
education rather than from some specially prescribed
|
||
|
||
course in ethics and technology.
|
||
|
||
[19] The widespread attention commanded by the Cornell
|
||
|
||
report (attention from the Association of Computing
|
||
|
||
Machinery, among others) demonstrates the industry's
|
||
|
||
interest in how the academy invokes liberal ethics in
|
||
|
||
order to assist in the managing of the organization of
|
||
|
||
the new specialized knowledge about information
|
||
|
||
technology. Despite or, perhaps, because of the
|
||
|
||
report's steadfast pledge to the virtues and ideals of
|
||
|
||
a liberal education, it bears all the marks of a
|
||
|
||
legitimation crisis inside (and outside) the academy
|
||
|
||
surrounding the new and all-important category of
|
||
|
||
computer professionalism. The increasingly specialized
|
||
|
||
design knowledge demanded of computer professionals
|
||
|
||
means that codes that go beyond the old professionalist
|
||
|
||
separation of mental and practical skills are needed to
|
||
|
||
manage the division that a hacker's functional talents
|
||
|
||
call into question, between a purely mental pursuit and
|
||
|
||
the pragmatic sphere of implementing knowledge in the
|
||
|
||
real world. "Hacking" must then be designated as a
|
||
|
||
strictly _amateur_ practice; the tension, in hacking,
|
||
|
||
between _interestedness_ and _disinterestedness_ is
|
||
|
||
different from, and deficient in relation to, the
|
||
|
||
proper balance demanded by professionalism.
|
||
|
||
Alternately, hacking can be seen as the amateur flip
|
||
|
||
side of the professional ideal--a disinterested love in
|
||
|
||
the service of interested parties and institutions. In
|
||
|
||
either case, it serves as an example of professionalism
|
||
|
||
gone wrong, but not very wrong.
|
||
|
||
[20] In common with the two responses to the virus
|
||
|
||
scare described earlier--the profitable reaction of the
|
||
|
||
computer industry and the self-empowering response of
|
||
|
||
the legislature-- the Cornell report shows how the
|
||
|
||
academy uses a case like the Morris affair to
|
||
|
||
strengthen its own sense of moral and cultural
|
||
|
||
authority in the sphere of professionalism,
|
||
|
||
particularly through its scornful indifference to and
|
||
|
||
aloofness from the codes and judgements exercised by
|
||
|
||
the media--its diabolic competitor in the field of
|
||
|
||
knowledge. Indeed, for all the trumpeting about
|
||
|
||
excesses of power and disrespect for the law of the
|
||
|
||
land, the revival of ethics, in the business and
|
||
|
||
science disciplines in the Ivy League and on Capitol
|
||
|
||
Hill (both awash with ethical fervor in the post-Boesky
|
||
|
||
and post-Reagan years), is little more than a weak
|
||
|
||
liberal response to working flaws or adaptational
|
||
|
||
lapses in the social logic of technocracy.
|
||
|
||
[21] To complete the scenario of morality play example-
|
||
|
||
making, however, we must also consider that Morris's
|
||
|
||
father was chief scientist of the National Computer
|
||
|
||
Security Center, the National Security Agency's public
|
||
|
||
effort at safeguarding computer security. A brilliant
|
||
|
||
programmer and codebreaker in his own right, he had
|
||
|
||
testified in Washington in 1983 about the need to
|
||
|
||
deglamorise teenage hacking, comparing it to "stealing
|
||
|
||
a car for the purpose of joyriding." In a further
|
||
|
||
Oedipal irony, Morris Sr. may have been one of the
|
||
|
||
inventors, while at Bell Labs in the 1950s, of a
|
||
|
||
computer game involving self-perpetuating programs that
|
||
|
||
were a prototype of today's worms and viruses. Called
|
||
|
||
Darwin, its principles were incorporated, in the
|
||
|
||
eighties, into a popular hacker game called Core War,
|
||
|
||
in which autonomous "killer" programs fought each other
|
||
|
||
to the death.^15^
|
||
|
||
[22] With the appearance, in the Morris affair, of a
|
||
|
||
patricidal object who is also the Pentagon's guardian
|
||
|
||
angel, we now have many of the classic components of
|
||
|
||
countercultural cross-generational conflict. What I
|
||
|
||
want to consider, however, is how and where this
|
||
|
||
scenario differs from the definitive contours of such
|
||
|
||
conflicts that we recognize as having been established
|
||
|
||
in the sixties; how the Cornell hacker Morris's
|
||
|
||
relation to, say, campus "occupations" today is
|
||
|
||
different from that evoked by the famous image of armed
|
||
|
||
black students emerging from a sit-in on the Cornell
|
||
|
||
campus; how the relation to technological ethics
|
||
|
||
differs from Andrew Kopkind's famous statement
|
||
|
||
"Morality begins at the end of a gun barrel" which
|
||
|
||
accompanied the publication of the do-it-yourself
|
||
|
||
Molotov cocktail design on the cover of a 1968 issue of
|
||
|
||
the _New York Review of Books_; or how hackers' prized
|
||
|
||
potential access to the networks of military systems
|
||
|
||
warfare differs from the prodigious Yippie feat of
|
||
|
||
levitating the Pentagon building. It may be that, like
|
||
|
||
the J.D. rebel without a cause of the fifties, the
|
||
|
||
disaffiliated student dropout of the sixties, and the
|
||
|
||
negationist punk of the seventies, the hacker of the
|
||
|
||
eighties has come to serve as a visible public example
|
||
|
||
of moral maladjustment, a hegemonic test case for
|
||
|
||
redefining the dominant ethics in an advanced
|
||
|
||
technocratic society. (Hence the need for each of
|
||
|
||
these deviant figures to come in different versions--
|
||
|
||
lumpen, radical chic, and Hollywood-style.)
|
||
|
||
[23] What concerns me here, however, are the different
|
||
|
||
conditions that exist today for recognizing
|
||
|
||
countercultural expression and activism. Twenty years
|
||
|
||
later, the technology of hacking and viral guerrilla
|
||
|
||
warfare occupies a similar place in countercultural
|
||
|
||
fantasy as the Molotov Cocktail design once did. While
|
||
|
||
I don't, for one minute, mean to insist on such
|
||
|
||
comparisons, which aren't particularly sound anyway, I
|
||
|
||
think they conveniently mark a shift in the relation of
|
||
|
||
countercultural activity to technology, a shift in
|
||
|
||
which a software-based technoculture, organized around
|
||
|
||
outlawed libertarian principles about free access to
|
||
|
||
information and communication, has come to replace a
|
||
|
||
dissenting culture organized around the demonizing of
|
||
|
||
abject hardware structures. Much, though not all, of
|
||
|
||
the sixties counterculture was formed around what I
|
||
|
||
have elsewhere called the _technology of folklore_--an
|
||
|
||
expressive congeries of preindustrialist, agrarianist,
|
||
|
||
Orientalist, antitechnological ideas, values, and
|
||
|
||
social structures. By contrast, the cybernetic
|
||
|
||
countercultures of the nineties are already being
|
||
|
||
formed around the _folklore of technology_--mythical
|
||
|
||
feats of survivalism and resistance in a data-rich
|
||
|
||
world of virtual environments and posthuman bodies--
|
||
|
||
which is where many of the SF-and technology-conscious
|
||
|
||
youth cultures have been assembling in recent
|
||
|
||
years.^16^
|
||
|
||
[24] There is no doubt that this scenario makes
|
||
|
||
countercultural activity more difficult to recognize
|
||
|
||
and therefore to define as politically significant. It
|
||
|
||
was much easier, in the sixties, to _identify_ the
|
||
|
||
salient features and symbolic power of a romantic
|
||
|
||
preindustrialist cultural politics in an advanced
|
||
|
||
technological society, especially when the destructive
|
||
|
||
evidence of America's supertechnological invasion of
|
||
|
||
Vietnam was being daily paraded in front of the public
|
||
|
||
eye. However, in a society whose technopolitical
|
||
|
||
infrastructure depends increasingly upon greater
|
||
|
||
surveillance, cybernetic activism necessarily relies on
|
||
|
||
a much more covert politics of identity, since access
|
||
|
||
to closed systems requires discretion and
|
||
|
||
dissimulation. Access to digital systems still
|
||
|
||
requires only the authentication of a signature or
|
||
|
||
pseudonym, not the identification of a real
|
||
|
||
surveillable person, so there exists a crucial
|
||
|
||
operative gap between authentication and
|
||
|
||
identification. (As security systems move toward
|
||
|
||
authenticating access through biological signatures--
|
||
|
||
the biometric recording and measurement of physical
|
||
|
||
characteristics such as palm or retinal prints, or vein
|
||
|
||
patterns on the backs of hands--the hacker's staple
|
||
|
||
method of systems entry through purloined passwords
|
||
|
||
will be further challenged.) By the same token,
|
||
|
||
cybernetic identity is never used up, it can be
|
||
|
||
recreated, reassigned, and reconstructed with any
|
||
|
||
number of different names and under different user
|
||
|
||
accounts. Most hacks, or technocrimes, go unnoticed or
|
||
|
||
unreported for fear of publicising the vulnerability of
|
||
|
||
corporate security systems, especially when the hacks
|
||
|
||
are performed by disgruntled employees taking their
|
||
|
||
vengeance on management. So, too, authoritative
|
||
|
||
identification of any individual hacker, whenever it
|
||
|
||
occurs, is often the result of accidental leads rather
|
||
|
||
than systematic detection. For example, Captain
|
||
|
||
Midnight, the video pirate who commandeered a satellite
|
||
|
||
a few years ago to interrupt broadcast TV viewing, was
|
||
|
||
traced only because a member of the public reported a
|
||
|
||
suspicious conversation heard over a crossed telephone
|
||
|
||
line.
|
||
|
||
[25] Eschewing its core constituency among white males
|
||
|
||
of the pre-professional-managerial class, the hacker
|
||
|
||
community may be expanding its parameters outward.
|
||
|
||
Hacking, for example, has become a feature of the young
|
||
|
||
adult mystery-and-suspense novel genre for girls.^17^
|
||
|
||
The elitist class profile of the hacker prodigy as that
|
||
|
||
of an undersocialized college nerd has become
|
||
|
||
democratized and customized in recent years; it is no
|
||
|
||
longer exclusively associated with institutionally
|
||
|
||
acquired college expertise, and increasingly it dresses
|
||
|
||
streetwise. In a recent article which documents the
|
||
|
||
spread of the computer underground from college whiz
|
||
|
||
kids to a broader youth subculture termed "cyberpunks,"
|
||
|
||
after the movement among SF novelists, the original
|
||
|
||
hacker phone phreak Cap'n Crunch is described as
|
||
|
||
lamenting the fact that the cyberculture is no longer
|
||
|
||
an "elite" one, and that hacker-valid information is
|
||
|
||
much easier to obtain these days.^18^
|
||
|
||
[26] For the most part, however, the self-defined
|
||
|
||
hacker underground, like many other
|
||
|
||
protocountercultural tendencies, has been restricted to
|
||
|
||
a privileged social milieu, further magnetised by the
|
||
|
||
self-understanding of its members that they are the
|
||
|
||
apprentice architects of a future dominated by
|
||
|
||
knowledge, expertise, and "smartness," whether human or
|
||
|
||
digital. Consequently, it is clear that the hacker
|
||
|
||
cyberculture is not a dropout culture; its
|
||
|
||
disaffiliation from a domestic parent culture is often
|
||
|
||
manifest in activities that answer, directly or
|
||
|
||
indirectly, to the legitimate needs of industrial R&D.
|
||
|
||
For example, this hacker culture celebrates high
|
||
|
||
productivity, maverick forms of creative work energy,
|
||
|
||
and an obsessive identification with on-line endurance
|
||
|
||
(and endorphin highs)--all qualities that are valorised
|
||
|
||
by the entrepreneurial codes of silicon futurism. In a
|
||
|
||
critique of the myth of the hacker-as-rebel, Dennis
|
||
|
||
Hayes debunks the political romance woven around the
|
||
|
||
teenage hacker:
|
||
|
||
They are typically white, upper-middle-class
|
||
|
||
adolescents who have taken over the home
|
||
|
||
computer (bought, subsidized, or tolerated
|
||
|
||
by parents in the hope of cultivating
|
||
|
||
computer literacy). Few are politically
|
||
|
||
motivated although many express contempt for
|
||
|
||
the "bureaucracies" that hamper their
|
||
|
||
electronic journeys. Nearly all demand
|
||
|
||
unfettered access to intricate and intriguing
|
||
|
||
computer networks. In this, teenage hackers
|
||
|
||
resemble an alienated shopping culture
|
||
|
||
deprived of purchasing opportunities more
|
||
|
||
than a terrorist network.^19^
|
||
|
||
[27] While welcoming the sobriety of Hayes's critique,
|
||
|
||
I am less willing to accept its assumptions about the
|
||
|
||
political implications of hacker activities. Studies
|
||
|
||
of youth subcultures (including those of a privileged
|
||
|
||
middle-class formation) have taught us that the
|
||
|
||
political meaning of certain forms of cultural
|
||
|
||
"resistance" is notoriously difficult to read. These
|
||
|
||
meanings are either highly coded or expressed
|
||
|
||
indirectly through media--private peer languages,
|
||
|
||
customized consumer styles, unorthodox leisure
|
||
|
||
patterns, categories of insider knowledge and
|
||
|
||
behavior--that have no fixed or inherent political
|
||
|
||
significance. If cultural studies of this sort have
|
||
|
||
proved anything, it is that the often symbolic, not
|
||
|
||
wholly articulate, expressivity of a youth culture can
|
||
|
||
seldom be translated directly into an articulate
|
||
|
||
political philosophy. The significance of these
|
||
|
||
cultures lies in their embryonic or _protopolitical_
|
||
|
||
languages and technologies of opposition to dominant or
|
||
|
||
parent systems of rules. If hackers lack a "cause,"
|
||
|
||
then they are certainly not the first youth culture to
|
||
|
||
be characterized in this dismissive way. In
|
||
|
||
particular, the left has suffered from the lack of a
|
||
|
||
cultural politics capable of recognizing the power of
|
||
|
||
cultural expressions that do not wear a mature
|
||
|
||
political commitment on their sleeves.
|
||
|
||
So, too, the escalation of activism-in-the-
|
||
|
||
professions in the last two decades has shown that it
|
||
|
||
is a mistake to condemn the hacker impulse on account
|
||
|
||
of its class constituency alone. To cede the "ability
|
||
|
||
to know" on the grounds that elite groups will enjoy
|
||
|
||
unjustly privileged access to technocratic knowledge is
|
||
|
||
to cede too much of the future. Is it of no political
|
||
|
||
significance at all that hackers' primary fantasies
|
||
|
||
often involve the official computer systems of the
|
||
|
||
police, armed forces, and defence and intelligence
|
||
|
||
agencies? And that the rationale for their fantasies
|
||
|
||
is unfailingly presented in the form of a defence of
|
||
|
||
civil liberties against the threat of centralized
|
||
|
||
intelligence and military activities? Or is all of
|
||
|
||
this merely a symptom of an apprentice elite's
|
||
|
||
fledgling will to masculine power? The activities of
|
||
|
||
the Chinese student elite in the pro-democracy movement
|
||
|
||
have shown that unforeseen shifts in the political
|
||
|
||
climate can produce startling new configurations of
|
||
|
||
power and resistance. After Tiananmen Square, Party
|
||
|
||
leaders found it imprudent to purge those high-tech
|
||
|
||
engineer and computer cadres who alone could guarantee
|
||
|
||
the future of any planned modernization program. On
|
||
|
||
the other hand, the authorities rested uneasy knowing
|
||
|
||
that each cadre (among the most activist groups in the
|
||
|
||
student movement) is a potential hacker who can have
|
||
|
||
the run of the communications house if and when he or
|
||
|
||
she wants.
|
||
|
||
[28] On the other hand, I do agree with Hayes's
|
||
|
||
perception that the media have pursued their romance
|
||
|
||
with the hacker at the cost of underreporting the much
|
||
|
||
greater challenge posed to corporate employers by their
|
||
|
||
employees. It is in the arena of conflicts between
|
||
|
||
workers and management that most high-tech "sabotage"
|
||
|
||
takes place. In the mainstream everyday life of office
|
||
|
||
workers, mostly female, there is a widespread culture
|
||
|
||
of unorganized sabotage that accounts for infinitely
|
||
|
||
more computer downtime and information loss every year
|
||
|
||
than is caused by destructive, "dark-side" hacking by
|
||
|
||
celebrity cybernetic intruders. The sabotage, time
|
||
|
||
theft, and strategic monkeywrenching deployed by office
|
||
|
||
workers in their engineered electromagnetic attacks on
|
||
|
||
data storage and operating systems might range from the
|
||
|
||
planting of time or logic bombs to the discrete use of
|
||
|
||
electromagnetic Tesla coils or simple bodily friction:
|
||
|
||
"Good old static electricity discharged from the
|
||
|
||
fingertips probably accounts for close to half the
|
||
|
||
disks and computers wiped out or down every year."^20^
|
||
|
||
More skilled operators, intent on evening a score with
|
||
|
||
management, often utilize sophisticated hacking
|
||
|
||
techniques. In many cases, a coherent networking
|
||
|
||
culture exists among female console operators, where,
|
||
|
||
among other things, tips about strategies for slowing
|
||
|
||
down the temporality of the work regime are circulated.
|
||
|
||
While these threats from below are fully recognized in
|
||
|
||
their boardrooms, corporations dependent upon digital
|
||
|
||
business machines are obviously unwilling to advertize
|
||
|
||
how acutely vulnerable they actually are to this kind
|
||
|
||
of sabotage. It is easy to imagine how organised
|
||
|
||
computer activism could hold such companies for ransom.
|
||
|
||
As Hayes points out, however, it is more difficult to
|
||
|
||
mobilize any kind of labor movement organized upon such
|
||
|
||
premises:
|
||
|
||
Many are prepared to publicly oppose the
|
||
|
||
countless dark legacies of the computer age:
|
||
|
||
"electronic sweatshops," Military technology,
|
||
|
||
employee surveillance, genotoxic water, and
|
||
|
||
ozone depletion. Among those currently
|
||
|
||
leading the opposition, however, it is
|
||
|
||
apparently deemed "irresponsible" to recommend
|
||
|
||
an active computerized resistance as a source
|
||
|
||
of worker's power because it is perceived as
|
||
|
||
a medium of employee crime and "terrorism."
|
||
|
||
^21^
|
||
|
||
_Processed World_, the "magazine with a bad attitude"
|
||
|
||
with which Hayes has been associated, is at the
|
||
|
||
forefront of debating and circulating these questions
|
||
|
||
among office workers, regularly tapping into the
|
||
|
||
resentments borne out in on-the-job resistance.
|
||
|
||
[29] While only a small number of computer users would
|
||
|
||
recognize and include themselves under the label of
|
||
|
||
"hacker," there are good reasons for extending the
|
||
|
||
restricted definition of _hacking_ down and across the
|
||
|
||
caste system of systems analysts, designers,
|
||
|
||
programmers, and operators to include all high-tech
|
||
|
||
workers, no matter how inexpert, who can interrupt,
|
||
|
||
upset, and redirect the smooth flow of structured
|
||
|
||
communications that dictates their positions in the
|
||
|
||
social networks of exchange and determines the
|
||
|
||
temporality of their work schedules. To put it in
|
||
|
||
these terms, however, is not to offer any universal
|
||
|
||
definition of hacker agency. There are many social
|
||
|
||
agents, for example, in job locations that are
|
||
|
||
dependent upon the hope of technological _reskilling_,
|
||
|
||
for whom sabotage or disruption of communicative
|
||
|
||
rationality is of little use; for such people,
|
||
|
||
definitions of hacking that are reconstructive, rather
|
||
|
||
than deconstructive, are more appropriate. A good
|
||
|
||
example is the crucial role of worker technoliteracy in
|
||
|
||
the struggle of labor against automation and
|
||
|
||
deskilling. When worker education classes in computer
|
||
|
||
programming were discontinued by management at the Ford
|
||
|
||
Rouge plant in Dearborn, Michigan, union (UAW) members
|
||
|
||
began to publish a newsletter called the _Amateur
|
||
|
||
Computerist_ to fill the gap.^22^ Among the columnists
|
||
|
||
and correspondents in the magazine have been veterans
|
||
|
||
of the Flint sit-down strikes who see a clear
|
||
|
||
historical continuity between the problem of labor
|
||
|
||
organization in the thirties and the problem of
|
||
|
||
automation and deskilling today. Workers' computer
|
||
|
||
literacy is seen as essential not only to the
|
||
|
||
demystification of the computer and the reskilling of
|
||
|
||
workers, but also to labor's capacity to intervene in
|
||
|
||
decisions about new technologies that might result in
|
||
|
||
shorter hours and thus in "work efficiency" rather than
|
||
|
||
worker efficiency.
|
||
|
||
[30] The three social locations I have mentioned above
|
||
|
||
all express different class relations to technology:
|
||
|
||
the location of an apprentice technical elite,
|
||
|
||
conventionally associated with the term "hacking"; the
|
||
|
||
location of the female high-tech office worker,
|
||
|
||
involved in "sabotage"; and the location of the shop-
|
||
|
||
floor worker, whose future depends on technological
|
||
|
||
reskilling. All therefore exhibit different ways of
|
||
|
||
_claiming back_ time dictated and appropriated by
|
||
|
||
technological processes, and of establishing some form
|
||
|
||
of independent control over the work relation so
|
||
|
||
determined by the new technologies. All, then, fall
|
||
|
||
under a broad understanding of the politics involved in
|
||
|
||
any extended description of hacker activities.
|
||
|
||
|
||
[This file is continued in ROSS-2 990]
|
||
|
||
[Andrew Ross, "Hacking Away at the Counter-culture,"
|
||
part 2, continued from ROSS-1 990. Distributed by
|
||
_Postmodern Culture_ in vol. 1, no. 1 (Sep. 1990);
|
||
copyright (c) 1990 by Andrew Ross, all rights reserved]
|
||
|
||
_The Culture and Technology Question_
|
||
|
||
[31] Faced with these proliferating practices in the
|
||
|
||
workplace, on the teenage cult fringe, and increasingly
|
||
|
||
in mainstream entertainment, where, over the last five
|
||
|
||
years, the cyberpunk sensibility in popular fiction,
|
||
|
||
film, and television has caught the romance of the
|
||
|
||
popular taste for the outlaw technology of
|
||
|
||
human/machine interfaces, we are obliged, I think, to
|
||
|
||
ask old kinds of questions about the new silicon order
|
||
|
||
which the evangelists of information technology have
|
||
|
||
been deliriously proclaiming for more than twenty
|
||
|
||
years. The postindustrialists' picture of a world of
|
||
|
||
freedom and abundance projects a sunny millenarian
|
||
|
||
future devoid of work drudgery and ecological
|
||
|
||
degradation. This sunny social order, cybernetically
|
||
|
||
wired up, is presented as an advanced evolutionary
|
||
|
||
phase of society in accord with Enlightenment ideals of
|
||
|
||
progress and rationality. By contrast, critics of this
|
||
|
||
idealism see only a frightening advance in the
|
||
|
||
technologies of social control, whose owners and
|
||
|
||
sponsors are efficiently shaping a society, as Kevin
|
||
|
||
Robins and Frank Webster put it, of "slaves without
|
||
|
||
Athens" that is actually the inverse of the "Athens
|
||
|
||
without slaves" promised by the silicon
|
||
|
||
positivists.^23^
|
||
|
||
[32] It is clear that one of the political features of
|
||
|
||
the new post-Fordist order--economically marked by
|
||
|
||
short-run production, diverse taste markets, flexible
|
||
|
||
specialization, and product differentiation--is that
|
||
|
||
the New Right has managed to appropriate not only the
|
||
|
||
utopian language and values of the alternative
|
||
|
||
technology movements but also the marxist discourse of
|
||
|
||
the "withering away of the state" and the more
|
||
|
||
compassionate vision of local, decentralized
|
||
|
||
communications first espoused by the libertarian left.
|
||
|
||
It must be recognized that these are very popular
|
||
|
||
themes and visions, (advanced most famously by Alvin
|
||
|
||
Toffler and the neoliberal Atari Democrats, though also
|
||
|
||
by leftist thinkers such as Andre Gortz, Rudolf Bahro,
|
||
|
||
and Alain Touraine)--much more popular, for example,
|
||
|
||
than the tradition of centralized technocratic planning
|
||
|
||
espoused by the left under the Fordist model of mass
|
||
|
||
production and consumption.^24^ Against the
|
||
|
||
postindustrialists' millenarian picture of a
|
||
|
||
postscarcity harmony, in which citizens enjoy
|
||
|
||
decentralized, access to free-flowing information, it
|
||
|
||
is necessary, however, to emphasise how and where
|
||
|
||
actually existing cybernetic capitalism presents a
|
||
|
||
gross caricature of such a postscarcity society.
|
||
|
||
[33] One of the stories told by the critical left about
|
||
|
||
new cultural technologies is that of monolithic,
|
||
|
||
panoptical social control, effortlessly achieved
|
||
|
||
through a smooth, endlessly interlocking system of
|
||
|
||
networks of surveillance. In this narrative,
|
||
|
||
information technology is seen as the most despotic
|
||
|
||
mode of domination yet, generating not just a
|
||
|
||
revolution in capitalist production but also a
|
||
|
||
revolution in living--"social Taylorism"--that touches
|
||
|
||
all cultural and social spheres in the home and in the
|
||
|
||
workplace.^25^ Through routine gathering of
|
||
|
||
information about transactions, consumer preferences,
|
||
|
||
and creditworthiness, a harvest of information about
|
||
|
||
any individual's whereabouts and movements, tastes,
|
||
|
||
desires, contacts, friends, associates, and patterns of
|
||
|
||
work and recreation becomes available in the form of
|
||
|
||
dossiers sold on the tradable information market, or is
|
||
|
||
endlessly convertible into other forms of intelligence
|
||
|
||
through computer matching. Advanced pattern
|
||
|
||
recognition technologies facilitate the process of
|
||
|
||
surveillance, while data encryption protects it from
|
||
|
||
public accountability.^26^
|
||
|
||
[34] While the debate about privacy has triggered
|
||
|
||
public consciousness about these excesses, the liberal
|
||
|
||
discourse about ethics and damage control in which that
|
||
|
||
debate has been conducted falls short of the more
|
||
|
||
comprehensive analysis of social control and social
|
||
|
||
management offered by left political economists.
|
||
|
||
According to one marxist analysis, information is seen
|
||
|
||
as a new kind of commodity resource which marks a break
|
||
|
||
with past modes of production and that is becoming the
|
||
|
||
essential site of capital accumulation in the world
|
||
|
||
economy. What happens, then, in the process by which
|
||
|
||
information, gathered up by data scavenging in the
|
||
|
||
transactional sphere, is systematically converted into
|
||
|
||
intelligence? A surplus value is created for use
|
||
|
||
elsewhere. This surplus information value is more than
|
||
|
||
is needed for public surveillance; it is often
|
||
|
||
information, or intelligence, culled from consumer
|
||
|
||
polling or statistical analysis of transactional
|
||
|
||
behavior, that has no immediate use in the process of
|
||
|
||
routine public surveillance. Indeed, it is this
|
||
|
||
surplus, bureaucratic capital that is used for the
|
||
|
||
purpose of forecasting social futures, and consequently
|
||
|
||
applied to the task of managing the behavior of mass or
|
||
|
||
aggregate units within those social futures. This
|
||
|
||
surplus intelligence becomes the basis of a whole new
|
||
|
||
industry of futures research which relies upon computer
|
||
|
||
technology to simulate and forecast the shape,
|
||
|
||
activity, and behavior of complex social systems. The
|
||
|
||
result is a possible system of social management that
|
||
|
||
far transcends the questions about surveillance that
|
||
|
||
have been at the discursive center of the privacy
|
||
|
||
debate.^27^
|
||
|
||
[35] To further challenge the idealists' vision of
|
||
|
||
postindustrial light and magic, we need only look
|
||
|
||
inside the semiconductor workplace itself, which is
|
||
|
||
home to the most toxic chemicals known to man (and
|
||
|
||
woman, especially since women of color often make up
|
||
|
||
the majority of the microelectronics labor force), and
|
||
|
||
where worker illness is measured not in quantities of
|
||
|
||
blood spilled on the shop floor but in the less visible
|
||
|
||
forms of chromosome damage, shrunken testicles,
|
||
|
||
miscarriages, premature deliveries, and severe birth
|
||
|
||
defects. In addition to the extraordinarily high
|
||
|
||
stress patterns of VDT operators, semiconductor workers
|
||
|
||
exhibit an occupational illness rate that even by the
|
||
|
||
late seventies was three times higher than that of
|
||
|
||
manufacturing workers, at least until the federal rules
|
||
|
||
for recognizing and defining levels of injury were
|
||
|
||
changed under the Reagan administration. Protection
|
||
|
||
gear is designed to protect the product and the clean
|
||
|
||
room from the workers, and not vice versa. Recently,
|
||
|
||
immunological health problems have begun to appear that
|
||
|
||
can be described only as a kind of chemically induced
|
||
|
||
AIDS, rendering the T-cells dysfunctional rather than
|
||
|
||
depleting them like virally induced AIDS.^28^ In
|
||
|
||
corporate offices, the use of keystroke software to
|
||
|
||
monitor and pace office workers has become a routine
|
||
|
||
part of job performance evaluation programs. Some 70
|
||
|
||
percent of corporations use electronic surveillance or
|
||
|
||
other forms of quantitative monitoring on their
|
||
|
||
workers. Every bodily movement can be checked and
|
||
|
||
measured, especially trips to the toilet. Federal
|
||
|
||
deregulation has meant that the limits of employee work
|
||
|
||
space have shrunk, in some government offices, below
|
||
|
||
that required by law for a two-hundred pound laboratory
|
||
|
||
pig.^29^ Critics of the labor process seem to have
|
||
|
||
sound reasons to believe that rationalization and
|
||
|
||
quantification are at last entering their most
|
||
|
||
primitive phase.
|
||
|
||
[36] These, then, are some of the features of the
|
||
|
||
critical left position--or what is sometimes referred
|
||
|
||
to as the "paranoid" position--on information
|
||
|
||
technology, which imagines or constructs a totalizing,
|
||
|
||
monolithic picture of systematic domination. While
|
||
|
||
this story is often characterized as conspiracy theory,
|
||
|
||
its targets--technorationality, bureaucratic
|
||
|
||
capitalism--are usually too abstract to fit the picture
|
||
|
||
of a social order planned and shaped by a small,
|
||
|
||
conspiring group of centralized power elites.
|
||
|
||
Although I believe that this story, when told inside
|
||
|
||
and outside the classroom, for example, is an
|
||
|
||
indispensable form of "consciousness-raising," it is
|
||
|
||
not always the best story to tell.
|
||
|
||
[37] While I am not comfortable with the "paranoid"
|
||
|
||
labelling, I would argue that such narratives do little
|
||
|
||
to discourage paranoia. The critical habit of finding
|
||
|
||
unrelieved domination everywhere has certain
|
||
|
||
consequences, one of which is to create a siege
|
||
|
||
mentality, reinforcing the inertia, helplessness, and
|
||
|
||
despair that such critiques set out to oppose in the
|
||
|
||
first place. What follows is a politics that can speak
|
||
|
||
only from a victim's position. And when knowledge
|
||
|
||
about surveillance is presented as systematic and
|
||
|
||
infallible, self-censoring is sure to follow. In the
|
||
|
||
psychosocial climate of fear and phobia aroused by the
|
||
|
||
virus scare, there is a responsibility not to be
|
||
|
||
alarmist or to be scared, especially when, as I have
|
||
|
||
argued, such moments are profitably seized upon by the
|
||
|
||
sponsors of control technology. In short, the picture
|
||
|
||
of a seamlessly panoptical network of surveillance may
|
||
|
||
be the result of a rather undemocratic, not to mention
|
||
|
||
unsocialistic, way of thinking, predicated upon the
|
||
|
||
recognition of people solely as victims. It is
|
||
|
||
redolent of the old sociological models of mass society
|
||
|
||
and mass culture, which cast the majority of society as
|
||
|
||
passive and lobotomized in the face of the cultural
|
||
|
||
patterns of modernization. To emphasize, as Robins and
|
||
|
||
Webster and others have done, the power of the new
|
||
|
||
technologies to despotically transform the "rhythm,
|
||
|
||
texture, and experience" of everyday life, and meet
|
||
|
||
with no resistance in doing so, is not only to cleave,
|
||
|
||
finally, to an epistemology of technological
|
||
|
||
determinism, but also to dismiss the capacity of people
|
||
|
||
to make their own uses of new technologies.^30^
|
||
|
||
[38] The seamless "interlocking" of public and private
|
||
|
||
networks of information and intelligence is not as
|
||
|
||
smooth and even as the critical school of hard
|
||
|
||
domination would suggest. In any case, compulsive
|
||
|
||
gathering of information is no _guarantee_ that any
|
||
|
||
interpretive sense will be made of the files or
|
||
|
||
dossiers, while some would argue that the increasingly
|
||
|
||
covert nature of surveillance is a sign that the
|
||
|
||
"campaign" for social control is not going well. One
|
||
|
||
of the most pervasive popular arguments against the
|
||
|
||
panoptical intentions of the masters of technology is
|
||
|
||
that their systems do not work. Every successful hack
|
||
|
||
or computer crime in some way reinforces the popular
|
||
|
||
perception that information systems are not infallible.
|
||
|
||
And the announcements of military-industrial
|
||
|
||
spokespersons that the fully automated battlefield is
|
||
|
||
on its way run up against an accumulated stock of
|
||
|
||
popular skepticism about the operative capacity of
|
||
|
||
weapons systems. These misgivings are born of decades
|
||
|
||
of distrust for the plans and intentions of the
|
||
|
||
military-industrial complex, and were quite evident in
|
||
|
||
the widespread cynicism about the Strategic Defense
|
||
|
||
Initiative. Just to take one empirical example of
|
||
|
||
unreliability, the military communications system
|
||
|
||
worked so poorly and so farcically during the U.S.
|
||
|
||
invasion of Grenada that commanders had to call each
|
||
|
||
other on pay phones: ever since then, the command-and-
|
||
|
||
control code of Arpanet technocrats has been C5--
|
||
|
||
Command, Control, Communication, Computers, and
|
||
|
||
Confusion.^31^ It could be said, of course, that the
|
||
|
||
invasion of Grenada did, after all, succeed, but the
|
||
|
||
more complex and inefficiency-prone such high-tech
|
||
|
||
invasions become (Vietnam is still the best example),
|
||
|
||
the less likely they are to be undertaken with any
|
||
|
||
guarantee of success.
|
||
|
||
[39] I am not suggesting that alternatives can be
|
||
|
||
forged simply by encouraging disbelief in the
|
||
|
||
infallibility of existing technologies (pointing to
|
||
|
||
examples of the appropriation of technologies for
|
||
|
||
radical uses, of course, always provides more visibly
|
||
|
||
satisfying evidence of empowerment), but
|
||
|
||
technoskepticism, while not a _sufficient_ condition of
|
||
|
||
social change, is a _necessary_ condition. Stocks of
|
||
|
||
popular technoskepticism are crucial to the task of
|
||
|
||
eroding the legitimacy of those cultural values that
|
||
|
||
prepare the way for new technological developments:
|
||
|
||
values and principles such as the inevitability of
|
||
|
||
material progress, the "emancipatory" domination of
|
||
|
||
nature, the innovative autonomy of machines, the
|
||
|
||
efficiency codes of pragmatism, and the linear
|
||
|
||
juggernaut of liberal Enlightenment rationality--all
|
||
|
||
increasingly under close critical scrutiny as a wave of
|
||
|
||
environmental consciousness sweeps through the
|
||
|
||
electorates of the West. Technologies do not shape or
|
||
|
||
determine such values. These values already exist
|
||
|
||
before the technologies, and the fact that they have
|
||
|
||
become deeply embodied in the structure of popular
|
||
|
||
needs and desires then provides the green light for the
|
||
|
||
acceptance of certain kinds of technology. The
|
||
|
||
principal rationale for introducing new technologies is
|
||
|
||
that they answer to already existing intentions and
|
||
|
||
demands that may be perceived as "subjective" but that
|
||
|
||
are never actually within the control of any single set
|
||
|
||
of conspiring individuals. As Marike Finlay has
|
||
|
||
argued, just as technology is only possible in given
|
||
|
||
discursive situations, one of which being the desire of
|
||
|
||
people to have it for reasons of empowerment, so
|
||
|
||
capitalism is merely the site, and not the source, of
|
||
|
||
the power that is often autonomously attributed to the
|
||
|
||
owners and sponsors of technology.^32^
|
||
|
||
[40] In fact, there is no frame of technological
|
||
|
||
inevitability that has not already interacted with
|
||
|
||
popular needs and desires, no introduction of new
|
||
|
||
machineries of control that has not already been
|
||
|
||
negotiated to some degree in the arena of popular
|
||
|
||
consent. Thus the power to design architecture that
|
||
|
||
incorporates different values must arise from the
|
||
|
||
popular perception that existing technologies are not
|
||
|
||
the only ones, nor are they the best when it comes to
|
||
|
||
individual and collective empowerment. It was this
|
||
|
||
kind of perception--formed around the distrust of big,
|
||
|
||
impersonal, "closed" hardware systems, and the desire
|
||
|
||
for small, decentralized, interactive machines to
|
||
|
||
facilitate interpersonal communication--that "built"
|
||
|
||
the PC out of hacking expertise in the early seventies.
|
||
|
||
These were as much the partial "intentions" behind the
|
||
|
||
development of microcomputing technology as deskilling,
|
||
|
||
monitoring, and information gathering are the
|
||
|
||
intentions behind the corporate use of that technology
|
||
|
||
today. The growth of public data networks, bulletin
|
||
|
||
board systems, alternative information and media links,
|
||
|
||
and the increasing cheapness of desktop publishing,
|
||
|
||
satellite equipment, and international data bases are
|
||
|
||
as much the result of local political "intentions" as
|
||
|
||
the fortified net of globally linked, restricted-access
|
||
|
||
information systems is the intentional fantasy of those
|
||
|
||
who seek to profit from centralised control. The
|
||
|
||
picture that emerges from this mapping of intentions is
|
||
|
||
not an inevitably technofascist one, but rather the
|
||
|
||
uneven result of cultural struggles over values and
|
||
|
||
meanings.
|
||
|
||
[41] It is in this respect--in the struggle over values
|
||
|
||
and meanings--that the work of cultural criticism takes
|
||
|
||
on its special significance as a full participant in
|
||
|
||
the debate about technology. In fact, cultural
|
||
|
||
criticism is already fully implicated in that debate,
|
||
|
||
if only because the culture and education industries
|
||
|
||
are rapidly becoming integrated within the vast
|
||
|
||
information service conglomerates. The media we study,
|
||
|
||
the media we publish in, and the media we teach within
|
||
|
||
are increasingly part of the same tradable information
|
||
|
||
sector. So, too, our common intellectual discourse has
|
||
|
||
been significantly affected by the recent debates about
|
||
|
||
postmodernism (or culture in a postindustrial world) in
|
||
|
||
which the euphoric, addictive thrill of the
|
||
|
||
technological sublime has figured quite prominently.
|
||
|
||
The high-speed technological fascination that is
|
||
|
||
characteristic of the postmodern condition can be read,
|
||
|
||
on the one hand, as a celebratory capitulation on the
|
||
|
||
part of intellectuals to the new information
|
||
|
||
technocultures. On the other hand, this celebratory
|
||
|
||
strain attests to the persuasive affect associated with
|
||
|
||
the new cultural technologies, to their capacity (more
|
||
|
||
powerful than that of their sponsors and promoters) to
|
||
|
||
generate pleasure and gratification and to win the
|
||
|
||
struggle for intellectual as well as popular consent.
|
||
|
||
[42] Another reason for the involvement of cultural
|
||
|
||
critics in the technology debates has to do with our
|
||
|
||
special critical knowledge of the way in which cultural
|
||
|
||
meanings are produced--our knowledge about the politics
|
||
|
||
of consumption and what is often called the politics of
|
||
|
||
representation. This is the knowledge which
|
||
|
||
demonstrates that there are limits to the capacity of
|
||
|
||
productive forces to shape and determine consciousness.
|
||
|
||
It is a knowledge that insists on the ideological or
|
||
|
||
interpretive dimension of technology as a culture which
|
||
|
||
can and must be used and consumed in a variety of ways
|
||
|
||
that are not reducible to the intentions of any single
|
||
|
||
source or producer, and whose meanings cannot simply be
|
||
|
||
read off as evidence of faultless social reproduction.
|
||
|
||
It is a knowledge, in short, which refuses to add to
|
||
|
||
the "hard domination" picture of disenfranchised
|
||
|
||
individuals watched over by some by some scheming
|
||
|
||
panoptical intelligence. Far from being understood
|
||
|
||
solely as the concrete hardware of electronically
|
||
|
||
sophisticated objects, technology must be seen as a
|
||
|
||
lived, interpretive practice for people in their
|
||
|
||
everyday lives. To redefine the shape and form of that
|
||
|
||
practice is to help create the need for new kinds of
|
||
|
||
hardware and software.
|
||
|
||
[43] One of the latter aims of this essay has been to
|
||
|
||
describe and suggest a wider set of activities and
|
||
|
||
social locations than is normally associated with the
|
||
|
||
practice of hacking. If there is a challenge here for
|
||
|
||
cultural critics, then it might be presented as the
|
||
|
||
challenge to make our knowledge about technoculture
|
||
|
||
into something like a hacker's knowledge, capable of
|
||
|
||
penetrating existing systems of rationality that might
|
||
|
||
otherwise be seen as infallible; a hacker's knowledge,
|
||
|
||
capable of reskilling, and therefore of rewriting the
|
||
|
||
cultural programs and reprogramming the social values
|
||
|
||
that make room for new technologies; a hacker's
|
||
|
||
knowledge, capable also of generating new popular
|
||
|
||
romances around the alternative uses of human
|
||
|
||
ingenuity. If we are to take up that challenge, we
|
||
|
||
cannot afford to give up what technoliteracy we have
|
||
|
||
acquired in deference to the vulgar faith that tells us
|
||
|
||
it is always acquired in complicity, and is thus
|
||
|
||
contaminated by the poison of instrumental rationality,
|
||
|
||
or because we hear, often from the same quarters, that
|
||
|
||
acquired technological competence simply glorifies the
|
||
|
||
inhuman work ethic. Technoliteracy, for us, is the
|
||
|
||
challenge to make a historical opportunity out of a
|
||
|
||
historical necessity.
|
||
|
||
_______________________________________________________
|
||
|
||
NOTES
|
||
|
||
|
||
1. Bryan Kocher, "A Hygiene Lesson,"
|
||
_Communications of the ACM_, 32.1 (January 1989): 3.
|
||
|
||
2. Jon A. Rochlis and Mark W. Eichen, "With
|
||
Microscope and Tweezers: The Worm from MIT's
|
||
Perspective," _Communications of the ACM_, 32.6 (June
|
||
1989): 697.
|
||
|
||
3. Philip Elmer-DeWitt, "Invasion of the Body
|
||
Snatchers," _Time_ (26 September 1988); 62-67.
|
||
|
||
4. Judith Williamson, "Every Virus Tells a Story:
|
||
The Meaning of HIV and AIDS," _Taking Liberties: AIDS
|
||
and Cultural Politics_, ed. Erica Carter and Simon
|
||
Watney (London: Serpent's Tail/ICA, 1989): 69.
|
||
|
||
5. "Pulsing the system" is a well-known
|
||
intelligence process in which, for example, planes
|
||
deliberately fly over enemy radar installations in
|
||
order to determine what frequencies they use and how
|
||
they are arranged. It has been suggested that Morris
|
||
Sr. and Morris Jr. worked in collusion as part of an
|
||
NSA operation to pulse the Internet system, and to
|
||
generate public support for a legal clampdown on
|
||
hacking. See Allan Lundell, _Virus! The Secret World
|
||
of Computer Invaders That Breed and Destroy_ (Chicago:
|
||
Contemporary Books, 1989), 12-18. As is the case with
|
||
all such conspiracy theories, no actual conspiracy need
|
||
have existed for the consequences--in this case, the
|
||
benefits for the intelligence community--to have been
|
||
more or less the same.
|
||
|
||
6. For details of these raids, see _2600: The
|
||
Hacker's Quarterly_, 7.1 (Spring 1990): 7.
|
||
|
||
7. "Hackers in Jail," _2600: The Hacker's
|
||
Quarterly_, 6.1 (Spring 1989); 22-23. The recent
|
||
Secret Service action that shut down _Phrack_, an
|
||
electronic newsletter operating out of St. Louis,
|
||
confirms _2600_'s thesis: a nonelectronic publication
|
||
would not be censored in the same way.
|
||
|
||
8. This is not to say that the new laws cannot
|
||
themselves be used to protect hacker institutions,
|
||
however. _2600_ has advised operators of bulletin
|
||
boards to declare them private property, thereby
|
||
guaranteeing protection under the Electronic Privacy
|
||
Act against unauthorized entry by the FBI.
|
||
|
||
9. Hugo Cornwall, _The Hacker's Handbook_ 3rd ed.
|
||
(London: Century, 1988) 181, 2-6. In Britain, for the
|
||
most part, hacking is still looked upon as a matter for
|
||
the civil, rather than the criminal, courts.
|
||
|
||
10. Discussions about civil liberties and property
|
||
rights, for example, tend to preoccupy most of the
|
||
participants in the electronic forum published as "Is
|
||
Computer Hacking a Crime?" in _Harper's_, 280.1678
|
||
(March 1990): 45-57.
|
||
|
||
11. See Hugo Cornwall, _Data Theft_ (London:
|
||
Heinemann, 1987).
|
||
|
||
12. Bill Landreth, _Out of the Inner Circle: The
|
||
True Story of a Computer Intruder Capable of Cracking
|
||
the Nation's Most Secure Computer Systems_ (Redmond,
|
||
Wash.: Tempus, Microsoft, 1989), 10.
|
||
|
||
13. _The Computer Worm: A Report to the Provost of
|
||
Cornell University on an Investigation Conducted by the
|
||
Commission of Preliminary Enquiry_ (Ithaca, N.Y.:
|
||
Cornell University, 1989).
|
||
|
||
14. _The Computer Worm: A Report to the Provost_,
|
||
8.
|
||
|
||
15. A. K. Dewdney, the "computer recreations"
|
||
columnist at _Scientific American_, was the first to
|
||
publicize the details of this game of battle programs
|
||
in an article in the May 1984 issue of the magazine.
|
||
In a follow-up article in March 1985, "A Core War
|
||
Bestiary of Viruses, Worms, and Other Threats to
|
||
Computer Memories," Dewdney described the wide range of
|
||
"software creatures" which readers' responses had
|
||
brought to light. A third column, in March 1989, was
|
||
written, in an exculpatory mode, to refute any
|
||
connection between his original advertisement of the
|
||
Core War program and the spate of recent viruses.
|
||
|
||
16. Andrew Ross, _No Respect: Intellectuals and
|
||
Popular Culture_ (New York: Routledge, 1989), 212.
|
||
Some would argue, however, that the ideas and values of
|
||
the sixties counterculture were only fully culminated
|
||
in groups like the People's Computer Company, which ran
|
||
Community Memory in Berkeley, or the Homebrew Computer
|
||
Club, which pioneered personal microcomputing. So,
|
||
too, the Yippies had seen the need to form YIPL, the
|
||
Youth International Party Line, devoted to "anarcho-
|
||
technological" projects, which put out a newsletter
|
||
called TAP (alternately the Technological American
|
||
Party and the Technological Assistance Program). In
|
||
its depoliticised form, which eschewed the kind of
|
||
destructive "dark-side" hacking advocated in its
|
||
earlier incarnation, _TAP_ was eventually the
|
||
progenitor of _2600_. A significant turning point, for
|
||
example, was _TAP_'s decision not to publish plans for
|
||
the hydrogen bomb (which the _Progressive_ did)--bombs
|
||
would destroy the phone system, which the _TAP_ phone
|
||
phreaks had an enthusiastic interest in maintaining.
|
||
|
||
17. See Alice Bach's _Phreakers_ series, in which
|
||
two teenage girls enjoy adventures through the use of
|
||
computer technology. _The Bully of Library Place_,
|
||
_Parrot Woman_, _Double Bucky Shanghai_, and _Ragwars_
|
||
(all published by Dell, 1987-88).
|
||
|
||
18. John Markoff, "Cyberpunks Seek Thrills in
|
||
Computerized Mischief," _New York Times_, November 26,
|
||
1988.
|
||
|
||
19. Dennis Hayes, _Behind the Silicon Curtain: The
|
||
Seductions of Work in a Lonely Era_ (Boston, South End
|
||
Press, 1989), 93.
|
||
One striking historical precedent for the hacking
|
||
subculture, suggested to me by Carolyn Marvin, was the
|
||
widespread activity of amateur or "ham" wireless
|
||
operators in the first two decades of the century.
|
||
Initially lionized in the press as boy-inventor heroes
|
||
for their technical ingenuity and daring adventures
|
||
with the ether, this white middle-class subculture was
|
||
increasingly demonized by the U.S. Navy (whose signals
|
||
the amateurs prankishly interfered with), which was
|
||
crusading for complete military control of the airwaves
|
||
in the name of national security. The amateurs lobbied
|
||
with democratic rhetoric for the public's right to
|
||
access the airwaves, and although partially successful
|
||
in their case against the Navy, lost out ultimately to
|
||
big commercial interests when Congress approved the
|
||
creation of a broadcasting monopoly after World War I
|
||
in the form of RCA. See Susan J. Douglas, _Inventing
|
||
American Broadcasting 1899-1922_ (Baltimore: Johns
|
||
Hopkins University Press, 1987), 187-291.
|
||
|
||
20. "Sabotage," _Processed World_, 11 (Summer
|
||
1984), 37-38.
|
||
|
||
21. Hayes, _Behind the Silicon Curtain_, 99.
|
||
|
||
22. _The Amateur Computerist_, available from R.
|
||
Hauben, PO Box, 4344, Dearborn, MI 48126.
|
||
|
||
23. Kevin Robins and Frank Webster, "Athens
|
||
Without Slaves...Or Slaves Without Athens? The
|
||
Neurosis of Technology," _Science as Culture_, 3
|
||
(1988): 7-53.
|
||
|
||
24. See Boris Frankel, _The Post-Industrial
|
||
Utopians_ (Oxford: Basil Blackwell, 1987).
|
||
|
||
25. See, for example, the collection of essays
|
||
edited by Vincent Mosco and Janet Wasko, _The Political
|
||
Economy of Information_ (Madison: University of
|
||
Wisconsin Press, 1988), and Dan Schiller, _The
|
||
Information Commodity_ (Oxford UP, forthcoming).
|
||
|
||
26. Tom Athanasiou and Staff, "Encryption and the
|
||
Dossier Society," _Processed World_, 16 (1986): 12-17.
|
||
|
||
27. Kevin Wilson, _Technologies of Control: The
|
||
New Interactive Media for the Home_ (Madison:
|
||
University of Wisconsin Press, 1988), 121-25.
|
||
|
||
28. Hayes, _Behind the Silicon Curtain_, 63-80.
|
||
|
||
29. "Our Friend the VDT," _Processed World_, 22
|
||
(Summer 1988): 24-25.
|
||
|
||
30. See Kevin Robins and Frank Webster,
|
||
"Cybernetic Capitalism," in Mosco and Wasko, 44-75.
|
||
|
||
31. Barbara Garson, _The Electronic Sweatshop_
|
||
(New York: Simon & Schuster, 1988), 244-45.
|
||
|
||
32. See Marike Finlay's Foucauldian analysis,
|
||
_Powermatics: A Discursive Critique of New Technology_
|
||
(London: Routledge & Kegan Paul, 1987). A more
|
||
conventional culturalist argument can be found in
|
||
Stephen Hill, _The Tragedy of Technology_ (London:
|
||
Pluto Press, 1988).
|
||
|
||
|