GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


archive:programming:counterc

HACKING AWAY AT THE COUNTERCULTURE

by

ANDREW ROSS

Princeton University

   Copyright (c) 1990 by Andrew Ross, all rights reserved.
       _Postmodern Culture_ vol. 1, no. 1 (Sep. 1990).

[1] Ever since the viral attack engineered in November

of 1988 by Cornell University hacker Robert Morris on

the national network system Internet, which includes

the Pentagon's ARPAnet data exchange network, the

nation's high-tech ideologues and spin doctors have

been locked in debate, trying to make ethical and

economic sense of the event. The virus rapidly

infected an estimated six thousand computers around the

country, creating a scare that crowned an open season

of viral hysteria in the media, in the course of which,

according to the Computer Virus Industry Association in

Santa Clara, the number of known viruses jumped from

seven to thirty during 1988, and from three thousand

infections in the first two months of that year to

thirty thousand in the last two months. While it

caused little in the way of data damage (some richly

inflated initial estimates reckoned up to $100m in

down time), the ramifications of the Internet virus

have helped to generate a moral panic that has all but

transformed everyday "computer culture."

[2] Following the lead of DARPA's (Defence Advance

Research Projects Agency) Computer Emergency Response

Team at Carnegie-Mellon University, anti-virus response

centers were hastily put in place by government and

defence agencies at the National Science Foundation,

the Energy Department, NASA, and other sites. Plans

were made to introduce a bill in Congress (the

Computer Virus Eradication Act, to replace the 1986

Computer Fraud and Abuse Act, which pertained solely to

government information), that would call for prison

sentences of up to ten years for the "crime" of

sophisticated hacking, and numerous government agencies

have been involved in a proprietary fight over the

creation of a proposed Center for Virus Control,

modelled, of course, on Atlanta's Centers for Disease

Control, notorious for its failures to respond

adequately to the AIDS crisis.

[3] In fact, media commentary on the virus scare has

run not so much tongue-in-cheek as hand-in-glove with

the rhetoric of AIDS hysteria–the common use of terms

like killer virus and epidemic; the focus on hi-risk

personal contact (virus infection, for the most part,

is spread on personal computers, not mainframes); the

obsession with defense, security, and immunity; and the

climate of suspicion generated around communitarian

acts of sharing. The underlying moral imperative being

this: You can't trust your best friend's software any

more than you can trust his or her bodily fluids–safe

software or no software at all! Or, as Dennis Miller

put it on _Saturday Night Live_, "Remember, when you

connect with another computer, you're connecting to

every computer that computer has ever connected to."

This playful conceit struck a chord in the popular

consciousness, even as it was perpetuated in such sober

quarters as the Association for Computing Machinery,

the president of which, in a controversial editorial

titled "A Hygiene Lesson," drew comparisons not only

with sexually transmitted diseases, but also with a

cholera epidemic, and urged attention to "personal

systems hygiene."^1^ In fact, some computer scientists

who studied the symptomatic path of Morris's virus

across Internet have pointed to its uneven effects upon

different computer types and operating systems, and

concluded that "there is a direct analogy with

biological genetic diversity to be made."^2^ The

epidemiology of biological virus, and especially AIDS,

research is being closely studied to help implement

computer security plans, and, in these circles, the new

witty discourse is laced with references to antigens,

white blood cells, vaccinations, metabolic free

radicals, and the like.

[4] The form and content of more lurid articles like

_Time_'s infamous (September 1988) story, "Invasion of

the Data Snatchers," fully displayed the continuity of

the media scare with those historical fears about

bodily invasion, individual and national, that are

often considered endemic to the paranoid style of

American political culture.^3^ Indeed, the rhetoric of

computer culture, in common with the medical discourse

of AIDS research, has fallen in line with the paranoid,

strategic style of Defence Department rhetoric. Each

language-repertoire is obsessed with hostile threats to

bodily and technological immune systems; every event is

a ballistic manoeuver in the game of microbiological

war, where the governing metaphors are indiscriminately

drawn from cellular genetics and cybernetics alike. As

a counterpoint to the tongue-in-cheek AI tradition of

seeing humans as "information-exchanging environments,"

the imagined life of computers has taken on an

organicist shape, now that they too are subject to

cybernetic "sickness" or disease. So, too, the

development of interrelated systems, such as Internet

itself, has further added to the structural picture of

an interdependent organism, whose component members,

however autonomous, are all nonetheless affected by the

"health" of each individual constituent. The growing

interest among scientists in developing computer

programs that will simulate the genetic behavior of

living organisms (in which binary numbers act like

genes) points to a future where the border between

organic and artificial life is less and less distinct.

[5] In keeping with the increasing use of biologically

derived language to describe mutations in systems

theory, conscious attempts to link the AIDS crisis with

the information security crisis have pointed out that

both kinds of virus, biological and electronic, take

over the host cell/program and clone their carrier

genetic codes by instructing the hosts to make replicas

of the viruses. Neither kind of virus, however, can

replicate themselves independently; they are pieces of

code that attach themselves to other cells/programs–

just as biological viruses need a host cell, computer

viruses require a host program to activate them. The

Internet virus was not, in fact, a virus, but a worm, a

program that can run independently and therefore

_appears_ to have a life of its own. The worm

replicates a full version of itself in programs and

systems as it moves from one to another, masquerading

as a legitimate user by guessing the user passwords of

locked accounts. Because of this autonomous existence,

the worm can be seen to behave as if it were an

organism with some kind of purpose or teleology, and

yet it has none. Its only "purpose" is to reproduce

and infect. If the worm has no inbuilt antireplication

code, or if the code is faulty, as was the case with

the Internet worm, it will make already-infected

computers repeatedly accept further replicas of itself,

until their memories are clogged. A much quieter worm

than that engineered by Morris would have moved more

slowly, as one supposes a "worm" should, protecting

itself from detection by ever more subtle camouflage,

and propagating its cumulative effect of operative

systems inertia over a much longer period of time.

[6] In offering such descriptions, however, we must be

wary of attributing a teleology/intentionality to worms

and viruses which can be ascribed only, and, in most

instances, speculatively, to their authors. There is

no reason why a cybernetic "worm" might be expected to

behave in any fundamental way like a biological worm.

So, too, the assumed intentionality of its author

distinguishes the human-made cybernetic virus from the

case of the biological virus, the effects of which are

fated to be received and discussed in a language

saturated with human-made structures and narratives of

meaning and teleological purpose. Writing about the

folkloric theologies of significance and explanatory

justice (usually involving retribution) that have

sprung up around the AIDS crisis, Judith Williamson has

pointed to the radical implications of this collision

between an intentionless virus and a meaning-filled

culture:

Nothing could be more meaningless than a

virus. It has no point, no purpose, no plan;

it is part of no scheme, carries no inherent

significance. And yet nothing is harder for

us to confront than the complete absence of

meaning. By its very definition,

meaninglessness cannot be articulated within

our social language, which is a system _of_

meaning: impossible to include, as an

absence, it is also impossible to exclude–

for meaninglessness isn't just the opposite

of meaning, it is the end of meaning, and

threatens the fragile structures by which we

make sense of the world.^4^

[7] No such judgment about meaninglessness applies to

the computer security crisis. In contrast to HIV's

lack of meaning or intentionality, the meaning of

cybernetic viruses is always already replete with

social significance. This meaning is related, first of

all, to the author's local intention or motivation,

whether psychic or fully social, whether wrought out

of a mood of vengeance, a show of bravado or technical

expertise, a commitment to a political act, or in

anticipation of the profits that often accrue from the

victims' need to buy an antidote from the author.

Beyond these local intentions, however, which are

usually obscure or, as in the Morris case, quite

inscrutable, there is an entire set of social and

historical narratives that surround and are part of the

"meaning" of the virus: the coded anarchist history of

the youth hacker subculture; the militaristic

environments of search-and-destroy warfare (a virus has

two components–a carrier and a "warhead"), which,

because of the historical development of computer

technology, constitute the family values of information

techno-culture; the experimental research environments

in which creative designers are encouraged to work; and

the conflictual history of pure and applied ethics in

the science and technology communities, to name just a

few. A similar list could be drawn up to explain the

widespread and varied _response_ to computer viruses,

from the amused concern of the cognoscenti to the

hysteria of the casual user, and from the research

community and the manufacturing industry to the morally

aroused legislature and the mediated culture at large.

Every one of these explanations and narratives is the

result of social and cultural processes and values;

consequently, there is very little about the virus

itself that is "meaningless." Viruses can no more be

seen as an objective, or necessary, result of the

"objective" development of technological systems than

technology in general can be seen as an objective,

determining agent of social change.

[8] For the sake of polemical economy, I would note

that the cumulative effect of all the viral hysteria

has been twofold. Firstly, it has resulted in a

windfall for software producers, now that users' blithe

disregard for makers' copyright privileges has eroded

in the face of the security panic. Used to fighting

halfhearted rearguard actions against widespread piracy

practices, or reluctantly acceding to buyers' desire

for software unencumbered by top-heavy security

features, software vendors are now profiting from the

new public distrust of program copies. So, too, the

explosion in security consciousness has hyperstimulated

the already fast-growing sectors of the security system

industry and the data encryption industry. In line

with the new imperative for everything from

"vaccinated" workstations to "sterilized" networks, it

has created a brand new market of viral vaccine vendors

who will sell you the virus (a one-time only

immunization shot) along with its antidote–with names

like Flu Shot +, ViruSafe, Vaccinate, Disk Defender,

Certus, Viral Alarm, Antidote, Virus Buster,

Gatekeeper, Ongard, and Interferon. Few of the

antidotes are very reliable, however, especially since

they pose an irresistible intellectual challenge to

hackers who can easily rewrite them in the form of ever

more powerful viruses. Moreover, most corporate

managers of computer systems and networks know that by

far the great majority of their intentional security

losses are a result of insider sabotage and

monkeywrenching.

[9] In short, the effects of the viruses have been to

profitably clamp down on copyright delinquency, and to

generate the need for entirely new industrial

production of viral suppressors to contain the fallout.

In this respect, it is easy to see that the appearance

of viruses could hardly, in the long run, have

benefited industry producers more. In the same vein,

the networks that have been hardest hit by the security

squeeze are not restricted-access military or corporate

systems but networks like Internet, set up on trust to

facilitate the open academic exchange of data,

information and research, and watched over by its

sponsor, DARPA. It has not escaped the notice of

conspiracy theorists that the military intelligence

community, obsessed with "electronic warfare," actually

stood to learn a lot from the Internet virus; the virus

effectively "pulsed the system," exposing the

sociological behaviour of the system in a crisis

situation.^5^

The second effect of the virus crisis has been

more overtly ideological. Virus-conscious fear and

loathing have clearly fed into the paranoid climate of

privatization that increasingly defines social

identities in the new post-Fordist order. The result–

a psycho-social closing of the ranks around fortified

private spheres–runs directly counter to the ethic

that we might think of as residing at the architectural

heart of information technology. In its basic assembly

structure, information technology is a technology of

processing, copying, replication, and simulation, and

therefore does not recognize the concept of private

information property. What is now under threat is the

rationality of a shareware culture, ushered in as the

achievement of the hacker counterculture that pioneered

the personal computer revolution in the early seventies

against the grain of corporate planning.

[10] There is another story to tell, however, about the

emergence of the virus scare as a profitable

ideological moment, and it is the story of how teenage

hacking has come to be increasingly defined as a

potential threat to normative educational ethics and

national security alike. The story of the creation of

this "social menace" is central to the ongoing attempts

to rewrite property law in order to contain the effects

of the new information technologies that, because of

their blindness to the copyrighting of intellectual

property, have transformed the way in which modern

power is exercised and maintained. Consequently, a

deviant social class or group has been defined and

categorised as "enemies of the state" in order to help

rationalize a general law-and-order clampdown on free

and open information exchange. Teenage hackers' homes

are now habitually raided by sheriffs and FBI agents

using strong-arm tactics, and jail sentences are

becoming a common punishment. Operation Sundevil, a

nationwide Secret Service operation in the spring of

1990, involving hundreds of agents in fourteen cities,

is the most recently publicized of the hacker raids

that have produced several arrests and seizures of

thousands of disks and address lists in the last two

years.^6^

[11] In one of the many harshly punitive prosecutions

against hackers in recent years, a judge went so far as

to describe "bulletin boards" as "hi-tech street

gangs." The editors of _2600_, the magazine that

publishes information about system entry and

exploration that is indispensable to the hacking

community, have pointed out that any single invasive

act, such as that of trespass, that involves the use of

computers is considered today to be infinitely more

criminal than a similar act undertaken without

computers.^7^ To use computers to execute pranks,

raids, frauds or thefts is to incur automatically the

full repressive wrath of judges urged on by the moral

panic created around hacking feats over the last two

decades. Indeed, there is a strong body of pressure

groups pushing for new criminal legislation that will

define "crimes with computers" as a special category of

crime, deserving "extraordinary" sentences and punitive

measures. Over that same space of time, the term

_hacker_ has lost its semantic link with the

journalistic _hack,_ suggesting a professional toiler

who uses unorthodox methods. So, too, its increasingly

criminal connotation today has displaced the more

innocuous, amateur mischief-maker-cum-media-star role

reserved for hackers until a few years ago.

[12] In response to the gathering vigor of this "war on

hackers," the most common defences of hacking can be

presented on a spectrum that runs from the appeasement

or accommodation of corporate interests to drawing up

blueprints for cultural revolution. (a) Hacking

performs a benign industrial service of uncovering

security deficiencies and design flaws. (b) Hacking,

as an experimental, free-form research activity, has

been responsible for many of the most progressive

developments in software development. © Hacking,

when not purely recreational, is an elite educational

practice that reflects the ways in which the

development of high technology has outpaced orthodox

forms of institutional education. (d) Hacking is an

important form of watchdog counterresponse to the use

of surveillance technology and data gathering by the

state, and to the increasingly monolithic

communications power of giant corporations. (e)

Hacking, as guerrilla know-how, is essential to the

task of maintaining fronts of cultural resistance and

stocks of oppositional knowledge as a hedge against a

technofascist future. With all of these and other

arguments in mind, it is easy to see how the social and

cultural _management_ of hacker activities has become a

complex process that involves state policy and

legislation at the highest levels. In this respect,

the virus scare has become an especially convenient

vehicle for obtaining public and popular consent for

new legislative measures and new powers of

investigation for the FBI.^8^

[13] Consequently, certain celebrity hackers have been

quick to play down the zeal with which they pursued

their earlier hacking feats, while reinforcing the

_deviant_ category of "technological hooliganism"

reserved by moralizing pundits for "dark-side" hacking.

Hugo Cornwall, British author of the bestselling

_Hacker's Handbook_, presents a Little England view of

the hacker as a harmless fresh-air enthusiast who

"visits advanced computers as a polite country rambler

might walk across picturesque fields." The owners of

these properties are like "farmers who don't mind

careful ramblers." Cornwall notes that "lovers of

fresh-air walks obey the Country Code, involving such

items as closing gates behind one and avoiding damage

to crops and livestock" and suggests that a similar

code ought to "guide your rambles into other people's

computers; the safest thing to do is simply browse,

enjoy and learn." By contrast, any rambler who

"ventured across a field guarded by barbed wire and

dotted with notices warning about the Official Secrets

Act would deserve most that happened thereafter."^9^

Cornwall's quaint perspective on hacking has a certain

"native charm," but some might think that this

beguiling picture of patchwork-quilt fields and benign

gentleman farmers glosses over the long bloody history

of power exercised through feudal and postfeudal land

economy in England, while it is barely suggestive of

the new fiefdoms, transnational estates, dependencies,

and principalities carved out of today's global

information order by vast corporations capable of

bypassing the laws and territorial borders of sovereign

nation-states. In general, this analogy with

"trespass" laws, which compares hacking to breaking and

entering other people's homes restricts the debate to

questions about privacy, property, possessive

individualism, and, at best, the excesses of state

surveillance, while it closes off any examination of

the activities of the corporate owners and

institutional sponsors of information technology (the

almost exclusive "target" of most hackers).^10^

[14] Cornwall himself has joined the lucrative ranks of

ex-hackers who either work for computer security firms

or write books about security for the eyes of worried

corporate managers.^11^ A different, though related,

genre is that of the penitent hacker's "confession,"

produced for an audience thrilled by tales of high-

stakes adventure at the keyboard, but written in the

form of a computer security handbook. The best example

of the "I Was a Teenage Hacker" genre is Bill (aka "The

Cracker") Landreth's _Out of the Inner Circle_: The

True Story of a Computer Intruder Capable of Cracking

the Nation's Most Secure Computer Systems_, a book

about "people who can't `just say no' to computers."

In full complicity with the deviant picture of the

hacker as "public enemy," Landreth recirculates every

official and media cliche about subversive

conspiratorial elites by recounting the putative

exploits of a high-level hackers' guild called the

Inner Circle. The author himself is presented in the

book as a former keyboard junkie who now praises the

law for having made a good moral example of him:

If you are wondering what I am like, I can

tell you the same things I told the judge in

federal court: Although it may not seem like

it, I am pretty much a normal American

teenager. I don't drink, smoke or take

drugs. I don't steal, assault people, or

vandalize property. The only way in which I

am really different from most people is in my

fascination with the ways and means of

learning about computers that don't belong to

me.^12^

Sentenced in 1984 to three years probation, during

which time he was obliged to finish his high school

education and go to college, Landreth concludes: "I

think the sentence is very fair, and I already know

what my major will be…." As an aberrant sequel to

the book's contrite conclusion, however, Landreth

vanished in 1986, violating his probation, only to face

later a stiff five-year jail sentence–a sorry victim,

no doubt, of the recent crackdown.

_Cyber-Counterculture_?

[15] At the core of Steven Levy's bestseller _Hackers_

(1984) is the argument that the hacker ethic, first

articulated in the 1950s among the famous MIT students

who developed multiple-access user systems, is

libertarian and crypto-anarchist in its right-to know

principles and its advocacy of decentralized

technology. This hacker ethic, which has remained the

preserve of a youth culture for the most part, asserts

the basic right of users to free access to all

information. It is a principled attempt, in other

words, to challenge the tendency to use technology to

form information elites. Consequently, hacker

activities were presented in the eighties as a romantic

countercultural tendency, celebrated by critical

journalists like John Markoff of the _New York Times_,

by Stewart Brand of _Whole Earth Catalog_ fame, and by

New Age gurus like Timothy Leary in the flamboyant

_Reality Hackers_. Fuelled by sensational stories

about phone phreaks like Joe Egressia (the blind eight-

year old who discovered the tone signal of phone

company by whistling) and Cap'n Crunch, groups like the

Milwaukee 414s, the Los Angeles ARPAnet hackers, the

SPAN Data Travellers, the Chaos Computer Club of

Hamburg, the British Prestel hackers, _2600_'s BBS,

"The Private Sector," and others, the dominant media

representation of the hacker came to be that of the

"rebel with a modem," to use Markoff's term, at least

until the more recent "war on hackers" began to shape

media coverage.

[16] On the one hand, this popular folk hero persona

offered the romantic high profile of a maverick though

nerdy cowboy whose fearless raids upon an impersonal

"system" were perceived as a welcome tonic in the gray

age of technocratic routine. On the other hand, he was

something of a juvenile technodelinquent who hadn't yet

learned the difference between right and wrong—a

wayward figure whose technical brilliance and

proficiency differentiated him nonetheless from, say,

the maladjusted working-class J.D. street-corner boy of

the 1950s (hacker mythology, for the most part, has

been almost exclusively white, masculine, and middle-

class). One result of this media profile was a

persistent infantilization of the hacker ethic–a way

of trivializing its embryonic politics, however finally

complicit with dominant technocratic imperatives or

with entrepreneurial-libertarian ideology one perceives

these politics to be. The second result was to

reinforce, in the initial absence of coercive jail

sentences, the high educational stakes of training the

new technocratic elites to be responsible in their use

of technology. Never, the given wisdom goes, has a

creative elite of the future been so in need of the

virtues of a liberal education steeped in Western

ethics!

[17] The full force of this lesson in computer ethics

can be found laid out in the official Cornell

University report on the Robert Morris affair. Members

of the university commission set up to investigate the

affair make it quite clear in their report that they

recognize the student's academic brilliance. His

hacking, moreover, is described, as a "juvenile act"

that had no "malicious intent" but that amounted, like

plagiarism, the traditional academic heresy, to a

dishonest transgression of other users' rights. (In

recent years, the privacy movement within the

information community–a movement mounted by liberals

to protect civil rights against state gathering of

information–has actually been taken up and used as a

means of criminalizing hacker activities.) As for the

consequences of this juvenile act, the report proposes

an analogy that, in comparison with Cornwall's _mature_

English country rambler, is thoroughly American,

suburban, middle-class and _juvenile_. Unleashing the

Internet worm was like "the driving of a golf-cart on a

rainy day through most houses in the neighborhood. The

driver may have navigated carefully and broken no

china, but it should have been obvious to the driver

that the mud on the tires would soil the carpets and

that the owners would later have to clean up the

mess."^13^

[18] In what stands out as a stiff reprimand for his

alma mater, the report regrets that Morris was educated

in an "ambivalent atmosphere" where he "received no

clear guidance" about ethics from "his peers or

mentors" (he went to Harvard!). But it reserves its

loftiest academic contempt for the press, whose

heroization of hackers has been so irresponsible, in

the commission's opinion, as to cause even further

damage to the standards of the computing profession;

media exaggerations of the courage and technical

sophistication of hackers "obscures the far more

accomplished work of students who complete their

graduate studies without public fanfare," and "who

subject their work to the close scrutiny and evaluation

of their peers, and not to the interpretations of the

popular press."^14^ In other words, this was an inside

affair, to be assessed and judged by fellow

professionals within an institution that reinforces its

authority by means of internally self-regulating codes

of professionalist ethics, but rarely addresses its

ethical relationship to society as a whole (acceptance

of defence grants, and the like). Generally speaking,

the report affirms the genteel liberal ideal that

professionals should not need laws, rules, procedural

guidelines, or fixed guarantees of safe and responsible

conduct. Apprentice professionals ought to have

acquired a good conscience by osmosis from a liberal

education rather than from some specially prescribed

course in ethics and technology.

[19] The widespread attention commanded by the Cornell

report (attention from the Association of Computing

Machinery, among others) demonstrates the industry's

interest in how the academy invokes liberal ethics in

order to assist in the managing of the organization of

the new specialized knowledge about information

technology. Despite or, perhaps, because of the

report's steadfast pledge to the virtues and ideals of

a liberal education, it bears all the marks of a

legitimation crisis inside (and outside) the academy

surrounding the new and all-important category of

computer professionalism. The increasingly specialized

design knowledge demanded of computer professionals

means that codes that go beyond the old professionalist

separation of mental and practical skills are needed to

manage the division that a hacker's functional talents

call into question, between a purely mental pursuit and

the pragmatic sphere of implementing knowledge in the

real world. "Hacking" must then be designated as a

strictly _amateur_ practice; the tension, in hacking,

between _interestedness_ and _disinterestedness_ is

different from, and deficient in relation to, the

proper balance demanded by professionalism.

Alternately, hacking can be seen as the amateur flip

side of the professional ideal–a disinterested love in

the service of interested parties and institutions. In

either case, it serves as an example of professionalism

gone wrong, but not very wrong.

[20] In common with the two responses to the virus

scare described earlier–the profitable reaction of the

computer industry and the self-empowering response of

the legislature– the Cornell report shows how the

academy uses a case like the Morris affair to

strengthen its own sense of moral and cultural

authority in the sphere of professionalism,

particularly through its scornful indifference to and

aloofness from the codes and judgements exercised by

the media–its diabolic competitor in the field of

knowledge. Indeed, for all the trumpeting about

excesses of power and disrespect for the law of the

land, the revival of ethics, in the business and

science disciplines in the Ivy League and on Capitol

Hill (both awash with ethical fervor in the post-Boesky

and post-Reagan years), is little more than a weak

liberal response to working flaws or adaptational

lapses in the social logic of technocracy.

[21] To complete the scenario of morality play example-

making, however, we must also consider that Morris's

father was chief scientist of the National Computer

Security Center, the National Security Agency's public

effort at safeguarding computer security. A brilliant

programmer and codebreaker in his own right, he had

testified in Washington in 1983 about the need to

deglamorise teenage hacking, comparing it to "stealing

a car for the purpose of joyriding." In a further

Oedipal irony, Morris Sr. may have been one of the

inventors, while at Bell Labs in the 1950s, of a

computer game involving self-perpetuating programs that

were a prototype of today's worms and viruses. Called

Darwin, its principles were incorporated, in the

eighties, into a popular hacker game called Core War,

in which autonomous "killer" programs fought each other

to the death.^15^

[22] With the appearance, in the Morris affair, of a

patricidal object who is also the Pentagon's guardian

angel, we now have many of the classic components of

countercultural cross-generational conflict. What I

want to consider, however, is how and where this

scenario differs from the definitive contours of such

conflicts that we recognize as having been established

in the sixties; how the Cornell hacker Morris's

relation to, say, campus "occupations" today is

different from that evoked by the famous image of armed

black students emerging from a sit-in on the Cornell

campus; how the relation to technological ethics

differs from Andrew Kopkind's famous statement

"Morality begins at the end of a gun barrel" which

accompanied the publication of the do-it-yourself

Molotov cocktail design on the cover of a 1968 issue of

the _New York Review of Books_; or how hackers' prized

potential access to the networks of military systems

warfare differs from the prodigious Yippie feat of

levitating the Pentagon building. It may be that, like

the J.D. rebel without a cause of the fifties, the

disaffiliated student dropout of the sixties, and the

negationist punk of the seventies, the hacker of the

eighties has come to serve as a visible public example

of moral maladjustment, a hegemonic test case for

redefining the dominant ethics in an advanced

technocratic society. (Hence the need for each of

these deviant figures to come in different versions–

lumpen, radical chic, and Hollywood-style.)

[23] What concerns me here, however, are the different

conditions that exist today for recognizing

countercultural expression and activism. Twenty years

later, the technology of hacking and viral guerrilla

warfare occupies a similar place in countercultural

fantasy as the Molotov Cocktail design once did. While

I don't, for one minute, mean to insist on such

comparisons, which aren't particularly sound anyway, I

think they conveniently mark a shift in the relation of

countercultural activity to technology, a shift in

which a software-based technoculture, organized around

outlawed libertarian principles about free access to

information and communication, has come to replace a

dissenting culture organized around the demonizing of

abject hardware structures. Much, though not all, of

the sixties counterculture was formed around what I

have elsewhere called the _technology of folklore_–an

expressive congeries of preindustrialist, agrarianist,

Orientalist, antitechnological ideas, values, and

social structures. By contrast, the cybernetic

countercultures of the nineties are already being

formed around the _folklore of technology_–mythical

feats of survivalism and resistance in a data-rich

world of virtual environments and posthuman bodies–

which is where many of the SF-and technology-conscious

youth cultures have been assembling in recent

years.^16^

[24] There is no doubt that this scenario makes

countercultural activity more difficult to recognize

and therefore to define as politically significant. It

was much easier, in the sixties, to _identify_ the

salient features and symbolic power of a romantic

preindustrialist cultural politics in an advanced

technological society, especially when the destructive

evidence of America's supertechnological invasion of

Vietnam was being daily paraded in front of the public

eye. However, in a society whose technopolitical

infrastructure depends increasingly upon greater

surveillance, cybernetic activism necessarily relies on

a much more covert politics of identity, since access

to closed systems requires discretion and

dissimulation. Access to digital systems still

requires only the authentication of a signature or

pseudonym, not the identification of a real

surveillable person, so there exists a crucial

operative gap between authentication and

identification. (As security systems move toward

authenticating access through biological signatures–

the biometric recording and measurement of physical

characteristics such as palm or retinal prints, or vein

patterns on the backs of hands–the hacker's staple

method of systems entry through purloined passwords

will be further challenged.) By the same token,

cybernetic identity is never used up, it can be

recreated, reassigned, and reconstructed with any

number of different names and under different user

accounts. Most hacks, or technocrimes, go unnoticed or

unreported for fear of publicising the vulnerability of

corporate security systems, especially when the hacks

are performed by disgruntled employees taking their

vengeance on management. So, too, authoritative

identification of any individual hacker, whenever it

occurs, is often the result of accidental leads rather

than systematic detection. For example, Captain

Midnight, the video pirate who commandeered a satellite

a few years ago to interrupt broadcast TV viewing, was

traced only because a member of the public reported a

suspicious conversation heard over a crossed telephone

line.

[25] Eschewing its core constituency among white males

of the pre-professional-managerial class, the hacker

community may be expanding its parameters outward.

Hacking, for example, has become a feature of the young

adult mystery-and-suspense novel genre for girls.^17^

The elitist class profile of the hacker prodigy as that

of an undersocialized college nerd has become

democratized and customized in recent years; it is no

longer exclusively associated with institutionally

acquired college expertise, and increasingly it dresses

streetwise. In a recent article which documents the

spread of the computer underground from college whiz

kids to a broader youth subculture termed "cyberpunks,"

after the movement among SF novelists, the original

hacker phone phreak Cap'n Crunch is described as

lamenting the fact that the cyberculture is no longer

an "elite" one, and that hacker-valid information is

much easier to obtain these days.^18^

[26] For the most part, however, the self-defined

hacker underground, like many other

protocountercultural tendencies, has been restricted to

a privileged social milieu, further magnetised by the

self-understanding of its members that they are the

apprentice architects of a future dominated by

knowledge, expertise, and "smartness," whether human or

digital. Consequently, it is clear that the hacker

cyberculture is not a dropout culture; its

disaffiliation from a domestic parent culture is often

manifest in activities that answer, directly or

indirectly, to the legitimate needs of industrial R&D.

For example, this hacker culture celebrates high

productivity, maverick forms of creative work energy,

and an obsessive identification with on-line endurance

(and endorphin highs)–all qualities that are valorised

by the entrepreneurial codes of silicon futurism. In a

critique of the myth of the hacker-as-rebel, Dennis

Hayes debunks the political romance woven around the

teenage hacker:

They are typically white, upper-middle-class

adolescents who have taken over the home

computer (bought, subsidized, or tolerated

by parents in the hope of cultivating

computer literacy). Few are politically

motivated although many express contempt for

the "bureaucracies" that hamper their

electronic journeys. Nearly all demand

unfettered access to intricate and intriguing

computer networks. In this, teenage hackers

resemble an alienated shopping culture

deprived of purchasing opportunities more

than a terrorist network.^19^

[27] While welcoming the sobriety of Hayes's critique,

I am less willing to accept its assumptions about the

political implications of hacker activities. Studies

of youth subcultures (including those of a privileged

middle-class formation) have taught us that the

political meaning of certain forms of cultural

"resistance" is notoriously difficult to read. These

meanings are either highly coded or expressed

indirectly through media–private peer languages,

customized consumer styles, unorthodox leisure

patterns, categories of insider knowledge and

behavior–that have no fixed or inherent political

significance. If cultural studies of this sort have

proved anything, it is that the often symbolic, not

wholly articulate, expressivity of a youth culture can

seldom be translated directly into an articulate

political philosophy. The significance of these

cultures lies in their embryonic or _protopolitical_

languages and technologies of opposition to dominant or

parent systems of rules. If hackers lack a "cause,"

then they are certainly not the first youth culture to

be characterized in this dismissive way. In

particular, the left has suffered from the lack of a

cultural politics capable of recognizing the power of

cultural expressions that do not wear a mature

political commitment on their sleeves.

So, too, the escalation of activism-in-the-

professions in the last two decades has shown that it

is a mistake to condemn the hacker impulse on account

of its class constituency alone. To cede the "ability

to know" on the grounds that elite groups will enjoy

unjustly privileged access to technocratic knowledge is

to cede too much of the future. Is it of no political

significance at all that hackers' primary fantasies

often involve the official computer systems of the

police, armed forces, and defence and intelligence

agencies? And that the rationale for their fantasies

is unfailingly presented in the form of a defence of

civil liberties against the threat of centralized

intelligence and military activities? Or is all of

this merely a symptom of an apprentice elite's

fledgling will to masculine power? The activities of

the Chinese student elite in the pro-democracy movement

have shown that unforeseen shifts in the political

climate can produce startling new configurations of

power and resistance. After Tiananmen Square, Party

leaders found it imprudent to purge those high-tech

engineer and computer cadres who alone could guarantee

the future of any planned modernization program. On

the other hand, the authorities rested uneasy knowing

that each cadre (among the most activist groups in the

student movement) is a potential hacker who can have

the run of the communications house if and when he or

she wants.

[28] On the other hand, I do agree with Hayes's

perception that the media have pursued their romance

with the hacker at the cost of underreporting the much

greater challenge posed to corporate employers by their

employees. It is in the arena of conflicts between

workers and management that most high-tech "sabotage"

takes place. In the mainstream everyday life of office

workers, mostly female, there is a widespread culture

of unorganized sabotage that accounts for infinitely

more computer downtime and information loss every year

than is caused by destructive, "dark-side" hacking by

celebrity cybernetic intruders. The sabotage, time

theft, and strategic monkeywrenching deployed by office

workers in their engineered electromagnetic attacks on

data storage and operating systems might range from the

planting of time or logic bombs to the discrete use of

electromagnetic Tesla coils or simple bodily friction:

"Good old static electricity discharged from the

fingertips probably accounts for close to half the

disks and computers wiped out or down every year."^20^

More skilled operators, intent on evening a score with

management, often utilize sophisticated hacking

techniques. In many cases, a coherent networking

culture exists among female console operators, where,

among other things, tips about strategies for slowing

down the temporality of the work regime are circulated.

While these threats from below are fully recognized in

their boardrooms, corporations dependent upon digital

business machines are obviously unwilling to advertize

how acutely vulnerable they actually are to this kind

of sabotage. It is easy to imagine how organised

computer activism could hold such companies for ransom.

As Hayes points out, however, it is more difficult to

mobilize any kind of labor movement organized upon such

premises:

Many are prepared to publicly oppose the

countless dark legacies of the computer age:

"electronic sweatshops," Military technology,

employee surveillance, genotoxic water, and

ozone depletion. Among those currently

leading the opposition, however, it is

apparently deemed "irresponsible" to recommend

an active computerized resistance as a source

of worker's power because it is perceived as

a medium of employee crime and "terrorism."

^21^

_Processed World_, the "magazine with a bad attitude"

with which Hayes has been associated, is at the

forefront of debating and circulating these questions

among office workers, regularly tapping into the

resentments borne out in on-the-job resistance.

[29] While only a small number of computer users would

recognize and include themselves under the label of

"hacker," there are good reasons for extending the

restricted definition of _hacking_ down and across the

caste system of systems analysts, designers,

programmers, and operators to include all high-tech

workers, no matter how inexpert, who can interrupt,

upset, and redirect the smooth flow of structured

communications that dictates their positions in the

social networks of exchange and determines the

temporality of their work schedules. To put it in

these terms, however, is not to offer any universal

definition of hacker agency. There are many social

agents, for example, in job locations that are

dependent upon the hope of technological _reskilling_,

for whom sabotage or disruption of communicative

rationality is of little use; for such people,

definitions of hacking that are reconstructive, rather

than deconstructive, are more appropriate. A good

example is the crucial role of worker technoliteracy in

the struggle of labor against automation and

deskilling. When worker education classes in computer

programming were discontinued by management at the Ford

Rouge plant in Dearborn, Michigan, union (UAW) members

began to publish a newsletter called the _Amateur

Computerist_ to fill the gap.^22^ Among the columnists

and correspondents in the magazine have been veterans

of the Flint sit-down strikes who see a clear

historical continuity between the problem of labor

organization in the thirties and the problem of

automation and deskilling today. Workers' computer

literacy is seen as essential not only to the

demystification of the computer and the reskilling of

workers, but also to labor's capacity to intervene in

decisions about new technologies that might result in

shorter hours and thus in "work efficiency" rather than

worker efficiency.

[30] The three social locations I have mentioned above

all express different class relations to technology:

the location of an apprentice technical elite,

conventionally associated with the term "hacking"; the

location of the female high-tech office worker,

involved in "sabotage"; and the location of the shop-

floor worker, whose future depends on technological

reskilling. All therefore exhibit different ways of

_claiming back_ time dictated and appropriated by

technological processes, and of establishing some form

of independent control over the work relation so

determined by the new technologies. All, then, fall

under a broad understanding of the politics involved in

any extended description of hacker activities.

[This file is continued in ROSS-2 990]

[Andrew Ross, "Hacking Away at the Counter-culture,"

   part 2, continued from ROSS-1 990.  Distributed by
   _Postmodern Culture_ in vol. 1, no. 1 (Sep. 1990);
   copyright (c) 1990 by Andrew Ross, all rights reserved]

_The Culture and Technology Question_

[31] Faced with these proliferating practices in the

workplace, on the teenage cult fringe, and increasingly

in mainstream entertainment, where, over the last five

years, the cyberpunk sensibility in popular fiction,

film, and television has caught the romance of the

popular taste for the outlaw technology of

human/machine interfaces, we are obliged, I think, to

ask old kinds of questions about the new silicon order

which the evangelists of information technology have

been deliriously proclaiming for more than twenty

years. The postindustrialists' picture of a world of

freedom and abundance projects a sunny millenarian

future devoid of work drudgery and ecological

degradation. This sunny social order, cybernetically

wired up, is presented as an advanced evolutionary

phase of society in accord with Enlightenment ideals of

progress and rationality. By contrast, critics of this

idealism see only a frightening advance in the

technologies of social control, whose owners and

sponsors are efficiently shaping a society, as Kevin

Robins and Frank Webster put it, of "slaves without

Athens" that is actually the inverse of the "Athens

without slaves" promised by the silicon

positivists.^23^

[32] It is clear that one of the political features of

the new post-Fordist order–economically marked by

short-run production, diverse taste markets, flexible

specialization, and product differentiation–is that

the New Right has managed to appropriate not only the

utopian language and values of the alternative

technology movements but also the marxist discourse of

the "withering away of the state" and the more

compassionate vision of local, decentralized

communications first espoused by the libertarian left.

It must be recognized that these are very popular

themes and visions, (advanced most famously by Alvin

Toffler and the neoliberal Atari Democrats, though also

by leftist thinkers such as Andre Gortz, Rudolf Bahro,

and Alain Touraine)–much more popular, for example,

than the tradition of centralized technocratic planning

espoused by the left under the Fordist model of mass

production and consumption.^24^ Against the

postindustrialists' millenarian picture of a

postscarcity harmony, in which citizens enjoy

decentralized, access to free-flowing information, it

is necessary, however, to emphasise how and where

actually existing cybernetic capitalism presents a

gross caricature of such a postscarcity society.

[33] One of the stories told by the critical left about

new cultural technologies is that of monolithic,

panoptical social control, effortlessly achieved

through a smooth, endlessly interlocking system of

networks of surveillance. In this narrative,

information technology is seen as the most despotic

mode of domination yet, generating not just a

revolution in capitalist production but also a

revolution in living–"social Taylorism"–that touches

all cultural and social spheres in the home and in the

workplace.^25^ Through routine gathering of

information about transactions, consumer preferences,

and creditworthiness, a harvest of information about

any individual's whereabouts and movements, tastes,

desires, contacts, friends, associates, and patterns of

work and recreation becomes available in the form of

dossiers sold on the tradable information market, or is

endlessly convertible into other forms of intelligence

through computer matching. Advanced pattern

recognition technologies facilitate the process of

surveillance, while data encryption protects it from

public accountability.^26^

[34] While the debate about privacy has triggered

public consciousness about these excesses, the liberal

discourse about ethics and damage control in which that

debate has been conducted falls short of the more

comprehensive analysis of social control and social

management offered by left political economists.

According to one marxist analysis, information is seen

as a new kind of commodity resource which marks a break

with past modes of production and that is becoming the

essential site of capital accumulation in the world

economy. What happens, then, in the process by which

information, gathered up by data scavenging in the

transactional sphere, is systematically converted into

intelligence? A surplus value is created for use

elsewhere. This surplus information value is more than

is needed for public surveillance; it is often

information, or intelligence, culled from consumer

polling or statistical analysis of transactional

behavior, that has no immediate use in the process of

routine public surveillance. Indeed, it is this

surplus, bureaucratic capital that is used for the

purpose of forecasting social futures, and consequently

applied to the task of managing the behavior of mass or

aggregate units within those social futures. This

surplus intelligence becomes the basis of a whole new

industry of futures research which relies upon computer

technology to simulate and forecast the shape,

activity, and behavior of complex social systems. The

result is a possible system of social management that

far transcends the questions about surveillance that

have been at the discursive center of the privacy

debate.^27^

[35] To further challenge the idealists' vision of

postindustrial light and magic, we need only look

inside the semiconductor workplace itself, which is

home to the most toxic chemicals known to man (and

woman, especially since women of color often make up

the majority of the microelectronics labor force), and

where worker illness is measured not in quantities of

blood spilled on the shop floor but in the less visible

forms of chromosome damage, shrunken testicles,

miscarriages, premature deliveries, and severe birth

defects. In addition to the extraordinarily high

stress patterns of VDT operators, semiconductor workers

exhibit an occupational illness rate that even by the

late seventies was three times higher than that of

manufacturing workers, at least until the federal rules

for recognizing and defining levels of injury were

changed under the Reagan administration. Protection

gear is designed to protect the product and the clean

room from the workers, and not vice versa. Recently,

immunological health problems have begun to appear that

can be described only as a kind of chemically induced

AIDS, rendering the T-cells dysfunctional rather than

depleting them like virally induced AIDS.^28^ In

corporate offices, the use of keystroke software to

monitor and pace office workers has become a routine

part of job performance evaluation programs. Some 70

percent of corporations use electronic surveillance or

other forms of quantitative monitoring on their

workers. Every bodily movement can be checked and

measured, especially trips to the toilet. Federal

deregulation has meant that the limits of employee work

space have shrunk, in some government offices, below

that required by law for a two-hundred pound laboratory

pig.^29^ Critics of the labor process seem to have

sound reasons to believe that rationalization and

quantification are at last entering their most

primitive phase.

[36] These, then, are some of the features of the

critical left position–or what is sometimes referred

to as the "paranoid" position–on information

technology, which imagines or constructs a totalizing,

monolithic picture of systematic domination. While

this story is often characterized as conspiracy theory,

its targets–technorationality, bureaucratic

capitalism–are usually too abstract to fit the picture

of a social order planned and shaped by a small,

conspiring group of centralized power elites.

Although I believe that this story, when told inside

and outside the classroom, for example, is an

indispensable form of "consciousness-raising," it is

not always the best story to tell.

[37] While I am not comfortable with the "paranoid"

labelling, I would argue that such narratives do little

to discourage paranoia. The critical habit of finding

unrelieved domination everywhere has certain

consequences, one of which is to create a siege

mentality, reinforcing the inertia, helplessness, and

despair that such critiques set out to oppose in the

first place. What follows is a politics that can speak

only from a victim's position. And when knowledge

about surveillance is presented as systematic and

infallible, self-censoring is sure to follow. In the

psychosocial climate of fear and phobia aroused by the

virus scare, there is a responsibility not to be

alarmist or to be scared, especially when, as I have

argued, such moments are profitably seized upon by the

sponsors of control technology. In short, the picture

of a seamlessly panoptical network of surveillance may

be the result of a rather undemocratic, not to mention

unsocialistic, way of thinking, predicated upon the

recognition of people solely as victims. It is

redolent of the old sociological models of mass society

and mass culture, which cast the majority of society as

passive and lobotomized in the face of the cultural

patterns of modernization. To emphasize, as Robins and

Webster and others have done, the power of the new

technologies to despotically transform the "rhythm,

texture, and experience" of everyday life, and meet

with no resistance in doing so, is not only to cleave,

finally, to an epistemology of technological

determinism, but also to dismiss the capacity of people

to make their own uses of new technologies.^30^

[38] The seamless "interlocking" of public and private

networks of information and intelligence is not as

smooth and even as the critical school of hard

domination would suggest. In any case, compulsive

gathering of information is no _guarantee_ that any

interpretive sense will be made of the files or

dossiers, while some would argue that the increasingly

covert nature of surveillance is a sign that the

"campaign" for social control is not going well. One

of the most pervasive popular arguments against the

panoptical intentions of the masters of technology is

that their systems do not work. Every successful hack

or computer crime in some way reinforces the popular

perception that information systems are not infallible.

And the announcements of military-industrial

spokespersons that the fully automated battlefield is

on its way run up against an accumulated stock of

popular skepticism about the operative capacity of

weapons systems. These misgivings are born of decades

of distrust for the plans and intentions of the

military-industrial complex, and were quite evident in

the widespread cynicism about the Strategic Defense

Initiative. Just to take one empirical example of

unreliability, the military communications system

worked so poorly and so farcically during the U.S.

invasion of Grenada that commanders had to call each

other on pay phones: ever since then, the command-and-

control code of Arpanet technocrats has been C5–

Command, Control, Communication, Computers, and

Confusion.^31^ It could be said, of course, that the

invasion of Grenada did, after all, succeed, but the

more complex and inefficiency-prone such high-tech

invasions become (Vietnam is still the best example),

the less likely they are to be undertaken with any

guarantee of success.

[39] I am not suggesting that alternatives can be

forged simply by encouraging disbelief in the

infallibility of existing technologies (pointing to

examples of the appropriation of technologies for

radical uses, of course, always provides more visibly

satisfying evidence of empowerment), but

technoskepticism, while not a _sufficient_ condition of

social change, is a _necessary_ condition. Stocks of

popular technoskepticism are crucial to the task of

eroding the legitimacy of those cultural values that

prepare the way for new technological developments:

values and principles such as the inevitability of

material progress, the "emancipatory" domination of

nature, the innovative autonomy of machines, the

efficiency codes of pragmatism, and the linear

juggernaut of liberal Enlightenment rationality–all

increasingly under close critical scrutiny as a wave of

environmental consciousness sweeps through the

electorates of the West. Technologies do not shape or

determine such values. These values already exist

before the technologies, and the fact that they have

become deeply embodied in the structure of popular

needs and desires then provides the green light for the

acceptance of certain kinds of technology. The

principal rationale for introducing new technologies is

that they answer to already existing intentions and

demands that may be perceived as "subjective" but that

are never actually within the control of any single set

of conspiring individuals. As Marike Finlay has

argued, just as technology is only possible in given

discursive situations, one of which being the desire of

people to have it for reasons of empowerment, so

capitalism is merely the site, and not the source, of

the power that is often autonomously attributed to the

owners and sponsors of technology.^32^

[40] In fact, there is no frame of technological

inevitability that has not already interacted with

popular needs and desires, no introduction of new

machineries of control that has not already been

negotiated to some degree in the arena of popular

consent. Thus the power to design architecture that

incorporates different values must arise from the

popular perception that existing technologies are not

the only ones, nor are they the best when it comes to

individual and collective empowerment. It was this

kind of perception–formed around the distrust of big,

impersonal, "closed" hardware systems, and the desire

for small, decentralized, interactive machines to

facilitate interpersonal communication–that "built"

the PC out of hacking expertise in the early seventies.

These were as much the partial "intentions" behind the

development of microcomputing technology as deskilling,

monitoring, and information gathering are the

intentions behind the corporate use of that technology

today. The growth of public data networks, bulletin

board systems, alternative information and media links,

and the increasing cheapness of desktop publishing,

satellite equipment, and international data bases are

as much the result of local political "intentions" as

the fortified net of globally linked, restricted-access

information systems is the intentional fantasy of those

who seek to profit from centralised control. The

picture that emerges from this mapping of intentions is

not an inevitably technofascist one, but rather the

uneven result of cultural struggles over values and

meanings.

[41] It is in this respect–in the struggle over values

and meanings–that the work of cultural criticism takes

on its special significance as a full participant in

the debate about technology. In fact, cultural

criticism is already fully implicated in that debate,

if only because the culture and education industries

are rapidly becoming integrated within the vast

information service conglomerates. The media we study,

the media we publish in, and the media we teach within

are increasingly part of the same tradable information

sector. So, too, our common intellectual discourse has

been significantly affected by the recent debates about

postmodernism (or culture in a postindustrial world) in

which the euphoric, addictive thrill of the

technological sublime has figured quite prominently.

The high-speed technological fascination that is

characteristic of the postmodern condition can be read,

on the one hand, as a celebratory capitulation on the

part of intellectuals to the new information

technocultures. On the other hand, this celebratory

strain attests to the persuasive affect associated with

the new cultural technologies, to their capacity (more

powerful than that of their sponsors and promoters) to

generate pleasure and gratification and to win the

struggle for intellectual as well as popular consent.

[42] Another reason for the involvement of cultural

critics in the technology debates has to do with our

special critical knowledge of the way in which cultural

meanings are produced–our knowledge about the politics

of consumption and what is often called the politics of

representation. This is the knowledge which

demonstrates that there are limits to the capacity of

productive forces to shape and determine consciousness.

It is a knowledge that insists on the ideological or

interpretive dimension of technology as a culture which

can and must be used and consumed in a variety of ways

that are not reducible to the intentions of any single

source or producer, and whose meanings cannot simply be

read off as evidence of faultless social reproduction.

It is a knowledge, in short, which refuses to add to

the "hard domination" picture of disenfranchised

individuals watched over by some by some scheming

panoptical intelligence. Far from being understood

solely as the concrete hardware of electronically

sophisticated objects, technology must be seen as a

lived, interpretive practice for people in their

everyday lives. To redefine the shape and form of that

practice is to help create the need for new kinds of

hardware and software.

[43] One of the latter aims of this essay has been to

describe and suggest a wider set of activities and

social locations than is normally associated with the

practice of hacking. If there is a challenge here for

cultural critics, then it might be presented as the

challenge to make our knowledge about technoculture

into something like a hacker's knowledge, capable of

penetrating existing systems of rationality that might

otherwise be seen as infallible; a hacker's knowledge,

capable of reskilling, and therefore of rewriting the

cultural programs and reprogramming the social values

that make room for new technologies; a hacker's

knowledge, capable also of generating new popular

romances around the alternative uses of human

ingenuity. If we are to take up that challenge, we

cannot afford to give up what technoliteracy we have

acquired in deference to the vulgar faith that tells us

it is always acquired in complicity, and is thus

contaminated by the poison of instrumental rationality,

or because we hear, often from the same quarters, that

acquired technological competence simply glorifies the

inhuman work ethic. Technoliteracy, for us, is the

challenge to make a historical opportunity out of a

historical necessity.

___

NOTES

1. Bryan Kocher, "A Hygiene Lesson,"

   _Communications of the ACM_, 32.1 (January 1989): 3.

2. Jon A. Rochlis and Mark W. Eichen, "With

   Microscope and Tweezers: The Worm from MIT's
   Perspective," _Communications of the ACM_, 32.6 (June
   1989): 697.

3. Philip Elmer-DeWitt, "Invasion of the Body

   Snatchers," _Time_ (26 September 1988); 62-67.

4. Judith Williamson, "Every Virus Tells a Story:

   The Meaning of HIV and AIDS," _Taking Liberties: AIDS
   and Cultural Politics_, ed. Erica Carter and Simon
   Watney (London: Serpent's Tail/ICA, 1989): 69.

5. "Pulsing the system" is a well-known

   intelligence process in which, for example, planes
   deliberately fly over enemy radar installations in
   order to determine what frequencies they use and how
   they are arranged.  It has been suggested that Morris
   Sr. and Morris Jr. worked in collusion as part of an
   NSA operation to pulse the Internet system, and to
   generate public support for a legal clampdown on
   hacking.  See Allan Lundell, _Virus! The Secret World
   of Computer Invaders That Breed and Destroy_ (Chicago:
   Contemporary Books, 1989), 12-18.  As is the case with
   all such conspiracy theories, no actual conspiracy need
   have existed for the consequences--in this case, the
   benefits for the intelligence community--to have been
   more or less the same.

6. For details of these raids, see _2600: The

   Hacker's Quarterly_, 7.1 (Spring 1990): 7.

7. "Hackers in Jail," _2600: The Hacker's

   Quarterly_, 6.1 (Spring 1989); 22-23.  The recent
   Secret Service action that shut down _Phrack_, an
   electronic newsletter operating out of St. Louis,
   confirms _2600_'s thesis: a nonelectronic publication
   would not be censored in the same way.

8. This is not to say that the new laws cannot

   themselves be used to protect hacker institutions,
   however.  _2600_ has advised operators of bulletin
   boards to declare them private property, thereby
   guaranteeing protection under the Electronic Privacy
   Act against unauthorized entry by the FBI.

9. Hugo Cornwall, _The Hacker's Handbook_ 3rd ed.

   (London: Century, 1988) 181, 2-6.  In Britain, for the
   most part, hacking is still looked upon as a matter for
   the civil, rather than the criminal, courts.

10. Discussions about civil liberties and property

   rights, for example, tend to preoccupy most of the
   participants in the electronic forum published as "Is
   Computer Hacking a Crime?" in _Harper's_, 280.1678
   (March 1990): 45-57.

11. See Hugo Cornwall, _Data Theft_ (London:

   Heinemann, 1987).

12. Bill Landreth, _Out of the Inner Circle: The

   True Story of a Computer Intruder Capable of Cracking
   the Nation's Most Secure Computer Systems_ (Redmond,
   Wash.: Tempus, Microsoft, 1989), 10.

13. _The Computer Worm: A Report to the Provost of

   Cornell University on an Investigation Conducted by the
   Commission of Preliminary Enquiry_ (Ithaca, N.Y.:
   Cornell University, 1989).

14. _The Computer Worm: A Report to the Provost_,

   8.

15. A. K. Dewdney, the "computer recreations"

   columnist at _Scientific American_, was the first to
   publicize the details of this game of battle programs
   in an article in the May 1984 issue of the magazine.
   In a follow-up article in March 1985, "A Core War
   Bestiary of Viruses, Worms, and Other Threats to
   Computer Memories," Dewdney described the wide range of
   "software creatures" which readers' responses had
   brought to light.  A third column, in March 1989, was
   written, in an exculpatory mode, to refute any
   connection between his original advertisement of the
   Core War program and the spate of recent viruses.

16. Andrew Ross, _No Respect: Intellectuals and

   Popular Culture_ (New York: Routledge, 1989), 212.
   Some would argue, however, that the ideas and values of
   the sixties counterculture were only fully culminated
   in groups like the People's Computer Company, which ran
   Community Memory in Berkeley, or the Homebrew Computer
   Club, which pioneered personal microcomputing.  So,
   too, the Yippies had seen the need to form YIPL, the
   Youth International Party Line, devoted to "anarcho-
   technological" projects, which put out a newsletter
   called TAP (alternately the Technological American
   Party and the Technological Assistance Program).  In
   its depoliticised form, which eschewed the kind of
   destructive "dark-side" hacking advocated in its
   earlier incarnation, _TAP_ was eventually the
   progenitor of _2600_.  A significant turning point, for
   example, was _TAP_'s decision not to publish plans for
   the hydrogen bomb (which the _Progressive_ did)--bombs
   would destroy the phone system, which the _TAP_ phone
   phreaks had an enthusiastic interest in maintaining.

17. See Alice Bach's _Phreakers_ series, in which

   two teenage girls enjoy adventures through the use of
   computer technology.  _The Bully of Library Place_,
   _Parrot Woman_, _Double Bucky Shanghai_, and _Ragwars_
   (all published by Dell, 1987-88).

18. John Markoff, "Cyberpunks Seek Thrills in

   Computerized Mischief," _New York Times_, November 26,
   1988.

19. Dennis Hayes, _Behind the Silicon Curtain: The

   Seductions of Work in a Lonely Era_ (Boston, South End
   Press, 1989), 93.
        One striking historical precedent for the hacking
   subculture, suggested to me by Carolyn Marvin, was the
   widespread activity of amateur or "ham" wireless
   operators in the first two decades of the century.
   Initially lionized in the press as boy-inventor heroes
   for their technical ingenuity and daring adventures
   with the ether, this white middle-class subculture was
   increasingly demonized by the U.S. Navy (whose signals
   the amateurs prankishly interfered with), which was
   crusading for complete military control of the airwaves
   in the name of national security.  The amateurs lobbied
   with democratic rhetoric for the public's right to
   access the airwaves, and although partially successful
   in their case against the Navy, lost out ultimately to
   big commercial interests when Congress approved the
   creation of a broadcasting monopoly after World War I
   in the form of RCA.  See Susan J. Douglas, _Inventing
   American Broadcasting 1899-1922_ (Baltimore: Johns
   Hopkins University Press, 1987), 187-291.

20. "Sabotage," _Processed World_, 11 (Summer

   1984), 37-38.

21. Hayes, _Behind the Silicon Curtain_, 99.

22. _The Amateur Computerist_, available from R.

   Hauben, PO Box, 4344, Dearborn, MI 48126.

23. Kevin Robins and Frank Webster, "Athens

   Without Slaves...Or Slaves Without Athens?  The
   Neurosis of Technology," _Science as Culture_, 3
   (1988): 7-53.

24. See Boris Frankel, _The Post-Industrial

   Utopians_ (Oxford: Basil Blackwell, 1987).

25. See, for example, the collection of essays

   edited by Vincent Mosco and Janet Wasko, _The Political
   Economy of Information_ (Madison: University of
   Wisconsin Press, 1988), and Dan Schiller, _The
   Information Commodity_ (Oxford UP, forthcoming).

26. Tom Athanasiou and Staff, "Encryption and the

   Dossier Society," _Processed World_, 16 (1986): 12-17.

27. Kevin Wilson, _Technologies of Control: The

   New Interactive Media for the Home_ (Madison:
   University of Wisconsin Press, 1988), 121-25.

28. Hayes, _Behind the Silicon Curtain_, 63-80.

29. "Our Friend the VDT," _Processed World_, 22

   (Summer 1988): 24-25.

30. See Kevin Robins and Frank Webster,

   "Cybernetic Capitalism," in Mosco and Wasko, 44-75.

31. Barbara Garson, _The Electronic Sweatshop_

   (New York: Simon & Schuster, 1988), 244-45.

32. See Marike Finlay's Foucauldian analysis,

   _Powermatics: A Discursive Critique of New Technology_
   (London: Routledge & Kegan Paul, 1987).  A more
   conventional culturalist argument can be found in
   Stephen Hill, _The Tragedy of Technology_ (London:
   Pluto Press, 1988).
/data/webs/external/dokuwiki/data/pages/archive/programming/counterc.txt · Last modified: 1999/08/01 17:20 by 127.0.0.1

Was this page helpful?-11+1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki