1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
|
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=windows-1252">
<META NAME="Generator" CONTENT="Microsoft Word 97">
<TITLE>Riemens, Some Thoughts on the Idea of "Hacker Culture"</TITLE>
<script language="JavaScript">
<!--
function MM_swapImgRestore() { //v3.0
var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
}
function MM_preloadImages() { //v3.0
var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
}
function MM_swapImage() { //v3.0
var i,j=0,x,a=MM_swapImage.arguments; document.MM_sr=new Array; for(i=0;i<(a.length-2);i+=3)
if ((x=MM_findObj(a[i]))!=null){document.MM_sr[j++]=x; if(!x.oSrc) x.oSrc=x.src; x.src=a[i+2];}
}
function MM_findObj(n, d) { //v4.0
var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];
for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers[i].document);
if(!x && document.getElementById) x=document.getElementById(n); return x;
}
//-->
</script>
</HEAD>
<BODY onLoad="MM_preloadImages('../images/monadology_01-over.gif','../images/subsol_01-over.gif','../images/other_worlds_01-over.gif','../images/black_bookbutt_01-over.gif','../images/1_01-over.gif','../images/0_01-over.gif','../images/infinity_01-over.gif','../images/mailbox_01-over.gif')" bgcolor="#FFFFFF" text="#000000" link="#0000FF" vlink="#0000FF" alink="#0000FF">
<table width="77%" border="0" height="299" align="center">
<tr>
<td height="116">
<table width="813" height="115" align="center">
<tr bgcolor="#000000">
<td width="823">
<table width="640" border="0" height="90" align="center" cellpadding="0" cellspacing="0">
<tr bgcolor="#000000">
<td height="2" width="75"> </td>
<td valign="top" height="2" align="right" width="150"><a href="http://subsol.c3.hu/subsol_2/monadology.html" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image6','','../images/monadology_01-over.gif',1)" target="_blank"><img name="Image6" border="0" src="/monadology_01.gif" width="150" height="35"></a></td>
<td valign="middle" align="center" colspan="3" height="2"><a href="http://subsol.c3.hu/subsol_2/index.html" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image1','','../images/subsol_01-over.gif',1)" target="_blank"><img name="Image1" border="0" src="/subsol_01.gif" width="150" height="35"></a></td>
<td valign="top" height="2" width="171"><a href="http://subsol.c3.hu/subsol_2/otherworlds.html" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image3','','../images/other_worlds_01-over.gif',1)" target="_blank"><img name="Image3" border="0" src="/other_worlds_01.gif" width="170" height="35"></a></td>
<td height="2" width="76"> </td>
</tr>
<tr bgcolor="#660000">
<td height="10" colspan="7"><font size="1" color="#660000">a</font></td>
</tr>
<tr>
<td height="8" width="75"> </td>
<td width="150" height="8" align="right" valign="top"><a href="http://subsol.c3.hu/subsol_2/blackbook.html" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image5','','../images/black_bookbutt_01-over.gif',1)" target="_blank"><img name="Image5" border="0" src="/black_bookbutt_01.gif" width="150" height="35"></a></td>
<td width="57" bgcolor="#000000" align="center"><a href="http://subsol.c3.hu/subsol_2/contributors/1_main.html" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image7','','../images/1_01-over.gif',1)" target="_blank"><img name="Image7" border="0" src="/1_01.gif" width="28" height="28"></a></td>
<td width="56" bgcolor="#000000" align="center"><a href="http://subsol.c3.hu/subsol_2/contributors3/0_main.html" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image9','','../images/0_01-over.gif',1)"><img name="Image9" border="0" src="/0_01.gif" width="27" height="27"></a></td>
<td width="55" bgcolor="#000000" align="center"><a href="riemenstext.html#" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image8','','../images/infinity_01-over.gif',1)"><img name="Image8" border="0" src="/infinity_01.gif" width="27" height="27"></a></td>
<td width="171"><a href="http://subsol.c3.hu/subsol_2/mailbox.html" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image4','','../images/mailbox_01-over.gif',1)" target="_blank"><img name="Image4" border="0" src="/mailbox_01.gif" width="170" height="35"></a></td>
<td height="8" width="76"> </td>
</tr>
</table>
</td>
</tr>
</table>
</td>
</tr>
<tr>
<td height="38">
<p> </p>
</td>
</tr>
<tr>
<td valign="top" height="2719">
<p align="center"><font face="Verdana, Arial, Helvetica, sans-serif" size="4" color="#990000"><b>SOME
THOUGHTS ON THE IDEA OF "HACKER CULTURE"<br>
</b></font><br>
<font face="Verdana, Arial, Helvetica, sans-serif" size="4" color="#990000"><b>Patrice
Riemens<br>
<br>
</b></font></p>
<p><font face="Times New Roman, Times, serif" size="3" color="#000000"><i>"The
Theory of 'Free Software' as the seed of a post-capitalist society only
makes sense where it is understood as the exposure of those very contradictions
of the development of productive forces which are relevant to the process
of emancipation. It does not, however, make sense as a discovery of a
format for their deployment out of which would automatically spring forth
a better society. And it does not make sense either as the first stage
of a process that one ought to follow as if it were a blueprint."
("Eight Theses on Liberation," <a href="http://www.oekonux.de/liste/archive/msg04304.html" target="_blank">Oekonux</a>
mailing list)</i></font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">As
the new information and communication technologies (ICT) entered our lives
and became increasingly important in our daily activities, so did all
kinds of knowledge, working habits and ways of thinking that were previously
the exclusive domain of "geeks" and computer experts. Even though
the vast majority of ICT users are passive consumers, a modicum of technological
know-how is more and more prevalent among non-professionals, and these
days, artists, intellectuals, and political activists have become fairly
visible as informed and even innovative actors in what has become known
as the public domain in cyberspace.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">"Hackers,"
also often, but inexactly referred to as "computer pirates"
or other derogatory term, constitute without doubt the first social movement
that was intrinsic to the electronic technology that spawned our networked
society. Hackers, both through their savyness and their actions, have
hit the imagination and have been in the news right from the onset of
the "information age," being either hyped up as bearers of an
independent and autonomous technological mastery, or demonized as potential
"cyber-terrorists" in the process. More recently they have been
hailed in certain "alternative" intellectual and cultural circles
as a countervailing power of sorts against the increasingly oppressive
onslaught of both monopolistic ICT corporations and regulation-obsessed
governments and their experts. Transformed into role-models as effective
resistance fighters against "the system," their garb has been
assumed with various degrees of (de)merit by a plethora of cultural and
political activists associated, closely or loosely, with the "counter-globalization
movement."</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">Yet,
whereas hackers (if we take a broad definition of the term) have been
pioneering the opening up of electronic channels of communication in the
South, in the North, they initially were held in suspicion by those same
circles. Political militants there hesitated for a long time before embarking
into computers and the new media, which they tended to view as "capitalist"
and hence "politically incorrect." By the mid-nineties, however,
"on-line activism" made rapid progress worldwide as more and
more groups adopted the new technologies as tools of action and information
exchange. The dwindling costs of equipment and communication, the (relative)
ease of use, the reliability and security, and the many options that were
offered by ICT were a boon to activists of all possible denominations.
All this was also a very bad surprise to the people at the helm of corporate
and political power, as they saw a swift, substantial, and many-pronged
breakdown of their stranglehold on communication and information taking
place. For some time, it looked like as if a level playing field between
hitherto dominators and dominated had come within sight.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">The
Net, as a result, became not only one of the principal carriers of political
activism, but also one of its major locus and issue. Once they had overcome
their initial shock and surprise, the powers that be were bound to react
forcefully. And they did, beefing up the "protection" of so-called
intellectual property, erecting ever higher walls around expert knowledge
and techniques, and unlashing all-round measures of control and surveillance
on electronic communications. But resistance against this (re)subjugation
of the networks also got organized. Almost by necessity, more and more
activists became conversant with the new technologies, which in the given
circumstances had to be a hands-on learning process. This process saw
activists turning "techies" and "geeks" turning activists
and has resulted in activist circles (political, but also intellectual,
cultural, and artistic) becoming markedly, sometimes completely, ITC-driven.
However, as we will see, this does not ipso facto make them hackers.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">But
it was equally within the domain of ICT itself that the exponential expansion
of both range and carrying capacity of the Internet, as well of that of
the related technologies, and all this within an increasingly aggressive
commercial environment made experts think again about the consequences
of these developments and even reconsider their methods, opinion, and
for quite a few of them, their position within the hitherto obtaining
order of things. Rejecting the new enclosures that are being imposed on
the dissemination of knowledge and techniques by commercial and/or state
interests, they are exploring new avenues of developing, spreading, and
also rewarding knowledge-building that are not exploitative and monopolistic
or even solely profit-oriented. Hence the flight taken by various software
programs, utilities and application modalities that have become known
under the generic name of Linux, Free Software, Open Source, and General
Public License (for definitions, see www.gnu.org).</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">De
prime abord, these developments suggest that given these technological
settings and socio-economic and political circumstances, convergence was
bound to take place between the actors involved, meaning a merger between
hackers and (political, cultural etc) activists since they were spreading
the same message, and operated in parallel ways under similar threats.
Unfortunately, this interpretation is as unwarranted in its optimism as
it is precipitate in its formulation. Following a line of reasoning aptly
called by the Dutch "the wish is the mother of the idea," such
interpretation is based on the assumed relation, not to say equivalence,
between individuals and groups, and between pursuits, motives, and methods
whose affinities and linkages, even when viewed under the designation
of "new social movements," are far from evident. In fact the
alleged congruence is inherently unstable since it is contingent, and
the supposedly common positions between those two groups are often absent
altogether, and sometimes even contradictory. Whereas it would be excessive
to portray hackers and activists in terms of "never shall the twins
met," the idea, asserted by many a political activist and certain
"public intellectuals," to the effect that their coalescence
is both natural and inevitable is equally outlandish. Not only does it
run roughshod of the sensibilities of "authentic" hackers -
and it does so unfortuitously - it also misrepresents reality hence giving
rise to erroneous hypothesizes and unwarranted expectations.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">"Hacker
culture," a concept one often encounters these days among networked
activists, purports to represent this playful confluence between tech
wizardry and the moral high ground. Hence, "Open Source" is
fast becoming an omnibus framework and a near-universal tool-kit to tackle
very diverse social issues, such as artistic production, law, epistemology,
education, and a few others, which are but remotely - if at all - related
to the field of software research and development, and the social environments
from which it originates. There is little wrong in itself to this - imitation
being the best of compliments - but for the fact that it tends to obscure
a sticky problem. Between hackers and activists often looms a wide gap
in approach and attitude that is just too critical to be easily papered
away. And it is precisely this fundamental difference that is usually
being hushed up by the evangelists of what I call the "hackers-activists
bhai-bhai" gospel - phrased after the celebrated slogan mouthed by
Chinese and Indian Ministers in 1953: "Hindi-Chini Bhai-Bhai"
("India and China are Brothers") … nine years later, both countries
were at war. A good, if a contrario, example of a really occurring non-equivalence
between political activists applying ICT and hackers is provided by that
spurious hybrid known as "hacktivism." "Hacktivism"
was originally coined by the Boston-based hackers "Cult of the Dead
Cow" (www.cultdeadcow.com), whose tag-line read "We put the
hack in activism." It was all about using ICT skills to thwart attacks
on liberties by powerful institutions. The group later had to defend itself
of guilt by association with respect to recent manifestations of "hacktivism"
as Distributed Denial of Services (DoDS) attacks.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">Behind
the so-called "Hacker Ethic" is the usual, daily activity of
hackers. To put it very simply, without going deeper into its precise
content, the hacker ethic runs strikingly parallel to the formula "l'art
pour l'art." What matters here, is the realization that, unlike activists,
hackers are focused on the pursuit of knowledge and the exercise of curiosity
for its own sake. Therefore, the obligations that derive from the hacker
ethic are perceived by genuine hackers as sovereign and not instrumental,
and always prevail above other aims or interests, whatever these may be
- and if there are any at all. This consequently makes the hackers movement
to be wary of any particular blueprint of society, however alternative,
and even adverse to embrace particular antagonism (some hackers, and not
minor ones, are for instance loath to demonize the Microsoft Corporation).
Hence the spread of political and philosophical opinions harbored by individual
hackers, without any loss of their feeling of identity and belonging to
the "movement" at large or even their particular group, is truly
astonishing, and very unlikely to obtain within any other "new social
movement." In fact, the militant defense of individual liberties
and a penchant for rather unegalitarian economic convictions one encounters
in tandem among a good many hackers has provided for bafflement among
networked political (i.e. left-leaning) activists coming to be better
acquainted with their "natural allies." Yet it is neither fortuitous
nor aberrant that the Californian transmutation of libertarianism enjoys
such widespread support among hackers.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">The
existence of such "ideological" positions has its reflection
in the daily and usual activities of hackers, which are generally characterized
by an absence of preconceived ideas and positions. Despite the avowed
"end of the great narratives," this is not the case with political
activists, since they do have objectives and aims that precede their actions.
Hackers, on the other hand, are usually happy with the "mere,"
but unrestricted, pursuit of knowledge, which reduces their "political
program," if that can be so called, to the freedom of learning and
enquiry, and thus would seem to fall very much short of demands for justice,
equality, emancipation, empowerment, etc that are formulated by political
militants. Yet they seem to be content with it, and there are good arguments
to think that such a program, as limited as it may sound, is essential,
not subsequent, to the achievement of the better society we all aspire
too.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">This
being said, the points of convergence between the activities of hackers
and those of (political) activists are many, and they increase by the
day. It is becoming more and more evident that both groups face the same
threats, and the same adversaries. As expert technological knowledge -
especially of ITC - that sits outside the formally structured (and shielded)
domains of corporate or political power gets evermore vilified in the
shape of "(cyber)-terrorist" fantasies, paranoia, and finally,
repression, while at the same time this very expertise is increasingly
being mastered and put to use by the enemies of the neo-liberal "One
Idea System," stronger, if circumstantial, links are being welded
between hackers and activists. And these linkages are likely to deepen
and endure in the same measure as the hostility and risks both groups
are likely to encounter augment, it is worthwhile to analyze what unites
as well as what separates them.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">"Hacktivist"
activities (and I am mostly referring here to the handywork of three groups,
Electronic Disturbance Theater, Electrohippies and RTMark), well advertised
by their authors, but also gleefully reported in the mainstream media,
are illustrative of the gap that parts activists from hackers. The former
usually view "hacktivism," which exploits the innumerable glitches
and weaknesses of ICT systems to destabilize the electronic communication
supports of "enemy organs" (government agencies, big corporations,
international financial institutions, "fascist" groups, etc.),
as a spectacular form of resistance and sabotage. The latter (generally)
take a much dimmer view, considering these activities as ineffective and
futile, and moreover, in most cases, technically inept as well. Such activities
(or antics) endanger the integrity of the network which hackers consider
to be theirs also. "Denial of Service" attacks, irrespective
of aims and targets, amount in their eyes to attacks on the freedom of
expression, which they seem to respect in a much more principled manner
than most political activists.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">The
truth is, that by abetting "hacktivism," activists implicitly
admit that the net has become a mere corporate carrier, to which they
have only a subordinate, almost clandestine, access, as opposed to be
stakeholders in, and thus sharing responsibility for it. This constitutes
their fundamental divergence with hackers, and it is not easily remediable.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">Political
activists are also, almost by definition, inclined to seek maximum media
exposure for their ideas and actions. Their activities, therefore, tend
to be public in all the acceptations of the term. The range of issues
that are covered by their ideals, and the variety of means and methods
to achieve the same make they need some form of organization, which is
often complex, because of and not despite the fact they strive for distribution
and horizontality. The result is that even in the most alternative of
circles, an apparatus and leaders appear, whose very informality obscures
rather than prevent hierarchies from arising. This does not suit well
the practice and the ethics of hackers, which Pekka Himanen has described
as "monastic" (www.hackersethic.org). The habitus may be monastic,
the behavior of hackers may however, perhaps be more suitably paralleled
with the "Slashta," the Polish gentry. There too, we see a desire
between equals, that is equals recognized as such beforehand, and hence
also elitist. Political activists on the other hand are much more opportunistic
when it comes to alliances and associations they engage in.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000">So
does the idea of "hacker culture" represent an effective way
to describe and define certain current modes of political activism, especially
when those do have a large ICT component? In many instances where the
term is being used, to the point of having become one of the "buzz-word
du jour," I do not believe so. In many cases, it is the romantic
appeal of what is perceived as hacker power and prowess that leads to
a superficial adoption of the "hacker attitude" moniker by the
cultural and political activists, but not of its underlying methods and
values. That does not mean that there exists an absolute incompatibility
between those two groups, and there are fortunately cases suggesting the
existence of a continuum - such as the Indymedia tech community's pairing
of expertise to a "serve the people" type of operation (tech.indymedia.org,
www.anarchogeek.com). But it should caution against a facile (and trendy)
assumption of an equivalence, and maybe against the confusion-inducing
use of the term "hacker culture" itself.</font></p>
<p><font face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000000"><br>
<i><font face="Times New Roman, Times, serif" size="3">This article first
appeared in French in <a href="http://www.samizdat.net/multitudes" target="_blank">Multitudes</a>,
Vol 2, No 8, March-April 2002, and in (an expanded) English translation
in <a href="http://cryptome.org/hacker-idea.htm" target="_blank">Cryptome</a>
on June 3, 2002.<br>
</font></i></font><br>
</p>
<p align="center"><b><font face="Arial, Helvetica, sans-serif" size="2" color="#000000"><a href="http://subsol.c3.hu/subsol_2/contributors3/riemensbio.html" target="_self"><font size="3">about
Patrice Riemens >></font></a></font></b></p>
</td>
</tr>
</table>
<blockquote>
<blockquote>
<p align="center"><br>
</p>
</blockquote>
</blockquote>
<p> </p>
<p> </p>
</BODY>
</HTML>
|