mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-20 01:41:20 +02:00
2165 lines
51 KiB
Plaintext
2165 lines
51 KiB
Plaintext
|
|
|
|
Concordia University, Montreal, Quebec
|
|
|
|
Dept. of Sociology and Anthropology
|
|
|
|
|
|
|
|
Honours Seminar - Soci 409/3
|
|
|
|
Submitted April 27, 1994
|
|
|
|
--------------------------------------
|
|
|
|
|
|
|
|
Computer Hackers: Rebels With a Cause
|
|
|
|
|
|
|
|
by Tanja S. Rosteck
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Introduction
|
|
|
|
|
|
|
|
|
|
|
|
Since the introduction of the personal computer in the late
|
|
|
|
1970s, the vocation of computer hacking has not only grown in scope
|
|
|
|
and membership, but the dynamics of the institution have changed as
|
|
|
|
well, as a result of the changing role of technology in society.
|
|
|
|
Consequently, the public image of the "typical" hacker has been
|
|
|
|
transformed from harmless nerd to malicious techno-criminal.
|
|
|
|
Fuelled by media sensationalism and corporate zealousness, their
|
|
|
|
activities have been criminalized and hackers are now being legally
|
|
|
|
persecuted on a scale disproportional to the actual threat they
|
|
|
|
pose. Hackers want their motivations and ethics to be viewed as
|
|
|
|
legitimate, or at least understood, instead of being simply written
|
|
|
|
off as devious teenagers who have nothing better to do than crash
|
|
|
|
every available computer.
|
|
|
|
|
|
|
|
Despite this, there has not been much sociological research
|
|
|
|
done on hackers and their culture. I find this strange; the
|
|
|
|
academic community widely accepts the concept of the "Information
|
|
|
|
Society", yet this future version of common society has not been
|
|
|
|
given its due within the discipline of sociology. The prospect of
|
|
|
|
a dual-class society, in which the population is segregated into
|
|
|
|
the information-rich and the information-poor, certainly qualifies
|
|
|
|
as a serious social problem. The computer hacker community, and
|
|
|
|
the important role this subculture plays in the Information
|
|
|
|
Society, must therefore be studied with equal attention.
|
|
|
|
|
|
|
|
Most of the available studies approach the subject from one of
|
|
|
|
two perspectives: one, a criminological perspective, employing
|
|
|
|
deviance theory to explain the formation and organization of the
|
|
|
|
hacker community; two, a civil-liberties approach that focuses on
|
|
|
|
current computer-crime laws and how apprehended hackers are being
|
|
|
|
denied their Constitutional rights. (All such studies focus on
|
|
|
|
United States constitutional law - a similar comprehensive
|
|
|
|
treatment on Canadian hackers has not yet been done.)
|
|
|
|
|
|
|
|
Although these approaches are essential to understanding the
|
|
|
|
hacker culture, it must be also be studied from a number of diverse
|
|
|
|
perspectives in order to properly show its depth and richness of
|
|
|
|
content. Therefore, this project will analyze the hacking
|
|
|
|
subculture as a form of organized revolutionary collective, by
|
|
|
|
utilizing a theory of social movements developed by Stewart, Smith,
|
|
|
|
and Denton (1984). Through its activities, this subculture
|
|
|
|
actually plays a vital role in the progression of technology, and
|
|
|
|
also performs a regulatory function for social control, by
|
|
|
|
protesting, mocking, and subtly undermining state and corporate
|
|
|
|
control through computers and related technologies.
|
|
|
|
|
|
|
|
It will be shown that the hacker's relatively harmless
|
|
|
|
activities are forms of such protest; yet, this cannot be
|
|
|
|
effectively vocalized to the public because of the nature of the
|
|
|
|
activities, ie., hacking is widely considered illegal. As with any
|
|
|
|
revolutionary subculture, the hacking movement is stigmatized,
|
|
|
|
discredited, and persecuted by the media and corporate culture as
|
|
|
|
juvenile, disruptive, and criminal. And, all the while, being
|
|
|
|
generally misunderstood. Because of this problem, it is necessary
|
|
|
|
to bring the hacker's plight to the attention of sociologists
|
|
|
|
through a theoretical framework; that is the primary purpose of
|
|
|
|
this paper.
|
|
|
|
|
|
|
|
Because of the lack of current, comprehensive studies
|
|
|
|
available, this is a largely exploratory project. By surveying
|
|
|
|
common hacker communications, the various social and political
|
|
|
|
themes of their activities can be examined, and conclusions drawn
|
|
|
|
about what hacking represents for the participants. Hacker
|
|
|
|
communications on electronic bulletin board systems (BBSes) -
|
|
|
|
electronic message and file transfer bases that are connected to by
|
|
|
|
a computer and modem - are generally considered "underground".
|
|
|
|
Private, heavily screened, and generally short-lived, these
|
|
|
|
bulletin boards are invisible to the general public, and most
|
|
|
|
require private invitation. Such types of communication are
|
|
|
|
therefore difficult to observe and study; a different channel of
|
|
|
|
hacker communication will be utilized here.
|
|
|
|
|
|
|
|
As with any subculture which has been sparsely studied,
|
|
|
|
various definitions of what constitutes a "hacker" abound, and
|
|
|
|
these definitions vary according to the socio-political position of
|
|
|
|
the defining group or individual. For the purposes of this study,
|
|
|
|
hackers are defined as computer enthusiasts who have an ardent
|
|
|
|
interest in learning about computer systems and how to use them in
|
|
|
|
innovative ways (Denning, 1991:25).
|
|
|
|
|
|
|
|
This definition, therefore, does not include, for instance,
|
|
|
|
malicious hackers who deliberately crash systems and delete files,
|
|
|
|
but those hackers who explore systems purely for the intellectual
|
|
|
|
challenge and leave no traces of their wanderings. In addition,
|
|
|
|
there are often misuses of the term, as the computer underground is
|
|
|
|
made up of not only hackers, but other kinds of computer
|
|
|
|
enthusiasts - for instance, phreakers, software pirates, and
|
|
|
|
carders as well. For a complete discussion of the organization and
|
|
|
|
topography of the computer underground, see Meyer, "The Social
|
|
|
|
Organization of the Computer Underground", 1989.
|
|
|
|
|
|
|
|
|
|
|
|
Literature Review
|
|
|
|
|
|
|
|
As previously mentioned, the hacker culture is a relatively
|
|
|
|
new phenomenon and major writings on it have only begun to surface
|
|
|
|
in the past 10 years, beginning with the 1984 publication of Steven
|
|
|
|
Levy's landmark work, _Hackers: Heroes of the Computer Revolution_.
|
|
|
|
Levy examines the evolution of the Hacker Ethic, a sextet of credos
|
|
|
|
that emerged from the activities of the "pioneer" hackers of the
|
|
|
|
late 1950s:
|
|
|
|
|
|
|
|
1. Always yield the Hands-On Imperative! Access to
|
|
|
|
computers - and anything else which might teach you
|
|
|
|
about the way the world works - should be unlimited
|
|
|
|
and total.
|
|
|
|
|
|
|
|
2. All information should be free.
|
|
|
|
|
|
|
|
3. Mistrust Authority - Promote Decentralization.
|
|
|
|
|
|
|
|
4. Hackers should be judged by their hacking, not
|
|
|
|
bogus criteria such as degrees, age, race, or
|
|
|
|
position.
|
|
|
|
|
|
|
|
5. You can create art and beauty on a computer.
|
|
|
|
|
|
|
|
6. Computers can change your life for the better.
|
|
|
|
|
|
|
|
(Levy, 1984)
|
|
|
|
|
|
|
|
|
|
|
|
This original code of ethics forms the political basis of the
|
|
|
|
modern hacker's activities. Although the methods used by the
|
|
|
|
hacking community have changed somewhat over time, the principal
|
|
|
|
motivations and ethics have remained the same. This point is
|
|
|
|
reiterated in several studies and commentaries (Felsenstein, 1992;
|
|
|
|
Meyer, 1989; Sterling, 1992). There is also much support for the
|
|
|
|
contention that the hacking community is rich in cultural diversity
|
|
|
|
(Levy, 1984; Hafner and Markoff, 1991; Meyer and Thomas, 1990;
|
|
|
|
Wessels, 1990).
|
|
|
|
|
|
|
|
However, contradictory findings are available; there are also
|
|
|
|
those studies and media reports that reinforce the stereotypical
|
|
|
|
image of the hacker as a teenage loner, devoid of social skills,
|
|
|
|
who is often petty and malicious in their actions and hold
|
|
|
|
absolutely no morals or ethics whatsoever (Forester, 1987; Parker,
|
|
|
|
1991; Stoll, 1989; Turkle, 1983). Sensationalist "pop culture" TV
|
|
|
|
shows such as Geraldo and NBC Dateline have featured episodes on
|
|
|
|
hackers; such episodes are wildly exaggerated in their claims and
|
|
|
|
portray the featured teenage hackers as brilliant-but-devious
|
|
|
|
thieves that spend their days stealing credit information.
|
|
|
|
|
|
|
|
These latter works are often ill-researched; their opinions
|
|
|
|
and "facts" come not from extensive observation, contact with the
|
|
|
|
diverse hacker community, or investigations into the motivations
|
|
|
|
behind the actions of hackers, but rather from media reports and/or
|
|
|
|
encounters with only one particular breed of hacker. To base
|
|
|
|
entire judgements on the findings from a segment of a culture,
|
|
|
|
rather than a representative whole, leads to inaccurate reports and
|
|
|
|
certainly does the hacker community no good in having their side
|
|
|
|
properly understood.
|
|
|
|
|
|
|
|
Reports like these simply perpetuate the popular image of the
|
|
|
|
lonesome computer criminal, without making crucial divisions
|
|
|
|
between the anarchists and the explorers, for instance. Yes, there
|
|
|
|
_are_ hackers who destroy files and crash systems intentionally, but
|
|
|
|
they certainly do not comprise the overwhelming majority of
|
|
|
|
hackers; they are in fact only a small percentage. Many hackers,
|
|
|
|
as is their primary intention, go completely unnoticed on the
|
|
|
|
systems they choose to hack and are never discovered. Leaving no
|
|
|
|
path or trace is of the utmost importance to hackers.
|
|
|
|
|
|
|
|
And at this point, many people assume we would then
|
|
|
|
proceed to copy everything we find and then trash the
|
|
|
|
system so we could then sell the only remaining copy of
|
|
|
|
the data to the highest bidder, preferably a foreign
|
|
|
|
agent or the richest competitor of the company...
|
|
|
|
|
|
|
|
It makes no sense. We thirst for knowledge and
|
|
|
|
information, and then you can possibly think we are going
|
|
|
|
to destroy that which is sacred to us? To take away
|
|
|
|
someone else's chance to succeed in getting in as we did?
|
|
|
|
To fuel an already terrible reputation and increase our
|
|
|
|
chances of getting caught and thus have our lives and
|
|
|
|
careers effectively ruined? ("Toxic Shock", 1990)
|
|
|
|
|
|
|
|
|
|
|
|
For this reason, it is often difficult to estimate the number
|
|
|
|
of active hackers at any given time (Denning, 1990; Landreth,
|
|
|
|
1989). Not only is leaving no trace on a system intellectually
|
|
|
|
challenging and part of the "hack", but leaving a trace makes it
|
|
|
|
much easier to lead the law enforcement authorities right to you -
|
|
|
|
and, most importantly, any detection will likely lead to the
|
|
|
|
hacker's stolen user account to be changed or deleted by the system
|
|
|
|
administrator.
|
|
|
|
|
|
|
|
On the other hand, the studies and commentaries from the
|
|
|
|
hacker's point of view are often written by current or ex-members
|
|
|
|
of the computer underground. This "insider's view" is most likely
|
|
|
|
to present a more balanced picture, of the type that only a member
|
|
|
|
of the studied culture can produce. These studies explain the
|
|
|
|
primary motivations behind hacking and how the original code of
|
|
|
|
ethics is adhered to in the modern computer community.
|
|
|
|
Publications such as _Computer Underground Digest_ and _2600: The
|
|
|
|
Hacker Quarterly_ strive to show a balanced view of hackers that is
|
|
|
|
both academic and well-debated, as a contrast to often erroneous
|
|
|
|
media hype.
|
|
|
|
|
|
|
|
In addition, the literature strongly supports the notion that
|
|
|
|
the hacking culture contains a strong element of rebellion and/or
|
|
|
|
(Denning, 1990; Hollinger, 1991; Levy, 1984; Meyer and Thomas,
|
|
|
|
1990; Sterling, 1992). Hacker groups often compile their own
|
|
|
|
newsletters and electronic journals, as well as debate topics on
|
|
|
|
BBSes, many of which are devoted strictly to those with a
|
|
|
|
rebellious and anarchist bent. Such electronic publications will
|
|
|
|
be discussed in detail in Methodology, and will comprise the data
|
|
|
|
set for this project.
|
|
|
|
|
|
|
|
|
|
|
|
Theoretical Approach
|
|
|
|
|
|
|
|
As stated earlier, the majority of approaches to studying
|
|
|
|
hackers are either criminological or civil-liberties ones. This
|
|
|
|
paper will employ theory of social movements, in order to
|
|
|
|
demonstrate the existence of socio-political protest within the
|
|
|
|
hacker culture. Stewart, Smith, and Denton (1984) outline the six
|
|
|
|
essential requirements for the existence of a social movement:
|
|
|
|
|
|
|
|
1. A social movement has at least minimal
|
|
|
|
organization.
|
|
|
|
2. A social movement is an uninstitutionalized
|
|
|
|
collectivity.
|
|
|
|
3. A social movement proposes or opposes a program for
|
|
|
|
change in societal norms, values, or both.
|
|
|
|
4. A social movement is countered by an established
|
|
|
|
order.
|
|
|
|
5. A social movement must be significantly large in
|
|
|
|
scope.
|
|
|
|
6. Persuasion is the essence of social movements.
|
|
|
|
|
|
|
|
Through the application of this criteria, the hacking
|
|
|
|
subculture can clearly be considered a social movement:
|
|
|
|
|
|
|
|
1. Minimal organization: the hacking culture has a significant
|
|
|
|
membership of "followers", and its share of "leaders". Such
|
|
|
|
leaders may be "gurus" - programming experts who are legendary
|
|
|
|
for their knowledge and helpful expertise (Raymond, 1993) - or
|
|
|
|
outspoken members of the community, such as "Emmanuel
|
|
|
|
Goldstein" (editor and publisher of 2600: The Hacker
|
|
|
|
Quarterly). Hackers often form small groups of their own,
|
|
|
|
which network with other groups through various channels of
|
|
|
|
communication; this type of organization efficiently serves
|
|
|
|
the needs of the community without the necessity of a large-
|
|
|
|
scale single organization.
|
|
|
|
|
|
|
|
2. Uninstitutionalized collectivity: The social movement is
|
|
|
|
always an "out group" and is criticized for not handling
|
|
|
|
the controversy through normal, proper channels and
|
|
|
|
procedures - even when the channels and procedures are
|
|
|
|
denied to the movement. The movement has virtually no
|
|
|
|
powers of reward and punishment beyond personal
|
|
|
|
recognition and expulsion, and expulsion often leads to
|
|
|
|
competing organizations created by the exiled. (Stewart,
|
|
|
|
Smith, and Denton, 1984: 5)
|
|
|
|
|
|
|
|
Hackers have always been considered an "out group", in schools
|
|
|
|
(where the hackers are simply "nerds") and in larger society
|
|
|
|
(where they are labelled "criminals"). They are not
|
|
|
|
considered part of any social institution. In addition, they
|
|
|
|
are often denied their own voice in the mass media, which
|
|
|
|
often leaps at chances to discredit and undermine members of
|
|
|
|
the hacking community.
|
|
|
|
|
|
|
|
3. Proposes or opposes change: this is what the hacking culture
|
|
|
|
is all about. Hackers wish to change the attitudes of the
|
|
|
|
mass public towards technology, and believe above all that
|
|
|
|
knowledge is power. If people are not willing to learn all
|
|
|
|
they can about technology, they are allowing themselves to be
|
|
|
|
controlled by state and corporate power; therefore, their
|
|
|
|
activities both oppose current norms and propose new ones.
|
|
|
|
|
|
|
|
4. Countered by an established order: The enemy of hackers are
|
|
|
|
those who try to oppress them the most - the state and large
|
|
|
|
corporations. Hacking, as a form of socio-political protest,
|
|
|
|
is therefore vilified and denounced through the media by these
|
|
|
|
two institutions. Hackers' innate knowledge of this manifests
|
|
|
|
itself in various forms: in anarchist collectives, in anti-
|
|
|
|
establishment collective action (Meyer and Thomas, 1990), and
|
|
|
|
the fact that corporate and state computers are most often the
|
|
|
|
intended targets of hackers.
|
|
|
|
|
|
|
|
5. Significantly large in scope: As stated earlier, it is often
|
|
|
|
difficult to estimate the number of hackers currently
|
|
|
|
operating because of the lack of trace they leave on systems.
|
|
|
|
However, there have been several estimates as to the number of
|
|
|
|
hacker bulletin board systems currently operating - another
|
|
|
|
difficult survey because most hacker BBSes are "underground"
|
|
|
|
and the phone numbers are not widely available - Meyer and
|
|
|
|
Thomas (1990) estimate that there are currently a few hundred
|
|
|
|
in the United States alone, compared to over a thousand non-
|
|
|
|
underground boards. Hacking is an international phenomenon,
|
|
|
|
and its membership cuts across ethnic, racial, gender, and
|
|
|
|
vocational lines. For instance, there have been many
|
|
|
|
documented reports of extensive hacking activity in Europe
|
|
|
|
(Hafner and Markoff, 1991; Stoll, 1990).
|
|
|
|
|
|
|
|
6. Persuasion: The typical uninstitutional, minimally-
|
|
|
|
organized social movement enjoys few means of
|
|
|
|
reward or punishment necessary either to
|
|
|
|
coerce people to join or to remain loyal to a
|
|
|
|
cause or to coerce the established order to
|
|
|
|
capitulate to all or some of its demands. ...
|
|
|
|
Persuasion is pervasive when a movement
|
|
|
|
attempts to bargain. For instance, a social
|
|
|
|
movement that decides to bargain must convince
|
|
|
|
both supporters and opposition that it is
|
|
|
|
serious, that it is operating from a position
|
|
|
|
of strength, and that it has something of
|
|
|
|
value to exchange for concessions. (Stewart,
|
|
|
|
Smith, and Denton, 1984: 11)
|
|
|
|
|
|
|
|
|
|
|
|
Persuasion, in this case, is also present. For the first part
|
|
|
|
of the defintion, the hacking culture complies by offering a subtle
|
|
|
|
system of reward or punishment to its members. For instance, the
|
|
|
|
code of ethics is strongly enforced; if a member derides this and
|
|
|
|
deliberately deletes some files, for instance, other hackers will
|
|
|
|
in turn deride him or her. Snitching, backstabbing and turning one
|
|
|
|
another in to the authorities is not uncommon ( Hafner and Markoff,
|
|
|
|
1991; Sterling, 1992). This is done primarily out of fear and
|
|
|
|
mistrust of authority and the law - that if they do not offer
|
|
|
|
information, they will be prosecuted as an associate in the crime -
|
|
|
|
rather than out of spite for a fellow hacker.
|
|
|
|
|
|
|
|
As a bargaining chip with state and corporate powers, hackers
|
|
|
|
offer the explanation that they are doing them a favor by
|
|
|
|
unearthing security holes in their systems (Denning, 1990;
|
|
|
|
Goldstein, 1990; Hittinger, 1991; Landreth, 1989.) In the words of
|
|
|
|
one hacker:
|
|
|
|
|
|
|
|
A major problem in Cyberspace is the lack of
|
|
|
|
communication between hackers and non-hackers.
|
|
|
|
Corporations are fully entitled to their privacy, and so
|
|
|
|
they feel threatened by the hacker "menace". ... If
|
|
|
|
hackers and corporations and security companies and
|
|
|
|
software companies, etc., were to overcome their
|
|
|
|
differences much could be done. By trading bits and
|
|
|
|
pieces of knowledge, the two opposing groups could
|
|
|
|
together develop revolutionary advances in computing that
|
|
|
|
would benefit all. ("The Dark Adept", 1990)
|
|
|
|
|
|
|
|
Therefore, through this model of social movement construction,
|
|
|
|
the assertion can be made that the hacker community indeed
|
|
|
|
comprises such a movement. An analysis of relevant data will
|
|
|
|
further support this conclusion.
|
|
|
|
|
|
|
|
|
|
|
|
Data and Methodology
|
|
|
|
|
|
|
|
This project utilizes an ethnographic approach, using
|
|
|
|
qualitative data and document analysis, to studying the hacker
|
|
|
|
culture. By analysing various electronic hacker journals and
|
|
|
|
commentaries, support for the theory of hacking as a social
|
|
|
|
movement, employing socio-political protest, can be found. As
|
|
|
|
discussed previously, "underground" communications such as those
|
|
|
|
found on BBS message bases provide much richer and representative
|
|
|
|
sources for study; hacker journals and commentaries are mainly
|
|
|
|
representative of only the more outspoken members of the culture.
|
|
|
|
However, there are several methodological problems inherent in
|
|
|
|
gathering BBS data.
|
|
|
|
|
|
|
|
Firstly, hacker BBSes are very well-guarded, and difficult for
|
|
|
|
an outsider (even a well-meaning researcher) to access. There are
|
|
|
|
"new-user" questionnaires to fill out, and such questionnaires
|
|
|
|
usually include technical questions, in order to test the potential
|
|
|
|
worth of the new user (Meyer and Thomas, 1990). Sometimes the new
|
|
|
|
user is given a small test, such as finding the unlisted phone
|
|
|
|
number to a certain computer, or asked to provide a piece of
|
|
|
|
information such as a account name and password to a well-secured
|
|
|
|
corporate system.
|
|
|
|
|
|
|
|
Such tests serve as filters for worthy and un-worthy potential
|
|
|
|
new members; it is imperative that new users be screened properly.
|
|
|
|
If a system operator (referred to as a "sysop" - the one who
|
|
|
|
maintains the bulletin board system) does not screen users
|
|
|
|
properly, any kind of computer user could gain access - even a
|
|
|
|
police officer or government agent. It is in the sysop's best
|
|
|
|
interests to weed out unsuitable members, for if the user is not
|
|
|
|
going to contribute in the sharing of information on the board,
|
|
|
|
there is really no use for them; if all they do is constantly take
|
|
|
|
information or files and not contribute anything equal in value
|
|
|
|
(referred to as a "sponge"), they are ridiculed and their account
|
|
|
|
deleted from the board.
|
|
|
|
|
|
|
|
Secondly, there is an innate mistrust of new users among the
|
|
|
|
hacker community. This is fuelled by the fact that police officers
|
|
|
|
or government agents often try to gain access to the board under
|
|
|
|
false pretenses - and quite a few succeed. Anyone, upon discovery,
|
|
|
|
claiming to be simply a sympathetic reporter or researcher will
|
|
|
|
likely be instantly shut out, and blacklisted on other hacker BBSes
|
|
|
|
- the word gets around fast. The mode of computer communications,
|
|
|
|
where you cannot see, hear, or physically speak to another person,
|
|
|
|
makes it easy to masquerade as someone you are not.
|
|
|
|
|
|
|
|
Law enforcement people with an excellent technical knowledge
|
|
|
|
of computers and some conception of the underground culture can
|
|
|
|
easily pass as a hacker. For this reason, phone numbers of hacker
|
|
|
|
BBSes are closely guarded and are not publicly distributed. Lists
|
|
|
|
of other hacker BBS numbers are often maintained and are available
|
|
|
|
on the board; but these lists are often outdated, since BBSes are
|
|
|
|
extremely volatile and usually have extremely short lives (Meyer,
|
|
|
|
1989).
|
|
|
|
|
|
|
|
For these reasons, I have chosen to employ as data underground
|
|
|
|
hacker publications and newsletters rather than BBS communications.
|
|
|
|
Although not as representative of the diverse hacker community as
|
|
|
|
BBS data, publications and newsletter analysis avoids the problems
|
|
|
|
inherent in ethnographic research, such as winning the trust and
|
|
|
|
cooperation of the members of the underground in order to gain
|
|
|
|
entry to the culture - which, because of their justifiably paranoid
|
|
|
|
nature, would take a very long time. As well, there is the problem
|
|
|
|
of being intrusive in the culture.
|
|
|
|
|
|
|
|
It is important to avoid intruding on the way the group
|
|
|
|
normally functions. Nothing sinks a field project faster
|
|
|
|
than interfering with the group's way of thinking and
|
|
|
|
doing things. At the very least, such intrusiveness will
|
|
|
|
change the situation you have come to study; at the
|
|
|
|
worst, it may result in your expulsion. (Northey and
|
|
|
|
Tepperman, 1986: 71)
|
|
|
|
|
|
|
|
|
|
|
|
By utilizing document analysis, however, these problems are
|
|
|
|
avoided, without a difference in quality of data. Many passionate
|
|
|
|
debates on underground BBSes are summarized by individuals and
|
|
|
|
submitted to hacker journals, which (with a limited amount of
|
|
|
|
technical skill, research, and Internet access) can be found on
|
|
|
|
several public archive sites. These are still the words of
|
|
|
|
hackers, yet it is not completely necessary for this study to enter
|
|
|
|
the culture itself as an observer.
|
|
|
|
|
|
|
|
As mentioned, several hacker journals and newsletters comprise
|
|
|
|
the data set. Each journal or newsletter is comprised of articles,
|
|
|
|
usually on a specific how-to topic (eg., "Hacking Answering
|
|
|
|
Machines", by Predat0r; "The Improved Carbide Bomb", by The
|
|
|
|
Sentinel), as well as commentaries, written by various authors. As
|
|
|
|
with underground BBSes, hacking journals and newsletters tend to
|
|
|
|
spring up and disappear in a very short time, with no explanations.
|
|
|
|
The ones used for this study, in no particular order, are:
|
|
|
|
|
|
|
|
PHRACK: (A contraction of the words Phreak/Hack) This
|
|
|
|
journal is generally recognized as the "official"
|
|
|
|
electronic publication. (The other "official"
|
|
|
|
publication, 2600: The Hacker Quarterly, is
|
|
|
|
available only in print form.) Phrack is the
|
|
|
|
oldest hacker journal in existence, with its first
|
|
|
|
issuance in 1985.
|
|
|
|
|
|
|
|
COMPUTER UNDERGROUND
|
|
|
|
DIGEST: Known as CuD. This weekly electronic newsletter
|
|
|
|
features both academic articles and commentaries
|
|
|
|
from members of the underground community, and
|
|
|
|
began publication in March 1990.
|
|
|
|
|
|
|
|
DIGITAL
|
|
|
|
MURDER: Issued first in October 1991. A general
|
|
|
|
hacking/phreaking/ newsletter.
|
|
|
|
|
|
|
|
FBI: (Freaker's Bureau Incorporated) General
|
|
|
|
newsletter, started in September 1991.
|
|
|
|
|
|
|
|
HACKERS
|
|
|
|
UNLIMITED: Began in December 1989.
|
|
|
|
|
|
|
|
INFORMATIK: (The Journal of Privileged Information), 1992.
|
|
|
|
|
|
|
|
MAGIK: (Master Anarchists Giving Illicit Knowledge), 1993.
|
|
|
|
|
|
|
|
THE NEW FONE EXPRESS: June 1991.
|
|
|
|
|
|
|
|
P/HUN: (Phreakers/Hackers Underground Network) One of the
|
|
|
|
better-known and longer-running journals, began in
|
|
|
|
1988.
|
|
|
|
|
|
|
|
NARC: (Nuclear Phreakers/Hackers/Carders) Another long-
|
|
|
|
lasting journal, started in 1989.
|
|
|
|
|
|
|
|
TAP
|
|
|
|
ONLINE: (Technical Assistance Party) First established in
|
|
|
|
1972 as YIPL (Youth International Party Line) by
|
|
|
|
Abbie Hoffman, and soon thereafter changed its name
|
|
|
|
to TAP. Recognized as the "grandfather" of hacker
|
|
|
|
publications (Meyer, 1990).
|
|
|
|
|
|
|
|
TPP: (The Propaganda Press) Barely a year old, and one
|
|
|
|
of the "fly-by-night" newsletters.
|
|
|
|
|
|
|
|
NIA: (Network Information Access) Another relatively
|
|
|
|
new publication, bearing the motto "Ignorance,
|
|
|
|
There's No Excuse".
|
|
|
|
|
|
|
|
H-NET: Begun in June 1990.
|
|
|
|
|
|
|
|
LOD/H TECH
|
|
|
|
JOURNALS: These are the technical journals of LOD/H - the
|
|
|
|
elite Legion of Doom/Hackers group. This four-part
|
|
|
|
set was released in January 1987 as a one-time
|
|
|
|
release.
|
|
|
|
|
|
|
|
|
|
|
|
These periodicals constitute a rich cross-section of the
|
|
|
|
computer underground culture. The authors of articles that appear
|
|
|
|
in these journals and newsletters are generally considered the more
|
|
|
|
"elite" or knowledgeable hackers in the culture, especially those
|
|
|
|
who write the how-to articles. Therefore, these periodicals can be
|
|
|
|
considered adequately representative of the culture's ethics,
|
|
|
|
beliefs, and values.
|
|
|
|
|
|
|
|
The following sections will provide and discuss data, culled
|
|
|
|
from these periodicals, supporting each of the six characteristics
|
|
|
|
of social movements outlined by Stewart, Smith, and Denton (1984).
|
|
|
|
These six points were provided as the theoretical framework for
|
|
|
|
this study - please refer back to Theoretical Approach for an
|
|
|
|
outline of this model.
|
|
|
|
|
|
|
|
|
|
|
|
Characteristic #1: Minimal Organization
|
|
|
|
|
|
|
|
Gordon Meyer (1989), in "Social Organization of the Computer
|
|
|
|
Underground", provides a comprehensive study of how hackers and
|
|
|
|
computer underground members organize through BBSes and other
|
|
|
|
illicit channels of communication, such as corporate voice-mail
|
|
|
|
bases and telephone "bridges". These methods allow hackers to
|
|
|
|
share vital information such as who's been arrested or searched,
|
|
|
|
which systems have shut down, new numbers to try, security holes
|
|
|
|
that have been discovered, etc. Although hacking is primarily a
|
|
|
|
solitary activity, hackers need to network, through BBSes and other
|
|
|
|
channels of communication, into groups to share information and
|
|
|
|
technique, and also to give a feeling of community.
|
|
|
|
|
|
|
|
Such groups usually do not have leaders in the real sense
|
|
|
|
(Meyer, 1989), but some members are bound to know more than others,
|
|
|
|
and the veterans of the group act as "big brothers" and guides to
|
|
|
|
novice hackers. For instance:
|
|
|
|
|
|
|
|
I learned as much as I could as fast as I could, and
|
|
|
|
after several months of intensive hacking and
|
|
|
|
information-trading, the Cracker was no longer a novice.
|
|
|
|
I knew a lot about hacking by then, and because I liked
|
|
|
|
to share what I knew, I gained the reputation of being
|
|
|
|
someone to go to if you were having trouble. ... As the
|
|
|
|
Cracker's reputation grew, answering such requests became
|
|
|
|
a matter of pride. (Bill Landreth (aka "The Cracker"),
|
|
|
|
1989: 16)
|
|
|
|
|
|
|
|
|
|
|
|
In addition, hackers regularly get together socially, whether
|
|
|
|
in small groups, or at large national gatherings called "cons"
|
|
|
|
(conventions). Cons are organized by elite groups and tend to draw
|
|
|
|
fairly large crowds. Cons feature guest speakers, who are usually
|
|
|
|
elite and well-known hackers, and occasionally academic or
|
|
|
|
professionals in the computer fields as well. Once planned, cons
|
|
|
|
are advertised on underground boards and through hacker
|
|
|
|
publications. Each convention has a unique name - the HoHoCon in
|
|
|
|
Houston, SummerCon, PumpCon at Halloween, and DefCon, to name a few
|
|
|
|
main ones. Conventions as social gatherings, however, have their
|
|
|
|
own set of problems:
|
|
|
|
|
|
|
|
Friday, October 30, 1992, Pumpcon began, at the Courtyard
|
|
|
|
of the Marriott, in Greenburgh, NY. All in all, about 30
|
|
|
|
hackers showed up, and had a great time. At least until
|
|
|
|
the evening of Oct. 31st, when 8-10 members of the
|
|
|
|
Greenburgh police force showed up and raided the Con. A
|
|
|
|
few hackers who had been out driving around during the
|
|
|
|
time of the bust returned a few hours later, and when
|
|
|
|
they were seen by police, they were immediately taken to
|
|
|
|
255 and questioned. (They were walking down the hall,
|
|
|
|
when a cop appeared, and told them to step into a room.)
|
|
|
|
The cops asked them if they were hackers, and when they
|
|
|
|
didn't answer, one police officer reached into the coat
|
|
|
|
pocket of one of the people, and produced an auto dialer.
|
|
|
|
This in itself was enough to send the three to room 255,
|
|
|
|
where the rest of the hackers were being held for
|
|
|
|
questioning. My question to you - isn't that just a bit
|
|
|
|
illegal? Bodily search without probable cause OR a
|
|
|
|
warrant? Ooops - I'm forgetting - we're HACKERS! We're
|
|
|
|
ALL BAD! We're ALWAYS breaking the law. We don't have
|
|
|
|
RIGHTS!. ... In one of the rooms, there were about 2
|
|
|
|
dozen computer magazines which were apparently
|
|
|
|
confiscated, although the warrant did not specify that
|
|
|
|
magazines could be taken. But, when you're busting
|
|
|
|
HACKERS, I suppose you can take what you want. After
|
|
|
|
all, hackers are evil geniuses, and don't have the same
|
|
|
|
rights as NORMAL criminals do. (by "Someone
|
|
|
|
|
|
|
|
|
|
|
|
Characteristic #2: Uninstitutionalized collectivity
|
|
|
|
|
|
|
|
Hackers have always been considered an "out" group in society.
|
|
|
|
In schools, hackers are seen as "nerds" and "loners" without social
|
|
|
|
skills (Levy, 1984; Turkle, 1983); in larger society, they are
|
|
|
|
prosecuted by those in power. In the words of a hacker:
|
|
|
|
|
|
|
|
"I am a hacker." If I ever told that to anyone, it would
|
|
|
|
immediately be assumed that I am a malicious,
|
|
|
|
vandalising, thieving, pseudo-terrorist out to take over
|
|
|
|
the computers of the world for personal gain or quite
|
|
|
|
possibly to glean some morbid satisfaction from deleting
|
|
|
|
megs upon megs of valuable data.
|
|
|
|
|
|
|
|
"I am associated with the computer underground." If I
|
|
|
|
ever told that to anyone, there would be a flash flood of
|
|
|
|
foolish associations in that person's mind between myself
|
|
|
|
and The Mafia, with Saddam Hussein, Syria, Libya, Abu
|
|
|
|
Nidal, and who knows what else.
|
|
|
|
|
|
|
|
Almost universally, among the ignorant majority, we
|
|
|
|
hackers are considered to be dangerous thugs whose sole
|
|
|
|
purpose in life is to cause as much damage as we can in
|
|
|
|
as little time as possible to the largest number of
|
|
|
|
people.
|
|
|
|
|
|
|
|
Sure, there are those little kiddies (mental and
|
|
|
|
physical) who call themselves "hackers" and fit the above
|
|
|
|
descriptions. There are also people who call themselves
|
|
|
|
"human beings" that rape, murder, cheat, lie and steal
|
|
|
|
every few minutes (or is it seconds, now?). Does that
|
|
|
|
mean that all "human beings" should then be placed in
|
|
|
|
prison? ("Toxic Shock", 1990)
|
|
|
|
|
|
|
|
|
|
|
|
As with any minority group, hackers are judged as outcasts,
|
|
|
|
and social, economic, and political resources are withheld from
|
|
|
|
them as a result. The commentary on the police raid at the PumpCon
|
|
|
|
convention (see page above), as well as the commentary above,
|
|
|
|
are reflections of hackers' anger at being constantly derided and
|
|
|
|
looked down upon as a worthless menace. The hacking culture is
|
|
|
|
definitely not a part of any established institution. However,
|
|
|
|
hackers often express a wish to work with an established
|
|
|
|
institution, such as the police, for both personal gain (less
|
|
|
|
chance of being prosecuted yourself) and for the good of the
|
|
|
|
movement (hackers feel that police should be spending their time
|
|
|
|
and resources going after the real computer criminals, such as
|
|
|
|
corporate embezzlers).
|
|
|
|
|
|
|
|
We cannot, we WILL not, allow this tyranny to continue!
|
|
|
|
The United States Government has ignored the voice of the
|
|
|
|
Electronic Community long enough! When we told the
|
|
|
|
government that what they were doing was wrong, they
|
|
|
|
refused to listen! When we formed political action groups
|
|
|
|
to bring our cases to court and before Congress, we were
|
|
|
|
told that we were using loopholes in the law to get away
|
|
|
|
with crime!!! We have, in a peaceful and respectful
|
|
|
|
manner, given our government more than reasonable
|
|
|
|
petition for redress of our grievances, but if anything
|
|
|
|
the situation has gotten worse!
|
|
|
|
|
|
|
|
Government administrations use computer crime as a weapon
|
|
|
|
in internal battles over jurisdiction. Government
|
|
|
|
officials, who have only the slightest understanding of
|
|
|
|
computer science, use computer crime as a tool for career
|
|
|
|
success. Elected Representatives, who have absolutely no
|
|
|
|
understanding of computers, use "information
|
|
|
|
superhighways", computer crime, and cryptography to gain
|
|
|
|
constituent money and voter support! The Electronic
|
|
|
|
Community, the only group who fully understands the
|
|
|
|
issues involved here, and the only group who is effected
|
|
|
|
by the decisions being made, has been completely ignored!
|
|
|
|
("The White Ninja", 1994)
|
|
|
|
|
|
|
|
|
|
|
|
Characteristic #3: Proposes or opposes change
|
|
|
|
|
|
|
|
Here, hackers definitely qualify under this criteria. As
|
|
|
|
stated previously, a primary hacker ethic is that information and
|
|
|
|
knowledge is power (Denning, 1990; Landreth, 1989; Levy, 1984). In
|
|
|
|
fact, the motto of the electronic hacker journal NIA (Network
|
|
|
|
Information Access) is "Ignorance, There's No Excuse". There is a
|
|
|
|
general call to the public to educate themselves in technology,
|
|
|
|
lest it be used to control them:
|
|
|
|
|
|
|
|
As we can see, this has not been the case. The computer
|
|
|
|
system has been solely in the hands of big businesses and
|
|
|
|
the government. The wonderful device meant to enrich
|
|
|
|
life has become a weapon which dehumanizes people. To
|
|
|
|
the government and large businesses, people are no more
|
|
|
|
than disk space, and the government doesn't use computers
|
|
|
|
to arrange aid for the poor, but to control nuclear death
|
|
|
|
weapons. The average American can only have access to a
|
|
|
|
small microcomputer which is worth only a fraction of
|
|
|
|
what they pay for it. The businesses keep the true state
|
|
|
|
of the art equipment away from the people behind a steel
|
|
|
|
wall of incredibly high prices and bureaucracy. It is
|
|
|
|
because of this state of affairs that hacking was born.
|
|
|
|
("Doctor Crash", 1986)
|
|
|
|
|
|
|
|
|
|
|
|
Most, if not all, of us think information should be
|
|
|
|
exchanged freely... If everyone is kept abreast of the
|
|
|
|
newest technologies, techniques, what have you, then
|
|
|
|
everyone can benefit...The more each of us knows, the
|
|
|
|
fewer past mistakes we will repeat, the greater knowledge
|
|
|
|
base we will have for future developments. ("Toxic
|
|
|
|
Shock", 1990)
|
|
|
|
|
|
|
|
|
|
|
|
Many hackers share a common utopian vision - that of an
|
|
|
|
electronic society where information is free and uncontrolled,
|
|
|
|
democracy reigns on the "information highway", and creativity and
|
|
|
|
ingenuity are revered traits:
|
|
|
|
|
|
|
|
The hackers are needed again. We can solve problems, get
|
|
|
|
it done, make it fun. The general public has a vested
|
|
|
|
interest in this! The public has a vested interest in
|
|
|
|
electronic privacy, in secure personal systems, and in
|
|
|
|
secure e-mail. As everyone learns more, the glamour and
|
|
|
|
glitz of the mysterious hackers will fade. Lay people
|
|
|
|
are getting a clearer idea of what's going on. ("Johnny
|
|
|
|
Yonderboy", 1990)
|
|
|
|
|
|
|
|
|
|
|
|
For further reference, see Steven Levy's landmark work,
|
|
|
|
Hackers: Heroes of the Compu
|
|
|
|
|
|
|
|
|
|
|
|
Characteristic #4: Countered by an established institution
|
|
|
|
|
|
|
|
As was seen in the previous section, hackers are angry at the
|
|
|
|
way they are portrayed in the mass media. In this case, the
|
|
|
|
"established order" includes most of those - the legal authorities,
|
|
|
|
the corporations, the government - that have a vested interest in
|
|
|
|
keeping hackers and their socio-political messages at a standstill.
|
|
|
|
|
|
|
|
This is our world now... the world of the electron and
|
|
|
|
the switch, the beauty of the baud. We make use of a
|
|
|
|
service already existing without paying for what could be
|
|
|
|
dirt-cheap if it wasn't run by profiteering gluttons, and
|
|
|
|
you call us criminals. We explore... and you call us
|
|
|
|
criminals. We seek after knowledge... and you call us
|
|
|
|
criminals. We exist without skin color, without
|
|
|
|
nationality, without religious bias... and you call us
|
|
|
|
criminals. You build atomic bombs, you wage wars, you
|
|
|
|
murder, cheat, and lie to us and try to make us believe
|
|
|
|
it's for our own good, yet we're the criminals.
|
|
|
|
|
|
|
|
Yes, I am a criminal. My crime is that of curiosity. My
|
|
|
|
crime is that of judging people by what they say and
|
|
|
|
think, not what they look like. My crime is that of
|
|
|
|
outsmarting you, something that you will never forgive me
|
|
|
|
for. ("The Mentor", 1986)
|
|
|
|
|
|
|
|
|
|
|
|
Hackers are very prolific on this topic, and certainly don't
|
|
|
|
mince words when it comes to voicing their anger at those
|
|
|
|
institutions that oppress them:
|
|
|
|
|
|
|
|
But, even as I type this, I begin to realize just why we
|
|
|
|
are such a feared group of people...
|
|
|
|
|
|
|
|
We are misunderstood by the majority.
|
|
|
|
|
|
|
|
You cannot understand someone who judges others by what
|
|
|
|
they say, think, and do, rather than how they look or how
|
|
|
|
large their income is.
|
|
|
|
You cannot understand someone who wants to be honest and
|
|
|
|
sharing, instead of lying, stealing, and cheating.
|
|
|
|
|
|
|
|
You cannot understand us because we are different.
|
|
|
|
Different in a society where conformity is the demanded
|
|
|
|
norm. We seek to rise above the rest, and then to pull
|
|
|
|
everyone else up to the same new heights. We seek to
|
|
|
|
innovate, to invent. We, quite seriously, seek to boldly
|
|
|
|
go where no one has gone before.
|
|
|
|
|
|
|
|
We are misunderstood, misinterpreted, misrepresented.
|
|
|
|
|
|
|
|
All because we simply want to learn. We simply want to
|
|
|
|
increase the flow of information and knowledge, so that
|
|
|
|
EVERYONE can learn and benefit. ("Toxic Shock", 1990)
|
|
|
|
|
|
|
|
|
|
|
|
Such oppression, without a proper venting of anger and
|
|
|
|
frustration, can lead to anarchy - and many hackers have an
|
|
|
|
anarchist/rebellious bent for this very reason (Meyer and Thomas,
|
|
|
|
1990).
|
|
|
|
|
|
|
|
There is one last method of this war against computer
|
|
|
|
abusers. This is a less subtle, less electronic method,
|
|
|
|
but much more direct and gets the message across. I am
|
|
|
|
speaking of what is called Anarchy. Anarchy as we know
|
|
|
|
it does not refer to the true meaning of the word (no
|
|
|
|
ruling body), but to the process of physically destroying
|
|
|
|
buildings and governmental establishments. This is a
|
|
|
|
very drastic, yet vital part of this "techno-revolution."
|
|
|
|
("Doctor Crash", 1986)
|
|
|
|
|
|
|
|
|
|
|
|
Many anarchist newsletters and journals began circulation in
|
|
|
|
1989 and 1990, which were the beginning years of a massive legal
|
|
|
|
crackdown on hackers in the United States. Suspected hackers'
|
|
|
|
houses were raided, equipment confiscated (and to this day, much is
|
|
|
|
not yet returned), and various charges laid.
|
|
|
|
|
|
|
|
Several high-profile trials went to session, such as that of
|
|
|
|
"Knight Lightning". One of the more paranoia-fueled raids was done
|
|
|
|
on Steve Jackson Games, a company that produced role-playing
|
|
|
|
simulation games. The accompanying book for one game, GURPS
|
|
|
|
Cyberpunk, was admonished by legal authorities as "a manual for
|
|
|
|
computer crime" (Sterling, 1992: 142). For a complete discussion
|
|
|
|
of these raids and accompanying legal hassles hackers faced, refer
|
|
|
|
to The Hacker Crackdown by Bruce Sterling (1992). These arrests
|
|
|
|
and trials were also closely monitored by the Electronic Freedom
|
|
|
|
Foundation, a lobby group started as a response to this crackdown.
|
|
|
|
Various commentaries, responses, and angry manifestos regarding
|
|
|
|
these raids are also published regularly in The Computer
|
|
|
|
Underground Digest.
|
|
|
|
|
|
|
|
|
|
|
|
Characteristic #5: Significantly large in scope
|
|
|
|
|
|
|
|
As mentioned, the hacker culture is not unique to North
|
|
|
|
America; many hackers in other countries have been similarly
|
|
|
|
prosecuted and hounded by the media. The best-known case of this
|
|
|
|
is the hackers of Europe. One group, the Chaos Computer Club, has
|
|
|
|
members in France and Germany. The Netherlands has their own
|
|
|
|
prominent group, HACK-TIC. These groups, as well as others from
|
|
|
|
around Europe, gather each year for the Chaos Computer Club's
|
|
|
|
annual conference in Germany.
|
|
|
|
|
|
|
|
Contrary to the name, the CCC is well-organized, publishes its
|
|
|
|
annual conference proceedings, and is generally considered a
|
|
|
|
resource base for other European hackers. Most famous of the
|
|
|
|
German hackers is Markus Hess, whose long-distance explorations
|
|
|
|
into American systems was documented by Cliff Stoll, in his 1989
|
|
|
|
book The Cuckoo's Egg. Another example of large-scale organization
|
|
|
|
are the hacker conventions in the United States. Also, the number
|
|
|
|
of hacker bulletin board systems in the United States alone,
|
|
|
|
previously stated as somewhere around a few hundred, are a
|
|
|
|
testament to the wide scale of this phenomenon.
|
|
|
|
|
|
|
|
Hackers maintain that there are others just like them all
|
|
|
|
around the world, and when they realise they are intellectually and
|
|
|
|
mentally different than most other people, it's like a revelation.
|
|
|
|
|
|
|
|
And then it happened... a door opened to a world...
|
|
|
|
rushing through the phone line like heroin through an
|
|
|
|
addict's veins, an electronic pulse is sent out, a refuge
|
|
|
|
from the day-to-day incompetencies is sought... a board
|
|
|
|
is found.
|
|
|
|
|
|
|
|
"This is it... this is where I belong..." I know everyone
|
|
|
|
here... even if I've never met them, never talked to
|
|
|
|
them, may never hear from them again... I know you all...
|
|
|
|
|
|
|
|
I am a hacker, and this is my manifesto. You may stop
|
|
|
|
this individual, but you can't stop us all... after all,
|
|
|
|
we're all alike. ("The Mentor", 1986)
|
|
|
|
|
|
|
|
|
|
|
|
Characteristic #6: Persuasion
|
|
|
|
|
|
|
|
As previously discussed in Theoretical Approach, the hacker
|
|
|
|
culture often employs reward and punishment in keeping their
|
|
|
|
movement together. Hackers that defy the ethics and values of the
|
|
|
|
underground are castigated, and the word of the deed and the
|
|
|
|
offender quickly travels through the social network.
|
|
|
|
|
|
|
|
For instance, in Out of the Inner Circle, Bill Landreth (aka
|
|
|
|
"The Cracker") documents the development of the Inner Circle, an
|
|
|
|
elite group of hackers which he helped create. The Inner Circle
|
|
|
|
had unwritten rules similar to the Hacker Ethic, and such rules
|
|
|
|
were strictly enforced:
|
|
|
|
|
|
|
|
The fact that we tried to invite only those people who
|
|
|
|
already met these two requirements quickly resulted in an
|
|
|
|
unwritten "code of ethics" that was, and remained, the
|
|
|
|
philosophy that held the Inner Circle together. ... We
|
|
|
|
had many good reasons to follow these basic rules. But
|
|
|
|
the most important, as far as the Inner Circle was
|
|
|
|
concerned, had to do with the basic principle of
|
|
|
|
respecting other people's property and information. We
|
|
|
|
wre explorers, not spies, and to us, damaging computer
|
|
|
|
files was not only clumsy and inelegant - it was wrong.
|
|
|
|
(Landreth, 1989: 18)
|
|
|
|
|
|
|
|
|
|
|
|
Some hackers think the time has come - that those in power are
|
|
|
|
finally willing to listen to them:
|
|
|
|
|
|
|
|
Just exactly how far should the government go to protect
|
|
|
|
companies and their data? Exactly what are the
|
|
|
|
responsibilities of a company with sensitive, valuable
|
|
|
|
data in their computer systems? There is a distinct
|
|
|
|
feeling that private-sector companies should be doing
|
|
|
|
more to protect themselves. Hackers can give an
|
|
|
|
important viewpoint on these issues, and all of a sudden
|
|
|
|
there are people willing to listen. ("Johnny Yonderboy",
|
|
|
|
1990)
|
|
|
|
|
|
|
|
|
|
|
|
Others become activists, and one hacker actively seeks out the
|
|
|
|
corporate sector by submitting technical security articles to The
|
|
|
|
Computer Underground Digest, a journal that is widely read by both
|
|
|
|
hackers and computer professionals alike:
|
|
|
|
|
|
|
|
... I hope to break down this barrier of resentment by
|
|
|
|
crossing over the lines of the Underground into the
|
|
|
|
"real" world and providing valuable information about
|
|
|
|
systems, security, interfacing, etc. I hope other will
|
|
|
|
follow suit, and that the private sector will reciprocate
|
|
|
|
by allowing technical information to flow into the
|
|
|
|
Underground. Ultimately, I hope there will be a rapport
|
|
|
|
between hackers and members of the private sector so that
|
|
|
|
we may learn from each other and make the best use
|
|
|
|
possible of this greatest of inventions, the computer.
|
|
|
|
("The Dark Adept", 1990)
|
|
|
|
|
|
|
|
|
|
|
|
Overwhelmingly, it looks like The Dark Adept's vision is not
|
|
|
|
being realised so far. Hackers continue to be raided and charged
|
|
|
|
under newly-constructed computer crime laws that are vague at best,
|
|
|
|
and constitutionally improper at worst. This largely misunderstood
|
|
|
|
culture is extending the symbolic olive branch to corporate
|
|
|
|
industry, by offering to share their knowledge and expertise to
|
|
|
|
create better technology for everyone.
|
|
|
|
|
|
|
|
However, corporate culture constantly denies this offering.
|
|
|
|
Preliminary experiments have been done in the United States, with
|
|
|
|
hackers being hired by companies to test their systems, and the
|
|
|
|
results have been overwhelmingly positive (Denning, 1990). Why,
|
|
|
|
then, is this practice not adopted widely? A discussion of the
|
|
|
|
implications of this, including power relations and econo-political
|
|
|
|
control, could easily comprise another thesis; for this reason, it
|
|
|
|
will not be delved into here.
|
|
|
|
|
|
|
|
|
|
|
|
Conclusions and Summary
|
|
|
|
|
|
|
|
In this paper, the conception of the computer hacking
|
|
|
|
phenomenon as a social movement has been explored. Working with a
|
|
|
|
theoretical model of social movements developed by Stewart, Smith,
|
|
|
|
and Denton (1984), various hacker writings have supported the idea
|
|
|
|
of the existence of social collectivity. As the hacker culture is
|
|
|
|
relatively new and astonishingly under-studied, these conclusions
|
|
|
|
can be taken as preliminary. I hope this study has laid a
|
|
|
|
groundwork for further sociological study of the computer
|
|
|
|
underground.
|
|
|
|
|
|
|
|
As the proliferation of hackers' anarchist tendencies
|
|
|
|
suggests, this culture desperately needs some understanding, as
|
|
|
|
well as a sympathetic ear. We have seen that corporate industry
|
|
|
|
rejects the knowledge and technical expertise of hackers; could not
|
|
|
|
a higher level of technology be realised if these two factions were
|
|
|
|
to work together? The answer to this will be found in the future.
|
|
|
|
As the possibility of a global Information Society draws closer,
|
|
|
|
people must be willing to take their technical education into their
|
|
|
|
own hands. We could all learn a valuable lesson from hackers: that
|
|
|
|
intellectual hunger and the quest for knowledge should be central
|
|
|
|
in our society.
|
|
|
|
|
|
|
|
The coming of the Information Society has been heralded by
|
|
|
|
academics and non-academics alike. The notion of a free,
|
|
|
|
democratic, electronic society has been beholded as a sort of
|
|
|
|
utopia, where information flows unencumbered and freedom of speech
|
|
|
|
is key. However, there is a dark side to this as well.
|
|
|
|
Information is becoming increasingly private, and many people fear
|
|
|
|
the Information Society will actually be a sort of Orwellian 1984-
|
|
|
|
type society instead:
|
|
|
|
|
|
|
|
There's something wrong with the Information Society.
|
|
|
|
There's something wrong with the idea that "information"
|
|
|
|
is a commodity like a desk or chair. ... Knowledge is
|
|
|
|
power. The rise of computer networking, of the
|
|
|
|
Information Society, is doing strange and disruptive
|
|
|
|
things to the processes by which power and knowledge are
|
|
|
|
currently distributed.
|
|
|
|
|
|
|
|
I don't think democracy will thrive in a milieu where
|
|
|
|
vast empires of data are encrypted, restricted,
|
|
|
|
proprietary, confidential, top secret, and sensitive. I
|
|
|
|
fear for the stability of a society that builds
|
|
|
|
sandcastles out of databits and tries to stop a
|
|
|
|
real-world tide with royal commands. (Sterling, 1992)
|
|
|
|
|
|
|
|
|
|
|
|
The debate goes on; either we can sit, wait patiently, and see how
|
|
|
|
it all turns out; or we can act, educate ourselves and each other,
|
|
|
|
and be ready for whatever hits. I will end this project with an
|
|
|
|
appropriate quote from a hacker:
|
|
|
|
|
|
|
|
If you need a tutorial on how to perform any of the above
|
|
|
|
stated methods, please read a file on it. And whatever
|
|
|
|
you do, continue the fight. Whether you know it or not,
|
|
|
|
if you are a hacker, you are a revolutionr Crash", 1986)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Bibliography (not in alpha order here)
|
|
|
|
|
|
|
|
|
|
|
|
Doctor Crash (1986) "The Techno Revolution". Phrack 1:6,
|
|
|
|
June 10, 1986.
|
|
|
|
|
|
|
|
Sterling, Bruce (1992) "A Statement of Principle". Computer
|
|
|
|
Underground Digest 4:47, September 30, 1992.
|
|
|
|
|
|
|
|
Denning, Dorothy (1990) Concerning Hackers Who Break Into
|
|
|
|
Computer Systems. In Proceedings of the 13th National Computer
|
|
|
|
Security Conference, October 1990.
|
|
|
|
|
|
|
|
The Dark Adept (1990) "The Ultimate Interface: Hackers and
|
|
|
|
the Private Sector". Computer Underground Digest 2:9, October
|
|
|
|
23, 1990.
|
|
|
|
|
|
|
|
Johnny Yonderboy (1990) "A Hacker's Perspective". Computer
|
|
|
|
Underground Digest 1:13, June 12, 1990.
|
|
|
|
|
|
|
|
Landreth, Bill (1989) Inside the Inner Circle. Microsoft Press:
|
|
|
|
Redmond, WA.
|
|
|
|
|
|
|
|
The Mentor (1986) "The Conscience of a Hacker". Phrack 1:7,
|
|
|
|
January 8, 1986.
|
|
|
|
|
|
|
|
Stoll, Cliff (1989) The Cuckoo's Egg. Simon and Schuster: New York.
|
|
|
|
|
|
|
|
Sterling, Bruce (1992) The Hacker Crackdown. Bantam: New York.
|
|
|
|
|
|
|
|
Meyer, Gordon and Thomas, Jim (1990) "The Baudy World of the Byte
|
|
|
|
Bandit: a Postmodernist Interpretation of the Computer
|
|
|
|
Underground". Forthcoming in F. Schmalleger (ed.), Computers
|
|
|
|
in Criminal Justice, Wyndham Hall: Bristol, Indiana.
|
|
|
|
|
|
|
|
Toxic Shock (1990) "Another View of Hacking: The Evil that Hackers
|
|
|
|
Do". Computer Underground Digest 2:6, October 6, 1990.
|
|
|
|
|
|
|
|
Levy, Steven (1984) Hackers: Heroes of the Computer Revolution.
|
|
|
|
Dell: New York.
|
|
|
|
|
|
|
|
The White Ninja (1994) "A Declaration of Complaints and Grievances
|
|
|
|
of the United States Electronic Community". Phrack 5:45, File
|
|
|
|
6/28, March 30, 1994.
|
|
|
|
|
|
|
|
Turkle, Sherry (1984) The Second Self: Computers and the Human
|
|
|
|
Spirit. Simon and Schuster: New York.
|
|
|
|
|
|
|
|
Someone who has been there but wishes to remain anonymous (1992)
|
|
|
|
"A Bird's-Eye View of the PumpCon Problem". Computer
|
|
|
|
Underground Digest 4:60, November 22, 1992.
|
|
|
|
|
|
|
|
Meyer, Gordon (1989) The Social Organization of the Computer
|
|
|
|
Underground. Unpublished Master's Thesis, University of
|
|
|
|
Northern Illinois.
|
|
|
|
|
|
|
|
Stewart, Charles, Smith, Craig, and Denton, Robert E. (1984)
|
|
|
|
Persuasion and Social Movements. Waveland Press: Prospect
|
|
|
|
Heights, Illinois.
|
|
|
|
|
|
|
|
Hafner, Katie and Markoff, John (1991) Cyberpunk: Outlaws and
|
|
|
|
Hackers on the Computer Frontier. Simon and Schuster: New
|
|
|
|
York.
|
|
|
|
|
|
|
|
Wessells, Michael (1990) Computer, Self, and Society. Prentice
|
|
|
|
Hall: Englewood Cliffs, NJ.
|
|
|
|
|
|
|
|
Northey, Margot and Tepperman, Lorne (1986) Making Sense in the
|
|
|
|
Social Sciences. Oxford University Press: Toronto.
|
|
|
|
|
|
|
|
Parker, Donn (1991) "Response to Dorothy Denning", in The United
|
|
|
|
States vs. Craig Neidorf: A Debate on Electronic Publishing,
|
|
|
|
Constitutional Rights and Hacking. Communications of the ACM
|
|
|
|
34:3, March 1991, p. 34.
|
|
|
|
.
|
|
|
|
|
|
|