HK = [ Faqs ] [ Archive ] [ Community ] [ Map ] [ Search ] [ Link ] = HK
[ Newsletter ] [ MailingList ] [ Blog ] [ Updates ] [ News ]
     
 
Torna all'Hac-K-Menu

HACKER CULTURE(s) by Jonas Löwgren
-- lecture notes, February 23, 2000 --

Introduction
Traditional hacker ethics
New hacker ethics
Origins of hacker culture(s)
Dimensions of hacker culture(s)
Hacker culture(s) as seen from the outside
Selected sources

Introduction

The title of this talk is Hacker culture(s), not Hacker culture. As we shall see, the picture is quite complex. Perhaps complex enough to talk about cultures instead of a culture.

On the other hand, the commonalities that bind members of hacker culture(s) and communities together are fairly clear and strong.

The following pages provide the notes for the talk, attempting to capture the heterogeneity of the hacker culture(s) as well as the commonalities. But first, how is the word hacker defined?

hacker /n./

[originally, someone who makes furniture with an axe]

1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.

3. A person capable of appreciating hack value.

4. A person who is good at programming quickly.

5. An expert at a particular program, or one who frequently does work using it or on it; as in 'a Unix hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.)

6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.

7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence 'password hacker', 'network hacker'. The correct term for this sense is cracker.

The term 'hacker' also tends to connote membership in the global community defined by the net (see network, the and Internet address). It also implies that the person described is seen to subscribe to some version of the hacker ethic (see hacker ethic).

It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled bogus). See also wannabee.

New Hacker's Dictionary, maintained by Eric S. Raymond.

[ Top ]

Traditional hacker ethics

A way of characterizing the commonalities of the hacker culture(s) is to describe a shared ethical platform. The hacker ethics were summarized in its most influential form by Stephen Levy in Hackers: Heroes of the Computer Revolution (Bantam books, 1984). Since then, they have been widely quoted and disseminated.

1. Access to computers--and anything which might teach you something about the way the world works--should be unlimited and total. Always yield to the hands-on imperative!

The "hands-on imperative" is typically interpreted both technically and socially. If you want the publisher of an interesting text to offer a WAP-readable version, for instance, don't complain to the publisher. Learn XML, write your own converter and publish it for others to use and improve (in the spirit of free information, below).

Similarly, if you want changes in society, don't complain but act. A strong interpretation may point towards political activism outside the boundaries of public law.

2. All information should be free.

A close analogy might be the standpoint of indian chief Sitting Bull concerning the colonization of the North American continent: "Land cannot be owned".

The free information credo is at odds with majority views on copyright and proprietary software. A good example is the copyleft policy of the Free Software Foundation. The following piece is taken from the introduction to the (very detailed) GNU General Public License, version 2, 1991.

"The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too."

There are subtle differences between free software and the currently more popular concept of open source. Free software in Richard Stallman's version is a profound view on freedom, community, cooperation and emancipation in the ideal society. Open source concentrates more on development efficiency and co-existence with contemporary business models. However, they can coexist: what is today known as Linux should strictly speaking be called GNU/Linux since a large portion of the software in the Linux distribution comes out of the GNU project.

3. Mistrust authority--promote decentralization.

A theme running through hacker cultures is to argue based on primary sources: facts and information that should be equally accessible. Authority in this context is associated with substituting power for information.

A recent example is the debate concerning the secret documents of The Church of Scientology. When some of the documents were moved into the public domain through appearing in a court trial in the US, they were immediately copied and disseminated in a thousand places on the Internet. Mainly by hackers or people affiliated with the hacker culture(s).

[ Top ]

Operation Clambake is a full-scale site in Norway dedicated to shedding as much light as possible on The Church of Scientology. The disclaimer reads as follows:

"The Church of Scientology is using copyright laws to withhold information from the public. Are they doing this for honest or dishonest reasons? In the case of doubt there is one way to find out. That is to publish their material. Not extracts but in some cases its entirety so there can be no argument about quoting out of context or misinterpreting what was written.

I, Andreas Heldal-Lund, have reviewed the secret materials of Scientology and after careful consideration have concluded that these materials are being kept secret in order to withhold information from the public with the sole purpose of deceiving the public as to the true nature of Scientology. I feel it is my moral duty to society to reveal this information to the public in order to alert them as to its nature. My belief is that the content of this material will clearly vindicate my actions."

4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.

Hacker cultures are meritocracies where positions are based on demonstrated knowledge and achievements. This is well illustrated in the piece below, published in Phrack, #7.

"The following was written shortly after my arrest...

\/\The Conscience of a Hacker/\/

by +++The Mentor+++
Written on January 8, 1986

Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.

But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?

I am a hacker, enter my world...

[ Top ]

Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.

I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.

I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up.
Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.

And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found.

"This is it... this is where I belong..."

I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...

You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.

This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike."

5. You can create art and beauty on a computer.

6. Computers can change (your) life for the better.

The last two lines of the traditional ethics are perhaps not surprising today. They must be understood in their historical context. In the 70s, computers were strange and unfamiliar to most people. In case they meant something, the images mostly had to do with administrative data processing, computing centers, punch cards and teletype interfaces. Art, beauty and life changes were not in the mainstream notion of computers.

[ Top ]

New hacker ethics

Steve Mizrach of the dept. of Anthropology, University of Florida, analyzed several recent hacker texts in the paper Is there a hacker ethic for 90s hackers? (1997). He summarizes his findings in a new set of ethical principles.

Above all else, do no harm.

Do not damage computers or data if at all possible. Much like the key element of the Hippocratic Oath.

Hacking is a quest for knowledge; there is no intrinsic need or desire to destroy. But it is generally held that system-cracking for fun and exploration is ethically OK as long as the cracker commits no theft, vandalism, or breach of confidentiality. However, accidents and pranks that hackers view as harmless may cause the victims to lose time and effort.

Protect privacy.

This is typically reconciled with the free information ethos by separating public information from private. How the line is drawn is, of course, a question of personal (and political) views.

Waste not, want not.

Computer resources should not lie idle and wasted. Using idle time and perhaps leaving suggestions for improved performance is seen as a favor.

Exceed limitations.

"Telling a hacker something can't be done, is a moral imperative for him to try."

The communicational imperative.

Communicating with and associating with peers is a fundamental human right. Some see it as strong enough to motivate violation of laws and regulations.

Leave no traces.

Keeping quiet about your exploits is not only for your protection. It also helps other hackers avoid getting caught or losing access.

Share!

Information increases in value by sharing it with other people. Data can be the basis for someone else's learning; software can be improved collectively.

Fight cyber-tyranny.

Hacking is necessary to help protect the world from dystopian development of global information systems a la 1984.

Trust, but test.

By engaging hands-on with technical and social systems, your discoveries can contribute to improving the systems.

[ Top ]

Origins of hacker culture(s)

There seems to be at least three lines of ancestry leading up to what we call the current hacker cultures. These are the hobbyists, the academics and the networkers.

Hobby hacking originated with radio amateurs as far back as the 20s. A strong interest in electronics provided fertile ground for the first home computers, such as the Altair 8800. Sweden had a home-grown brand early on: the ABC80 in 1978, followed by the ABC800 in 1981.

Some of the home computers were sold as construction kits, fostering the tradition of really understanding the technology.

Home computers such as the Commodore 64, offering color graphics and quality audio, attracted game players and game developers. Cracking the copy protection of the games became a logical application for technical skills and aptitude. Cracked games needed a splash screen where the cracker could claim credit for his work. This developed into the intro, a full-scale multimedia production where technical and artistic skills could be demonstrated. The demos being presented today at demoparties are intros separated from the games they demo.

Academic hacking is generally traced to Massachussetts Institute of Technology (MIT) where The Model Railroad Club developed sophisticated railroad systems in the 50s. The word "hack" was used to refer to technology-based practical jokes or stunts. Its meaning shifted to the technology needed to perform the prank, and later came to mean a clever technical solution in general.

MIT ran a project in the early 60s intended to develop a timesharing computer. This project became the core of the AI lab, where the first academic hacker culture emerged. Students specialized in mathematics and artifical intelligence and spent 30 hours straight in programming sessions instead of going to regular classes. Ideas of free information developed. Several students learned to pick locks in order to better use the equipment in the building. Howard Rheingold captures the spirit well in Tools for thought (1985):

"MIT Bldg 26, MAC Project, 1960

At the moment David walked in, a young man named Richard Greenblatt, who lived on a stereotypical diet of soft drinks and candy bars, and who didn't stop to sleep, much less to change clothing, was explaining to a circle of awed admirers, which included some of the computer scientists who had hired him, how he intended to write a chess playing program good enough to beat a human. Greenblatt's thesis advisor, Marvin Minsky, tried to discourage Greenblatt, telling him there was little hope of making progress in chess playing software.

Six year after he first stumbled upon the inhabitants of building 26, ... David Rodman ... was in the group that watched Greenblatt's 'MacHack' program demolish Hubert Dreyfus, the number one critic of the whole AI field, in a much heralded and highly symbolic game of chess."

Network hacking was initially performed on telephone networks. Phone phreaks developed ways of surfing the phone system, creating connections across dozens of switches and countries using control commands that only the phone companies were supposed to know. Free phone calls could be obtained in many ways. For instance, on certain switches, a straight 2600 Hz tone meant that the line was not busy. If you had a line open and sent a 2600 tone into the receiver, charging of the call would stop.

Some legendary phreaks were Joe Engressia, who was blind and could whistle control tones to perfect pitch, and Cap'n Crunch who got his name from the discovery that the whistle in Cap'n Crunch cereal boxes could be used for control tones. Most phreaks, however, bought or built simple tone generators called blue boxes.

Gradually, computer networks began to develop. Phone companies turned to computer-controlled switches. Network hacking moved from electromechanical phone networks to digital computer networks. With a terminal and a modem, a new world opened.

[ Top ]

Dimensions of hacker culture(s)

Hacker culture(s) today come out of hobby hacking, academic hacking and network hacking. It is more or less based on an ethical code, interpreted and shared in different ways. How can it be understood?

There are a few dimensions that seem to span the field in a useful way.

Hacking --- cracking. Real hackers are careful to point out that malicious hacking activities should properly speaking be called cracking. However, the question is where to draw the line. The police, the corporate world, the judicial system, etc take a fairly restrictive position. Much of what hackers would call exploration for the sake of learning is regularly prosecuted.

Before the web, most network hacking/cracking involved finding computers on the network, getting into them, looking around, perhaps downloading some files and then preparing a back door for convenient entry later on. Some of the pleasure seemed to be in collecting adresses to computers where the hacker had access. Of course, there was also the element of using superior technical skills to bypass the security system.

Hacking and cracking in the late 90s has taken a few more visible forms. Defacing web pages is very popular, given the enormous visibility of the results. This basically means cracking a computer that runs a web server and place your own pages there instead of the original information. Attrition has a large mirror archive of defaced web pages.

Due to the public nature of web and mail servers, they can be cracked also without access to the computer on which they run. Denial-of-service attacks on public servers, which entails sending millions of requests to the servers simultaneously from many sources, are quite frequent. Mail bombing can be seen as a variation on the same theme.

Creating and disseminating a virus is another form of hacking/cracking that has taken off with the increasing penetration of Internet usage. Email is now by far the most common carrier of virus and Trojan horses.

[ Top ]

Purpose. Academic hacker culture views intrusion as a means for learning more about computers and networks. If data are altered, it is typically done as a practical joke. Basically, the hackers view the intrusions as harmless.

Another common hacker argument for exposing security flaws by intrusion is to help build safer systems in the future.

Contrary to the traditional hacker norm of keeping a low profile, many of the web defacement attacks are of the graffiti kind. There is no discernible purpose, only a triumphant message from the crackers. The common expression is "[You have been] owned by group X", together with a graffiti-style tag image.

Hacking/cracking has often been used as a means for personal revenge. It is not unknown for police officers investigating computer crime to receive personal credit card bills and phone bills in huge amounts. The hacker has gained access to, e.g., the phone company and manipulated the records.

Political activism is another reason for hacking/cracking. The Telia web site in Sweden was defaced in 1996 as a result of growing discontent with the monopoly and pricing policy for Internet services. The Swedish Animal Liberation Front attacked Smittskyddsinstitutet and Karolinska Institutet repeatedly on 1998-99 in order to stop unnecessary experiments on animals. An internationally well-known group is PHAIT (Portuguese Hackers Against Indonesian Tyranny) who attacked Indonesian authorities several times in 1997, motivated by the situation in East Timor.

Cyberpunk --- extropism. Linus Walleij defines a cyberpunk as

"a person in a high-technological society who has information and/or knowledge that the ruling powers would rather have kept to themselves."

Cyberpunk is essentially a pessimistic stance on the macro level, where society is seen as structures of global information systems ruling the people. Visions of the future are dystopic. However, the cyberpunk/hacker has the necessary skills to survive and prosper in such a world. Hence the optimistic twist on the individual level of fighting the system.

The notion of fighting oppressive systems extends also to the limitations of the human body. Smart drugs, implants and cyborg mythology are strongly associated with cyberpunk.

Where cyberpunk is dystopic, extropism concentrates on positive outcomes for society. The word extropy is the inverse of enthropy, and it means that we can continue to exceed our limitations by means of new technology. Persistent experimentation and development of technology will lead to greater freedom for the individual and less oppression. A necessary condition is that free individuals (rather than corporations or authorities) take charge of the development.

[ Top ]

Hacker culture(s) as seen from the outside

Journalists, investigators and others encountering hackers/crackers often comment on their obsessive urge to brag about their conquests. One might imagine that a social structure where the only criterion for assessment is knowledge needs showing-off to maintain the pecking order. However, this observation runs counter to the ethical principle of keeping a low profile.

Several interpretations are possible. It might be that the ethical principle deduced by Mizrach should really read "Leave no traces in the computers you hack." Another possibility is that the wannabees boast; established and secure hackers have no need to. A third that journalists, investigators, etc. construct an image of the hacker as they would like them all to be.

What is clear, however, is that the meritocracy of (computer) knowledge can make it hard to avoid arrogance and "in-speak" in the eye of the public. An example might be the disclaimer on Linus Walleij's home page.

"Disclaimer: I, Linus Walleij, have put up these pages for political and personal reasons. I often use well-balanced amounts of rude or explicit language, as well as slang, since I think it is the spice that shakes a sleeping brain awake. If you think this could be annoying to you (ie if you want your brain to stay dumb), please get lost at once. This is a page for mature, mindwise grown-up people. If you decide to mail me on any matter concerning these pages or my person in general, please note that I want constructive criticism. This means you should not write: 'This page makes me sick.' but rather: 'This page makes me sick, because...' and so forth. Mail I find stupid, arrogant, lame, unwise of plain boring will be piped to DEVICE NULL without further treatment. Pressing any of the link buttons above confirms you agree with me on this."

Another highly visible trait of hackers is their devotion to hacking. In 1976, Joseph Weizenbaum (an established AI critic) described the phenomenon of "compulsive programming" in the book Computer power and human reason:

"Wherever computer centers have become established, that is to say, in countless places in the United States, as well as in virtually all other industrial regions of the world, bright young men of disheveled appearance, often with sunken glowing eyes, can be seen sitting at computer consoles, their arms tensed waiting to fire, their fingers, already poised to strike at the buttons and keys on which their attention seems to be as riveted as a gambler's on the rolling dice. When not so transfixed, they often sit at tables strewn with computer printouts over which they pour like possessed students of a cabalistic text. They work until they drop, twenty, thirty hours at a time. Their food, if they arrange it, is brought to them: coffee, cokes, sandwiches. If possible they sleep on cots near the computer. But only for a few hours--then back to the console or the printouts. Their rumpled clothes, their unwashed and unshaven faces, and their uncombed hair all testify that they are oblivious to their bodies and to the world in which they move. They exist, at least when so engaged, only through and for computers. These are computer bums, compulsive programmers. They are an international phenomenon."

A different version of the same description would perhaps focus on the intense concentration, flow-like qualities, personal satisfaction and rich social exchanges in and around a good programming session.

Sherry Turkle interviewed a number of hackers on their relations with computers as part of the data for the book The second self. Her explanation of the computer's holding power concentrates on control and compensation. The computer offers a predictable universe where the user has godlike powers to create and destroy once the necessary skills have been acquired. She also points to the strong aesthetical norms of programming.

The perceived association between hacker culture(s) and computer crime is a major subject. There is no room to treat it properly here. Good sources are Walleij: Copyright finns inte, version 3.0 (in Swedish) and Sterling: The hacker crackdown (Bantam Books, 1992). In passing, it should be noted that (1) traditional hackers are careful to make the distinction between hackers and crackers, (2) many of the computer crimes reported in media would not qualify as hacks, and (3) most of the ethical principles are flexible enough to accommodate various personal purposes and persuasions (including illegal ones).

[ Top ]

Selected sources

This is a short list of what I see as some essential resources. Each of them contains large numbers of pointers and references for further exploration.

Attrition. A collection of resources from and for the hacker cultures. Note in particular the large mirror archive of defaced web sites (sites being modified by crackers).

Free Software Foundation. Describes the foundations and status of the GNU project, launched by Richard Stallman in 1984 to develop a free version of Unix. GNU components are now being widely used together with the more famous Linux kernel.

Katie Hafner and John Markoff: Cyberpunk. Corgi Books, 1993. The stories of three famous hackers: Kevin Mitnick, Pengo and Robert Tappan Morris. Written in journalistic style with a human interest angle, highly readable.

Douglas Hofstadter: Gödel, Escher, Bach. An eternal golden braid. A cult classic among computer scientists (and hackers). Hofstadter connects mathematics, music and imagery with basic AI issues.

Tracy Kidder: The soul of a new machine. 1981. The story of how Data General developed their first minicomputer. Conveys the "Dead Poets Society" feeling of intense collaborative hacking.

New Hacker's Dictionary, maintained by Eric S. Raymond. Language is a strong component of any culture. No exception for hacker culture(s). This dictionary is definitive.

Jörgen Nissen: Pojkarna vid datorn. Symposion Graduale, 1993. A sociological PhD thesis in Swedish about the hobby hacker culture in Sweden.

Phrack. A classic hacker magazine, published for free since 1985 through BBS and more recently the Internet.

Eric S. Raymond: The cathedral and the bazaar. An analysis of why Linux and the concept of open source works.
Homesteading the noosphere. An essay on property and ownership in open source culture.
The magic cauldron. On the economics of open source software.

Howard Rheingold: Tools for thought, 1985. A good piece on the history of the hacker culture(s), with an emphasis on academic hacking in the US.

Bruce Sterling: The hacker crackdown. Bantam Books, 1992. The story of Operation Sundevil, a massive attempt by US authorities to "fight computer crime" and apprehend hackers. The book is available in various file formats from the Electronic Frontier Foundation.

Clifford Stoll: The cuckoo's egg. 1989. Describes Stoll's hunt for a hacker in his system at Lawrence Berkeley Labs, a hunt that takes him to Eastern Europe. The conspiracy angle of Stoll's book is well balanced by Hafner and Markoff's account of the same story (above).

Sherry Turkle: The second self. 1984. A psychological study of hackers (among other groups) and their relations to computers.

Linus Walleij: Copyright finns inte, version 3.0. The best text I have seen in Swedish on hacker cultures. Fairly comprehensive and some of the material on the history of hacker cultures in Sweden is quite unique.

[ Top ]

Released By DaMe`
Visits [1452671]