BEING A HACKER On the meaning of being a hacker by Valerio
"Elf Qrin" Capello
http://www.elfqrin.com
Copyright (C) 1999 Valerio Capello First written: 23JAN2000
v1.1en 26MAR2000
This is a translation from the original Italian version v1.5 r23JAN2000 (first written: 31AUG1999-09SEP1999)
Supervisor for the English language: SirD.
Latest version available from: http://www.ElfQrin.com/docs/BeingHacker.html
Other language versions: Italian - Bulgarian
"But did you, in your three- piece psychology and
1950's technobrain, ever take a look behind the eyes of the
hacker? Did you ever wonder what made him tick, what forces shaped
him, what may have molded him? I am a hacker, enter my
world..." ("The Conscience of a Hacker", The Mentor)
"Fear them not therefore: for there is nothing
covered, that shall not be revealed; and hid, that shall not be
known" (Matthew 10:26)
THE HACKER
Another idiot has been locked up because of committing a senseless act
with little or no thought to the consequences. Law enforcement needs to
look good, the news becomes public domain and the press is unleashed,
using attention grabbing headlines like: "Computer terrorist busted", or
better, a "hacker".
Not only is the term misused, but it is usually only understood to be a
mere synonym for "computer pirate", which is not only limitive, but
completely wrong. Few people, even those who would define themselves as
such, really know what "being a hacker" means.
The WWWebster Online Dictionary (http://www.m-w.com/), at the "hacker" entry
says:
Main Entry: hacker Pronunciation:
'ha-k&r Function: noun Date: 14th century 1 : one that
hacks 2 : a person who is inexperienced or unskilled at a particular
activity "a tennis hacker" 3 : an expert at programming and solving
problems with a computer 4 : a person who illegally gains access to
and sometimes tampers with information in a computer
system
Among the various meanings quoted above, (besides
definition 1, which is obvious...), definition 4 is the one which
generally corresponds to the idea of "the hacker" that the majority of
people have, while definition 3, is the one which is actually closer to
the real meaning of "hacker", even if it is still rather limiting.
A dictionary rarely gives a definative answer, but it is always a good
start. For a more precise definition we can consult a specific
dictionary such as the Jargon File, the most prestigious dictionary of
hacker terminology, "a comprehensive compendium of hacker slang
illuminating many aspects of hackish tradition, folklore, and
humor", begun by Raphael Finkel of the university of Stanford in
1975, and then passed in management to Don Woods of the MIT, up to see the
light of the printed paper in 1983, with the title of "The Hacker's
Dictionary" (Harper & Row CN 1082, ISBN 0-06-091082-8, also known in
the scene as "Steele-1983").
[ Top ]
The on-line hacker Jargon File, version 2.9.10, 01 JUL 1992 (part of
the Project Gutenberg), at the "hacker" entry says:
:hacker: [originally, someone who makes furniture with an
axe] n. 1. A person who enjoys exploring the details of programmable
systems and how to stretch their capabilities, as opposed to most users,
who prefer to learn only the minimum necessary. 2. One who programs
enthusiastically (even obsessively) or who enjoys programming rather
than just theorizing about programming. 3. A person capable of
appreciating {hack value}. 4. A person who is good at programming
quickly. 5. An expert at a particular program, or one who frequently
does work using it or on it; as in `a UNIX hacker'. (Definitions 1
through 5 are correlated, and people who fit them congregate.) 6. An
expert or enthusiast of any kind. One might be an astronomy hacker, for
example. 7. One who enjoys the intellectual challenge of creatively
overcoming or circumventing limitations. 8. [deprecated] A malicious
meddler who tries to discover sensitive information by poking around.
Hence `password hacker', `network hacker'. See {cracker}.
Since this is a specific dictionary, the definition of hacker
here is closer to its original meaning, even if it is necessary to
extrapolate it from the varied proposed meanings in order to obtain the
closest and most faithfull interpretation.
A hacker is a person that loves to study all things in depth
(definition 1), especially the more apparently meaningless details, to
discover hidden peculiarities, new features and weakness in them. For
example, it is possible to hack a book, by using it to equalize the legs
of a table, or to use the sharp edge of one of its pages to cut something.
The main point being that it is used for more than it's conventional
function of being read. But more than this, a hacker soon learns that the
same techniques used for exploiting computer systems can be used to
manipulate people. This is the so-called social hacking. With a
little skilled psychology, the masters of "social hacking" can convince
other people to do what they want (within limits of course, and depending
on the abilities of the "social hacker"), in order to obtain the
information they require. This may sound like an unusual and unatural
practise, but once you take into account that this is performed quite
regularly, in everyday life, by girlfriends, friends and teachers etc. to
obtain what they want from others, it's not that strange, even if hackers
do use a little more skill and technique. Another way of bringing
hacking out from the computer's world, is the so-called vadding
(the term is actually rarely used, but the activity is largely practiced)
this consists of exploring places where the average person doesn't
normally have access, such as basements, roofs of public buildings,
maintenance tunnels, elevator wells and similar places. Sometimes, some of
these activities born inside the hacker scene, grow and eventually
separate, becoming new entities, like phreaking, the term applied
to the world of "hacking" telephones and telephone systems, or the term
carding, which is basically "techno-credit card fraud",.. very
illegal and risky. In short, a hacker has the tendency to use his
skills also beyond of the computer context, and anywhere tends to use the
hacking techniques and to discover what is normally hidden to the common
man. For a hacker, the ability to reason, harness his full brain
capacity and maintain his mind at maximum efficiency levels, is most
important. With a few exceptions, it is unusual that a hacker would
smoke, use drugs, or drink excessively (however beer appears to be the
preferred choice, when alcohol is drunk). Speaking of John Draper, (a.k.a
"Captain Crunch", one of the most legendary phreaker/hackers, famous for
discovering that by sending a tone of 2600Hz over the telephone lines of
AT&T, it was possible to effect free calls), Steven Levy says:
"Cigarettes made him violent": smoking next to him was
extremely hazardous to your health...
[ Top ]
A hacker is certainly a programming maniac, (definition 2): once a
technique has been discovered, it is necessary to write a program that
exploits it. Hackers often spend many day's and night's in front of a
computer, programming or experimenting with new techniques. After spending
so many hours in front of a computer, a hacker gains a remarkable ability
to analyze large amounts of data very quickly. The ability to program
quickly, (definition 4) can be a characteristic of a hacker, but is not
always necessarily so. As far as a hacker is concerned, it is faster to
type on a keyboard, than it is to write things down, many hackers spend
quite a lot of time reflecting over, or analyzing previously written code,
while they are programming. Definition 5 is, in effect, a restrictive
meaning of the word "hacker" since it limits it to a single field (as in
UNIX), it can however be considered as a specialization. Actually in
these cases, especially when it concerns true experts in a field, the
terms wizard or guru are preferred. For example, the
definition "UNIX wizard" in the United States is also recognized
outside of the hacker environment and it can be included in a resume.
Definition 3 may be considered apart: a person that qualifies for this
definition is not neccasarily a real hacker, but a very experienced person
with a good knowledge, who is not neccasarily able to develop hacker
techniques. To make it clearer, think about the differences between a good
author and someone that appreciates a good book.
Definition 7, together with definition 1, are the ones that get closer
to the real essence of the hacker. To study a system, to discover
weaknesses, the peculiarities and hidden features of it, and then use them
to go beyond its limits, with creativeness and imagination. This, in a
certain way, brings us directly to definition 8. The person with these
skills can use his knowledge to try to access information to which he
doesn't have the right to access, and here the discourse gets complicated,
because for a hacker there is no information which he does not have the
right to access. We will get back to this point later, when we will speak
about the "hacker ethic".
Finally, although it has nothing to do with the character of the
hacker, I would like to attract attention to definition 6; for a hacker,
the term hacker is always positive: if he speaks of a "hacker of
astronomy", he speaks of a true expert of that subject. Contrary to this,
in everyday language, according to definition 2 of the WWWebster
dictionary, a "hacker" in a certain field is a person that is not skilled
in that specific field.
After giving the definitions, the Jargon File provides more information
on the meaning of the word "hacker":
The term `hacker' also tends to connote membership in the
global community [...]. It also implies that the person described is
seen to subscribe to some version of the hacker ethic [...].
It is better to be described as a hacker by others than to describe
oneself that way. Hackers consider themselves something of an elite (a
meritocracy based on ability), though one to which new members are
gladly welcome. There is thus a certain ego satisfaction to be had in
identifying yourself as a hacker (but if you claim to be one and are
not, you'll quickly be labeled {bogus}). [...] [or most commonly, the
most used term in these circumstances is "lamer", even if next versions
of the Jargon File use this term in a slightly different context]
[ Top ]
But, perhaps more than anything else, curiosity and above
average intelligence are the signatures of a true hacker. The hacker has
an almost physical need of knowledge of any kind. The hacker is most
certainly a voracious reader, even if his preference is only for
scientific matters or science fiction, and generally one would find many
shelves full of books in his room. But a hacker is not satisfied by the
"ready made" knowledge, of the information that he finds in the books
written for the average person, a hacker wants it all, and collects all
possible information. Schools are institutions that are not able to
furnish all the information that a hacker needs. The governments
and all the public or private institutions have the tendency to furnish
the least necessary information. About this point, Steven Levy in
"Hackers, Heroes of the Computer Revolution" (written in 1984), affirms
that the hackers "are possessed not merely by curiosity, but by a
positive *lust to know.*"
This idea is even clearer in these excerpts took from what is a
considered "the hacker's manifesto": "The Conscience of to Hacker"
(sometimes erroneously reported, in a nearly prophetic sense, as "Mentor's
Last Words"), written by The Mentor on January 8th 1986, and published for
the first time on the e-zine Phrack, Volume One, Issue 7, Phile 3. This
text collects in a few paragraphs, a large part of the hacker philosophy,
with touching results for most true hackers (even if it may be difficult
to think of a hacker as a person that has a heart as well as a brain).
[...]
Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me... Damn underachiever.
[...]
we've been spoon-fed baby food at school when we hungered for
steak... the bits of meat that you did let slip through were pre-chewed
and tasteless. We've been dominated by sadists, or ignored by the
apathetic. The few that had something to teach found us willing pupils,
but those few are like drops of water in the desert.
[...]
We explore... and you call us criminals. We seek after knowledge...
and you call us criminals. We exist without skin color, without
nationality, without religious bias... and you call us criminals. You
build atomic bombs, you wage wars, you murder, cheat, and lie to us and
try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that
of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never
forgive me for.
[...]
[ Top ]
In these words, you will see the frustration of
living in a defective world, that deprives the individuals that wish to
rise above the mediocre, of the very information and resources they
desire, to know what is kept hidden, and it condemns them hypocritically
as criminals.
But the desperate search of knowledge is only one of the
characteristics of the hacker. Another sure one is the pursute of extreme
perfection. An interesting article, is the one that narrates the history
of the first hackers, and of how they developed "Spacewar!" (the first
videogame in history, born as a demo for the TX-0, meant as a "killer
application" for this computer, with all its features exploitable), is
"The origin of Spacewar", written by J. M. Graetz, and published in the
August, 1981 issue of Creative Computing magazine.
One of the forces driving the dedicated hacker is the quest
for elegance. It is not sufficient to write programs that work. They
must also be "elegant," either in code or in function -- both, if
possible. An elegant program does its job as fast as possible, or is as
compact as possible, or is as clever as possible in taking advantage of
the particular features of the machine in which it runs, and (finally)
produces its results in an aesthetically pleasing form without
compromising either the results or operation of other programs
associated with it. But the elegance and the perfection of
hackers is not always comprehensible to the average individual. A hacker
can often be in ecstasy reading some code written by another hacker,
admiring his ability and "tasting" his style, as if he was reading poetry.
For example, normally to exchange the content of two variables (a and
b, in this case), the statement most commonly used is this, which uses a
third temporary variable:
dummy = a : a = b : b = dummy The following
method, instead, doesn't need the third variable, because it exploits a
mathematical peculiarity of the boolean operator XOR:
a = a XOR b : b = a XOR b : a = a XOR b
[ Top ]
Even if
this system is at least three times slower than the first one because it
requires the execution of three mathematical operations, (however it
allows the saving of memory that the third variable would normally
occupy), a hacker will surely admire the ingeniousness and the elegance of
this method, to him it assumes the taste of a Japanese haiku.
Talking about the perfectionism of the hackers, in "Hackers: Heroes of
the Computer Revolution" written by Steven Levy in 1984, in the chapter 2
("The Hacker Ethic"), we read:
Hackers believe that essential lessons can be learned about
the systems--about the world--from taking things apart, seeing how they
work, and using this knowledge to create new and even more interesting
things. They resent any person, physical barrier, or law that tries to
keep them from doing this.
This is especially true when a hacker wants to fix something that
(from his point of view) is broken or needs improvement. Imperfect
systems infuriate hackers, whose primal instinct is to debug them. This
is one reason why hackers generally hate driving cars--the system of
randomly programmed red lights and oddly laid out one-way streets causes
delays which are so goddamned UNNECESSARY that the impulse is to
rearrange signs, open up traffic-light control boxes . . .redesign the
entire system.
In a perfect hacker world, anyone pissed off enough to open up a
control box near a traffic light and take it apart to make it work
better should be perfectly welcome to make the attempt.
It's just in the name of such principle that the Linux
operating system and the Gnu C compiler have been developed, their code is
open and available to be changed and modified by anyone. Lately, many
important commercial software producers also started moving in this
direction, as Netscape: Netscape Communicator 5, will, in fact be the
first software, originally born as a "closed" commercial product, to be
developed with this type of philosophy.
A hacker is never satisfied with the default settings of a program or
of the custom installations, he always has to open the configuration menu
and set the options to get the maximum performance, and to make the
product work as close as possible to his "way". A hacker must be able to
use, to modify and to check all the possible features of a program.
But after all, what motivates hackers? Why do they create programs that
exploit advanced techniques and then distribute them free? And why do they
freely distribute knowledge that was incredibly difficult to obtain? A
good answer could be found in the site of the KIN (Klever Internet
Nothings, http://www.klever.net/),
they are not exactly a hacker crew, but a group of people that write
programs and release them freely on the Internet:
What makes people write software and distribute it for free?
Vanity, you said? Well, maybe.. But after all, what is this business all
about? Is it all about money? Ask anyone - it's not. Most people I know
in the industry will tell you that. Their idea is "just leave me
alone and let me do what I love to do".
In short, it's not
about money. It's about feeling free to do what you want, and, just
possibly, to find someone that appreciates your work.
[ Top ]
THE HACKER ETHIC
The true hacker doesn't have morals, and he would never censor
information or ideas of any kind. An initiative of the Italian priest Don
Fortunato di Noto, (mailto:fortunad@sistemia.it) who in
January of 1998 formed the "Committee of resistance against the
Pedophiles", and who asked for the help of the hacker community to unmask,
capture and close the sites of the pedophiles on the Internet, failed
miserably as it was only supported by self-acclaimed hackers without any
skill. Besides, hackers are tolerant by nature, and rarely get angry,
but they are irritated by people and tasks perceived to be wasting their
time. There are however, some things that hackers can be intolerant of.
One of these is when lies are told, to, or about them, you can say that
hackers are imbeciles (it's an opinion, after all), but you can not say
that they steal chickens. And yet, it would still be unusual that hackers
would hack a site to remove the lies propogated about them. It would be
more typical that they would create another site, refuting the lies
against them. Hacking can be used like as a form of protest, breaking
into and modifying the websites of very well known societies and
government or military corporate entities, can be a way to make public
certain injustices (especially attacks to the liberty of information or
expression) or violations of human rights. The hacks, of the websites of
the CIA (that became Central Stupidity Agency) and of the Department of
Justice, are famous for being hacked with this intention in mind. In
the article "Hacking for Human Rights?" by Arik Hesseldahl (ahess@reporters.net) published on
the online magazine Wired (http://www.wired.com/) dated 14.Jul.98
9:15am, the hacker Bondie Wong, (a dissident Chinese astrophysicist who
lives in Canada, that temporarily disabled a Chinese satellite in 1997), a
member of the famous hacker crew, Cult of the Dead Cow (which in the
beginning of 1999 released the Back Orifice trojan) threatened to attack
the computer networks of foreign companies that did business with China,
causing them serious damages and huge financial losses. In an interview
conducted by Oxblood Ruffin, a former United Nations consultant, and
published on Wired, Blondie Wong says: "Human rights is an
international issue, so I don't have a problem with businesses that profit
from our suffering paying part of the bill".
Contrary to the complete lack of moral judgement (but, above all, of
moralism) of hackers, lies a deep ethical sense, that is something allmost
"religious" in most hackers. About this point, we can go back to the
Jargon File:
:hacker ethic, the: n. 1. The belief that
information-sharing is a powerful positive good, and that it is an
ethical duty of hackers to share their expertise by writing free
software and facilitating access to information and to computing
resources wherever possible. 2. The belief that system-cracking for
fun and exploration is ethically OK as long as the cracker commits no
theft, vandalism, or breach of confidentiality.
Both of these normative ethical principles are widely, but by no
means universally) accepted among hackers. Most hackers subscribe to the
hacker ethic in sense 1, and many act on it by writing and giving away
free software. A few go further and assert that *all* information should
be free and *any* proprietary control of it is bad [...]
Sense 2 is more controversial: some people consider the act of
cracking itself to be unethical [...] But this principle at least
moderates the behavior of people who see themselves as `benign' crackers
(see also {samurai}). On this view, it is one of the highest forms of
hackerly courtesy to (a) break into a system, and then (b) explain to
the sysop, preferably by email from a {superuser} account, exactly how
it was done and how the hole can be plugged --- acting as an unpaid (and
unsolicited) {tiger team} [The "tiger team" derives from the U.S.
military jargon. These people are paid professionals who do hacker-type
tricks, e.g., leave cardboard signs saying "bomb" in critical defense
installations, hand-lettered notes saying "Your codebooks have been
stolen" (they usually haven't been) inside safes, etc. Serious successes
of tiger teams sometimes lead to early retirement for base commanders
and security officers].
[...]
Breaking into a system is not seen by the hacker
as a criminal action, but like a challenge. The idea is not to damage the
"victim", but to find a way to penetrate its defenses. It's the
intellectual challenge, the curiosity, the will to experiment and to
explore, this is what moves the hacker, not the will to damage someone or
something, and not even to obtain personal profit.
[ Top ]
In another writing of The Mentor, "A Novice's Guide to Hacking- 1989
edition", dated December 1988, the author opens the essay with a call to
the ethics of the category, to which follows a list of "suggestions
for guidelines to follow to ensure that not only you stay out of trouble,
but you pursue your craft without damaging the computers you hack into or
the companies who own them":
As long as there have been computers, there have been
hackers. In the 50's at the Massachusets Institute of Technology (MIT),
students devoted much time and energy to ingenious exploration of the
computers. Rules and the law were disregarded in their pursuit for the
'hack'. Just as they were enthralled with their pursuit of information,
so are we. The thrill of the hack is not in breaking the law, it's in
the pursuit and capture of knowledge.
In a file titled "The
Hotmail Hack" written by Digital Assassin of the "United Underground" (or
"U2", for short), in which a weakness of the HotMail system is
illustrated, through which it is possible to enter into the mailbox of
another person, the author, at a certain point interrupts the explanation
with these words:
....but before I tell you how to use that line, I'm going to
side track for a little theory behind this hack. Because there's NO
point in a hack, if you don't know how it works. That is the whole idea
of hacking, to find out how systems work.
These are clear
examples of what the real intent of a hacker is when he breaks a system.
It's very close to the idea of a child that opens a toy to see how it
works. The difference is that the hacker tries not to destroy the toy
(aside from the fact that the toy is not his own...).
Anyway, let's see the specific definition of the "cracker", according
to the Jargon File:
:cracker: n. One who breaks security on a system. Coined ca.
1985 by hackers in defense against journalistic misuse of {hacker}
(q.v., sense 8). An earlier attempt to establish `worm' in this sense
around 1981--82 on USENET was largely a failure.
Both these neologisms reflected a strong revulsion against the theft
and vandalism perpetrated by cracking rings. While it is expected that
any real hacker will have done some playful cracking and knows many of
the basic techniques, anyone past {larval stage} is expected to have
outgrown the desire to do so.
Thus, there is far less overlap between hackerdom and crackerdom than
the {mundane} [the term "mundane" is taken from the Sci-Fi fandom and
identifies everything outside the world of the computer science, or the
hacking] reader misled by sensationalistic journalism might expect.
Crackers tend to gather in small, tight-knit, very secretive groups that
have little overlap with the huge, open poly-culture this lexicon
describes; though crackers often like to describe *themselves* as
hackers, most true hackers consider them a separate and lower form of
life.
Ethical considerations aside, hackers figure that anyone who can't
imagine a more interesting way to play with their computers than
breaking into someone else's has to be pretty {losing} [on the other
hand, they have the same consideration for the people who use the
computer in an absolute conventional way, such as only to write
documents or to play] [...]
[ Top ]
Furthermore, about the
"cracking" itself, the Jargon File says:
:cracking: n. The act of breaking into a computer system;
what a {cracker} does. Contrary to widespread myth, this does not
usually involve some mysterious leap of hackerly brilliance, but rather
persistence and the dogged repetition of a handful of fairly well-known
tricks that exploit common weaknesses in the security of target systems.
Accordingly, most crackers are only mediocre hackers.
However, This is a superficial and reductive vision. In fact,
as it is easily imaginable, there exist people, that are as experienced
with computers and as thirsty of knowledge, that however don't have any
respect of the hacker ethic and don't hesitate to perform actions meant to
damage computer systems or other people. They are the so-called
Dark-side hackers. This term derives from George Lucas' "Star
Wars". A Dark-side hacker, just like Darth Vader, is "seduced by the
dark side of the Force". It has nothing to do with the common idea
of "good" and "bad", but it's closer to the idea of
"legal" and "chaotic" in Dungeons&Dragons: In substance,
the dark-side hackers are accorded the same dignity and recognized as
having the ability of a hacker, but their orientation makes them a
dangerous element for the community. A more common definition, reserved
for those that damage someone else's computer systems without drawing any
benefit from it, (therefore for pure stupidity or evilness), it is that of
Malicious hackers.
More recent versions of the Jargon File (in which some most obsolete
terms have been removed), as the version 4.0.0, 24 JUL 1996, makes clear,
not only the distinction between hacker and cracker, but also between the
entire hack scenes and other parallel realities, like piracy, and the
"warez d00dz", who collect an impressive amount of software (games
and applications, or better said "gamez" and "appz"), that
they are never likely to use, and whose greatest pride is to get software,
break its protections, and distribute it on their website before their
rival crew, where possible, within the same day it was released ("0-day
warez").
One could think that the Jargon File speaks only in theory, and that it
describes the hacker ethic in a fantastic and utopian way. This is not so,
hackers really are attached to their principles. The following is a
practical example concerning one of the most famous hacker crews, the LOD
(Legions Of Doom, that takes its name from the group of baddies in the
series of cartoons of Superman and his Superfriends), of which The Mentor
was also a member during the years 1988-89 (the already cited author of
"The conscience of a Hacker").
[ Top ]
In "The History of LOD/H", Revision #3 May 1990, written by Lex Luthor
(founder of the crew, from the name of the baddie in the movie Superman
I), and published on their e-zine "The LOD/H Technical Journal", Issue #4,
released on May 20, 1990 (File 06 of 10), we can read:
Of all 38 members, only one was forcefully ejected. It was
found out that Terminal Man [member dof the LOD/H in 1985] destroyed
data that was not related to covering his tracks. This has always been
unacceptable to us, regardless of what the media and law enforcement
tries to get you to think.
Yet, not all agree upon the same
principles, and there are some "grey areas": for example, taking
possession of objects that allow you to access information, or pursuing a
personal purpose, can be considered "ethical" by some. A specific example
could be "grabbing": the theft of things like keys, magnetic cards,
manuals or technical schemes, anyway this is a debatable activity, since a
hacker prefers to copy rather to subtract, not only to not damage the
"victim", but also to avoid leaving traces of his intrusion. A more
acceptable and legal variant is "trashing", that consists in
looking inside the garbage of the subject, searching for objects and/or
useful information.
But breaking into computer systems is only a small activity amongst the
many things that hackers are involved in, and the aversion against the
virtual vandal actions are a small part of the hacker ethic. The hacker
ethic is something greater, almost mystic, and draws its origins from the
first hackers, those that programmed the TX-0, using the first available
computers in the big American universities like MIT or Stanford. From
the already cited "Hackers, Heroes of the Computer Revolution" by Steven
Levy:
Something new was coalescing around the TX-0: a new way of
life, with a philosophy, an ethic, and a dream.
There was no one moment when it started to dawn on the TX-0 hackers
that by devoting their technical abilities to computing with a devotion
rarely seen outside of monasteries they were the vanguard of a daring
symbiosis between man and machine. With a fervor like that of young
hot-rodders fixated on souping up engines, they came to take their
almost unique surroundings for granted, Even as the elements of a
culture were forming, as legends began to accrue, as their mastery of
programming started to surpass any previous recorded levels of skill,
the dozen or so hackers were reluctant to acknowledge that their tiny
society, on intimate terms with the TX-0, had been slowly and implicitly
piecing together a body of concepts, beliefs, and mores.
The precepts of this revolutionary Hacker Ethic were not so much
debated and discussed as silently agreed upon. No manifestos were issued
["The Mentor"'s one, very polemic, was written only about twenty years
later]. No missionaries tried to gather converts. The computer did the
converting [...]
[ Top ]
Shortly, Steven Levy sums up the "hacker
ethic" this way:
Access to computers -- and anything which might teach you
something about the way the world works -- should be unlimited and
total. Always yield to the Hands-On imperative.
All information should be free.
Mistrust Authority. Promote Decentralization.
Hackers should be judged by their hacking, not bogus criteria such as
degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.
LIKE ALADDIN'S LAMP, YOU COULD GET IT [THE COMPUTER] TO DO YOUR
BIDDING.
THE LAMER
From "The Hacker Crackdown - Law and Disorder on the Electronic
Frontier" by Bruce Sterling, Bantam Books, 1992. (ISBN 0-553-08058-X,
paperback: ISBN 0-553-56370-X, released as free electronic text for
non-commercial purposes)
There are hackers today who fiercely and publicly resist any
besmirching of the noble title of hacker. Naturally and understandably,
they deeply resent the attack on their values implicit in using the word
"hacker" as a synonym for computer-criminal.
[...]
The term "hacking" is used routinely today by almost all law
enforcement officials with any professional interest in computer fraud
and abuse. American police describe almost any crime committed with, by,
through, or against a computer as hacking.
If the
differentiation between hacker, cracker and dark-side hacker can result a
very tiny distinction for the ones who live outside of the computer scene,
nobody, especially a journalist, should confuse a hacker with the poor
idiot that was locked up for using, with no thought to the consequences,
programs that he found somewhere. (even if using the term "hacker" does
sell more newspapers... The difference between hackers and journalists is
that the aforementioned have ethics, the latter, not even a sense of
modesty... but this is often simply mere ignorance).
Let's take as an example the following article published on the Italian
newspaper "L'Unione Sarda" (http://www.unionesarda.it/), by
Luigi Almiento (almiento@unionesarda.it).
[ Top ]
POLICE.
The arrested hacker is a surveyor,
aged 25
Files were stolen from the computers of internet
"navigators", with the aid of a virus spread on the Internet
Many people from different national service providers, recently
learned to their own detriment, that it is better not to stay and chat
to strangers on the chat-lines of the Internet. This occured when
a hacker aged 25, obtained the user names and passwords of their
dial up accounts, while they were on-line.
[...]
"Harris", explains the lieutenant Saverio Spoto, commander of the
Police Station [actually they are "Carabinieri", not the normal Police,
because in Italy there are two different polices, don't ask why], «
contacted his victims through Icq, a "talking place", offered by many
Internet providers». During these "written talks", using an access key
he acquired that gives false information, G. F. sent the Netbus virus to
the computers of his victims. This allowed him to "navigate" the hard
drives of the computers of these people while they were connected to the
internet. Harris also had a site, which offered pornographic pictures,
pirate-programs and files of every kind, and whenever someone connected
to his address, they were immediately infected by the computer virus.
[...] In a few words, lieutenant Spoto succeeds in
showing his complete ignorance of the subject: he gives an abominable
definition of ICQ, defines Netbus as a virus rather than a trojan (which
means he doesn't have any idea of how it works), and still not being
satisfied with this, attributes it with a contagiousness similar to the
Ebola virus: to be infected simply by connecting to an Internet address
sounds like something supernatural. Then, he shamelessy concludes with the
invitation "If anyone has had contact with Harris, and thinks that
their files may have been forced, they can come to us at the Police
Station". If everyone at the Police Station are as experienced as
he is, it would be preferable to keep the Harris' "virus" rather than
allowing them to put their hands anywhere near your computer.
Besides, these self-acclaimed hackers are almost never bust because of
a police operation, (unless they caused a lot of trouble), but because
they have the stupid habit of boasting of their actions in chatrooms or
even in real life. Often in front of total strangers, that are often
police officers or people close to the law enforcement environment, (such
as the child or the girlfriend of a police officer). In fact, the
conclusive part of the article regarding "Harris" says: "The
investigators did not explain how, but only that they had succeeded in
identifying the surveyor": obviously the law officers would like
people to think that they identified the guilty person by means of some
complicated technique, pursuing the information packets or something in
this line, rather than admitting that they only had to make a few
enquiries on IRC channels.
The hacker is the one that develops the exploit, and eventually creates
a program based on this expoit. People that blindly use these programs
because they found them on the Internet, or even worse, because a friend
passed them on to them, are merely lamers, that only have a vague idea of
how to use the tool they have in their hands and they know nothing about
computer systems, programming, or how to cover their tracks. Often these
self-acclaimed hackers, self infect themselves with a virus or a trojan
they just downloaded, due to their incapabilities. Putting these
programs in the hands of the average person is like giving a loaded gun to
a five year-old.
The fact is, that up to the early '80s, computers were only intended
for hackers, specialized personnel or students. Only later did they appear
on the desks of offices and in houses. The first home computers replaced
the primitive consoles of videogames like the Atari 2600, the
Intellivision and the Colecovision (the revolution was lead by the
Commodore 64 and the Sinclair ZX Spectrum), but still across the whole
world there was a "computer culture" throughout the '80s, there were
published magazines that taught programming (mainly BASIC, as well as
Machine Code) and very advanced techniques worthy of the best hackers.
Then during the '90s, Apple and Microsoft's dream started to come true, "a
computer on every desk and in every home". The computer became a common
appliance available to almost everybody, the general level of the
magazines started to drop, and almost all were confined to publishing
articles about the latest hardware and software, or advice on how to use
commercial applications. This change in the computer world that made
computers not only the sole domain of the hackers, but for everyone, has
certainly had some positive general effects, but it proved to be a double
edged sword, especially with the advent of the Internet. These days anyone
can have powerful tools that inflict damage on other people, real "digital
weapons", without having a clue about how they work or how they should be
"handled". The average guy can get locked up just for perpetrating what he
thought was a "cool" joke, even if it was in bad taste.
[ Top ]
All those lamers-wannabe-hackers should better satisfy their needs with
APEX v1.00 r10/8/91, a nice program written by Ed T. Toton III (however
the original idea is older) that simulates the connection to different US
government and military computers (like those of NORAD, or of NASA), among
other things it is also possible to pretend that you are the President of
the United States of America, and enter the system that controls the
nuclear weapons. With a bit of ability and practice, it is possible to
convince some friends that you are really trying to force the US computer
systems, and pass the time having good clean fun, without hurting anybody,
risking a jail sentence and/or offending the hackers by trying to pretend
to be what you are not.
But besides this, outside of the "criminal" context, something that
bothers hackers is the ever increasing mass of self-claimed computer
"experts", that actually don't know much more than how to turn on a
computer and launch a program, and they fill their mouthes with loads of
technical words about which they know nothing. At this point, it is
very interesting to read this text from the already quoted home page of
the KIN:
I remember [...] When writing software was closer to art and
magic than to business and/or just coding. I miss that now. What
happened after that? Well, tons of fast graduates appeared who could
only do Basic or Clipper/DBase programming, who pretended to be the
best. They could wear suites and had money and relatives... I called
them nephews. How many times were you in the situation when you
gave the best offer, and you simply feel you HAD to write this software
- but in the end your client says something like: "I'm really sorry, but
I just got a call from my wife and her nephew works for this
company in Nebraska who are certified Basic engineers so we'll have to
give the contract to them?" The nephews produced terrible
software which led to terrible disappointments in the industry ('I've
invested so much money in computers and it's not really working for
me').
[...] The Net gives you a chance to be first creative and then think
about business. Let's use it now - before nephews will get
their certified degrees.... Sadly, a crowd of
nephews are already working, with or without certified degrees,
and armed with programs like Front Page or Publisher
creating websites, filling their big mouths with words like FTP and
client-server application, even if they don't know what they mean or what
they are talking about. Luckily, the Net is large and, - at least for
the moment, - it generates its own rules by itself. There is room for
everyone.
[ Top ]
|