| OLD HACKERS, NEW HACKERS: WHAT'S THE DIFFERENCE? di Steve Mizrach
 
   
         Apparently, to people enamored of the 'old school' of hackers, 
like Steven Levy or Clifford Stoll, there is a big difference. Indeed, to 
the 'old style' MIT/Stanford hackers, they resent the bestowal of their 
honored title on 'those people' by the media... to many people, 'hacker' 
is reserved for a class of people in the 60s, a certain 'breed' of 
programmer who launched the 'computer revolution,' but just can't seem to 
be found around any more... according to these 'old school' hackers, 
hacking meant a willingness to make technology accessible and open, a 
certain 'love affair' with the computer which meant "they would rather 
code than sleep." It meant a desire to create beauty with computers, to 
liberate information, to decentralize access to communication... 
        But what about the 'new' hackers? Many of the 'old' hackers think 
they don't deserve the name, preferring to call them 'computer 
criminals,' 'vandals,' 'crackers,' 'miscreants,' or in a purely 
generational swipe, 'juvenile delinquents.' The media uses the word 
'hacker' to refer to young, clever computer users who use their modems to 
break into systems without authorization, much as depicted in the movie 
War Games.  And the old school hackers resent this. Many of 
the new hackers aren't good programmers; they are just people without 
ethics who have no reservations about swiping passwords, codes, software, 
and other information and trading them with their friends. They may be 
good at exploiting security holes in systems, but all they succeed in 
doing (say people like Stoll) is destroying the trust on which open 
networks are built. 
          I am interested, needless to say, in the generational aspect to 
this battle over the name 'hacker'. Most of the old hackers of the 60s 
are of course now living in the 90s - Baby Boomers who, like their 
ex-hippie friends, went from 'freak' to 'straight,' finding jobs in 
computer security firms and corporate software conglomerates. And like 
other counterculturalists from the 60s, they just can't seem to figure 
out this Generation X forming the counterculture of the 90s... where's 
the openness? The idealism? These "juvenile delinquents" just don't live 
up to the high moral standards of the 60s nostalgiacs like Levy and 
Stoll. But then, Levy rants about those great hackers who founded Apple 
Computer and launched the PC revolution - those same ex-phreaks, Jobs and 
Wozniak, who actually allowed their company to patent  their system 
hardware and software![ Top ] 
          The "cyberpunks" of the 90s, it seems, just don't live up to 
what people like Stoll and Levy expect of them. And all the old 'hackers' 
go to great pains to define themselves apart from the new breed of 
'hackers,' always groaning in angst when the label continues to be 
applied to them. I would argue that the hackers of the 90s are not  so 
different from the hackers of the 60s, that indeed, the same exploratory, 
antiauthoritarian, liberatory impulses are at work; it is simply that the 
hackers of the 60s do not understand the situation in which we live, and 
this is probably because they read 60s hippie lit rather than 90s 
cyberpunk SF... the 'old hackers' are simply too comfortable to be 
afflicted... they don't understand why the new 'hacker' does what he does. 
         According to Levy, the differences between the old and new 
hackers are stark and clear. The first group strove to create, the second 
strives to destroy and tamper, he says. The first group loved control 
over their computers, but the second group loves the power computers 
gives them over people. The first group was always seeking to improve and 
simplify; the second group only exploits and manipulates. The first group 
did what they did because of a feeling of truth and beauty in their 
activities; the second group hacks for profit and status. The first group 
was communal and closely knit, always sharing openly their new hacks and 
discoveries; the second, he says, is paranoid, isolated, and secretive. 
For Levy, the old hackers were computer wizards, but the new hackers are 
computer terrorists, always searching for new forms of electronic 
vandalism or maliciousness without thought of the consequences. 
        But where Levy sees differences, I see some curious similarities. 
Old-style MIT 'hackers' were rather well-known for getting around locks 
of both the physical and electronic variety. Is there such a difference 
between the righteous anger of the MIT hacker toward the IBM 'priesthood' 
who kept him away from the massive mainframe, and the 90s hacker who 
feels righteous anger over being prevented access from huge commercial 
databases without an expensive account? The old MIT hackers were also 
known for their exploration of the phone system, and exploring 'hacks' to 
make calls to unsuspecting places for free. Indeed, many of the early 
hackers were   phone phreaks, plain and simple, ripping off service from 
the phone company (THE company, AT & T, alias Ma Bell, back then), which 
they resented for its refusal to share the technical information about 
telephony. 
         The 60s hackers were known for their desire for liberating 
information. They openly shared source code; members of the Homebrew 
Computer Club also openly shared with each other the flaws of various 
machines, and 'hacks' to get around their lack of performance. Since Levy 
seems to think that software piracy should not be a crime (since he 
thinks source code should not be copyrighted), his problem with the 'new 
hackers' does not appear to be piracy. Neither does it appear to be the 
open sharing of some admittedly dangerous 'real-world' information taken 
straight from books like the Anarchist Cookbook  on how to 
make bombs and drugs. Rather, it seems to focus around the malicious 
misdeeds of a small minority, dedicated to spreading Trojan horses, logic 
bombs, viruses, worms, and other destructive programs... [ Top ] 
          In actuality, the majority of viruses (such as the Christmas 
virus) are harmless. They eat up small fractions of CPU space and are 
designed, rather than to wipe clean someone's hard drive, to just display 
a message at a given time. They are, in short, pranks - something that 
Levy also points out the old MIT hackers were overfond of. They were 
known for playing complex tricks on people, and were masters of "social 
engineering" - the art of manipulating technocrats by being a good 
bullshit artist - just as the 90s hackers are... their elaborate games 
and pranks often being ways to demonstrate their superiority to the 
faculty, administrators, or other "know-it-alls" who they felt got in 
their way of their access to computers... 
          In "invading" corporate voicemail systems, the modern 90s 
hackers are no different than the 60s MIT hackers mapping out the 
labyrinths of the MIT underground tunnel system. They do it for the same 
reasons: because they are told not to, because the conduits often lead to 
surprising places, because the activity is basically harmless even though 
it is declared unauthorized or even illegal, and because it gives them a 
feeling of mastery and control over a complex problem. The simple fact 
is, most of the 90s hackers are not wantonly malicious or destructive. 
Indeed, many subscribe to an updated 90s Hacker Ethic, declaring that 
they will not "hack" personal privacy or the personal computer user, 
instead declaring that their "targets" will be large, unresponsive 
corporations or bureaucratic government organizations... 
         But the main reason for the difference between the 60s and 90s 
hackers is that the GenXers are a "post-punk" generation, hence the term, 
"cyberpunk." Their music has a little more edge and anger and a little 
less idealism. They've seen the death of rock n'roll, and watched Michael 
Bolton and Whitney Houston try and revive its corpse. Their world is a 
little more multicultural and complicated, and less black-and-white. And 
it is one in which, while computers can be used to create beauty, they 
are also being used to destroy freedom and autonomy... hence control over 
computers is an act of self-defense, not just power-hunger. Hacking, for 
some of the new 'hackers,' is more than just a game, or a means to get 
goodies without paying for them. As with the older generation, it has 
become a way of life, a means of defining themselves as a subculture... 
         Many of them are quite deliberately 'nonviolent' in their 
ambitions. They will not lock others out from their accounts, damage or 
change data without permission, or do anything to jeopardize system 
viability. Instead, they enter computer systems to 1) look around and see 
what's there (if someone breaks into your house, looks at the posters on 
your wall, then locks the door on the way out, have they committed a 
crime?) 2) see where else they can go from where they are (what 
connections can be pursued?)  and 3) take advantage of any unique 
abilities of the machine that they've accessed. MIT's hackers did all of 
these things and more with the various mainframes they were 'forbidden' 
to access and explore... they questioned  the right of technocrats to 
limit access, and openly transgressed   their arbitrary limitations based 
on invoked mantras of the preciousness of computer time. 
         Indeed, the 90s hackers pay a lot of homage to the first 
generation. They have borrowed much of their jargon and certainly many of 
their ideas. Their modus operandi  , the PC, would not be available to 
them were it not for the way the 60s hackers challenged the IBM/corporate 
computer model and made personal computing a reality... their style, 
their use of handles, their love for late-night junk food, are 
all testaments to the durability and transmission of 60s Hacker culture. 
So why are the biographers of the 60s hackers so antagonistic and hostile 
to the new 90s hackers? Do they sense some sort of betrayal of the 
original Hacker Ethic and its imperatives? Is it just the classic refusal 
to pass a torch onto a new generation? 
         Breaking into the root node of a UNIX network or the system 
manager account of a VAX network takes nimble thinking and clever 
programming. It often takes a knowledge of various loopholes in the 
system, and clever tricks that can be done with its coding. It often 
requires unorthodox uses of standard applications. In short, it requires 
hacking in the oldest and best senses of the term. In doing it, many 90s 
hackers seek to expand their knowledge of the system and its 
capabilities, not to sabotage the efforts of others or wreck the system. 
Phreaks, in 'hacking' the phone system, are simply acting in the 
centuries-old tradition of American radicals who have always challenged 
the ways in which corporate and governmental structures prevent people 
from free association with their peers... challenging the notion that "to 
reach out and touch someone" should be a costly privilege rather than a 
right. 
           Someday, the old and new 'hackers' may sit down, and discuss 
their commonalities rather than their differences. They may realize that 
they share an alienation from the existing system. They might find out 
that they have motivations and principles in common. Most importantly, 
they might stop competing with each other for a mantle or title. The old 
hackers might see the ways in which their countercultural visions failed 
to take account of new realities, and they might provide a sense of 
communal vision and purpose for the often backstabbing and 
self-aggrandizing new hackers. If they were to actually team up, it might 
be mean what Bruce Sterling calls "the End of the Amateurs." And the 
beginning of "Computer Lib?" 
Steve Mizrach (aka Seeker1) 
[ Top ] |