hack7.txt

  1. Directory
  2. History
  3. hack7.txt

Concordia University, Montreal, Quebec

Dept. of Sociology and Anthropology



Honours Seminar - Soci 409/3

Submitted April 27, 1994

--------------------------------------



Computer Hackers: Rebels With a Cause



by Tanja S. Rosteck







Introduction





     Since the introduction of the personal computer in the late

1970s, the vocation of computer hacking has not only grown in scope

and membership, but the dynamics of the institution have changed as

well, as a result of the changing role of technology in society.

Consequently, the public image of the "typical" hacker has been

transformed from harmless nerd to malicious techno-criminal.

Fuelled by media sensationalism and corporate zealousness, their

activities have been criminalized and hackers are now being legally

persecuted on a scale disproportional to the actual threat they

pose.  Hackers want their motivations and ethics to be viewed as

legitimate, or at least understood, instead of being simply written

off as devious teenagers who have nothing better to do than crash

every available computer.



     Despite this, there has not been much sociological research

done on hackers and their culture.  I find this strange; the

academic community widely accepts the concept of the "Information

Society", yet this future version of common society has not been

given its due within the discipline of sociology.  The prospect of

a dual-class society, in which the population is segregated into

the information-rich and the information-poor, certainly qualifies

as a serious social problem.  The computer hacker community, and

the important role this subculture plays in the Information

Society, must therefore be studied with equal attention.



     Most of the available studies approach the subject from one of

two perspectives: one, a criminological perspective, employing

deviance theory to explain the formation and organization of the

hacker community; two, a civil-liberties approach that focuses on

current computer-crime laws and how apprehended hackers are being

denied their Constitutional rights.  (All such studies focus on

United States constitutional law - a similar comprehensive

treatment on Canadian hackers has not yet been done.)



     Although these approaches are essential to understanding the

hacker culture, it must be also be studied from a number of diverse

perspectives in order to properly show its depth and richness of

content.  Therefore, this project will analyze the hacking

subculture as a form of organized revolutionary collective, by

utilizing a theory of social movements developed by Stewart, Smith,

and Denton (1984).  Through its activities, this subculture

actually plays a vital role in the progression of technology, and

also performs a regulatory function for social control, by

protesting, mocking, and subtly undermining state and corporate

control through computers and related technologies.



     It will be shown that the hacker's relatively harmless

activities are forms of such protest; yet, this cannot be

effectively vocalized to the public because of the nature of the

activities, ie., hacking is widely considered illegal.  As with any

revolutionary subculture, the hacking movement is stigmatized,

discredited, and persecuted by the media and corporate culture as

juvenile, disruptive, and criminal.  And, all the while, being

generally misunderstood.  Because of this problem, it is necessary

to bring the hacker's plight to the attention of sociologists

through a theoretical framework; that is the primary purpose of

this paper.



     Because of the lack of current, comprehensive studies

available, this is a largely exploratory project.  By surveying

common hacker communications, the various social and political

themes of their activities can be examined, and conclusions drawn

about what hacking represents for the participants.  Hacker

communications on electronic bulletin board systems (BBSes) -

electronic message and file transfer bases that are connected to by

a computer and modem - are generally considered "underground".

Private, heavily screened, and generally short-lived, these

bulletin boards are invisible to the general public, and most

require private invitation.  Such types of communication are

therefore difficult to observe and study; a different channel of

hacker communication will be utilized here.



     As with any subculture which has been sparsely studied,

various definitions of what constitutes a "hacker" abound, and

these definitions vary according to the socio-political position of

the defining group or individual.  For the purposes of this study,

hackers are defined as computer enthusiasts who have an ardent

interest in learning about computer systems and how to use them in

innovative ways (Denning, 1991:25).



     This definition, therefore, does not include, for instance,

malicious hackers who deliberately crash systems and delete files,

but those hackers who explore systems purely for the intellectual

challenge and leave no traces of their wanderings.  In addition,

there are often misuses of the term, as the computer underground is

made up of not only hackers, but other kinds of computer

enthusiasts - for instance, phreakers, software pirates, and

carders as well.  For a complete discussion of the organization and

topography of the computer underground, see Meyer, "The Social

Organization of the Computer Underground", 1989.





Literature Review



     As previously mentioned, the hacker culture is a relatively

new phenomenon and major writings on it have only begun to surface

in the past 10 years, beginning with the 1984 publication of Steven

Levy's landmark work, _Hackers: Heroes of the Computer Revolution_.

Levy examines the evolution of the Hacker Ethic, a sextet of credos

that emerged from the activities of the "pioneer" hackers of the

late 1950s:



     1.   Always yield the Hands-On Imperative!  Access to

          computers - and anything else which might teach you

          about the way the world works - should be unlimited

          and total.



     2.   All information should be free.



     3.   Mistrust Authority - Promote Decentralization.



     4.   Hackers should be judged by their hacking, not

          bogus criteria such as degrees, age, race, or

          position.



     5.   You can create art and beauty on a computer.



     6.   Computers can change your life for the better.



     (Levy, 1984)





     This original code of ethics forms the political basis of the

modern hacker's activities.  Although the methods used by the

hacking community have changed somewhat over time, the principal

motivations and ethics have remained the same.  This point is

reiterated in several studies and commentaries (Felsenstein, 1992;

Meyer, 1989; Sterling, 1992).  There is also much support for the

contention that the hacking community is rich in cultural diversity

(Levy, 1984; Hafner and Markoff, 1991; Meyer and Thomas, 1990;

Wessels, 1990).



     However, contradictory findings are available; there are also

those studies and media reports that reinforce the stereotypical

image of the hacker as a teenage loner, devoid of social skills,

who is often petty and malicious in their actions and hold

absolutely no morals or ethics whatsoever (Forester, 1987; Parker,

1991; Stoll, 1989; Turkle, 1983).  Sensationalist "pop culture" TV

shows such as Geraldo and NBC Dateline have featured episodes on

hackers; such episodes are wildly exaggerated in their claims and

portray the featured teenage hackers as brilliant-but-devious

thieves that spend their days stealing credit information.



     These latter works are often ill-researched; their opinions

and "facts" come not from extensive observation, contact with the

diverse hacker community, or investigations into the motivations

behind the actions of hackers, but rather from media reports and/or

encounters with only one particular breed of hacker.  To base

entire judgements on the findings from a segment of a culture,

rather than a representative whole, leads to inaccurate reports and

certainly does the hacker community no good in having their side

properly understood.



     Reports like these simply perpetuate the popular image of the

lonesome computer criminal, without making crucial divisions

between the anarchists and the explorers, for instance.  Yes, there

_are_ hackers who destroy files and crash systems intentionally, but

they certainly do not comprise the overwhelming majority of

hackers; they are in fact only a small percentage.  Many hackers,

as is their primary intention, go completely unnoticed on the

systems they choose to hack and are never discovered.  Leaving no

path or trace is of the utmost importance to hackers.



     And at this point, many people assume we would then

     proceed to copy everything we find and then trash the

     system so we could then sell the only remaining copy of

     the data to the highest bidder, preferably a foreign

     agent or the richest competitor of the company...



     It makes no sense.  We thirst for knowledge and

     information, and then you can possibly think we are going

     to destroy that which is sacred to us? To take away

     someone else's chance to succeed in getting in as we did?

     To fuel an already terrible reputation and increase our

     chances of getting caught and thus have our lives and

     careers effectively ruined? ("Toxic Shock", 1990)





     For this reason, it is often difficult to estimate the number

of active hackers at any given time (Denning, 1990; Landreth,

1989).  Not only is leaving no trace on a system intellectually

challenging and part of the "hack", but leaving a trace makes it

much easier to lead the law enforcement authorities right to you -

and, most importantly, any detection will likely lead to the

hacker's stolen user account to be changed or deleted by the system

administrator.



     On the other hand, the studies and commentaries from the

hacker's point of view are often written by current or ex-members

of the computer underground.  This "insider's view" is most likely

to present a more balanced picture, of the type that only a member

of the studied culture can produce.  These studies explain the

primary motivations behind hacking and how the original code of

ethics is adhered to in the modern computer community.

Publications such as _Computer Underground Digest_ and _2600: The

Hacker Quarterly_ strive to show a balanced view of hackers that is

both academic and well-debated, as a contrast to often erroneous

media hype.



     In addition, the literature strongly supports the notion that

the hacking culture contains a strong element of rebellion and/or

(Denning, 1990; Hollinger, 1991; Levy, 1984; Meyer and Thomas,

1990; Sterling, 1992).  Hacker groups often compile their own

newsletters and electronic journals, as well as debate topics on

BBSes, many of which are devoted strictly to those with a

rebellious and anarchist bent.  Such electronic publications will

be discussed in detail in Methodology, and will comprise the data

set for this project.





Theoretical Approach



     As stated earlier, the majority of approaches to studying

hackers are either criminological or civil-liberties ones.  This

paper will employ theory of social movements, in order to

demonstrate the existence of socio-political protest within the

hacker culture.  Stewart, Smith, and Denton (1984) outline the six

essential requirements for the existence of a social movement:



     1.   A social movement has at least minimal

          organization.

     2.   A social movement is an uninstitutionalized

          collectivity.

     3.   A social movement proposes or opposes a program for

          change in societal norms, values, or both.

     4.   A social movement is countered by an established

          order.

     5.   A social movement must be significantly large in

          scope.

     6.   Persuasion is the essence of social movements.



     Through the application of this criteria, the hacking

subculture can clearly be considered a social movement:



1.   Minimal organization: the hacking culture has a significant

     membership of "followers", and its share of "leaders".  Such

     leaders may be "gurus" - programming experts who are legendary

     for their knowledge and helpful expertise (Raymond, 1993) - or

     outspoken members of the community, such as "Emmanuel

     Goldstein" (editor and publisher of 2600: The Hacker

     Quarterly).  Hackers often form small groups of their own,

     which network with other groups through various channels of

     communication; this type of organization efficiently serves

     the needs of the community without the necessity of a large-

     scale single organization.



2.   Uninstitutionalized collectivity: The social movement is

          always an "out group" and is criticized for not handling

          the controversy through normal, proper channels and

          procedures - even when the channels and procedures are

          denied to the movement.  The movement has virtually no

          powers of reward and punishment beyond personal

          recognition and expulsion, and expulsion often leads to

          competing organizations created by the exiled. (Stewart,

          Smith, and Denton, 1984: 5)



     Hackers have always been considered an "out group", in schools

     (where the hackers are simply "nerds") and in larger society

     (where they are labelled "criminals").  They are not

     considered part of any social institution.  In addition, they

     are often denied their own voice in the mass media, which

     often leaps at chances to discredit and undermine members of

     the hacking community.



3.   Proposes or opposes change: this is what the hacking culture

     is all about.  Hackers wish to change the attitudes of the

     mass public towards technology, and believe above all that

     knowledge is power.  If people are not willing to learn all

     they can about technology, they are allowing themselves to be

     controlled by state and corporate power; therefore, their

     activities both oppose current norms and propose new ones.



4.   Countered by an established order: The enemy of hackers are

     those who try to oppress them the most - the state and large

     corporations.  Hacking, as a form of socio-political protest,

     is therefore vilified and denounced through the media by these

     two institutions.  Hackers' innate knowledge of this manifests

     itself in various forms: in anarchist collectives, in anti-

     establishment collective action (Meyer and Thomas, 1990), and

     the fact that corporate and state computers are most often the

     intended targets of hackers.



5.   Significantly large in scope: As stated earlier, it is often

     difficult to estimate the number of hackers currently

     operating because of the lack of trace they leave on systems.

     However, there have been several estimates as to the number of

     hacker bulletin board systems currently operating - another

     difficult survey because most hacker BBSes are "underground"

     and the phone numbers are not widely available - Meyer and

     Thomas (1990) estimate that there are currently a few hundred

     in the United States alone, compared to over a thousand non-

     underground boards.  Hacking is an international phenomenon,

     and its membership cuts across ethnic, racial, gender, and

     vocational lines.  For instance, there have been many

     documented reports of extensive hacking activity in Europe

     (Hafner and Markoff, 1991; Stoll, 1990).



6.   Persuasion:    The typical uninstitutional, minimally-

                    organized social movement enjoys few means of

                    reward or punishment necessary either to

                    coerce people to join or to remain loyal to a

                    cause or to coerce the established order to

                    capitulate to all or some of its demands. ...

                    Persuasion is pervasive when a movement

                    attempts to bargain.  For instance, a social

                    movement that decides to bargain must convince

                    both supporters and opposition that it is

                    serious, that it is operating from a position

                    of strength, and that it has something of

                    value to exchange for concessions. (Stewart,

                    Smith, and Denton, 1984: 11)





     Persuasion, in this case, is also present.  For the first part

of the defintion, the hacking culture complies by offering a subtle

system of reward or punishment to its members.  For instance, the

code of ethics is strongly enforced; if a member derides this and

deliberately deletes some files, for instance, other hackers will

in turn deride him or her.  Snitching, backstabbing and turning one

another in to the authorities is not uncommon ( Hafner and Markoff,

1991; Sterling, 1992).  This is done primarily out of fear and

mistrust of authority and the law - that if they do not offer

information, they will be prosecuted as an associate in the crime -

rather than out of spite for a fellow hacker.



     As a bargaining chip with state and corporate powers, hackers

offer the explanation that they are doing them a favor by

unearthing security holes in their systems (Denning, 1990;

Goldstein, 1990; Hittinger, 1991; Landreth, 1989.)  In the words of

one hacker:



     A major problem in Cyberspace is the lack of

     communication between hackers and non-hackers.

     Corporations are fully entitled to their privacy, and so

     they feel threatened by the hacker "menace". ... If

     hackers and corporations and security companies and

     software companies, etc., were to overcome their

     differences much could be done.  By trading bits and

     pieces of knowledge, the two opposing groups could

     together develop revolutionary advances in computing that

     would benefit all.  ("The Dark Adept", 1990)



     Therefore, through this model of social movement construction,

the assertion can be made that the hacker community indeed

comprises such a movement.  An analysis of relevant data will

further support this conclusion.





Data and Methodology



     This project utilizes an ethnographic approach, using

qualitative data and document analysis, to studying the hacker

culture.  By analysing various electronic hacker journals and

commentaries, support for the theory of hacking as a social

movement, employing socio-political protest, can be found.  As

discussed previously, "underground" communications such as those

found on BBS message bases provide much richer and representative

sources for study; hacker journals and commentaries are mainly

representative of only the more outspoken members of the culture.

However, there are several methodological problems inherent in

gathering BBS data.



     Firstly, hacker BBSes are very well-guarded, and difficult for

an outsider (even a well-meaning researcher) to access.  There are

"new-user" questionnaires to fill out, and such questionnaires

usually include technical questions, in order to test the potential

worth of the new user (Meyer and Thomas, 1990).  Sometimes the new

user is given a small test, such as finding the unlisted phone

number to a certain computer, or asked to provide a piece of

information such as a account name and password to a well-secured

corporate system.



     Such tests serve as filters for worthy and un-worthy potential

new members; it is imperative that new users be screened properly.

If a system operator (referred to as a "sysop" - the one who

maintains the bulletin board system) does not screen users

properly, any kind of computer user could gain access - even a

police officer or government agent.  It is in the sysop's best

interests to weed out unsuitable members, for if the user is not

going to contribute in the sharing of information on the board,

there is really no use for them; if all they do is constantly take

information or files and not contribute anything equal in value

(referred to as a "sponge"), they are ridiculed and their account

deleted from the board.



     Secondly, there is an innate mistrust of new users among the

hacker community.  This is fuelled by the fact that police officers

or government agents often try to gain access to the board under

false pretenses - and quite a few succeed.  Anyone, upon discovery,

claiming to be simply a sympathetic reporter or researcher will

likely be instantly shut out, and blacklisted on other hacker BBSes

- the word gets around fast.  The mode of computer communications,

where you cannot see, hear, or physically speak to another person,

makes it easy to masquerade as someone you are not.



     Law enforcement people with an excellent technical knowledge

of computers and some conception of the underground culture can

easily pass as a hacker.  For this reason, phone numbers of hacker

BBSes are closely guarded and are not publicly distributed.  Lists

of other hacker BBS numbers are often maintained and are available

on the board; but these lists are often outdated, since BBSes are

extremely volatile and usually have extremely short lives (Meyer,

1989).



     For these reasons, I have chosen to employ as data underground

hacker publications and newsletters rather than BBS communications.

Although not as representative of the diverse hacker community as

BBS data, publications and newsletter analysis avoids the problems

inherent in ethnographic research, such as winning the trust and

cooperation of the members of the underground in order to gain

entry to the culture - which, because of their justifiably paranoid

nature, would take a very long time.  As well, there is the problem

of being intrusive in the culture.



     It is important to avoid intruding on the way the group

     normally functions.  Nothing sinks a field project faster

     than interfering with the group's way of thinking and

     doing things.  At the very least, such intrusiveness will

     change the situation you have come to study; at the

     worst, it may result in your expulsion.  (Northey and

     Tepperman, 1986: 71)





     By utilizing document analysis, however, these problems are

avoided, without a difference in quality of data.  Many passionate

debates on underground BBSes are summarized by individuals and

submitted to hacker journals, which (with a limited amount of

technical skill, research, and Internet access) can be found on

several public archive sites.  These are still the words of

hackers, yet it is not completely necessary for this study to enter

the culture itself as an observer.



     As mentioned, several hacker journals and newsletters comprise

the data set.  Each journal or newsletter is comprised of articles,

usually on a specific how-to topic (eg., "Hacking Answering

Machines", by Predat0r; "The Improved Carbide Bomb", by The

Sentinel), as well as commentaries, written by various authors.  As

with underground BBSes, hacking journals and newsletters tend to

spring up and disappear in a very short time, with no explanations.

The ones used for this study, in no particular order, are:



     PHRACK:   (A contraction of the words Phreak/Hack)  This

               journal is generally recognized as the "official"

               electronic publication. (The other "official"

               publication, 2600: The Hacker Quarterly, is

               available only in print form.) Phrack is the

               oldest hacker journal in existence, with its first

               issuance in 1985.



     COMPUTER UNDERGROUND

     DIGEST:   Known as CuD. This weekly electronic newsletter

               features both academic articles and commentaries

               from members of the underground community, and

               began publication in March 1990.



     DIGITAL

     MURDER:   Issued first in October 1991.  A general

               hacking/phreaking/ newsletter.



     FBI:      (Freaker's Bureau Incorporated)  General

               newsletter, started in September 1991.



     HACKERS

     UNLIMITED: Began in December 1989.



     INFORMATIK: (The Journal of Privileged Information), 1992.



     MAGIK:    (Master Anarchists Giving Illicit Knowledge), 1993.



     THE NEW FONE EXPRESS:  June 1991.



     P/HUN:    (Phreakers/Hackers Underground Network)  One of the

               better-known and longer-running journals, began in

               1988.



     NARC:     (Nuclear Phreakers/Hackers/Carders)  Another long-

               lasting journal, started in 1989.



     TAP

     ONLINE:   (Technical Assistance Party)  First established in

               1972 as YIPL (Youth International Party Line) by

               Abbie Hoffman, and soon thereafter changed its name

               to TAP.  Recognized as the "grandfather" of hacker

               publications (Meyer, 1990).



     TPP:      (The Propaganda Press)  Barely a year old, and one

               of the "fly-by-night" newsletters.



     NIA:      (Network Information Access)  Another relatively

               new publication, bearing the motto "Ignorance,

               There's No Excuse".



     H-NET:    Begun in June 1990.



     LOD/H TECH

     JOURNALS: These are the technical journals of LOD/H - the

               elite Legion of Doom/Hackers group.  This four-part

               set was released in January 1987 as a one-time

               release.





     These periodicals constitute a rich cross-section of the

computer underground culture.  The authors of articles that appear

in these journals and newsletters are generally considered the more

"elite" or knowledgeable hackers in the culture, especially those

who write the how-to articles.  Therefore, these periodicals can be

considered adequately representative of the culture's ethics,

beliefs, and values.



     The following sections will provide and discuss data, culled

from these periodicals, supporting each of the six characteristics

of social movements outlined by Stewart, Smith, and Denton (1984).

These six points were provided as the theoretical framework for

this study - please refer back to Theoretical Approach for an

outline of this model.





Characteristic #1: Minimal Organization



     Gordon Meyer (1989), in "Social Organization of the Computer

Underground", provides a comprehensive study of how hackers and

computer underground members organize through BBSes and other

illicit channels of communication, such as corporate voice-mail

bases and telephone "bridges".  These methods allow hackers to

share vital information such as who's been arrested or searched,

which systems have shut down, new numbers to try, security holes

that have been discovered, etc.  Although hacking is primarily a

solitary activity, hackers need to network, through BBSes and other

channels of communication, into groups to share information and

technique, and also to give a feeling of community.



     Such groups usually do not have leaders in the real sense

(Meyer, 1989), but some members are bound to know more than others,

and the veterans of the group act as "big brothers" and guides to

novice hackers.  For instance:



     I learned as much as I could as fast as I could, and

     after several months of intensive hacking and

     information-trading, the Cracker was no longer a novice.

     I knew a lot about hacking by then, and because I liked

     to share what I knew, I gained the reputation of being

     someone to go to if you were having trouble. ... As the

     Cracker's reputation grew, answering such requests became

     a matter of pride.  (Bill Landreth (aka "The Cracker"),

     1989: 16)





     In addition, hackers regularly get together socially, whether

in small groups, or at large national gatherings called "cons"

(conventions).  Cons are organized by elite groups and tend to draw

fairly large crowds.  Cons feature guest speakers, who are usually

elite and well-known hackers, and occasionally academic or

professionals in the computer fields as well.  Once planned, cons

are advertised on underground boards and through hacker

publications.  Each convention has a unique name - the HoHoCon in

Houston, SummerCon, PumpCon at Halloween, and DefCon, to name a few

main ones.  Conventions as social gatherings, however, have their

own set of problems:



     Friday, October 30, 1992, Pumpcon began, at the Courtyard

     of the Marriott, in Greenburgh, NY.  All in all, about 30

     hackers showed up, and had a great time.  At least until

     the evening of Oct. 31st, when 8-10 members of the

     Greenburgh police force showed up and raided the Con.  A

     few hackers who had been out driving around during the

     time of the bust returned a few hours later, and when

     they were seen by police, they were immediately taken to

     255 and questioned.  (They were walking down the hall,

     when a cop appeared, and told them to step into a room.)

     The cops asked them if they were hackers, and when they

     didn't answer, one police officer reached into the coat

     pocket of one of the people, and produced an auto dialer.

     This in itself was enough to send the three to room 255,

     where the rest of the hackers were being held for

     questioning.  My question to you - isn't that just a bit

     illegal?  Bodily search without probable cause OR a

     warrant?  Ooops - I'm forgetting - we're HACKERS!  We're

     ALL BAD!  We're ALWAYS breaking the law.  We don't have

     RIGHTS!. ... In one of the rooms, there were about 2

     dozen computer magazines which were apparently

     confiscated, although the warrant did not specify that

     magazines could be taken.  But, when you're busting

     HACKERS, I suppose you can take what you want.  After

     all, hackers are evil geniuses, and don't have the same

     rights as NORMAL criminals do.  (by "Someone





Characteristic #2: Uninstitutionalized collectivity



     Hackers have always been considered an "out" group in society.

In schools, hackers are seen as "nerds" and "loners" without social

skills (Levy, 1984; Turkle, 1983); in larger society, they are

prosecuted by those in power.  In the words of a hacker:



     "I am a hacker."  If I ever told that to anyone, it would

     immediately be assumed that I am a malicious,

     vandalising, thieving, pseudo-terrorist out to take over

     the computers of the world for personal gain or quite

     possibly to glean some morbid satisfaction from deleting

     megs upon megs of valuable data.



     "I am associated with the computer underground."  If I

     ever told that to anyone, there would be a flash flood of

     foolish associations in that person's mind between myself

     and The Mafia, with Saddam Hussein, Syria, Libya, Abu

     Nidal, and who knows what else.



     Almost universally, among the ignorant majority, we

     hackers are considered to be dangerous thugs whose sole

     purpose in life is to cause as much damage as we can in

     as little time as possible to the largest number of

     people.



     Sure, there are those little kiddies (mental and

     physical) who call themselves "hackers" and fit the above

     descriptions.  There are also people who call themselves

     "human beings" that rape, murder, cheat, lie and steal

     every few minutes (or is it seconds, now?).  Does that

     mean that all "human beings" should then be placed in

     prison?  ("Toxic Shock", 1990)





     As with any minority group, hackers are judged as outcasts,

and social, economic, and political resources are withheld from

them as a result.  The commentary on the police raid at the PumpCon

convention (see page above), as well as the commentary above,

are reflections of hackers' anger at being constantly derided and

looked down upon as a worthless menace.  The hacking culture is

definitely not a part of any established institution.  However,

hackers often express a wish to work with an established

institution, such as the police, for both personal gain (less

chance of being prosecuted yourself) and for the good of the

movement (hackers feel that police should be spending their time

and resources going after the real computer criminals, such as

corporate embezzlers).



     We cannot, we WILL not, allow this tyranny to continue!

     The United States Government has ignored the voice of the

     Electronic Community long enough! When we told the

     government that what they were doing was wrong, they

     refused to listen! When we formed political action groups

     to bring our cases to court and before Congress, we were

     told that we were using loopholes in the law to get away

     with crime!!! We have, in a peaceful and respectful

     manner, given our government more than reasonable

     petition for redress of our grievances, but if anything

     the situation has gotten worse!



     Government administrations use computer crime as a weapon

     in internal battles over jurisdiction. Government

     officials, who have only the slightest understanding of

     computer science, use computer crime as a tool for career

     success. Elected Representatives, who have absolutely no

     understanding of computers, use "information

     superhighways", computer crime, and cryptography to gain

     constituent money and voter support! The Electronic

     Community, the only group who fully understands the

     issues involved here, and the only group who is effected

     by the decisions being made, has been completely ignored!

     ("The White Ninja", 1994)





Characteristic #3: Proposes or opposes change



     Here, hackers definitely qualify under this criteria.  As

stated previously, a primary hacker ethic is that information and

knowledge is power (Denning, 1990; Landreth, 1989; Levy, 1984).  In

fact, the motto of the electronic hacker journal NIA (Network

Information Access) is "Ignorance, There's No Excuse".  There is a

general call to the public to educate themselves in technology,

lest it be used to control them:



     As we can see, this has not been the case.  The computer

     system has been solely in the hands of big businesses and

     the government.  The wonderful device meant to enrich

     life has become a weapon which dehumanizes people.  To

     the government and large businesses, people are no more

     than disk space, and the government doesn't use computers

     to arrange aid for the poor, but to control nuclear death

     weapons.  The average American can only have access to a

     small microcomputer which is worth only a fraction of

     what they pay for it.  The businesses keep the true state

     of the art equipment away from the people behind a steel

     wall of incredibly high prices and bureaucracy.  It is

     because of this state of affairs that hacking was born.

     ("Doctor Crash", 1986)





     Most, if not all, of us think information should be

     exchanged freely... If everyone is kept abreast of the

     newest technologies, techniques, what have you, then

     everyone can benefit...The more each of us knows, the

     fewer past mistakes we will repeat, the greater knowledge

     base we will have for future developments. ("Toxic

     Shock", 1990)





     Many hackers share a common utopian vision - that of an

electronic society where information is free and uncontrolled,

democracy reigns on the "information highway", and creativity and

ingenuity are revered traits:



     The hackers are needed again.  We can solve problems, get

     it done, make it fun.  The general public has a vested

     interest in this!  The public has a vested interest in

     electronic privacy, in secure personal systems, and in

     secure e-mail.  As everyone learns more, the glamour and

     glitz of the mysterious hackers will fade.  Lay people

     are getting a clearer idea of what's going on.  ("Johnny

     Yonderboy", 1990)





     For further reference, see Steven Levy's landmark work,

Hackers: Heroes of the Compu





Characteristic #4: Countered by an established institution



     As was seen in the previous section, hackers are angry at the

way they are portrayed in the mass media.  In this case, the

"established order" includes most of those - the legal authorities,

the corporations, the government - that have a vested interest in

keeping hackers and their socio-political messages at a standstill.



     This is our world now... the world of the electron and

     the switch, the beauty of the baud.  We make use of a

     service already existing without paying for what could be

     dirt-cheap if it wasn't run by profiteering gluttons, and

     you call us criminals.  We explore... and you call us

     criminals.  We seek after knowledge... and you call us

     criminals.  We exist without skin color, without

     nationality, without religious bias... and you call us

     criminals.  You build atomic bombs, you wage wars, you

     murder, cheat, and lie to us and try to make us believe

     it's for our own good, yet we're the criminals.



     Yes, I am a criminal.  My crime is that of curiosity.  My

     crime is that of judging people by what they say and

     think, not what they look like.  My crime is that of

     outsmarting you, something that you will never forgive me

     for.  ("The Mentor", 1986)





     Hackers are very prolific on this topic, and certainly don't

mince words when it comes to voicing their anger at those

institutions that oppress them:



     But, even as I type this, I begin to realize just why we

     are such a feared group of people...



     We are misunderstood by the majority.



     You cannot understand someone who judges others by what

     they say, think, and do, rather than how they look or how

     large their income is.

     You cannot understand someone who wants to be honest and

     sharing, instead of lying, stealing, and cheating.



     You cannot understand us because we are different.

     Different in a society where conformity is the demanded

     norm.  We seek to rise above the rest, and then to pull

     everyone else up to the same new heights.  We seek to

     innovate, to invent.  We, quite seriously, seek to boldly

     go where no one has gone before.



     We are misunderstood, misinterpreted, misrepresented.



     All because we simply want to learn.  We simply want to

     increase the flow of information and knowledge, so that

     EVERYONE can learn and benefit.  ("Toxic Shock", 1990)





     Such oppression, without a proper venting of anger and

frustration, can lead to  anarchy - and many hackers have an

anarchist/rebellious bent for this very reason (Meyer and Thomas,

1990).



     There is one last method of this war against computer

     abusers.  This is a less subtle, less electronic method,

     but much more direct and gets the message across.  I am

     speaking of what is called Anarchy.  Anarchy as we know

     it does not refer to the true meaning of the word (no

     ruling body), but to the process of physically destroying

     buildings and governmental establishments.  This is a

     very drastic, yet vital part of this "techno-revolution."

     ("Doctor Crash", 1986)





     Many anarchist newsletters and journals began circulation in

1989 and 1990, which were the beginning years of a massive legal

crackdown on hackers in the United States.  Suspected hackers'

houses were raided, equipment confiscated (and to this day, much is

not yet returned), and various charges laid.



     Several high-profile trials went to session, such as that of

"Knight Lightning".  One of the more paranoia-fueled raids was done

on Steve Jackson Games, a company that produced role-playing

simulation games.  The accompanying book for one game, GURPS

Cyberpunk, was admonished by legal authorities as "a manual for

computer crime" (Sterling, 1992: 142).  For a complete discussion

of these raids and accompanying legal hassles hackers faced, refer

to The Hacker Crackdown by Bruce Sterling (1992).  These arrests

and trials were also closely monitored by the Electronic Freedom

Foundation, a lobby group started as a response to this crackdown.

Various commentaries, responses, and angry manifestos regarding

these raids are also published regularly in The Computer

Underground Digest.





Characteristic #5: Significantly large in scope



     As mentioned, the hacker culture is not unique to North

America; many hackers in other countries have been similarly

prosecuted and hounded by the media.  The best-known case of this

is the hackers of Europe.  One group, the Chaos Computer Club, has

members in France and Germany.  The Netherlands has their own

prominent group, HACK-TIC.  These groups, as well as others from

around Europe, gather each year for the Chaos Computer Club's

annual conference in Germany.



     Contrary to the name, the CCC is well-organized, publishes its

annual conference proceedings, and is generally considered a

resource base for other European hackers.  Most famous of the

German hackers is Markus Hess, whose long-distance explorations

into American systems was documented by Cliff Stoll, in his 1989

book The Cuckoo's Egg.  Another example of large-scale organization

are the hacker conventions in the United States.  Also, the number

of hacker bulletin board systems in the United States alone,

previously stated as somewhere around a few hundred, are a

testament to the wide scale of this phenomenon.



     Hackers maintain that there are others just like them all

around the world, and when they realise they are intellectually and

mentally different than most other people, it's like a revelation.



     And then it happened... a door opened to a world...

     rushing through the phone line like heroin through an

     addict's veins, an electronic pulse is sent out, a refuge

     from the day-to-day incompetencies is sought... a board

     is found.



     "This is it... this is where I belong..." I know everyone

     here... even if I've never met them, never talked to

     them, may never hear from them again... I know you all...



     I am a hacker, and this is my manifesto.  You may stop

     this individual, but you can't stop us all... after all,

     we're all alike.  ("The Mentor", 1986)





Characteristic #6: Persuasion



     As previously discussed in Theoretical Approach, the hacker

culture often employs reward and punishment in keeping their

movement together.  Hackers that defy the ethics and values of the

underground are castigated, and the word of the deed and the

offender quickly travels through the social network.



     For instance, in Out of the Inner Circle, Bill Landreth (aka

"The Cracker") documents the development of the Inner Circle, an

elite group of hackers which he helped create.  The Inner Circle

had unwritten rules similar to the Hacker Ethic, and such rules

were strictly enforced:



     The fact that we tried to invite only those people who

     already met these two requirements quickly resulted in an

     unwritten "code of ethics" that was, and remained, the

     philosophy that held the Inner Circle together. ... We

     had many good reasons to follow these basic rules.  But

     the most important, as far as the Inner Circle was

     concerned, had to do with the basic principle of

     respecting other people's property and information.  We

     wre explorers, not spies, and to us, damaging computer

     files was not only clumsy and inelegant - it was wrong.

     (Landreth, 1989: 18)





     Some hackers think the time has come - that those in power are

finally willing to listen to them:



     Just exactly how far should the government go to protect

     companies and their data?  Exactly what are the

     responsibilities of a company with sensitive, valuable

     data in their computer systems?  There is a distinct

     feeling that private-sector companies should be doing

     more to protect themselves.  Hackers can give an

     important viewpoint on these issues, and all of a sudden

     there are people willing to listen.  ("Johnny Yonderboy",

     1990)





Others become activists, and one hacker actively seeks out the

corporate sector by submitting technical security articles to The

Computer Underground Digest, a journal that is widely read by both

hackers and computer professionals alike:



     ... I hope to break down this barrier of resentment by

     crossing over the lines of the Underground into the

     "real" world and providing valuable information about

     systems, security, interfacing, etc.  I hope other will

     follow suit, and that the private sector will reciprocate

     by allowing technical information to flow into the

     Underground.  Ultimately, I hope there will be a rapport

     between hackers and members of the private sector so that

     we may learn from each other and make the best use

     possible of this greatest of inventions, the computer.

     ("The Dark Adept", 1990)





     Overwhelmingly, it looks like The Dark Adept's vision is not

being realised so far.  Hackers continue to be raided and charged

under newly-constructed computer crime laws that are vague at best,

and constitutionally improper at worst.  This largely misunderstood

culture is extending the symbolic olive branch to corporate

industry, by offering to share their knowledge and expertise to

create better technology for everyone.



     However, corporate culture constantly denies this offering.

Preliminary experiments have been done in the United States, with

hackers being hired by companies to test their systems, and the

results have been overwhelmingly positive (Denning, 1990).  Why,

then, is this practice not adopted widely?  A discussion of the

implications of this, including power relations and econo-political

control, could easily comprise another thesis; for this reason, it

will not be delved into here.





Conclusions and Summary



     In this paper, the conception of the computer hacking

phenomenon as a social movement has been explored.  Working with a

theoretical model of social movements developed by Stewart, Smith,

and Denton (1984), various hacker writings have supported the idea

of the existence of social collectivity.  As the hacker culture is

relatively new and astonishingly under-studied, these conclusions

can be taken as preliminary.  I hope this study has laid a

groundwork for further sociological study of the computer

underground.



     As the proliferation of hackers' anarchist tendencies

suggests, this culture desperately needs some understanding, as

well as a sympathetic ear.  We have seen that corporate industry

rejects the knowledge and technical expertise of hackers; could not

a higher level of technology be realised if these two factions were

to work together?  The answer to this will be found in the future.

As the possibility of a global Information Society draws closer,

people must be willing to take their technical education into their

own hands.  We could all learn a valuable lesson from hackers: that

intellectual hunger and the quest for knowledge should be central

in our society.



     The coming of the Information Society has been heralded by

academics and non-academics alike.  The notion of a free,

democratic, electronic society has been beholded as a sort of

utopia, where information flows unencumbered and freedom of speech

is key.  However, there is a dark side to this as well.

Information is becoming increasingly private, and many people fear

the Information Society will actually be a sort of Orwellian 1984-

type society instead:



     There's something wrong with the Information Society.

     There's something wrong with the idea that "information"

     is a commodity like a desk or chair. ... Knowledge is

     power.  The rise of computer networking, of the

     Information Society, is doing strange and disruptive

     things to the processes by which power and knowledge are

     currently distributed.



     I don't think democracy will thrive in a milieu where

     vast empires of data are encrypted, restricted,

     proprietary, confidential, top secret, and sensitive.  I

     fear for the stability of a society that builds

     sandcastles out of databits and tries to stop a

     real-world tide with royal commands.  (Sterling, 1992)





The debate goes on; either we can sit, wait patiently, and see how

it all turns out; or we can act, educate ourselves and each other,

and be ready for whatever hits.  I will end this project with an

appropriate quote from a hacker:



     If you need a tutorial on how to perform any of the above

     stated methods, please read a file on it.  And whatever

     you do, continue the fight.  Whether you know it or not,

     if you are a hacker, you are a revolutionr Crash", 1986)









Bibliography (not in alpha order here)





Doctor Crash (1986) "The Techno Revolution". Phrack 1:6,

     June 10, 1986.



Sterling, Bruce (1992) "A Statement of Principle". Computer

     Underground Digest 4:47, September 30, 1992.



Denning, Dorothy (1990) Concerning Hackers Who Break Into

     Computer Systems. In Proceedings of the 13th National Computer

     Security Conference, October 1990.



The Dark Adept (1990) "The Ultimate Interface: Hackers and

     the Private Sector". Computer Underground Digest 2:9, October

     23, 1990.



Johnny Yonderboy (1990) "A Hacker's Perspective". Computer

     Underground Digest 1:13, June 12, 1990.



Landreth, Bill (1989) Inside the Inner Circle. Microsoft Press:

     Redmond, WA.



The Mentor (1986) "The Conscience of a Hacker". Phrack 1:7,

     January 8, 1986.



Stoll, Cliff (1989) The Cuckoo's Egg. Simon and Schuster: New York.



Sterling, Bruce (1992) The Hacker Crackdown. Bantam: New York.



Meyer, Gordon and Thomas, Jim (1990) "The Baudy World of the Byte

     Bandit: a Postmodernist Interpretation of the Computer

     Underground". Forthcoming in F. Schmalleger (ed.), Computers

     in Criminal Justice, Wyndham Hall: Bristol, Indiana.



Toxic Shock (1990) "Another View of Hacking: The Evil that Hackers

     Do". Computer Underground Digest 2:6, October 6, 1990.



Levy, Steven (1984) Hackers: Heroes of the Computer Revolution.

     Dell: New York.



The White Ninja (1994) "A Declaration of Complaints and Grievances

     of the United States Electronic Community". Phrack 5:45, File

     6/28, March 30, 1994.



Turkle, Sherry (1984) The Second Self: Computers and the Human

     Spirit. Simon and Schuster: New York.



Someone who has been there but wishes to remain anonymous (1992)

     "A Bird's-Eye View of the PumpCon Problem". Computer

     Underground Digest 4:60, November 22, 1992.



Meyer, Gordon (1989) The Social Organization of the Computer

     Underground. Unpublished Master's Thesis, University of

     Northern Illinois.



Stewart, Charles, Smith, Craig, and Denton, Robert E. (1984)

     Persuasion and Social Movements. Waveland Press: Prospect

     Heights, Illinois.



Hafner, Katie and Markoff, John (1991) Cyberpunk: Outlaws and

     Hackers on the Computer Frontier. Simon and Schuster: New

     York.



Wessells, Michael (1990) Computer, Self, and Society. Prentice

     Hall: Englewood Cliffs, NJ.



Northey, Margot and Tepperman, Lorne (1986) Making Sense in the

     Social Sciences. Oxford University Press: Toronto.



Parker, Donn (1991) "Response to Dorothy Denning", in The United

     States vs. Craig Neidorf: A Debate on Electronic Publishing,

     Constitutional Rights and Hacking. Communications of the ACM

     34:3, March 1991, p. 34.

.



DOWNLOAD FILE
MD5
b2de1c713d6ccfad27d2a16470af8fe1

AAAAH! MY EYES! Click here if you prefer a black and white color scheme.