Date: Fri, 24 Apr 92 19:01:13 CDT From: Jim Thomas Subject: File 1--Hacking, Then and Now In CuD 4.18, Jerry Leichter raises several points for discussion. Each reveals the rapid changes that continue to occur both in computer technology and computer culture. Jerry writes: 2. "Information" and "computers" should be free, hackers are just trying to learn, there is nothing wrong with learning. Point 2 I don't want to get into; it's old, tired, and if you don't recognize it for its moral bankruptcy by this time, nothing I can say will change your mind. I doubt that Jerry means to imply that the debates over the accessibility of information are morally bankrupt or that the goal of learning through "hacking" is improper. Rather, the cynical use of the rhetoric of freedom by many "wannabe cybernauts" to justify intrusion or blatant predatory behavior distorts the original meaning of the term used by the early hackers. The original hackers found the challenge of the new machine intriguing. Few resources were available for exploring its limits other than hands-on trial-and-error, and there were no ethical or legal models to guide the initial exploration. Two decades ago, control over the new technology appeared limited to a relatively small elite who, if unchecked, would amass what some considered unacceptable power over the dissemination and use of computer technology and use. Things change. This raises Jerry's second point: Whatever one may think of hacking activity, its meaning is not the same in 1992 as it was even as recently as the late-1980s. Bob Bickford's definition of hacking as "the joy of exceeding limitations" is no longer the current dominating ethos of too many of those who have assumed the "hacker" mantle. The label has become a romanticized activity for teenagers and others who see password cracking, simple computer intrusion for its own sake, numbers-running, and credit card fraud as ends in themselves. Like the counter-culture of the sixties, the "hacker culture" emerged quickly, shaped a new generation of youth exploring beyond the confines of conventional culture, and then disintegrated under the excesses of those who adopted the trappings while losing sight of the core of the new cultural message. Like the counter-culture, the ease of access into "hacking, the romanticized media depictions, the focus of newcomers on the fun to the exclusion of corresponding responsibilities, and the critical mass of exploiters able to manipulate for their own ends fed the darkside of the culture. All meanings occur in a broader context, and the context of hacking has changed. Social changes in the past decade have led to changes in the definition of "hacking" and in the corresponding ethos and culture. The increased learning curve required to master contemporary computers, the proliferation of networks to share information, and the ease of distribution of software have reduced much of the incentive for many amateur hackers to invest the time and effort in moving beyond all but the simplest of technological skill. As a consequence, there has emerged a fairly large core of newcomers who lack both the skill and the ethos that guided earlier hackers, and who define the enterprise simplistically. The attraction of original phreaking and hacking and its attendant lifestyle appear to center on three fundamental characteristics: The quest for knowledge, the belief in a higher ideological purpose of opposition to potentially dangerous technological control, and the enjoyment of risk-taking. In a sense, CU participants consciously created dissonance as a means of creating social meaning in what is perceived as an increasingly meaningless world. In some ways, the original CU represents a reaction against contemporary culture by offering an ironic response to the primacy of a master technocratic language, the incursion of computers into realms once considered private, the politics of techno-society, and the sanctity of established civil and state authority. But, the abuses of this ethos have changed the culture dramatically. Consider two fairly typical posts from two defunct self-styled "hacker" boards in the early 1990s: Well, instead of leaving codes, could you leave us "uninformed" people with a few 800 dialups and formats? I don't need codes, I just want dialups! Is that so much to ask? I would be willing to trade CC's %credit cards% for dialups. Lemme know.. or: Tell ya what. I will exchange any amount of credit cards for a code or two. You name the credit limit you want on the credit card and I will get it for you. I do this cause I to janitorial work at night INSIDE the bank when no one is there..... heheheheheh Unfortunately, this is the "hacking" that the public and LE officials dramatize, but it is simply an infantile form of social predation. There is no adventure, no passion for learning, and no innocence reflected in today's CU culture. Jerry is, therefore correct: Times have changed. If Altamont symbolized the death the counter-culture, Cliff Stoll's _The Cuckoo's Egg_ symbolizes the end of the "golden age of hacking." culture and those who participate in it have lost their innocence. Baudrillard observed that our private sphere now ceases to be the stage where the drama of subjects at odds with their objects and with their image is played out, and we no longer exist as playwrites or actors, but as terminals of multiple networks. The public space of the social arena is reduced to the private space of the computer desk, which in turn creates a new semi-public, but restricted, public realm to which dissonance seekers retreat. To participate in the computer underground once was to engage in what Baudrillard describes as "private telematics," in which individuals, to extend Baudrillard's fantasy metaphor, are transported from their mundane computer system to the controls of a hypothetical machine, isolated in a position of perfect sovereignty, at an infinite distance from the original universe. There, identity is created through symbolic strategies and collective beliefs. Sadly, this generally is no longer the case for most young computerists. Times have changed. Very few who currently attempt to justify the "right to hack" as a form of social rebellion recognize--let alone engage in--the tedious struggles of others (such as EFF or CPSR) that would civilize the Electronic Frontier. In the battle to expand civil liberties to cyberspace, contemporary "hackers" have not only *not* been part of the solution, they have become part of the problem. Downloaded From P-80 International Information Systems 304-744-2253