Information Security News mailing list archives
Cry Hackerdom!
From: William Knowles <wk () C4I ORG>
Date: Wed, 18 Oct 2000 16:08:25 -0500
http://www.feedmag.com/essay/es405_master.html TUCKERED OUT after three days of prayer and sermons, attendees at the National Evangelist Workshop this summer thought they could slip out of Las Vegas with souls unscathed. In a town known for leading even the most pious into temptation, these teetotalers had managed to enjoy nothing but wholesome fun. And they had chosen a gambling-free, off-the-Strip hotel, the Alexis Park, to ensure that the wicked would not intrude on their holy powwows. Sin City, however, has a knack for sordid surprises. One morning this summer, as they toted their luggage through the lobby, the preachers discovered that their quiet hotel had been overrun by youths sporting the reputed accessories of amoral hedonism: black leather pants, goopy makeup, and hair colors never conceived of by the Creator. At 11 AM many were already guzzling screwdrivers and cheap draft beers. THE EVANGELISTS' BANE were the thousands of hackers in town for DefCon, the annual highlight of the digital underground's social calendar. This year's convention was a three-day blur of technical lectures and heavy drinking, punctuated by conspiracy theorizing and frat-boy pranks (including a pipe-destroying concrete-down-the-toilet gag that may spell the end of DefCon's run at the Alexis Park). As one besotted character nicknamed Unstable Boy slurred to me, "This is a weekend-long party. With a T1 connection. What more could you ask for?" DefCon may sound like an icky affair, a geekified version of Daytona spring break without the alluring jiggle factor. Yet the nihilistic, evangelist-scaring posturing belies a culture whose optimism borders on cockeyed -- a culture that, according to programming sage and The Mythical Man-Month author Frederick Brooks, "attracts those who believe in happy endings and fairy godmothers." Though many hackers embrace the trappings of fashionable morbidity -- narcotics consumption, black-helicopter paranoia, bondage gear -- they also harbor instincts that can best be described as virtuous, even spiritual. Hackers generally disavow belief in the Man Upstairs, but they maintain a peculiarly unwavering faith in their fellow man. Professed fans of Nietzsche's gloomy indictments, these post-ENIAC craftsmen actually embrace a radically sunny ethos. Their commitment to open systems is blissfully free of the cold Darwinist leanings that mar cyber-libertarian thought -- as The Cathedral and the Bazaar author Eric S. Raymond has noted, hacker philosophy is based on the concept of "radical sharing justified by sound market economics, but not really founded on an economic impulse." The onset of a borderless digital realm, hackers hold, will elicit admirable reactions from meatspace users; vested with the power of network guardianship, human beings will act responsibly, even gallantly. Analyzing hackerdom's philosophical nuances is a tricky proposition, not least of all because it is difficult to answer the fundamental question: "What is a hacker?" It is an epithet applied to a vast array of geeks, from Linus Torvalds to the snarky kids who deface Web pages with pro-LSD graffiti. But the elder statesmen of the computer underground, top-tier programming prophets from Raymond to spotlight-shy characters like "rain forest puppy" and "Simple Nomad," shudder at the term's broadening. To them, hacker is an honorific that has been corrupted by no-goodniks and mainstreamers. Nothing chafes them quite like headlines that brand "Love Bug" author Onel de Guzman a hacker. At his DefCon presentation, "Nightstalker," the self-designated "official crusty old guy" from the hacker collective Cult of the Dead Cow, railed against such simpletons: "Anyone can throw a brick through a church window. But it takes an artist to make that stained glass." The underground now recognizes an opportunity to reclaim their favorite title. As in the Internet's formative years, when university-based coders first fiddled with network protocols, technology is being advanced primarily outside the confines of corporatized testing laboratories. In this nascent post-Napster, post-Linux world, "true" hackers consider themselves crusaders for digital libertation who should be embraced, not feared. TO THOSE UNFAMILIAR with computer lingo, of course, hacker is synonymous with "criminal," someone who trespasses on private networks and revels in creating pointless chaos. Ask the man on the street to define the word and he'll describe kids who swipe credit card numbers, monkeywrench eBay, and knock NASA satellites out of orbit. Hacker is almost a slur, akin to "carjacker" or "crackhead." The media shoulders most of the blame for perpetuating the hacker-equals-criminal misconception, but the underground is also rife with wannabes who have poisoned the semantics. Enticed by the outlaw image-drummed up most recently by the bizarre arrest of alleged Yahoo! crasher "Mafiaboy"-technical dunces are flocking to the culture. In Las Vegas, there was an abundance of such wannabes strutting the halls, masters of the disaffected adolescent sneer but oblivious to the intricacies of Perl; by my unscientific count, a good quarter of the attendees were in town solely for the abundant drugs and fashion-show atmosphere, and their computer lexicons stopped at BASIC. Alongside the trade-show tables selling genuine hacker paraphenalia -- DoC T-shirts and Blowfish algorithim stickers -- were an equal number of vendors hawking drum-and-bass 'zines and how-to books on poppy cultivation. "Everybody should have to pass a programming test before they can get in," grumbled one veteran hacker, Hubert Chang, as he surveyed DefCon's Day One crowd. "Of course, that would eliminate about a third of the people here." Purists, however, dismiss both thieves and poseurs as undeserving of the hacker label. True hackers -- those who have defined the culture's core tenets -- trace their origins back to the model-train enthusiasts of Eisenhower-era MIT. In his classic 1984 book, Hackers: Heroes of the Computer Revolution, Steven Levy details how these young men evolved from electric-coil tinkerers into altruistic programmers, whose chief pleasure is problem solving. Hackers, by Levy's definition, are simply technology-obsessed folks in love with the "Eureka!" moment. The hacker ethic, he writes, developed as "a philosophy of sharing, openness, decentralization, and getting your hand on machines at any cost-to improve the machines, and to improve the world." The selflessness of that credo sounds outlandish in this age of dot-com optionaires, so it's easy to forget that many pillars of the wired world were perfected by uncompensated hackers. Take, for example, the classic story of UNIX, still the nerd's operating system of choice. When Bell Labs released the operating system to educational institutions in 1976, part of the distribution license mandated that any additions or changes by users would have to be shared with the entire UNIX community. Despite the lack of financial incentives, hundreds of hackers developed UNIX's broad functionality, porting it to a variety of platforms and enabling it to support network protocols like UUCP and TCP/IP. Today's hackers still maintain that Mammon should be excluded from the creative process as a matter of principle. If one needs proof that money corrupts technology, they contend, merely examine the bugs that have riddled such flagship Microsoft products as the IIS server. At DefCon, the distaste for profiteering was palpable -- thus the abundance of "Fuck Red Hat" T-shirts, protests against corporate co-optation of open-source systems. The underground's latest heroes are the directors of software projects based on 4.4 BSD Lite, the free operating system pioneered at the University of California at Berkeley in the late 1970s. The gratis software churned out by projects like FreeBSD and OpenBSD is inarguably superior to most mainstream Linux distributions, both in terms of security and portability. Compensation for these coders is virtually non-existent-OpenBSD founder Theo de Raadt, who milled about DefCon slapping pro-cryptography stickers on attendees chests, ekes out a living on T-shirt sales and donations. (He recently saved up enough to purchase a small house, but his infrequent social outings still consist primarily of pizza dinners in downtown Calgary.) By favoring intrinsic rewards over extrinsic, hackers find themselves in bizarre philosophical company. Though decidedly antagonistic to organized religion, these money-eschewing technophiles share spiritual terrain with the world's most prominent faiths. The terrified evangelists who fled the Alexis Park would find the hackers' lack of avarice heartwarming -- the love of money, after all, is one of the Good Book's biggest no-nos. And Buddhist renouncers, though potentially put-off by the enthusiasm for blood-drenched games like Quake, would admire the hacker penchant for spiritual fulfillment through psychic exploration. Raymond compares this insatiable intellectual curiousity to that of instinctual artists, hailing the hacker drive to cherish the "pure artistic satisfaction of designing beautiful software and making it work. People for whom [that] is not a significant motivation never become hackers in the first place, just as people who don't love music never become composers." ANDREW SULLIVAN has noted that the antiprofit ethos closely parallels that of another, more contemporary value system: Marxism. In a New York Times Magazine article this past June, he termed the sentiment "dot-communism" and pointed to MP3 swapping as proof of communism's cyberspace rebirth-Marxism 2.0. "By turning physical property into endlessly duplicable e-property," Sullivan wrote, "the ancient human problem of 'mine-thine' has been essentially solved." Indeed, hackers deride the attempts of private interests to fashion cyberspace into an archipelago of fortified e-commerce islands. Part of this feeling stems from the hacker faith in what The Economist has termed "the Internet's founding myth" -- that the Internet was created outside the scope of government control, and its commodification amounts to an illegal, immoral capitalist coup. This origin tale excludes the Pentagon's prominent role in ARPANET, as well as Cisco's trailblazing development of routers. Hackers, however, conveniently disregard those "minor" details. To them, the wired world should be an unruly Eden, free from authoritarian constraints, and they've bought into a legend that backs their view. But Sullivan overstates the underground's ideological fervor. Heavily influenced by the laissez-faire doctrine of libertarianism, hackers have little taste for imposing a dictatorship of the proletariat -- or any other cogent political order, for that matter. Instead, hackers simply accept that the freedom of information is inevitable, and that debating the merits of such a system would be a titanic time-waster.Think of that subversive slogan : "Information wants to be free." The 1s and 0s that inhabit the world's hard drives are yearning to roam and breed. Information is akin to a feral biological entity over which no one can claim exclusive dominion. Media bigwigs mindful of copyright protections may dismiss the paradigm, but there is ample precedent for the outlook. Humanity has a poor track record when it comes to corralling knowledge, even in those rare cases when there is general consensus that such limits are a good idea. The global community tried hard to stem the proliferation of nuclear weapons, for example, but North Korea still built the bomb. Similar regulatory efforts in cyberspace are proving futile. The Clinton administration relaxed its ban on the export of strong encryption when it realized that efforts to keep such tools out of criminal hands were doomed to failure, since other nations were not bound by the same edict. And the unpoliced nooks and crannies of cyberspace are the perfect incubators for gestating Freenets, destined to make file-sharing anonymity a near-inalienable right. Authorities plead that an unregulated Internet will become a hotbed of nefarious activity, that everyone from Islamic fundamentalists to neo-Nazis will somehow manipulate modems to further their antigovernment crusades. Art Money, chief information officer for the Department of Defense, used the DefCon podium to drive home that point: "Our friend Osama Bin Laden doesn't necessarily have to use physical means to get his way." HACKERS, however, have a derisive nickname for such assertions -- "FUD," shorthand for "fear, uncertainty, and doubt." When Money spoke of a hypothetical world in which everyone had "unfettered access to strong encryption," the applause was deafening; when he responded, "Wait, wait -- I'm not just talking for legal things, but [for] illegal things, too," real cheers broke out. Hackers contend -- correctly -- that security can be tightened without government intervention, and that the vast majority of users are online not to foment jihad, but to increase their knowledge and communicate with their fellow man. And that's precisely why hackers, more so than any other community, do not fear an unruly cyberspace. There is an anarchic streak that runs throughout the culture, an implicit trust in the individual's capacity for making moral, nonharmful choices. Regulatory bodies exist to keep human tendencies in check; hackers, on the other hand, believe that humans are far from the nasty bastards imagined by antiquated political philosophers. In cyberspace, that bred-in-the-bone goodness will emerge; everyone will follow the hacker ethic and produce knowledge for the sheer joy of accomplishment. Network technology holds the key to uncovering man's fundamental decency. Critics scoff at this outlook as woefully myopic. They question how producers of intellectual property can feed their families in world where copyright and patent laws mean squat. They lambaste the founding myth favored by hackers, which conspicuously excludes the vital contributions of the Pentagon. They fear that privacy will be destroyed should every hard drive be rendered scannable in a barrier-free cyberspace. Yet hackers pish-posh these concerns -- not so much because they have figured out solutions, but because they have blind faith that the Internet is predestined to become a perfect beast. They haven't yet figured out how Napster and Metallica can peacefully coexist, but they do not fear a future without speed metal. As the Internet follows its organic path toward full maturation, they argue, all of the little details that inspire so much present-day hand-wringing will iron themselves out. Cyberpunks as the Pollyannas of the twenty-first century? The same paranoid kids who obsess over Masonic conspiracies and the National Security Agency? The same geeky outcasts who shimmy robotically to self-loathing industrial tunes? Hard as it may be to swallow, instead of "Information wants to be free," the hacker mantra of the moment could just as easily be "Faith shall be rewarded." The evangelists would approve. Brendan I. Koerner is a Markle Fellow at the New America Foundation. -- *==============================================================* "Communications without intelligence is noise; Intelligence without communications is irrelevant." Gen Alfred. M. Gray, USMC ================================================================ C4I.org - Computer Security, & Intelligence - http://www.c4i.org *==============================================================* ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Cry Hackerdom! William Knowles (Oct 19)