💾 Archived View for spam.works › mirrors › textfiles › programming › counterc captured on 2023-11-14 at 11:48:40.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

 
 
                HACKING AWAY AT THE COUNTERCULTURE
 
                                by
 
                           ANDREW ROSS
 
                       Princeton University
     Copyright (c) 1990 by Andrew Ross, all rights reserved.
         _Postmodern Culture_ vol. 1, no. 1 (Sep. 1990).
 
 
 
[1]       Ever since the viral attack engineered in November
 
     of 1988 by Cornell University hacker Robert Morris on
 
     the national network system Internet, which includes
 
     the Pentagon's ARPAnet data exchange network, the
 
     nation's high-tech ideologues and spin doctors have
 
     been locked in debate, trying to make ethical and
 
     economic sense of the event.  The virus rapidly
 
     infected an estimated six thousand computers around the
 
     country, creating a scare that crowned an open season
 
     of viral hysteria in the media, in the course of which,
 
     according to the Computer Virus Industry Association in
 
     Santa Clara, the number of known viruses jumped from
 
     seven to thirty during 1988, and from three thousand
 
     infections in the first two months of that year to
 
     thirty thousand in the last two months.  While it
 
     caused little in the way of data damage (some richly
 
     inflated initial estimates reckoned up to $100m in
 
     down time), the ramifications of the Internet virus
 
     have helped to generate a moral panic that has all but
 
     transformed everyday "computer culture."
 
[2]       Following the lead of DARPA's (Defence Advance
 
     Research Projects Agency) Computer Emergency Response
 
     Team at Carnegie-Mellon University, anti-virus response
 
     centers were hastily put in place by government and
 
     defence agencies at the National Science Foundation,
 
     the Energy Department, NASA, and other sites.  Plans
 
     were made to introduce a bill in Congress (the
 
     Computer Virus Eradication Act, to replace the 1986
 
     Computer Fraud and Abuse Act, which pertained solely to
 
     government information), that would call for prison
 
     sentences of up to ten years for the "crime" of
 
     sophisticated hacking, and numerous government agencies
 
     have been involved in a proprietary fight over the
 
     creation of a proposed Center for Virus Control,
 
     modelled, of course, on Atlanta's Centers for Disease
 
     Control, notorious for its failures to respond
 
     adequately to the AIDS crisis.
 
[3]       In fact, media commentary on the virus scare has
 
     run not so much tongue-in-cheek as hand-in-glove with
 
     the rhetoric of AIDS hysteria--the common use of terms
 
     like killer virus and epidemic; the focus on hi-risk
 
     personal contact (virus infection, for the most part,
 
     is spread on personal computers, not mainframes); the
 
     obsession with defense, security, and immunity; and the
 
     climate of suspicion generated around communitarian
 
     acts of sharing.  The underlying moral imperative being
 
     this: You can't trust your best friend's software any
 
     more than you can trust his or her bodily fluids--safe
 
     software or no software at all!  Or, as Dennis Miller
 
     put it on _Saturday Night Live_, "Remember, when you
 
     connect with another computer, you're connecting to
 
     every computer that computer has ever connected to."
 
     This playful conceit struck a chord in the popular
 
     consciousness, even as it was perpetuated in such sober
 
     quarters as the Association for Computing Machinery,
 
     the president of which, in a controversial editorial
 
     titled "A Hygiene Lesson," drew comparisons not only
 
     with sexually transmitted diseases, but also with a
 
     cholera epidemic, and urged attention to "personal
 
     systems hygiene."^1^  In fact, some computer scientists
 
     who studied the symptomatic path of Morris's virus
 
     across Internet have pointed to its uneven effects upon
 
     different computer types and operating systems, and
 
     concluded that "there is a direct analogy with
 
     biological genetic diversity to be made."^2^  The
 
     epidemiology of biological virus, and especially AIDS,
 
     research is being closely studied to help implement
 
     computer security plans, and, in these circles, the new
 
     witty discourse is laced with references to antigens,
 
     white blood cells, vaccinations, metabolic free
 
     radicals, and the like.
 
[4]       The form and content of more lurid articles like
 
     _Time_'s infamous (September 1988) story, "Invasion of
 
     the Data Snatchers," fully displayed the continuity of
 
     the media scare with those historical fears about
 
     bodily invasion, individual and national, that are
 
     often considered endemic to the paranoid style of
 
     American political culture.^3^  Indeed, the rhetoric of
 
     computer culture, in common with the medical discourse
 
     of AIDS research, has fallen in line with the paranoid,
 
     strategic style of Defence Department rhetoric.  Each
 
     language-repertoire is obsessed with hostile threats to
 
     bodily and technological immune systems; every event is
 
     a ballistic manoeuver in the game of microbiological
 
     war, where the governing metaphors are indiscriminately
 
     drawn from cellular genetics and cybernetics alike.  As
 
     a counterpoint to the tongue-in-cheek AI tradition of
 
     seeing humans as "information-exchanging environments,"
 
     the imagined life of computers has taken on an
 
     organicist shape, now that they too are subject to
 
     cybernetic "sickness" or disease.  So, too, the
 
     development of interrelated systems, such as Internet
 
     itself, has further added to the structural picture of
 
     an interdependent organism, whose component members,
 
     however autonomous, are all nonetheless affected by the
 
     "health" of each individual constituent.  The growing
 
     interest among scientists in developing computer
 
     programs that will simulate the genetic behavior of
 
     living organisms (in which binary numbers act like
 
     genes) points to a future where the border between
 
     organic and artificial life is less and less distinct.
 
[5]       In keeping with the increasing use of biologically
 
     derived language to describe mutations in systems
 
     theory, conscious attempts to link the AIDS crisis with
 
     the information security crisis have pointed out that
 
     both kinds of virus, biological and electronic, take
 
     over the host cell/program and clone their carrier
 
     genetic codes by instructing the hosts to make replicas
 
     of the viruses.  Neither kind of virus, however, can
 
     replicate themselves independently; they are pieces of
 
     code that attach themselves to other cells/programs--
 
     just as biological viruses need a host cell, computer
 
     viruses require a host program to activate them.  The
 
     Internet virus was not, in fact, a virus, but a worm, a
 
     program that can run independently and therefore
 
     _appears_ to have a life of its own.  The worm
 
     replicates a full version of itself in programs and
 
     systems as it moves from one to another, masquerading
 
     as a legitimate user by guessing the user passwords of
 
     locked accounts. Because of this autonomous existence,
 
     the worm can be seen to behave as if it were an
 
     organism with some kind of purpose or teleology, and
 
     yet it has none.  Its only "purpose" is to reproduce
 
     and infect.  If the worm has no inbuilt antireplication
 
     code, or if the code is faulty, as was the case with
 
     the Internet worm, it will make already-infected
 
     computers repeatedly accept further replicas of itself,
 
     until their memories are clogged.  A much quieter worm
 
     than that engineered by Morris would have moved more
 
     slowly, as one supposes a "worm" should, protecting
 
     itself from detection by ever more subtle camouflage,
 
     and propagating its cumulative effect of operative
 
     systems inertia over a much longer period of time.
 
[6]       In offering such descriptions, however, we must be
 
     wary of attributing a teleology/intentionality to worms
 
     and viruses which can be ascribed only, and, in most
 
     instances, speculatively, to their authors.  There is
 
     no reason why a cybernetic "worm" might be expected to
 
     behave in any fundamental way like a biological worm.
 
     So, too, the assumed intentionality of its author
 
     distinguishes the human-made cybernetic virus from the
 
     case of the biological virus, the effects of which are
 
     fated to be received and discussed in a language
 
     saturated with human-made structures and narratives of
 
     meaning and teleological purpose.  Writing about the
 
     folkloric theologies of significance and explanatory
 
     justice (usually involving retribution) that have
 
     sprung up around the AIDS crisis, Judith Williamson has
 
     pointed to the radical implications of this collision
 
     between an intentionless virus and a meaning-filled
 
     culture:
 
          Nothing could be more meaningless than a
 
          virus.  It has no point, no purpose, no plan;
 
          it is part of no scheme, carries no inherent
 
          significance.  And yet nothing is harder for
 
          us to confront than the complete absence of
 
          meaning.  By its very definition,
 
          meaninglessness cannot be articulated within
 
          our social language, which is a system _of_
 
          meaning: impossible to include, as an
 
          absence, it is also impossible to exclude--
 
          for meaninglessness isn't just the opposite
 
          of meaning, it is the end of meaning, and
 
          threatens the fragile structures by which we
 
          make sense of the world.^4^
 
[7]       No such judgment about meaninglessness applies to
 
     the computer security crisis.  In contrast to HIV's
 
     lack of meaning or intentionality, the meaning of
 
     cybernetic viruses is always already replete with
 
     social significance.  This meaning is related, first of
 
     all, to the author's local intention or motivation,
 
     whether psychic or fully social, whether wrought out
 
     of a mood of vengeance, a show of bravado or technical
 
     expertise, a commitment to a political act, or in
 
     anticipation of the profits that often accrue from the
 
     victims' need to buy an antidote from the author.
 
     Beyond these local intentions, however, which are
 
     usually obscure or, as in the Morris case, quite
 
     inscrutable, there is an entire set of social and
 
     historical narratives that surround and are part of the
 
     "meaning" of the virus: the coded anarchist history of
 
     the youth hacker subculture; the militaristic
 
     environments of search-and-destroy warfare (a virus has
 
     two components--a carrier and a "warhead"), which,
 
     because of the historical development of computer
 
     technology, constitute the family values of information
 
     techno-culture; the experimental research environments
 
     in which creative designers are encouraged to work; and
 
     the conflictual history of pure and applied ethics in
 
     the science and technology communities, to name just a
 
     few.  A similar list could be drawn up to explain the
 
     widespread and varied _response_ to computer viruses,
 
     from the amused concern of the cognoscenti to the
 
     hysteria of the casual user, and from the research
 
     community and the manufacturing industry to the morally
 
     aroused legislature and the mediated culture at large.
 
     Every one of these explanations and narratives is the
 
     result of social and cultural processes and values;
 
     consequently, there is very little about the virus
 
     itself that is "meaningless."  Viruses can no more be
 
     seen as an objective, or necessary, result of the
 
     "objective" development of technological systems than
 
     technology in general can be seen as an objective,
 
     determining agent of social change.
 
[8]       For the sake of polemical economy, I would note
 
     that the cumulative effect of all the viral hysteria
 
     has been twofold.  Firstly, it has resulted in a
 
     windfall for software producers, now that users' blithe
 
     disregard for makers' copyright privileges has eroded
 
     in the face of the security panic.  Used to fighting
 
     halfhearted rearguard actions against widespread piracy
 
     practices, or reluctantly acceding to buyers' desire
 
     for software unencumbered by top-heavy security
 
     features, software vendors are now profiting from the
 
     new public distrust of program copies.  So, too, the
 
     explosion in security consciousness has hyperstimulated
 
     the already fast-growing sectors of the security system
 
     industry and the data encryption industry.  In line
 
     with the new imperative for everything from
 
     "vaccinated" workstations to "sterilized" networks, it
 
     has created a brand new market of viral vaccine vendors
 
     who will sell you the virus (a one-time only
 
     immunization shot) along with its antidote--with names
 
     like Flu Shot +, ViruSafe, Vaccinate, Disk Defender,
 
     Certus, Viral Alarm, Antidote, Virus Buster,
 
     Gatekeeper, Ongard, and Interferon.  Few of the
 
     antidotes are very reliable, however, especially since
 
     they pose an irresistible intellectual challenge to
 
     hackers who can easily rewrite them in the form of ever
 
     more powerful viruses.  Moreover, most corporate
 
     managers of computer systems and networks know that by
 
     far the great majority of their intentional security
 
     losses are a result of insider sabotage and
 
     monkeywrenching.
 
[9]       In short, the effects of the viruses have been to
 
     profitably clamp down on copyright delinquency, and to
 
     generate the need for entirely new industrial
 
     production of viral suppressors to contain the fallout.
 
     In this respect, it is easy to see that the appearance
 
     of viruses could hardly, in the long run, have
 
     benefited industry producers more.  In the same vein,
 
     the networks that have been hardest hit by the security
 
     squeeze are not restricted-access military or corporate
 
     systems but networks like Internet, set up on trust to
 
     facilitate the open academic exchange of data,
 
     information and research, and watched over by its
 
     sponsor, DARPA.  It has not escaped the notice of
 
     conspiracy theorists that the military intelligence
 
     community, obsessed with "electronic warfare," actually
 
     stood to learn a lot from the Internet virus; the virus
 
     effectively "pulsed the system," exposing the
 
     sociological behaviour of the system in a crisis
 
     situation.^5^
 
          The second effect of the virus crisis has been
 
     more overtly ideological.  Virus-conscious fear and
 
     loathing have clearly fed into the paranoid climate of
 
     privatization that increasingly defines social
 
     identities in the new post-Fordist order.  The result--
 
     a psycho-social closing of the ranks around fortified
 
     private spheres--runs directly counter to the ethic
 
     that we might think of as residing at the architectural
 
     heart of information technology.  In its basic assembly
 
     structure, information technology is a technology of
 
     processing, copying, replication, and simulation,  and
 
     therefore does not recognize the concept of private
 
     information property.  What is now under threat is the
 
     rationality of a shareware culture, ushered in as the
 
     achievement of the hacker counterculture that pioneered
 
     the personal computer revolution in the early seventies
 
     against the grain of corporate planning.
 
[10]      There is another story to tell, however, about the
 
     emergence of the virus scare as a profitable
 
     ideological moment, and it is the story of how teenage
 
     hacking has come to be increasingly defined as a
 
     potential threat to normative educational ethics and
 
     national security alike.  The story of the creation of
 
     this "social menace" is central to the ongoing attempts
 
     to rewrite property law in order to contain the effects
 
     of the new information technologies that, because of
 
     their blindness to the copyrighting of intellectual
 
     property, have transformed the way in which modern
 
     power is exercised and maintained.  Consequently, a
 
     deviant social class or group has been defined and
 
     categorised as "enemies of the state" in order to help
 
     rationalize a general law-and-order clampdown on free
 
     and open information exchange.  Teenage hackers' homes
 
     are now habitually raided by sheriffs and FBI agents
 
     using strong-arm tactics, and jail sentences are
 
     becoming a common punishment.  Operation Sundevil, a
 
     nationwide Secret Service operation in the spring of
 
     1990, involving hundreds of agents in fourteen cities,
 
     is the most recently publicized of the hacker raids
 
     that have produced several arrests and seizures of
 
     thousands of disks and address lists in the last two
 
     years.^6^
 
[11]      In one of the many harshly punitive prosecutions
 
     against hackers in recent years, a judge went so far as
 
     to describe "bulletin boards" as "hi-tech street
 
     gangs."  The editors of _2600_, the magazine that
 
     publishes information about system entry and
 
     exploration that is indispensable to the hacking
 
     community, have pointed out that any single invasive
 
     act, such as that of trespass, that involves the use of
 
     computers is considered today to be infinitely more
 
     criminal than a similar act undertaken without
 
     computers.^7^  To use computers to execute pranks,
 
     raids, frauds or thefts is to incur automatically the
 
     full repressive wrath of judges urged on by the moral
 
     panic created around hacking feats over the last two
 
     decades.  Indeed, there is a strong body of pressure
 
     groups pushing for new criminal legislation that will
 
     define "crimes with computers" as a special category of
 
     crime, deserving "extraordinary" sentences and punitive
 
     measures.  Over that same space of time, the term
 
     _hacker_ has lost its semantic link with the
 
     journalistic _hack,_ suggesting a professional toiler
 
     who uses unorthodox methods.  So, too, its increasingly
 
     criminal connotation today has displaced the more
 
     innocuous, amateur mischief-maker-cum-media-star role
 
     reserved for hackers until a few years ago.
 
[12]      In response to the gathering vigor of this "war on
 
     hackers," the most common defences of hacking can be
 
     presented on a spectrum that runs from the appeasement
 
     or accommodation of corporate interests to drawing up
 
     blueprints for cultural revolution.  (a) Hacking
 
     performs a benign industrial service of uncovering
 
     security deficiencies and design flaws.  (b) Hacking,
 
     as an experimental, free-form research activity, has
 
     been responsible for many of the most progressive
 
     developments in software development.  (c) Hacking,
 
     when not purely recreational, is an elite educational
 
     practice that reflects the ways in which the
 
     development of high technology has outpaced orthodox
 
     forms of institutional education.  (d) Hacking is an
 
     important form of watchdog counterresponse to the use
 
     of surveillance technology and data gathering by the
 
     state, and to the increasingly monolithic
 
     communications power of giant corporations.  (e)
 
     Hacking, as guerrilla know-how, is essential to the
 
     task of maintaining fronts of cultural resistance and
 
     stocks of oppositional knowledge as a hedge against a
 
     technofascist future.  With all of these and other
 
     arguments in mind, it is easy to see how the social and
 
     cultural _management_ of hacker activities has become a
 
     complex process that involves state policy and
 
     legislation at the highest levels.  In this respect,
 
     the virus scare has become an especially convenient
 
     vehicle for obtaining public and popular consent for
 
     new legislative measures and new powers of
 
     investigation for the FBI.^8^
 
[13]      Consequently, certain celebrity hackers have been
 
     quick to play down the zeal with which they pursued
 
     their earlier hacking feats, while reinforcing the
 
     _deviant_ category of "technological hooliganism"
 
     reserved by moralizing pundits for "dark-side" hacking.
 
     Hugo Cornwall, British author of the bestselling
 
     _Hacker's Handbook_, presents a Little England view of
 
     the hacker as a harmless fresh-air enthusiast who
 
     "visits advanced computers as a polite country rambler
 
     might walk across picturesque fields."  The owners of
 
     these properties are like "farmers who don't mind
 
     careful ramblers."  Cornwall notes that "lovers of
 
     fresh-air walks obey the Country Code, involving such
 
     items as closing gates behind one and avoiding damage
 
     to crops and livestock" and suggests that a similar
 
     code ought to "guide your rambles into other people's
 
     computers; the safest thing to do is simply browse,
 
     enjoy and learn."  By contrast, any rambler who
 
     "ventured across a field guarded by barbed wire and
 
     dotted with notices warning about the Official Secrets
 
     Act would deserve most that happened thereafter."^9^
 
     Cornwall's quaint perspective on hacking has a certain
 
     "native charm," but some might think that this
 
     beguiling picture of patchwork-quilt fields and benign
 
     gentleman farmers glosses over the long bloody history
 
     of power exercised through feudal and postfeudal land
 
     economy in England, while it is barely suggestive of
 
     the new fiefdoms, transnational estates, dependencies,
 
     and principalities carved out of today's global
 
     information order by vast corporations capable of
 
     bypassing the laws and territorial borders of sovereign
 
     nation-states.  In general, this analogy with
 
     "trespass" laws, which compares hacking to breaking and
 
     entering other people's homes restricts the debate to
 
     questions about privacy, property, possessive
 
     individualism, and, at best, the excesses of state
 
     surveillance, while it closes off any examination of
 
     the activities of the corporate owners and
 
     institutional sponsors of information technology (the
 
     almost exclusive "target" of most hackers).^10^
 
[14]      Cornwall himself has joined the lucrative ranks of
 
     ex-hackers who either work for computer security firms
 
     or write books about security for the eyes of worried
 
     corporate managers.^11^  A different, though related,
 
     genre is that of the penitent hacker's "confession,"
 
     produced for an audience thrilled by tales of high-
 
     stakes adventure at the keyboard, but written in the
 
     form of a computer security handbook.  The best example
 
     of the "I Was a Teenage Hacker" genre is Bill (aka "The
 
     Cracker") Landreth's _Out of the Inner Circle_: The
 
     True Story of a Computer Intruder Capable of Cracking
 
     the Nation's Most Secure Computer Systems_, a book
 
     about "people who can't `just say no' to computers."
 
     In full complicity with the deviant picture of the
 
     hacker as "public enemy," Landreth recirculates every
 
     official and media cliche about subversive
 
     conspiratorial elites by recounting the putative
 
     exploits of a high-level hackers' guild called the
 
     Inner Circle.  The author himself is presented in the
 
     book as a former keyboard junkie who now praises the
 
     law for having made a good moral example of him:
 
          If you are wondering what I am like, I can
 
          tell you the same things I told the judge in
 
          federal court: Although it may not seem like
 
          it, I am pretty much a normal American
 
          teenager.  I don't drink, smoke or take
 
          drugs.  I don't steal, assault people, or
 
          vandalize property.  The only way in which I
 
          am really different from most people is in my
 
          fascination with the ways and means of
 
          learning about computers that don't belong to
 
          me.^12^
 
     Sentenced in 1984 to three years probation, during
 
     which time he was obliged to finish his high school
 
     education and go to college, Landreth concludes:  "I
 
     think the sentence is very fair, and I already know
 
     what my major will be...."  As an aberrant sequel to
 
     the book's contrite conclusion, however, Landreth
 
     vanished in 1986, violating his probation, only to face
 
     later a stiff five-year jail sentence--a sorry victim,
 
     no doubt, of the recent crackdown.
 
 
 
     _Cyber-Counterculture_?
 
[15]      At the core of Steven Levy's bestseller _Hackers_
 
     (1984) is the argument that the hacker ethic, first
 
     articulated in the 1950s among the famous MIT students
 
     who developed multiple-access user systems, is
 
     libertarian and crypto-anarchist in its right-to know
 
     principles and its advocacy of decentralized
 
     technology.  This hacker ethic, which has remained the
 
     preserve of a youth culture for the most part, asserts
 
     the basic right of users to free access to all
 
     information.  It is a principled attempt, in other
 
     words, to challenge the tendency to use technology to
 
     form information elites.  Consequently, hacker
 
     activities were presented in the eighties as a romantic
 
     countercultural tendency, celebrated by critical
 
     journalists like John Markoff of the _New York Times_,
 
     by Stewart Brand of _Whole Earth Catalog_ fame, and by
 
     New Age gurus like Timothy Leary in the flamboyant
 
     _Reality Hackers_.  Fuelled by sensational stories
 
     about phone phreaks like Joe Egressia (the blind eight-
 
     year old who discovered the tone signal of phone
 
     company by whistling) and Cap'n Crunch, groups like the
 
     Milwaukee 414s, the Los Angeles ARPAnet hackers, the
 
     SPAN Data Travellers, the Chaos Computer Club of
 
     Hamburg, the British Prestel hackers, _2600_'s BBS,
 
     "The Private Sector," and others, the dominant media
 
     representation of the hacker came to be that of the
 
     "rebel with a modem," to use Markoff's term, at least
 
     until the more recent "war on hackers" began to shape
 
     media coverage.
 
[16]       On the one hand, this popular folk hero persona
 
     offered the romantic high profile of a maverick though
 
     nerdy cowboy whose fearless raids upon an impersonal
 
     "system" were perceived as a welcome tonic in the gray
 
     age of technocratic routine.  On the other hand, he was
 
     something of a juvenile technodelinquent who hadn't yet
 
     learned the difference between right and wrong---a
 
     wayward figure whose technical brilliance and
 
     proficiency differentiated him nonetheless from, say,
 
     the maladjusted working-class J.D. street-corner boy of
 
     the 1950s (hacker mythology, for the most part, has
 
     been almost exclusively white, masculine, and middle-
 
     class).  One result of this media profile was a
 
     persistent infantilization of the hacker ethic--a way
 
     of trivializing its embryonic politics, however finally
 
     complicit with dominant technocratic imperatives or
 
     with entrepreneurial-libertarian ideology one perceives
 
     these politics to be.  The second result was to
 
     reinforce, in the initial absence of coercive jail
 
     sentences, the high educational stakes of training the
 
     new technocratic elites to be responsible in their use
 
     of technology.  Never, the given wisdom goes, has a
 
     creative elite of the future been so in need of the
 
     virtues of a liberal education steeped in Western
 
     ethics!
 
[17]      The full force of this lesson in computer ethics
 
     can be found laid out in the official Cornell
 
     University report on the Robert Morris affair.  Members
 
     of the university commission set up to investigate the
 
     affair make it quite clear in their report that they
 
     recognize the student's academic brilliance.  His
 
     hacking, moreover, is described, as a "juvenile act"
 
     that had no "malicious intent" but that amounted, like
 
     plagiarism, the traditional academic heresy, to a
 
     dishonest transgression of other users' rights.  (In
 
     recent years, the privacy movement within the
 
     information community--a movement mounted by liberals
 
     to protect civil rights against state gathering of
 
     information--has actually been taken up and used as a
 
     means of criminalizing hacker activities.)  As for the
 
     consequences of this juvenile act, the report proposes
 
     an analogy that, in comparison with Cornwall's _mature_
 
     English country rambler, is thoroughly American,
 
     suburban, middle-class and _juvenile_.  Unleashing the
 
     Internet worm was like "the driving of a golf-cart on a
 
     rainy day through most houses in the neighborhood.  The
 
     driver may have navigated carefully and broken no
 
     china, but it should have been obvious to the driver
 
     that the mud on the tires would soil the carpets and
 
     that the owners would later have to clean up the
 
     mess."^13^
 
[18]      In what stands out as a stiff reprimand for his
 
     alma mater, the report regrets that Morris was educated
 
     in an "ambivalent atmosphere" where he "received no
 
     clear guidance" about ethics from "his peers or
 
     mentors" (he went to Harvard!).  But it reserves its
 
     loftiest academic contempt for the press, whose
 
     heroization of hackers has been so irresponsible, in
 
     the commission's opinion, as to cause even further
 
     damage to the standards of the computing profession;
 
     media exaggerations of the courage and technical
 
     sophistication of hackers "obscures the far more
 
     accomplished work of students who complete their
 
     graduate studies without public fanfare," and "who
 
     subject their work to the close scrutiny and evaluation
 
     of their peers, and not to the interpretations of the
 
     popular press."^14^  In other words, this was an inside
 
     affair, to be assessed and judged by fellow
 
     professionals within an institution that reinforces its
 
     authority by means of internally self-regulating codes
 
     of professionalist ethics, but rarely addresses its
 
     ethical relationship to society as a whole (acceptance
 
     of defence grants, and the like).  Generally speaking,
 
     the report affirms the genteel liberal ideal that
 
     professionals should not need laws, rules, procedural
 
     guidelines, or fixed guarantees of safe and responsible
 
     conduct.  Apprentice professionals ought to have
 
     acquired a good conscience by osmosis from a liberal
 
     education rather than from some specially prescribed
 
     course in ethics and technology.
 
[19]      The widespread attention commanded by the Cornell
 
     report (attention from the Association of Computing
 
     Machinery, among others) demonstrates the industry's
 
     interest in how the academy invokes liberal ethics in
 
     order to assist in the managing of the organization of
 
     the new specialized knowledge about information
 
     technology.  Despite or, perhaps, because of the
 
     report's steadfast pledge to the virtues and ideals of
 
     a liberal education, it bears all the marks of a
 
     legitimation crisis inside (and outside) the academy
 
     surrounding the new and all-important category of
 
     computer professionalism.  The increasingly specialized
 
     design knowledge demanded of computer professionals
 
     means that codes that go beyond the old professionalist
 
     separation of mental and practical skills are needed to
 
     manage the division that a hacker's functional talents
 
     call into question, between a purely mental pursuit and
 
     the pragmatic sphere of implementing knowledge in the
 
     real world.  "Hacking" must then be designated as a
 
     strictly _amateur_ practice; the tension, in hacking,
 
     between _interestedness_ and _disinterestedness_ is
 
     different from, and deficient in relation to, the
 
     proper balance demanded by professionalism.
 
     Alternately, hacking can be seen as the amateur flip
 
     side of the professional ideal--a disinterested love in
 
     the service of interested parties and institutions.  In
 
     either case, it serves as an example of professionalism
 
     gone wrong, but not very wrong.
 
[20]      In common with the two responses to the virus
 
     scare described earlier--the profitable reaction of the
 
     computer industry and the self-empowering response of
 
     the legislature-- the Cornell report shows how the
 
     academy uses a case like the Morris affair to
 
     strengthen its own sense of moral and cultural
 
     authority in the sphere of professionalism,
 
     particularly through its scornful indifference to and
 
     aloofness from the codes and judgements exercised by
 
     the media--its diabolic competitor in the field of
 
     knowledge.  Indeed, for all the trumpeting about
 
     excesses of power and disrespect for the law of the
 
     land, the revival of ethics, in the business and
 
     science disciplines in the Ivy League and on Capitol
 
     Hill (both awash with ethical fervor in the post-Boesky
 
     and post-Reagan years), is little more than a weak
 
     liberal response to working flaws or adaptational
 
     lapses in the social logic of technocracy.
 
[21]      To complete the scenario of morality play example-
 
     making, however, we must also consider that Morris's
 
     father was chief scientist of the National Computer
 
     Security Center, the National Security Agency's public
 
     effort at safeguarding computer security.  A brilliant
 
     programmer and codebreaker in his own right, he had
 
     testified in Washington in 1983 about the need to
 
     deglamorise teenage hacking, comparing it to "stealing
 
     a car for the purpose of joyriding."  In a further
 
     Oedipal irony, Morris Sr. may have been one of the
 
     inventors, while at Bell Labs in the 1950s, of a
 
     computer game involving self-perpetuating programs that
 
     were a prototype of today's worms and viruses.  Called
 
     Darwin, its principles were incorporated, in the
 
     eighties, into a popular hacker game called Core War,
 
     in which autonomous "killer" programs fought each other
 
     to the death.^15^
 
[22]      With the appearance, in the Morris affair, of a
 
     patricidal object who is also the Pentagon's guardian
 
     angel, we now have many of the classic components of
 
     countercultural cross-generational conflict.  What I
 
     want to consider, however, is how and where this
 
     scenario differs from the definitive contours of such
 
     conflicts that we recognize as having been established
 
     in the sixties; how the Cornell hacker Morris's
 
     relation to, say, campus "occupations" today is
 
     different from that evoked by the famous image of armed
 
     black students emerging from a sit-in on the Cornell
 
     campus; how the relation to technological ethics
 
     differs from Andrew Kopkind's famous statement
 
     "Morality begins at the end of a gun barrel" which
 
     accompanied the publication of the do-it-yourself
 
     Molotov cocktail design on the cover of a 1968 issue of
 
     the _New York Review of Books_; or how hackers' prized
 
     potential access to the networks of military systems
 
     warfare differs from the prodigious Yippie feat of
 
     levitating the Pentagon building.  It may be that, like
 
     the J.D. rebel without a cause of the fifties, the
 
     disaffiliated student dropout of the sixties, and the
 
     negationist punk of the seventies, the hacker of the
 
     eighties has come to serve as a visible public example
 
     of moral maladjustment, a hegemonic test case for
 
     redefining the dominant ethics in an advanced
 
     technocratic society.  (Hence the need for each of
 
     these deviant figures to come in different versions--
 
     lumpen, radical chic, and Hollywood-style.)
 
[23]      What concerns me here, however, are the different
 
     conditions that exist today for recognizing
 
     countercultural expression and activism.  Twenty years
 
     later, the technology of hacking and viral guerrilla
 
     warfare occupies a similar place in countercultural
 
     fantasy as the Molotov Cocktail design once did.  While
 
     I don't, for one minute, mean to insist on such
 
     comparisons, which aren't particularly sound anyway, I
 
     think they conveniently mark a shift in the relation of
 
     countercultural activity to technology, a shift in
 
     which a software-based technoculture, organized around
 
     outlawed libertarian principles about free access to
 
     information and communication, has come to replace a
 
     dissenting culture organized around the demonizing of
 
     abject hardware structures.  Much, though not all, of
 
     the sixties counterculture was formed around what I
 
     have elsewhere called the _technology of folklore_--an
 
     expressive congeries of preindustrialist, agrarianist,
 
     Orientalist, antitechnological ideas, values, and
 
     social structures.  By contrast, the cybernetic
 
     countercultures of the nineties are already being
 
     formed around the _folklore of technology_--mythical
 
     feats of survivalism and resistance in a data-rich
 
     world of virtual environments and posthuman bodies--
 
     which is where many of the SF-and technology-conscious
 
     youth cultures have been assembling in recent
 
     years.^16^
 
[24]      There is no doubt that this scenario makes
 
     countercultural activity more difficult to recognize
 
     and therefore to define as politically significant.  It
 
     was much easier, in the sixties, to _identify_ the
 
     salient features and symbolic power of a romantic
 
     preindustrialist cultural politics in an advanced
 
     technological society, especially when the destructive
 
     evidence of America's supertechnological invasion of
 
     Vietnam was being daily paraded in front of the public
 
     eye.  However, in a society whose technopolitical
 
     infrastructure depends increasingly upon greater
 
     surveillance, cybernetic activism necessarily relies on
 
     a much more covert politics of identity, since access
 
     to closed systems requires discretion and
 
     dissimulation.  Access to digital systems still
 
     requires only the authentication of a signature or
 
     pseudonym, not the identification of a real
 
     surveillable person, so there exists a crucial
 
     operative gap between authentication and
 
     identification.  (As security systems move toward
 
     authenticating access through biological signatures--
 
     the biometric recording and measurement of physical
 
     characteristics such as palm or retinal prints, or vein
 
     patterns on the backs of hands--the hacker's staple
 
     method of systems entry through purloined passwords
 
     will be further challenged.)  By the same token,
 
     cybernetic identity is never used up, it can be
 
     recreated, reassigned, and reconstructed with any
 
     number of different names and under different user
 
     accounts.  Most hacks, or technocrimes, go unnoticed or
 
     unreported for fear of publicising the vulnerability of
 
     corporate security systems, especially when the hacks
 
     are performed by disgruntled employees taking their
 
     vengeance on management.  So, too, authoritative
 
     identification of any individual hacker, whenever it
 
     occurs, is often the result of accidental leads rather
 
     than systematic detection.  For example, Captain
 
     Midnight, the video pirate who commandeered a satellite
 
     a few years ago to interrupt broadcast TV viewing, was
 
     traced only because a member of the public reported a
 
     suspicious conversation heard over a crossed telephone
 
     line.
 
[25]      Eschewing its core constituency among white males
 
     of the pre-professional-managerial class, the hacker
 
     community may be expanding its parameters outward.
 
     Hacking, for example, has become a feature of the young
 
     adult mystery-and-suspense novel genre for girls.^17^
 
     The elitist class profile of the hacker prodigy as that
 
     of an undersocialized college nerd has become
 
     democratized and customized in recent years; it is no
 
     longer exclusively associated with institutionally
 
     acquired college expertise, and increasingly it dresses
 
     streetwise.  In a recent article which documents the
 
     spread of the computer underground from college whiz
 
     kids to a broader youth subculture termed "cyberpunks,"
 
     after the movement among SF novelists, the original
 
     hacker phone phreak Cap'n Crunch is described as
 
     lamenting the fact that the cyberculture is no longer
 
     an "elite" one, and that hacker-valid information is
 
     much easier to obtain these days.^18^
 
[26]      For the most part, however, the self-defined
 
     hacker underground, like many other
 
     protocountercultural tendencies, has been restricted to
 
     a privileged social milieu, further magnetised by the
 
     self-understanding of its members that they are the
 
     apprentice architects of a future dominated by
 
     knowledge, expertise, and "smartness," whether human or
 
     digital.  Consequently, it is clear that the hacker
 
     cyberculture is not a dropout culture; its
 
     disaffiliation from a domestic parent culture is often
 
     manifest in activities that answer, directly or
 
     indirectly, to the legitimate needs of industrial R&D.
 
     For example, this hacker culture celebrates high
 
     productivity, maverick forms of creative work energy,
 
     and an obsessive identification with on-line endurance
 
     (and endorphin highs)--all qualities that are valorised
 
     by the entrepreneurial codes of silicon futurism.  In a
 
     critique of the myth of the hacker-as-rebel, Dennis
 
     Hayes debunks the political romance woven around the
 
     teenage hacker:
 
          They are typically white, upper-middle-class
 
          adolescents who have taken over the home
 
          computer (bought, subsidized, or tolerated
 
          by parents in the hope of cultivating
 
          computer literacy).  Few are politically
 
          motivated although many express contempt for
 
          the "bureaucracies" that hamper their
 
          electronic journeys.  Nearly all demand
 
          unfettered access to intricate and intriguing
 
          computer networks.  In this, teenage hackers
 
          resemble an alienated shopping culture
 
          deprived of purchasing opportunities more
 
          than a terrorist network.^19^
 
[27]      While welcoming the sobriety of Hayes's critique,
 
     I am less willing to accept its assumptions about the
 
     political implications of hacker activities.  Studies
 
     of youth subcultures (including those of a privileged
 
     middle-class formation) have taught us that the
 
     political meaning of certain forms of cultural
 
     "resistance" is notoriously difficult to read.  These
 
     meanings are either highly coded or expressed
 
     indirectly through media--private peer languages,
 
     customized consumer styles, unorthodox leisure
 
     patterns, categories of insider knowledge and
 
     behavior--that have no fixed or inherent political
 
     significance.  If cultural studies of this sort have
 
     proved anything, it is that the often symbolic, not
 
     wholly articulate, expressivity of a youth culture can
 
     seldom be translated directly into an articulate
 
     political philosophy.  The significance of these
 
     cultures lies in their embryonic or _protopolitical_
 
     languages and technologies of opposition to dominant or
 
     parent systems of rules.  If hackers lack a "cause,"
 
     then they are certainly not the first youth culture to
 
     be characterized in this dismissive way.  In
 
     particular, the left has suffered from the lack of a
 
     cultural politics capable of recognizing the power of
 
     cultural expressions that do not wear a mature
 
     political commitment on their sleeves.
 
          So, too, the escalation of activism-in-the-
 
     professions in the last two decades has shown that it
 
     is a mistake to condemn the hacker impulse on account
 
     of its class constituency alone.  To cede the "ability
 
     to know" on the grounds that elite groups will enjoy
 
     unjustly privileged access to technocratic knowledge is
 
     to cede too much of the future.  Is it of no political
 
     significance at all that hackers' primary fantasies
 
     often involve the official computer systems of the
 
     police, armed forces, and defence and intelligence
 
     agencies?  And that the rationale for their fantasies
 
     is unfailingly presented in the form of a defence of
 
     civil liberties against the threat of centralized
 
     intelligence and military activities?  Or is all of
 
     this merely a symptom of an apprentice elite's
 
     fledgling will to masculine power?  The activities of
 
     the Chinese student elite in the pro-democracy movement
 
     have shown that unforeseen shifts in the political
 
     climate can produce startling new configurations of
 
     power and resistance.  After Tiananmen Square, Party
 
     leaders found it imprudent to purge those high-tech
 
     engineer and computer cadres who alone could guarantee
 
     the future of any planned modernization program.  On
 
     the other hand, the authorities rested uneasy knowing
 
     that each cadre (among the most activist groups in the
 
     student movement) is a potential hacker who can have
 
     the run of the communications house if and when he or
 
     she wants.
 
[28]      On the other hand, I do agree with Hayes's
 
     perception that the media have pursued their romance
 
     with the hacker at the cost of underreporting the much
 
     greater challenge posed to corporate employers by their
 
     employees.  It is in the arena of conflicts between
 
     workers and management that most high-tech "sabotage"
 
     takes place.  In the mainstream everyday life of office
 
     workers, mostly female, there is a widespread culture
 
     of unorganized sabotage that accounts for infinitely
 
     more computer downtime and information loss every year
 
     than is caused by destructive, "dark-side" hacking by
 
     celebrity cybernetic intruders.  The sabotage, time
 
     theft, and strategic monkeywrenching deployed by office
 
     workers in their engineered electromagnetic attacks on
 
     data storage and operating systems might range from the
 
     planting of time or logic bombs to the discrete use of
 
     electromagnetic Tesla coils or simple bodily friction:
 
     "Good old static electricity discharged from the
 
     fingertips probably accounts for close to half the
 
     disks and computers wiped out or down every year."^20^
 
     More skilled operators, intent on evening a score with
 
     management, often utilize sophisticated hacking
 
     techniques.  In many cases, a coherent networking
 
     culture exists among female console operators, where,
 
     among other things, tips about strategies for slowing
 
     down the temporality of the work regime are circulated.
 
     While these threats from below are fully recognized in
 
     their boardrooms, corporations dependent upon digital
 
     business machines are obviously unwilling to advertize
 
     how acutely vulnerable they actually are to this kind
 
     of sabotage.  It is easy to imagine how organised
 
     computer activism could hold such companies for ransom.
 
     As Hayes points out, however, it is more difficult to
 
     mobilize any kind of labor movement organized upon such
 
     premises:
 
          Many are prepared to publicly oppose the
 
          countless dark legacies of the computer age:
 
          "electronic sweatshops," Military technology,
 
          employee surveillance, genotoxic water, and
 
          ozone depletion.  Among those currently
 
          leading the opposition, however, it is
 
          apparently deemed "irresponsible" to recommend
 
          an active computerized resistance as a source
 
          of worker's power because it is perceived as
 
          a medium of employee crime and "terrorism."
 
          ^21^
 
     _Processed World_, the "magazine with a bad attitude"
 
     with which Hayes has been associated, is at the
 
     forefront of debating and circulating these questions
 
     among office workers, regularly tapping into the
 
     resentments borne out in on-the-job resistance.
 
[29]      While only a small number of computer users would
 
     recognize and include themselves under the label of
 
     "hacker," there are good reasons for extending the
 
     restricted definition of _hacking_ down and across the
 
     caste system of systems analysts, designers,
 
     programmers, and operators to include all high-tech
 
     workers, no matter how inexpert, who can interrupt,
 
     upset, and redirect the smooth flow of structured
 
     communications that dictates their positions in the
 
     social networks of exchange and determines the
 
     temporality of their work schedules.  To put it in
 
     these terms, however, is not to offer any universal
 
     definition of hacker agency.  There are many social
 
     agents, for example, in job locations that are
 
     dependent upon the hope of technological _reskilling_,
 
     for whom sabotage or disruption of communicative
 
     rationality is of little use; for such people,
 
     definitions of hacking that are reconstructive, rather
 
     than deconstructive, are more appropriate.  A good
 
     example is the crucial role of worker technoliteracy in
 
     the struggle of labor against automation and
 
     deskilling.  When worker education classes in computer
 
     programming were discontinued by management at the Ford
 
     Rouge plant in Dearborn, Michigan, union (UAW) members
 
     began to publish a newsletter called the _Amateur
 
     Computerist_ to fill the gap.^22^  Among the columnists
 
     and correspondents in the magazine have been veterans
 
     of the Flint sit-down strikes who see a clear
 
     historical continuity between the problem of labor
 
     organization in the thirties and the problem of
 
     automation and deskilling today.  Workers' computer
 
     literacy is seen as essential not only to the
 
     demystification of the computer and the reskilling of
 
     workers, but also to labor's capacity to intervene in
 
     decisions about new technologies that might result in
 
     shorter hours and thus in "work efficiency" rather than
 
     worker efficiency.
 
[30]      The three social locations I have mentioned above
 
     all express different class relations to technology:
 
     the location of an apprentice technical elite,
 
     conventionally associated with the term "hacking"; the
 
     location of the female high-tech office worker,
 
     involved in "sabotage"; and the location of the shop-
 
     floor worker, whose future depends on technological
 
     reskilling.  All therefore exhibit different ways of
 
     _claiming back_ time dictated and appropriated by
 
     technological processes, and of establishing some form
 
     of independent control over the work relation so
 
     determined by the new technologies.  All, then, fall
 
     under a broad understanding of the politics involved in
 
     any extended description of hacker activities.
 
 
     [This file is continued in ROSS-2 990]
 
     [Andrew Ross, "Hacking Away at the Counter-culture,"
     part 2, continued from ROSS-1 990.  Distributed by
     _Postmodern Culture_ in vol. 1, no. 1 (Sep. 1990);
     copyright (c) 1990 by Andrew Ross, all rights reserved]
 
     _The Culture and Technology Question_
 
[31]      Faced with these proliferating practices in the
 
     workplace, on the teenage cult fringe, and increasingly
 
     in mainstream entertainment, where, over the last five
 
     years, the cyberpunk sensibility in popular fiction,
 
     film, and television has caught the romance of the
 
     popular taste for the outlaw technology of
 
     human/machine interfaces, we are obliged, I think, to
 
     ask old kinds of questions about the new silicon order
 
     which the evangelists of information technology have
 
     been deliriously proclaiming for more than twenty
 
     years.  The postindustrialists' picture of a world of
 
     freedom and abundance projects a sunny millenarian
 
     future devoid of work drudgery and ecological
 
     degradation.  This sunny social order, cybernetically
 
     wired up, is presented as an advanced evolutionary
 
     phase of society in accord with Enlightenment ideals of
 
     progress and rationality.  By contrast, critics of this
 
     idealism see only a frightening advance in the
 
     technologies of social control, whose owners and
 
     sponsors are efficiently shaping a society, as Kevin
 
     Robins and Frank Webster put it, of "slaves without
 
     Athens" that is actually the inverse of the "Athens
 
     without slaves" promised by the silicon
 
     positivists.^23^
 
[32]      It is clear that one of the political features of
 
     the new post-Fordist order--economically marked by
 
     short-run production, diverse taste markets, flexible
 
     specialization, and product differentiation--is that
 
     the New Right has managed to appropriate not only the
 
     utopian language and values of the alternative
 
     technology movements but also the marxist discourse of
 
     the "withering away of the state" and the more
 
     compassionate vision of local, decentralized
 
     communications first espoused by the libertarian left.
 
     It must be recognized that these are very popular
 
     themes and visions, (advanced most famously by Alvin
 
     Toffler and the neoliberal Atari Democrats, though also
 
     by leftist thinkers such as Andre Gortz, Rudolf Bahro,
 
     and Alain Touraine)--much more popular, for example,
 
     than the tradition of centralized technocratic planning
 
     espoused by the left under the Fordist model of mass
 
     production and consumption.^24^  Against the
 
     postindustrialists' millenarian picture of a
 
     postscarcity harmony, in which citizens enjoy
 
     decentralized, access to free-flowing information, it
 
     is necessary, however, to emphasise how and where
 
     actually existing cybernetic capitalism presents a
 
     gross caricature of such a postscarcity society.
 
[33]      One of the stories told by the critical left about
 
     new cultural technologies is that of monolithic,
 
     panoptical social control, effortlessly achieved
 
     through a smooth, endlessly interlocking system of
 
     networks of surveillance.  In this narrative,
 
     information technology is seen as the most despotic
 
     mode of domination yet, generating not just a
 
     revolution in capitalist production but also a
 
     revolution in living--"social Taylorism"--that touches
 
     all cultural and social spheres in the home and in the
 
     workplace.^25^  Through routine gathering of
 
     information about transactions, consumer preferences,
 
     and creditworthiness, a harvest of information about
 
     any individual's whereabouts and movements, tastes,
 
     desires, contacts, friends, associates, and patterns of
 
     work and recreation becomes available in the form of
 
     dossiers sold on the tradable information market, or is
 
     endlessly convertible into other forms of intelligence
 
     through computer matching.  Advanced pattern
 
     recognition technologies facilitate the process of
 
     surveillance, while data encryption protects it from
 
     public accountability.^26^
 
[34]       While the debate about privacy has triggered
 
     public consciousness about these excesses, the liberal
 
     discourse about ethics and damage control in which that
 
     debate has been conducted falls short of the more
 
     comprehensive analysis of social control and social
 
     management offered by left political economists.
 
     According to one marxist analysis, information is seen
 
     as a new kind of commodity resource which marks a break
 
     with past modes of production and that is becoming the
 
     essential site of capital accumulation in the world
 
     economy.  What happens, then, in the process by which
 
     information, gathered up by data scavenging in the
 
     transactional sphere, is systematically converted into
 
     intelligence?  A surplus value is created for use
 
     elsewhere.  This surplus information value is more than
 
     is needed for public surveillance; it is often
 
     information, or intelligence, culled from consumer
 
     polling or statistical analysis of transactional
 
     behavior, that has no immediate use in the process of
 
     routine public surveillance.  Indeed, it is this
 
     surplus, bureaucratic capital that is used for the
 
     purpose of forecasting social futures, and consequently
 
     applied to the task of managing the behavior of mass or
 
     aggregate units within those social futures.  This
 
     surplus intelligence becomes the basis of a whole new
 
     industry of futures research which relies upon computer
 
     technology to simulate and forecast the shape,
 
     activity, and behavior of complex social systems.  The
 
     result is a possible system of social management that
 
     far transcends the questions about surveillance that
 
     have been at the discursive center of the privacy
 
     debate.^27^
 
[35]      To further challenge the idealists' vision of
 
     postindustrial light and magic, we need only look
 
     inside the semiconductor workplace itself, which is
 
     home to the most toxic chemicals known to man (and
 
     woman, especially since women of color often make up
 
     the majority of the microelectronics labor force), and
 
     where worker illness is measured not in quantities of
 
     blood spilled on the shop floor but in the less visible
 
     forms of chromosome damage, shrunken testicles,
 
     miscarriages, premature deliveries, and severe birth
 
     defects.  In addition to the extraordinarily high
 
     stress patterns of VDT operators, semiconductor workers
 
     exhibit an occupational illness rate that even by the
 
     late seventies was three times higher than that of
 
     manufacturing workers, at least until the federal rules
 
     for recognizing and defining levels of injury were
 
     changed under the Reagan administration.  Protection
 
     gear is designed to protect the product and the clean
 
     room from the workers, and not vice versa.  Recently,
 
     immunological health problems have begun to appear that
 
     can be described only as a kind of chemically induced
 
     AIDS, rendering the T-cells dysfunctional rather than
 
     depleting them like virally induced AIDS.^28^  In
 
     corporate offices, the use of keystroke software to
 
     monitor and pace office workers has become a routine
 
     part of job performance evaluation programs.  Some 70
 
     percent of corporations use electronic surveillance or
 
     other forms of quantitative monitoring on their
 
     workers.  Every bodily movement can be checked and
 
     measured, especially trips to the toilet.  Federal
 
     deregulation has meant that the limits of employee work
 
     space have shrunk, in some government offices, below
 
     that required by law for a two-hundred pound laboratory
 
     pig.^29^  Critics of the labor process seem to have
 
     sound reasons to believe that rationalization and
 
     quantification are at last entering their most
 
     primitive phase.
 
[36]      These, then, are some of the features of the
 
     critical left position--or what is sometimes referred
 
     to as the "paranoid" position--on information
 
     technology, which imagines or constructs a totalizing,
 
     monolithic picture of systematic domination.  While
 
     this story is often characterized as conspiracy theory,
 
     its targets--technorationality, bureaucratic
 
     capitalism--are usually too abstract to fit the picture
 
     of a social order planned and shaped by a small,
 
     conspiring group of centralized power elites.
 
     Although I believe that this story, when told inside
 
     and outside the classroom, for example, is an
 
     indispensable form of "consciousness-raising," it is
 
     not always the best story to tell.
 
[37]      While I am not comfortable with the "paranoid"
 
     labelling, I would argue that such narratives do little
 
     to discourage paranoia.  The critical habit of finding
 
     unrelieved domination everywhere has certain
 
     consequences, one of which is to create a siege
 
     mentality, reinforcing the inertia, helplessness, and
 
     despair that such critiques set out to oppose in the
 
     first place.  What follows is a politics that can speak
 
     only from a victim's position.  And when knowledge
 
     about surveillance is presented as systematic and
 
     infallible, self-censoring is sure to follow.  In the
 
     psychosocial climate of fear and phobia aroused by the
 
     virus scare, there is a responsibility not to be
 
     alarmist or to be scared, especially when, as I have
 
     argued, such moments are profitably seized upon by the
 
     sponsors of control technology.  In short, the picture
 
     of a seamlessly panoptical network of surveillance may
 
     be the result of a rather undemocratic, not to mention
 
     unsocialistic, way of thinking, predicated upon the
 
     recognition of people solely as victims.  It is
 
     redolent of the old sociological models of mass society
 
     and mass culture, which cast the majority of society as
 
     passive and lobotomized in the face of the cultural
 
     patterns of modernization.  To emphasize, as Robins and
 
     Webster and others have done, the power of the new
 
     technologies to despotically transform the "rhythm,
 
     texture, and experience" of everyday life, and meet
 
     with no resistance in doing so, is not only to cleave,
 
     finally, to an epistemology of technological
 
     determinism, but also to dismiss the capacity of people
 
     to make their own uses of new technologies.^30^
 
[38]      The seamless "interlocking" of public and private
 
     networks of information and intelligence is not as
 
     smooth and even as the critical school of hard
 
     domination would suggest.  In any case, compulsive
 
     gathering of information is no _guarantee_ that any
 
     interpretive sense will be made of the files or
 
     dossiers, while some would argue that the increasingly
 
     covert nature of surveillance is a sign that the
 
     "campaign" for social control is not going well.  One
 
     of the most pervasive popular arguments against the
 
     panoptical intentions of the masters of technology is
 
     that their systems do not work.  Every successful hack
 
     or computer crime in some way reinforces the popular
 
     perception that information systems are not infallible.
 
     And the announcements of military-industrial
 
     spokespersons that the fully automated battlefield is
 
     on its way run up against an accumulated stock of
 
     popular skepticism about the operative capacity of
 
     weapons systems.  These misgivings are born of decades
 
     of distrust for the plans and intentions of the
 
     military-industrial complex, and were quite evident in
 
     the widespread cynicism about the Strategic Defense
 
     Initiative.  Just to take one empirical example of
 
     unreliability, the military communications system
 
     worked so poorly and so farcically during the U.S.
 
     invasion of Grenada that commanders had to call each
 
     other on pay phones: ever since then, the command-and-
 
     control code of Arpanet technocrats has been C5--
 
     Command, Control, Communication, Computers, and
 
     Confusion.^31^  It could be said, of course, that the
 
     invasion of Grenada did, after all, succeed, but the
 
     more complex and inefficiency-prone such high-tech
 
     invasions become (Vietnam is still the best example),
 
     the less likely they are to be undertaken with any
 
     guarantee of success.
 
[39]      I am not suggesting that alternatives can be
 
     forged simply by encouraging disbelief in the
 
     infallibility of existing technologies (pointing to
 
     examples of the appropriation of technologies for
 
     radical uses, of course, always provides more visibly
 
     satisfying evidence of empowerment), but
 
     technoskepticism, while not a _sufficient_ condition of
 
     social change, is a _necessary_ condition.  Stocks of
 
     popular technoskepticism are crucial to the task of
 
     eroding the legitimacy of those cultural values that
 
     prepare the way for new technological developments:
 
     values and principles such as the inevitability of
 
     material progress, the "emancipatory" domination of
 
     nature, the innovative autonomy of machines, the
 
     efficiency codes of pragmatism, and the linear
 
     juggernaut of liberal Enlightenment rationality--all
 
     increasingly under close critical scrutiny as a wave of
 
     environmental consciousness sweeps through the
 
     electorates of the West.  Technologies do not shape or
 
     determine such values.  These values already exist
 
     before the technologies, and the fact that they have
 
     become deeply embodied in the structure of popular
 
     needs and desires then provides the green light for the
 
     acceptance of certain kinds of technology.  The
 
     principal rationale for introducing new technologies is
 
     that they answer to already existing intentions and
 
     demands that may be perceived as "subjective" but that
 
     are never actually within the control of any single set
 
     of conspiring individuals.  As Marike Finlay has
 
     argued, just as technology is only possible in given
 
     discursive situations, one of which being the desire of
 
     people to have it for reasons of empowerment, so
 
     capitalism is merely the site, and not the source, of
 
     the power that is often autonomously attributed to the
 
     owners and sponsors of technology.^32^
 
[40]      In fact, there is no frame of technological
 
     inevitability that has not already interacted with
 
     popular needs and desires, no introduction of new
 
     machineries of control that has not already been
 
     negotiated to some degree in the arena of popular
 
     consent.  Thus the power to design architecture that
 
     incorporates different values must arise from the
 
     popular perception that existing technologies are not
 
     the only ones, nor are they the best when it comes to
 
     individual and collective empowerment.  It was this
 
     kind of perception--formed around the distrust of big,
 
     impersonal, "closed" hardware systems, and the desire
 
     for small, decentralized, interactive machines to
 
     facilitate interpersonal communication--that "built"
 
     the PC out of hacking expertise in the early seventies.
 
     These were as much the partial "intentions" behind the
 
     development of microcomputing technology as deskilling,
 
     monitoring, and information gathering are the
 
     intentions behind the corporate use of that technology
 
     today.  The growth of public data networks, bulletin
 
     board systems, alternative information and media links,
 
     and the increasing cheapness of desktop publishing,
 
     satellite equipment, and international data bases are
 
     as much the result of local political "intentions" as
 
     the fortified net of globally linked, restricted-access
 
     information systems is the intentional fantasy of those
 
     who seek to profit from centralised control.  The
 
     picture that emerges from this mapping of intentions is
 
     not an inevitably technofascist one, but rather the
 
     uneven result of cultural struggles over values and
 
     meanings.
 
[41]      It is in this respect--in the struggle over values
 
     and meanings--that the work of cultural criticism takes
 
     on its special significance as a full participant in
 
     the debate about technology.  In fact, cultural
 
     criticism is already fully implicated in that debate,
 
     if only because the culture and education industries
 
     are rapidly becoming integrated within the vast
 
     information service conglomerates.  The media we study,
 
     the media we publish in, and the media we teach within
 
     are increasingly part of the same tradable information
 
     sector.  So, too, our common intellectual discourse has
 
     been significantly affected by the recent debates about
 
     postmodernism (or culture in a postindustrial world) in
 
     which the euphoric, addictive thrill of the
 
     technological sublime has figured quite prominently.
 
     The high-speed technological fascination that is
 
     characteristic of the postmodern condition can be read,
 
     on the one hand, as a celebratory capitulation on the
 
     part of intellectuals to the new information
 
     technocultures.  On the other hand, this celebratory
 
     strain attests to the persuasive affect associated with
 
     the new cultural technologies, to their capacity (more
 
     powerful than that of their sponsors and promoters) to
 
     generate pleasure and gratification and to win the
 
     struggle for intellectual as well as popular consent.
 
[42]      Another reason for the involvement of cultural
 
     critics in the technology debates has to do with our
 
     special critical knowledge of the way in which cultural
 
     meanings are produced--our knowledge about the politics
 
     of consumption and what is often called the politics of
 
     representation.  This is the knowledge which
 
     demonstrates that there are limits to the capacity of
 
     productive forces to shape and determine consciousness.
 
     It is a knowledge that insists on the ideological or
 
     interpretive dimension of technology as a culture which
 
     can and must be used and consumed in a variety of ways
 
     that are not reducible to the intentions of any single
 
     source or producer, and whose meanings cannot simply be
 
     read off as evidence of faultless social reproduction.
 
     It is a knowledge, in short, which refuses to add to
 
     the "hard domination" picture of disenfranchised
 
     individuals watched over by some by some scheming
 
     panoptical intelligence.  Far from being understood
 
     solely as the concrete hardware of electronically
 
     sophisticated objects, technology must be seen as a
 
     lived, interpretive practice for people in their
 
     everyday lives.  To redefine the shape and form of that
 
     practice is to help create the need for new kinds of
 
     hardware and software.
 
[43]      One of the latter aims of this essay has been to
 
     describe and suggest a wider set of activities and
 
     social locations than is normally associated with the
 
     practice of hacking.  If there is a challenge here for
 
     cultural critics, then it might be presented as the
 
     challenge to make our knowledge about technoculture
 
     into something like a hacker's knowledge, capable of
 
     penetrating existing systems of rationality that might
 
     otherwise be seen as infallible; a hacker's knowledge,
 
     capable of reskilling, and therefore of rewriting the
 
     cultural programs and reprogramming the social values
 
     that make room for new technologies; a hacker's
 
     knowledge, capable also of generating new popular
 
     romances around the alternative uses of human
 
     ingenuity.  If we are to take up that challenge, we
 
     cannot afford to give up what technoliteracy we have
 
     acquired in deference to the vulgar faith that tells us
 
     it is always acquired in complicity, and is thus
 
     contaminated by the poison of instrumental rationality,
 
     or because we hear, often from the same quarters, that
 
     acquired technological competence simply glorifies the
 
     inhuman work ethic.  Technoliteracy, for us, is the
 
     challenge to make a historical opportunity out of a
 
     historical necessity.
 
     _______________________________________________________
 
                             NOTES
 
 
          1. Bryan Kocher, "A Hygiene Lesson,"
     _Communications of the ACM_, 32.1 (January 1989): 3.
 
          2.  Jon A. Rochlis and Mark W. Eichen, "With
     Microscope and Tweezers: The Worm from MIT's
     Perspective," _Communications of the ACM_, 32.6 (June
     1989): 697.
 
          3. Philip Elmer-DeWitt, "Invasion of the Body
     Snatchers," _Time_ (26 September 1988); 62-67.
 
          4. Judith Williamson, "Every Virus Tells a Story:
     The Meaning of HIV and AIDS," _Taking Liberties: AIDS
     and Cultural Politics_, ed. Erica Carter and Simon
     Watney (London: Serpent's Tail/ICA, 1989): 69.
 
          5. "Pulsing the system" is a well-known
     intelligence process in which, for example, planes
     deliberately fly over enemy radar installations in
     order to determine what frequencies they use and how
     they are arranged.  It has been suggested that Morris
     Sr. and Morris Jr. worked in collusion as part of an
     NSA operation to pulse the Internet system, and to
     generate public support for a legal clampdown on
     hacking.  See Allan Lundell, _Virus! The Secret World
     of Computer Invaders That Breed and Destroy_ (Chicago:
     Contemporary Books, 1989), 12-18.  As is the case with
     all such conspiracy theories, no actual conspiracy need
     have existed for the consequences--in this case, the
     benefits for the intelligence community--to have been
     more or less the same.
 
          6. For details of these raids, see _2600: The
     Hacker's Quarterly_, 7.1 (Spring 1990): 7.
 
          7. "Hackers in Jail," _2600: The Hacker's
     Quarterly_, 6.1 (Spring 1989); 22-23.  The recent
     Secret Service action that shut down _Phrack_, an
     electronic newsletter operating out of St. Louis,
     confirms _2600_'s thesis: a nonelectronic publication
     would not be censored in the same way.
 
          8.  This is not to say that the new laws cannot
     themselves be used to protect hacker institutions,
     however.  _2600_ has advised operators of bulletin
     boards to declare them private property, thereby
     guaranteeing protection under the Electronic Privacy
     Act against unauthorized entry by the FBI.
 
          9. Hugo Cornwall, _The Hacker's Handbook_ 3rd ed.
     (London: Century, 1988) 181, 2-6.  In Britain, for the
     most part, hacking is still looked upon as a matter for
     the civil, rather than the criminal, courts.
 
          10. Discussions about civil liberties and property
     rights, for example, tend to preoccupy most of the
     participants in the electronic forum published as "Is
     Computer Hacking a Crime?" in _Harper's_, 280.1678
     (March 1990): 45-57.
 
          11. See Hugo Cornwall, _Data Theft_ (London:
     Heinemann, 1987).
 
          12. Bill Landreth, _Out of the Inner Circle: The
     True Story of a Computer Intruder Capable of Cracking
     the Nation's Most Secure Computer Systems_ (Redmond,
     Wash.: Tempus, Microsoft, 1989), 10.
 
          13. _The Computer Worm: A Report to the Provost of
     Cornell University on an Investigation Conducted by the
     Commission of Preliminary Enquiry_ (Ithaca, N.Y.:
     Cornell University, 1989).
 
          14. _The Computer Worm: A Report to the Provost_,
     8.
 
          15. A. K. Dewdney, the "computer recreations"
     columnist at _Scientific American_, was the first to
     publicize the details of this game of battle programs
     in an article in the May 1984 issue of the magazine.
     In a follow-up article in March 1985, "A Core War
     Bestiary of Viruses, Worms, and Other Threats to
     Computer Memories," Dewdney described the wide range of
     "software creatures" which readers' responses had
     brought to light.  A third column, in March 1989, was
     written, in an exculpatory mode, to refute any
     connection between his original advertisement of the
     Core War program and the spate of recent viruses.
 
          16. Andrew Ross, _No Respect: Intellectuals and
     Popular Culture_ (New York: Routledge, 1989), 212.
     Some would argue, however, that the ideas and values of
     the sixties counterculture were only fully culminated
     in groups like the People's Computer Company, which ran
     Community Memory in Berkeley, or the Homebrew Computer
     Club, which pioneered personal microcomputing.  So,
     too, the Yippies had seen the need to form YIPL, the
     Youth International Party Line, devoted to "anarcho-
     technological" projects, which put out a newsletter
     called TAP (alternately the Technological American
     Party and the Technological Assistance Program).  In
     its depoliticised form, which eschewed the kind of
     destructive "dark-side" hacking advocated in its
     earlier incarnation, _TAP_ was eventually the
     progenitor of _2600_.  A significant turning point, for
     example, was _TAP_'s decision not to publish plans for
     the hydrogen bomb (which the _Progressive_ did)--bombs
     would destroy the phone system, which the _TAP_ phone
     phreaks had an enthusiastic interest in maintaining.
 
          17. See Alice Bach's _Phreakers_ series, in which
     two teenage girls enjoy adventures through the use of
     computer technology.  _The Bully of Library Place_,
     _Parrot Woman_, _Double Bucky Shanghai_, and _Ragwars_
     (all published by Dell, 1987-88).
 
          18. John Markoff, "Cyberpunks Seek Thrills in
     Computerized Mischief," _New York Times_, November 26,
     1988.
 
          19. Dennis Hayes, _Behind the Silicon Curtain: The
     Seductions of Work in a Lonely Era_ (Boston, South End
     Press, 1989), 93.
          One striking historical precedent for the hacking
     subculture, suggested to me by Carolyn Marvin, was the
     widespread activity of amateur or "ham" wireless
     operators in the first two decades of the century.
     Initially lionized in the press as boy-inventor heroes
     for their technical ingenuity and daring adventures
     with the ether, this white middle-class subculture was
     increasingly demonized by the U.S. Navy (whose signals
     the amateurs prankishly interfered with), which was
     crusading for complete military control of the airwaves
     in the name of national security.  The amateurs lobbied
     with democratic rhetoric for the public's right to
     access the airwaves, and although partially successful
     in their case against the Navy, lost out ultimately to
     big commercial interests when Congress approved the
     creation of a broadcasting monopoly after World War I
     in the form of RCA.  See Susan J. Douglas, _Inventing
     American Broadcasting 1899-1922_ (Baltimore: Johns
     Hopkins University Press, 1987), 187-291.
 
          20. "Sabotage," _Processed World_, 11 (Summer
     1984), 37-38.
 
          21. Hayes, _Behind the Silicon Curtain_, 99.
 
          22. _The Amateur Computerist_, available from R.
     Hauben, PO Box, 4344, Dearborn, MI 48126.
 
          23. Kevin Robins and Frank Webster, "Athens
     Without Slaves...Or Slaves Without Athens?  The
     Neurosis of Technology," _Science as Culture_, 3
     (1988): 7-53.
 
          24. See Boris Frankel, _The Post-Industrial
     Utopians_ (Oxford: Basil Blackwell, 1987).
 
          25. See, for example, the collection of essays
     edited by Vincent Mosco and Janet Wasko, _The Political
     Economy of Information_ (Madison: University of
     Wisconsin Press, 1988), and Dan Schiller, _The
     Information Commodity_ (Oxford UP, forthcoming).
 
          26. Tom Athanasiou and Staff, "Encryption and the
     Dossier Society," _Processed World_, 16 (1986): 12-17.
 
          27.  Kevin Wilson, _Technologies of Control: The
     New Interactive Media for the Home_ (Madison:
     University of Wisconsin Press, 1988), 121-25.
 
          28. Hayes, _Behind the Silicon Curtain_, 63-80.
 
          29. "Our Friend the VDT," _Processed World_, 22
     (Summer 1988): 24-25.
 
          30. See Kevin Robins and Frank Webster,
     "Cybernetic Capitalism," in Mosco and Wasko, 44-75.
 
          31. Barbara Garson, _The Electronic Sweatshop_
     (New York: Simon & Schuster, 1988), 244-45.
 
          32. See Marike Finlay's Foucauldian analysis,
     _Powermatics: A Discursive Critique of New Technology_
     (London: Routledge & Kegan Paul, 1987).  A more
     conventional culturalist argument can be found in
     Stephen Hill, _The Tragedy of Technology_ (London:
     Pluto Press, 1988).