💾 Archived View for spam.works › mirrors › textfiles › politics › hckrslg.txt captured on 2024-02-05 at 13:49:04.

View Raw

More Information

⬅️ Previous capture (2023-06-16)

-=-=-=-=-=-=-

The Hacker's League
Lee Felsenstein
18 March 1992

Theory

     The Hacker's League is modeled loosely after the American 
Radio Relay League (A.R.R.L.), an organization of technological 
adventurers of the Edwardian period.  In its heyday, the radio 
amateurs moved from being nuisances to being important 
contributors to the development of radio technology.  In a field 
which demanded governmental regulation for orderly operation, the 
A.R.R.L. represented the interests of amateurs in the councils of 
government and organized ongoing educational activities through 
which newcomers to the field could learn not only the technology 
involved, but also the human interactions which connect the 
technology to the outside world.

     The most recent triumph of radio amateurs has been the 
development of packet radio, which has recently been adopted by 
Motorola as the basis for its "wireless local loop" for wireless 
telephone operation.  Thanks to the amateurs, it was developed 
and tried out in an open environment outside of commercial 
pressures which tend toward secrecy and exclusion. 

     In the area of computers and telecommunication, there are 
several parallels between today's hackers and the radio amateurs 
of 1915.  Hackers are seen by the respectable technological 
players as nuisances capable of doing great damage and generally 
without redeeming qualitites.  They were indistinguishable from 
rogue broadcasters who trampled on other signals in their urge to 
cover the longest distance.  In the corridors of power there was 
a movement toward outlawing them.  Nontechnical people did not 
know quite what to think about this problem and its suggested 
solution.

     The A.R.R.L. was more than a lobbying organization, though.  
It provided a means for the mutual education essential to the 
growth of any technology, a route of entry open to all comers, 
and a social scene to accompany the technological forum.  Through 
the A.R.R.L. green kids could encounter grizzled oldtimers who 
would be unapproachable in their positions the industry.  At 
field days and other events the cameraderie of being explorers 
overcame the barriers of class and position as well as those 
engendered by commercial competition.  Networking was possible in 
the amateur environment which forwarded the operation in the 
commercial and professional environments.

     The concept of the Hacker's League is similar but different 
as befits the different nature of the technology.  The aim is to 
provide a situation in which otherwise unqualified entrants to 
the field can engage in informal learning situations, test their 
skills as a means of exercising their craft, gain hands-on 
experience with systems which would be unobtainable otherwise, 
and participate on both sides of mentoring and tutorial 
relationships. 

     The Hacker's League would provide an outlet for the creative 
energies which are otherwise expended making life worse for 
perceived or imagined enemies through unauthorized entry to 
systems and other illegal or unethical conduct.  Such energies 
would be turned toward projects which advance the state of the 
art, and in a way which undermines the arrogance and exclusivity 
of the corporate managers which hackers find so tempting a 
target.

     To the charge that the Hacker's League would become a front 
for the interests of industry may be raised the defense that by 
exploiting industry's fear of low-level disorder it would provide 
an organizing platform for higher-level attack upon the 
technological underpinnings of the existing structure.  Consider 
the difference between outcomes had hackers in the 1970's been 
content to organize politically for access to mainframes. There 
would have been no personal computer industry, and the power 
relationships would not have undergone the radical changes 
brought about by the triumph of open architecture.  One might 
well have said then that the amateur computer activity was a 
distraction from the true task of tugging at the sleeve of power, 
yet we can all see the effects of that activity.

     The Hacker's League could be seen as a guild serving to 
restrict entry to the membership of the technical elite.  In 
fact, the League would be far more open than the current system 
of university education.  It would provide a means of testing to 
see whether one is suited to the demands of the technology 
without exacting years of commitment to learning prerequisites.  
Within the Hacker's League there would be much more mobility 
among specialties than exists in university curricula, and the 
doors would be open to underage entrants and those who come later 
in life after entrance to a university becomes difficult or 
impossible.

     Still, the human tendencies which lead toward exclusivity 
and the formation of cliques will always be with us, and we must 
bear themin mind as we proceed in conceptualizing and realizing 
the Hacker's League.  The technology in which we work tends to 
eliminate the need for centralization, and one of the important 
outcomes of the Leagues's development would be the demonstration 
of the decentralized mode of organization, as noble an 
exploration as might be contemplated, int he opinion of many.

     After all, the primary challenge is not so much in the 
hardware, or the physical form of the systems of 
intercommunication and interaction around which society develops.  
The important work is in developing the social forms of use of 
this technology which forwards the common good as well as that of 
the individual.  New ways of thinking, as Einstein said, are the 
urgently needed ingredient for the humanization and survivalof 
society.  The Hacker's League would not only provide a 
development bed for social innovations involving the use of 
information technology, but it would empower those innovations 
through the parallel development of the technology and, most 
importantly, of the human network through which the technology is 
made to come alive.

Practice

     The Hacker's League would be  membership organization open 
to nonmembers for certain functions.  It would be organized as a 
nonprofit educational and scientific organization.  Its 
publications would be freely available to all interested readers. 

     The League would hold periodic local events demonstrating 
technical achievements of members or chapters, and offering 
places for individuals outside the League to exhibit or to engage 
in low-level trade, such as swap meets.  A newcomer would most 
probably make first contact at such events, and might decide to 
attend a local chapter meeting. 

     Meetings of local chapters would be high in information 
exchange and low in structure.  Newcomers would be acknowledged 
and provided with a brief orientation so that they would not feel 
put off by displays of technical virtuosity or cliquishness.  If 
the newcomer desired further involvement, there would be a set of 
course tracks available as suggested paths for establishing, 
through achievement, one's level of skill.  These might be 
thought of as Scout Merit Badges, although the name would 
probably not be used.  

     In the early stages of involvement, the newcomer might 
interact with a designated instructor who is also working to 
establish skill in teaching and coaching.  Later, as the newcomer 
gains skill and established competence, he or she would be 
recommended for more individual instruction and consultation from 
more highly skilled mentors.  Such mentoring relationships would 
be an important feature of the League, both as a means and and 
end. 

     The League at the local level would acquire maintain 
obsolescent equipment which would be operated and imporved by the 
members through development projects proposed from the 
membership.  Telecommunication resource would also be solicited 
as donations from carriers, on the none-too-subtle suggestion 
that the availability of such resource in such a context is 
conducive to the developmentof skilled citizens instead of 
antisocial attackers.  Through this resource the League would 
maintain its larger structure, which would be a communication-
based overlay of networks and ad-hocracies.

     Through these structures conflicitng positions could be 
discussed and debated in a functioning participatory democracy.  
Informed plebiscites would be conducted both as a means of 
determining the senseof the League on issues of importsnce and as 
development projects testing the capabilities of information 
technology under various arrangements of use.  The highest 
structure of orgnization would be at the local level, and the 
administrators at wider levels might be given titles, such as 
Janitor, which tend to prevent puffery and self-glorification.  
Sapiential authority would be fostered within the League as 
opposed to positional authority. 

     The newcomer would progress from establishing his or her 
level of skill to a process of exploring the available courses of 
self-development.  It would be possible to propose a specific 
course different from the recommended courses.  The newcomer 
would then engage in projects which require the improvement in 
skill level under the supervision or review of competent skilled 
members. 

     This should be seen as professional development (where the 
word has no connotation of "earning a livelihood") and since it 
is a responsibility of all professionals to teach adn transmit 
their skills, the newcomer would along the way be expected to 
perform as an instructor and later a supervisor and mentor to future 
newcomers.  Thus, progress in self-development would not be 
simply a matter of the "neat hacks" one could accomplish, but 
would require an integration into the society first of hackers, 
then the broader society.  There is no reason why technologists 
must rely on others to represent their work to the public or the 
polity.

     One of the public service functions performed by the 
members of the Hacker's League (and this performance would be 
explicitly carried out by the members and not by the 
"organization") would be consultation on informational security 
and integrity of communications within everyday society.  Members 
of the League would provide a service of analysis of proposals, 
investigations of system misuse and pursuit of abusers which 
would rest on itsown professional foundation rather than serving 
direct commercial ends which might distort the conclusions of 
investigations.

     To use a popular metaphor, members ofthe HAcker's League 
might be compared to doctors on the Electronic Frontier, with 
their own loose medical association to keep quackery at bay and 
serving a public health function.  Or perhaps the analogy might 
be to schoolteachers who also write literature and literary 
criticism, as well as turningout works of art and organizing 
criticism of the same.  Obviously, this metaphoric space needs 
work.

     One can expect to betterone's material condition through 
participating inthe networks of relationships which would be the 
Hacker's League, if one has the skill and aptitude to improve 
one's skills.  If not, it would be no shame to cease 
participation. An important function of the League would be to 
encourage the incompetent to go elsewhere without opprobium.  
They may well turn up as administrators within industry, and it 
is in no ones' interest for there to be hostile relations based 
upon "loser" status. 

     In fact, the Hacker's League would be a way to do away with 
the "winner/loser" dichotomy.  If you try, you win to some 
degree, and younger members less secure in themselves need to 
learn this, at times to a desperate degree.  One can take on more 
thnone can handle, be allowed to fail with support from those 
more experienced, and not incur actual or emotional costs which 
would otherwise drive one away from such experimentation.  The 
Hacker's League wouldn't be working without a measurable degree 
of honestly won failure on the partofits members.

     What types of projects would be undertaken?  Perhaps the 
development of distributed operating systems suitable for 
networks of variegated intelligent devices; elegant user front-
ends and development environments for intuitive system 
configuration; pidgin speech (unnatural language) recognition 
systems; new structures of groupware; posibly neural networks at 
higher levels.  

     But these are my own conjectures, and what would actually 
transpire would almost certainly make these guesses look 
ridiculously quaint and primitive.  Let's give it a chance to 
happen.