SlideShare a Scribd company logo
1 of 15
Is Hacking Art? 1


Eng 102 Final Essay July 16, 2008 Christopher Horne




                                       Is Hacking Art?

                                      Christopher Horne

                             University of Advancing Technology

                                 Elizabeth Lorang, Professor
Is Hacking Art? 2




                                        Is Hacking Art?



        If it is true, as the old New York urban legend goes, that any secret can be told in

a bar within three drinks, then the hacker equivalent would be learning any secret within

six Red Bulls. And learning secrets is the essenceof being a hacker. A hacker, or ‘one who

hacks’, derives from the verb ‘hack’, to chop or cut roughly. There are a variety of connotations,

ranging from the relatively benign to the positively malicious. The modern interpretation has

veered sharply towards the nefarious end of the spectrum of meaning. Hacking is usually meant to

denote a specific type of quasi-criminal computer programmer whose mission it is to illegally

break into other people’s computer systems. The reasons run the gamut from simple curiosity to

criminal intent, such as stealing credit card numbers, passwords, account numbers, extortion for

espionage. There is some consensus that hackers are a disruptive force in society. For hackers, this

disruption is part of their mission in life. A hacker may be defined as someone who enjoys creative

processes involved in computer programming. In corporate America, programmers are often seen

as technicians whose job it is to translate the visions of product managers into code. In damping

the oscillations of creativity in the name of productivity, corporations dump the highs as well as

the lows. For some talented programmers, this regimen lacks sufficient rewards. America has a

great tradition of lionizing people who win by breaking rules. Hackers have this quality, plus an

overriding sense of relentlessness. A great hacker will also possess empathy (which often also

characterizes a great painter). In the closed ethos that defines hacking, visualizing the needs of the

end user (other hackers in this case) constitutes an aesthetic factor very close to the idea of beauty.

Computer science often extols lack of empathy as a mark of
Is Hacking Art? 3


high intelligence. There are historical reasons for this, going back the Unix mainframedays, when

large central computers at universities, corporations and the military were programmed and

maintained by a ‘priesthood’ who depended on secrecy in order to maintain their sta as
                                                                                   tus

programmers.

       This paper intends to discuss the question of whether hacking can be considered

art. To make any useful statements at all about th topic, it is necessary to first cons
                                                  is                                  ider

what constitutes art and then to see how, if at all, hackers can claim a valid sinecure in

this area. The notion of art is often defined in cultural terms, as an aspect of the realm of

civilization. In this regard, a common idea of art might be an object that is beautiful, hangs in a

gallery, is recognizable as the work of an individual, shows evidence of intensive labor in its

production, and is often expensive. A second indicator of art is something which shows superior

taste and refinement in the buyer of art. This might be called ‘art is in the eyes of the beholder’ if

it were a chapter in a book. None of these ideas would be incorrect. Anyone who posts a blog on

the Internet would be correct in stating that they have an opinion. The point of demarcation for a

blogger or and artist (or for an art critic) would be whether that opinion is an informed opinion.

This is a very pertinent question early in the third millennium, when the Internet allows an

informational Babel, a true universal democracy, or a Jeffersonian meritocracy (take your pick).

       In this spirit, art may be defined as reflecting some vital, illuminating part of current

culture, having a certain frisson that helps us locate ourselves in the context of the complexity of

life. Art should be relevant, make us think, have currency, an edge, hipness, definition, focus.

Victorian hair art may be beautiful in its way, but collecting and displaying it sends a message to

the viewer: I have no relevance, and therefore no voice in contemporary culture. The ghastly

simulacrums of Thomas Kinkade (“Painter of Light” tm) offer many of the hallmarks of

conventional definitions art (including hand painting by an individual) but only the most naïve and
Is Hacking Art? 4


gullible art buyers would fail to recognize themas commodities. The problem is that the

commoditization of art and culture is by now nearly total. Even once revered icons like Van Gogh,

Picasso, and Dali now pass as high-grade packaged goods for the wealthy.

        My contention is that hacker art is a new form of artistic expression. Hacking is

a performance art. Hackers perform technology itself. We grant this status to cinema.

Cinema is a performance by technology. The non-technological forms are plays, musical theater

and the like. For hackers, it is information itself which is the medium of representation. This is a

new concept in some ways, and in other ways, it is exactly the artistic justification behind the

Abstract Expressionists of the 1950s, and later Color Field, Minimalism, and Op and Pop art. Art is

pure information, the evidence of the mental activities of the artist as a sensitive interpreter of

culture. Technology is the hacker’s home culture; commenting on and manipulat ng that culture,
                                                                            i

he or she makes a perfectly valid statement of art, provided that it is done with the perception and

vision expected of any skilled artist . A hacker takes culture as his or her object, just as Goya found

war as a cultural subject or Warhol used thephenomenon of celebrity for the same purpose.

Quoting Douglas Thomas (Hacker Culture), “The difference is that the grounding of style is

shifted from the relationship from the relationship of material to cultural production to one based

on the production and consumption of knowledge. Hacker culture is able to invent itself as an

active system of signs rather than as a reactive system of re-articulation and re-contextualization.

Hacker style reverses the hierarchy of production.” (Douglas, 2002)

                The demographic for hackers is often young men either in their teens or early

twenties. They are smart, technologically savvy, and driven by a desire for knowledge.

As a culture, hackers are dedicated to testing boundaries. The goal of a hacker is mastery- mastery

of knowledge, of technology, and mastery of other hackers. They have their own language, Leet,

derived from the word ‘elite’; their own magazines such as Phrack and 2600, and their own virtual
Is Hacking Art? 5


territories on the Internet, such as BBS (online bulletin boards), where online reputations are built

and software offered to the community, and the Darknet, a private Internet where business is done.

Hacking culture is a mirror for mainstream culture. This mirror is dark and distorted, but a true

mirror nonetheless in many ways. The truth which this mirror reveals is far from beautiful, but it is

possible to find alternative answers to many of the half-truths and myths we allow material culture

to use against us to control the scope of our interactions with other members of society.

Mainstream culture overtly and covertly is dedicated to maintaining a status quo and class structure

not conducive to mobility. For example, ordinary citizens have Facebook, privileged classes have

Diamond Lounge (www.diamondlounge.com), a social networking site which only admits

members recommended by other members. Those members are from the top echelons, and the

information exchanged is of great monetary value. In having an alternative vision of values and

lifestyles, we are better able to evade the persistent obfuscation presented as a model of ordinary

life by the omniscient, omnipresent condu of mainstream media on behalf of such process owners
                                         it

as the military, political and commercial interests who currently occupy the alpha predator niches

of our social ecology.(Douglas, 2002)

This state is often referred to as the Panopticon, an all-seeing surveillance culture.

For those in opposition to the Panopticon, there are two desirable pieces of knowledge.

The first is who the surveillance culture prioritizes in choosing targets, and the second

Is what kind of information is being gathered. These kinds of knowledge are important to

all of us, but for the hacker at the margins of legality, they are vital to freedom.

        One of the primary confusions in conventional society is the difference between

money and wealth. Wealth is anything that creates surplus value. It need not be a

physical object. It could be data, or services, or knowledge, or anything else that people

want and are willing to pay for. Money is only the token of exchange for goods and
Is Hacking Art? 6


services. Hackers understand this principle very well. This is why their labor and

products (chiefly software) is offered to other hackers for free. They are ‘paid’ by

having their reputation enhanced online. It is a game of honor, like jousting was for

medieval knights. Knights had rules of chivalry which defined their lives, and hackers

have a similar code of honor, called Hacker Ethics.

        At the heart of the hacker experience is an intense desire for problem solving.

To gain more and more knowledge is a primary goal. Hacking is a ‘gifting culture’, similar to that

of certain Native American tribes of the Pacific Northwest, where status and leadership are gained

by giving potlatches. (Sternberg, 1994) The more the would-be leader gives to the tribe, the higher

their social status. In the case of hackers, by giving back knowledge and making available free

software tools that other hackers can use, the common enterprise of hacking and hacking culture is

advanced. One of the main social contracts of this culture is ‘Hacker Ethics’. In its most articulate

form, published in a book by Steven Levy “Heroes of the Computer Revolution” in 1984. (Levy,

1984)



The principles dictate:

   1. Access to computers-and anything that might teach you something about the way
         the world works- should be unlimited and total.

   2. Always yield to the Hands-on Imperative!

   3. All information should be free


   4. Mistrust authority- promote decentralization


   5. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or
      position


   6. You can create art and beauty on a computer.
Is Hacking Art? 7




   7. Computers can change your life for the better.


   This simple code yields some surprising insights. Who would have believed tha
                                                                               t

over-caffenated adolescents with data fixations could be native postmodernists, as in Rule 5. But

what is postmodernism? Sir Isaac Newton, the great 18th century physicist once said, late in his

life, “I seem to have been only a boy playing on the seashore, and diverting myself now and then

finding a smoother pebble or a prettier shell than ordinary, wilst the great ocean of truth lay all

undiscovered before me.”[fl] This faith in some great but discoverable truth lay behind much of

the thinking of the Enlightenment, and later the period of culture which has come to be known as

modernism. In contrast, postmodernism is the study of the phenomenon of the perceived trend

towards the atomization of context and the failure of meta-narratives in general to provide for

social cohesion in society. It is the hangover from the grand ball of the Enlightenment, when the

belief in the mind of Humankind and belief in the perpetual and inevi able advance of Civilization
                                                                    t

was still possible. The lighthouse of the Rational has fallen in a storm. There are bricks and

stones and rubble, but the great prize, the light itself that saved countless ships, has been swept

away to sea. Some long for the light, but others say that it is better gone. These last are the coastal

pirates, the shipbreakers whose new-found wealth has madethem the rulers of the coast. But what

is really gone forever is the view from the top of the lighthouse. To picture code-obsessed

teenagers taking time from their efforts to break into Strategic Air Command backbone servers to

discuss the finer points of such postmodernists as Derain and Derrida is farcical.

       Any real similarities in philosophy between postmodernism and hacking are an example of

co-evolution. It sometimes happens that in nature two entirely different species come up with the

same form independently, sometimes by dint of evolutionary change, as in the case of the Viceroy

butterfly, which mimics the Monarch. The Monarch butterfly feeds on the bitter tasting sap of the
Is Hacking Art? 8


milkweed plant, and this makes it unpalatable to birds. Through the mechanism of natural

selection, the Viceroy closely resembles the Monarch, and so takes advantage of the birds’

acquired distaste. An exception to this may be in the origins of postmodernism, which came about

as a result of reaction against modernism. One of modernism’s chief affects is architecture,

exemplified by the International Style created by Mies van der Rohes in the 1950’s. This is the

familiar ‘glass box’ skyscraper, still with us today. The glass box minimized public space and by

its ordered verticality, became the perfect expression of hierarchal corporate power. It is proper to

speak of computer architectures in the sameway, because the same power structures that created

the skyscrapers also built the corporate networks, for the same purpose and with the same

philosophy. Therefore, we may think of hacker culture as closely related to the pos
                                                                                  tmodern

movement. They both are reacting in different arenas against the same authoritarian culture.

       Principle 2, the Hands-on Imperative (Levy’s capitalization) is worth discussing.

In some ways, the idea of taking things apart to see how they work in order to produce something

better defines a key aspect of hacker personality and thinking. In Victorian society, they would

have been called tinkerers. Before the advent of the computer, many adolescents were into

electronics, building radios, repairing TV’s, making homemade strobe lights, guitar amplifiers, and

the like. They were regarded as harmless eccentrics, prototypical nerds, and usually wound up

being ham radio operators or TV repairmen. The computer is a device of another order altogether.

Because it can both send and receive data, and is connected via the Internet to other sources of

data, the harmless tinkerer suddenly has real power. Part of the lure of becoming a hacker stems

from an original state of powerlessness, of being the one who the jocks in hi h school beat up and
                                                                            g

the pretty girls scorned. Powerlessness aligned with intelligence is a powerful cocktail in any age,

but the computer provides the leverage to actuate that power into a significant force in society. I

am reminded of the old Arab saying, “Never turn your back on a frog.” Just because something
Is Hacking Art? 9


seems powerless doesn’t mean that it is. Principle 6 demonstrates that the idea of hackers as artists

is already a very integral part of the culture.

         Modern art was largely defined by New York critics Clement Greenberg and

Harold Rosenberg beginning in the 1950’s. Their theme was purity. The canvas was

a field of action. What was to go on the canvas, according to Greenberg, was not a picture

but an event- a record of pure activity. The contents, or message of the artwork on the canvas was

to be stripped of all visual and historic referents, and the results were simply visual information.

(Wolfe, 1975) Painting was to be a blueprint for ideas, in exactly the same

way that software code is a blueprint for the computer program itself. Real art happened

in the brain, real art speaks for itself. Given the concept that the Internet may be regarded

as the ‘canvas’ of the work of hackers, we can begin to see some ready parallels between

what has been accepted as the primary theory of modern art since the 1950s, albeit in

modified form, and the possibility that hacking can be considered a valid art form.

Hacking, like the work of Jackson Pollack or Jasper Johns, is a signifier of the state of

American culture, a ready barometer for the cooling of an advanced culture as it hardens

and solidifies into a late stage of decline. Furthermore, the art of hackers is a direct message

written on the very life of the culture itself, since it affects and modifies the functioning of the

Internet. The Internet, as frame, represents the image of culture in flux. By violating that frame,

hacking’s interaction adheres to the principle that art is a diagram of culture. As comment on that

diagram, hacking represents a diagram of a diagram, and a diagram of a diagram is metaphysics.

(Taylor, 2004)

        We can see, then, that not only is hacking art, but in it could be said to signify a sacred

mission to save society from itself. Hacking is the real goods, creatively. Hacking as a culture is

about secrets, and secrets are the root of cool. We live in a world of predigested forms, at the
Is Hacking Art? 10


interface of public history and secret history. As individuals, the signal-to-noise ratio for

empowerment is very high. The official media represents a species of nest invasion, which seeks

to maintain the crisis of self for its own ends. We have internalized the interface, and history, as

internalized space, emerges from the trauma of loss of self. With the barriers to the self broken

down, and the flood of messages from the Id of commercial and political American culture

breaking over the levees of our souls, we seek a rescuer, an agent of change, to restore the integrity

of our submerged psyches. Hackers represent an alternative order, a path to higher ground, where

the individual, the ronin, the trickster, shows the way back toself-containment and

detachment from the corrosive swells of the sea of media. Hackers have voluntarily abandoned the

cherished values of our culture which make life comprehensible and define normality. This

requires real courage. We are immigrants in a windowless passage in steerage, our destination

defined by hope. Only the ‘first class’ passengers have access to sunlight, air, and a semblance of

a view over the wide ocean of progress. Hackers are those passengers from the lower levels who

steal onto the bridge undetected to gain some notion of our course and heading. We should

celebrate this boldness not to suffer blindly in darkness.

       No artist can claim that calling without some sense of beauty or aesthetics. For a hacker, as

a writer of software, the first consideration must be utility. His or her intended audience is going to

take the code off the BBS and use it for its intended purpose. If it doesn’t work, and work well, the

hacker posting the code will find their reputation in a steep, rapid decline. According to Paul

Graham, Hackers and Painters, (Graham, 2004), beauty for a software designer is good design.

Good design encompasses simplicity, solves the right problem, looks easy but is actually hard to

write, has symmetry, and importantly, it is daring. If something is ugly, it is probably not the best

design, according to Graham. The root of technology is

technique. Good technique is always in favor among the cognoscenti, whether it is Jasper
Is Hacking Art? 11


John’s wax-based encaustics, the invisible brushstrokes of Georgia O’Keefe, or DoomCowX’s

level-seven OSI hack on a DOD server. Great work in any creative field tends to grow out of ideas

that have been overlooked, and no idea is so overlooked as one that is unthinkable. A great hacker

does not merely ignore conventional wisdom, but makes a special effort to break it. An example

as an artist might be Seurat, who broke the integrity of a picture plane made up of brushstrokes that

flow together to make a pictorial representation and instead broke it up into thousands and

thousands of tiny dots of color. It was the right sort of wrongness.

        To the extent that hackers areseen to be the enemies of such manifestations of

mainstream culture as the government, commerce, the military and the media, which seek to

consolidate their power on the economic and social lives of citizens by any means, the central issue

is: Who has the center of cool? Apple Computer’s slogan was “Think Different”, even as they

strove to commodify their customer base into reliable demographics. A company either grows or it

dies, the argument goes, and it grows by feeding off the economic and social nature of its

customers. The military and government, too, need this fuel of coolness to finance a plethora of

schemes. “Be all you can be”, whispers the Army’s advertisement; “Aim high” counters the Air

Force. “Yes, we can!” trumpets a prominent presidential candidate. The media, having no

substance, is all about cool. Why do millions of people tune in nightly to watch a man in a suit

read from a piece of paper? There is nothing inherently interesting in the act, but the ‘news’ is

pitched as relevant, ‘with it’, vital- in other words, cool. In this sense, hackers may be

thought less as true enemies of the current hegemony than as a rival subculture, competing for a

share of the limited oxygen that is Attention. Attention- ‘eyeballs’, to use the vernacular, is the

real prize. The sustained attention of individuals is the paydirt of our civilization, the heavy grains

of gold in the media stream that must be panned and sluiced to maintain power. Hackers are agents

of disruption to the physical process of transmitting cultural messages about Weapons of Mass
Is Hacking Art? 12


Destruction or the virtues of whitening strips for a clean, healthy mouth. The message of

manipulation is precisely the same. Only the weight of the message is different. As McLuhan

might have said, a company does not produce cigarettes, or lightbulbs, or cruise missiles, it

produces information. On the surface, the disruption caused by hackers is trivial- a few servers go

down, some account numbers are compromised, a company’s reputation for reliability is

damaged. But the game goes on.

        The real hazard from hackers consists of providing an alternative vision of cool.

If money and material goods aren’t hip, if a credit card with a 27 % interest rate no longer

represents ‘freedom’, the commodification of context (meaningthe entire communication

process) is broken. In this sense, the government and industry represent the real hackers, stealing

and manipulating our personal identities for power and gain. Both the hackers and the

corporations are bent on producing art. The art of corporations is concealment, that of hackers is

the revelation that the concealment can be removed. Using the metaphor of the Wizard of Oz, it is

the hackers in the form of Toto who pull back the curtain of power, revealing to the transfixed

public the machinations of the man with the microphone. (Mizrach, 1998) Bogeymen (the

ayatollah, Ghadafy, Bin Laden, radon gas) are part of the standard mechanism of distraction used

by all governments and industry in their campaigns to maintain power. Yet, flaws in the nature of

Power itself prevent hackers from being fully utilized for this purpose. A bank may not wish to

advertise to its competitors and the public that bank accounts and other information are not safe. A

government may not wish to point out that it had secrets to hide, or the nature of those secrets.

Hackers are nothing if not intelligent, and realize that this phenomenon gives them additional

leverage over institutions of all stripes.

        The hacker’s crime is that of erasing the boundaries between technology and culture,
Is Hacking Art? 13


and in so doing, creating a space where one can perform technology as a subject of culture rather

than a subject alienated by culture. (Douglas, 2002) They could becalled deconstructionists, artists

who find meaning in the margins of technology where machines and relationships encounter

situations they were not designed to handle. As such, they are metaphysical explorers who seek to

understand all that there is to understand about the world. This is the hallmark of the highest type

of humanity. Like that other explorer, Prometheus, who brought the forbidden technology of fire

to civilization, we see them as agents of knowledge who have done their job too well, and must be

punished for their effrontery. Those would reveal secrets must pay the price.



                                    References



Douglas, Thomas. (2002). Hacker Culture. Minneapolis.

       University of Minnesota Press.

 Sternberg, Robert J. (1994). Thinking and Problem Solving. San Diego.

       Academic Press.

Levy, Steven. (1984). Hackers: Heroes of the Computer Revol tion. Garden City.
                                                          u

       Anchor Press.

Brewster, Sir David. (1855). Memoirs of the Life, Writings, and Discoveries of Sir

       Isaac Newton, Volume II. Edinburgh. Thomas Constable & Co.

Wolfe, Tom. (1975). The Painted Word. New York.

       Farrar, Straus, Giroux.

 Taylor, Paul. (2004). The Digital Sublime. Cambridge. MIT Press.

Graham, Paul . (2004). Hackers and Painters: Big Ideas from the Computer Age. Cambridge.

O’Reilly.
Is Hacking Art? 14


Mizrach, Steven. (1998).Is There a Hacker Ethic for 90’s Hackers?.

      Retrieved July 15, 2008 from http:// www.fiu.edu/~mizrachs/hackerethic.html
Is Hacking Art? 15

More Related Content

Similar to Is Hacking Art

Perfect Family Essay. Descriptive essay: Write essay on my family
Perfect Family Essay. Descriptive essay: Write essay on my familyPerfect Family Essay. Descriptive essay: Write essay on my family
Perfect Family Essay. Descriptive essay: Write essay on my familyJulie Roest
 
Darknet imaginaries: The discursive malleability of the cultural status of di...
Darknet imaginaries: The discursive malleability of the cultural status of di...Darknet imaginaries: The discursive malleability of the cultural status of di...
Darknet imaginaries: The discursive malleability of the cultural status of di...Piotr Siuda
 
Slaughtering Sacred Cows
Slaughtering Sacred CowsSlaughtering Sacred Cows
Slaughtering Sacred CowsTony Smith
 
The Interactive culture in the XXI century
The Interactive culture in the XXI centuryThe Interactive culture in the XXI century
The Interactive culture in the XXI centuryFabio Viola
 
Cyberfeminism with a difference
Cyberfeminism with a differenceCyberfeminism with a difference
Cyberfeminism with a differenceVitoria Alexia
 
Examples Of Compare And Contrast Essays. Compare And Contrast Essay Outline Mla
Examples Of Compare And Contrast Essays. Compare And Contrast Essay Outline MlaExamples Of Compare And Contrast Essays. Compare And Contrast Essay Outline Mla
Examples Of Compare And Contrast Essays. Compare And Contrast Essay Outline MlaMorgan Daniels
 
Online-Aesthetics. From Genre to Subculture
Online-Aesthetics. From Genre to SubcultureOnline-Aesthetics. From Genre to Subculture
Online-Aesthetics. From Genre to SubcultureAnton Hecht
 
How the Net Betrays Discourse
How the Net Betrays DiscourseHow the Net Betrays Discourse
How the Net Betrays DiscourseDavid Brin
 
African American Culture Essay. Langston Hughes Reflections of Celebration of...
African American Culture Essay. Langston Hughes Reflections of Celebration of...African American Culture Essay. Langston Hughes Reflections of Celebration of...
African American Culture Essay. Langston Hughes Reflections of Celebration of...Kate Hunter
 
Racism In To Kill A Mockingbird Essay. 11 To Kill a Mockingbird Quotes That A...
Racism In To Kill A Mockingbird Essay. 11 To Kill a Mockingbird Quotes That A...Racism In To Kill A Mockingbird Essay. 11 To Kill a Mockingbird Quotes That A...
Racism In To Kill A Mockingbird Essay. 11 To Kill a Mockingbird Quotes That A...Adriana Mitchell
 
Technological Imperialism and Digital Writing
Technological Imperialism and Digital WritingTechnological Imperialism and Digital Writing
Technological Imperialism and Digital WritingLeonardo Flores
 
Where does value lie - in the digital age.pptx
Where does value lie - in the digital age.pptxWhere does value lie - in the digital age.pptx
Where does value lie - in the digital age.pptxAnton Hecht
 
RCA Design Products Guest Lecture: From theory to making and back again – or,...
RCA Design Products Guest Lecture: From theory to making and back again – or,...RCA Design Products Guest Lecture: From theory to making and back again – or,...
RCA Design Products Guest Lecture: From theory to making and back again – or,...Kat Braybrooke
 
Use & Abuse of Social Media
Use & Abuse of Social MediaUse & Abuse of Social Media
Use & Abuse of Social MediaMathias Klang
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 
Multimedia and Politics
Multimedia and PoliticsMultimedia and Politics
Multimedia and Politicsmicsha
 

Similar to Is Hacking Art (20)

Prosthetic lecture.a copy 5
Prosthetic lecture.a copy 5Prosthetic lecture.a copy 5
Prosthetic lecture.a copy 5
 
Reading on a Holodeck
Reading on a HolodeckReading on a Holodeck
Reading on a Holodeck
 
Digital humanities
Digital humanitiesDigital humanities
Digital humanities
 
Perfect Family Essay. Descriptive essay: Write essay on my family
Perfect Family Essay. Descriptive essay: Write essay on my familyPerfect Family Essay. Descriptive essay: Write essay on my family
Perfect Family Essay. Descriptive essay: Write essay on my family
 
Darknet imaginaries: The discursive malleability of the cultural status of di...
Darknet imaginaries: The discursive malleability of the cultural status of di...Darknet imaginaries: The discursive malleability of the cultural status of di...
Darknet imaginaries: The discursive malleability of the cultural status of di...
 
Slaughtering Sacred Cows
Slaughtering Sacred CowsSlaughtering Sacred Cows
Slaughtering Sacred Cows
 
The Interactive culture in the XXI century
The Interactive culture in the XXI centuryThe Interactive culture in the XXI century
The Interactive culture in the XXI century
 
367 558-1-pb
367 558-1-pb367 558-1-pb
367 558-1-pb
 
Cyberfeminism with a difference
Cyberfeminism with a differenceCyberfeminism with a difference
Cyberfeminism with a difference
 
Examples Of Compare And Contrast Essays. Compare And Contrast Essay Outline Mla
Examples Of Compare And Contrast Essays. Compare And Contrast Essay Outline MlaExamples Of Compare And Contrast Essays. Compare And Contrast Essay Outline Mla
Examples Of Compare And Contrast Essays. Compare And Contrast Essay Outline Mla
 
Online-Aesthetics. From Genre to Subculture
Online-Aesthetics. From Genre to SubcultureOnline-Aesthetics. From Genre to Subculture
Online-Aesthetics. From Genre to Subculture
 
How the Net Betrays Discourse
How the Net Betrays DiscourseHow the Net Betrays Discourse
How the Net Betrays Discourse
 
African American Culture Essay. Langston Hughes Reflections of Celebration of...
African American Culture Essay. Langston Hughes Reflections of Celebration of...African American Culture Essay. Langston Hughes Reflections of Celebration of...
African American Culture Essay. Langston Hughes Reflections of Celebration of...
 
Racism In To Kill A Mockingbird Essay. 11 To Kill a Mockingbird Quotes That A...
Racism In To Kill A Mockingbird Essay. 11 To Kill a Mockingbird Quotes That A...Racism In To Kill A Mockingbird Essay. 11 To Kill a Mockingbird Quotes That A...
Racism In To Kill A Mockingbird Essay. 11 To Kill a Mockingbird Quotes That A...
 
Technological Imperialism and Digital Writing
Technological Imperialism and Digital WritingTechnological Imperialism and Digital Writing
Technological Imperialism and Digital Writing
 
Where does value lie - in the digital age.pptx
Where does value lie - in the digital age.pptxWhere does value lie - in the digital age.pptx
Where does value lie - in the digital age.pptx
 
RCA Design Products Guest Lecture: From theory to making and back again – or,...
RCA Design Products Guest Lecture: From theory to making and back again – or,...RCA Design Products Guest Lecture: From theory to making and back again – or,...
RCA Design Products Guest Lecture: From theory to making and back again – or,...
 
Use & Abuse of Social Media
Use & Abuse of Social MediaUse & Abuse of Social Media
Use & Abuse of Social Media
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
Multimedia and Politics
Multimedia and PoliticsMultimedia and Politics
Multimedia and Politics
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Is Hacking Art

  • 1. Is Hacking Art? 1 Eng 102 Final Essay July 16, 2008 Christopher Horne Is Hacking Art? Christopher Horne University of Advancing Technology Elizabeth Lorang, Professor
  • 2. Is Hacking Art? 2 Is Hacking Art? If it is true, as the old New York urban legend goes, that any secret can be told in a bar within three drinks, then the hacker equivalent would be learning any secret within six Red Bulls. And learning secrets is the essenceof being a hacker. A hacker, or ‘one who hacks’, derives from the verb ‘hack’, to chop or cut roughly. There are a variety of connotations, ranging from the relatively benign to the positively malicious. The modern interpretation has veered sharply towards the nefarious end of the spectrum of meaning. Hacking is usually meant to denote a specific type of quasi-criminal computer programmer whose mission it is to illegally break into other people’s computer systems. The reasons run the gamut from simple curiosity to criminal intent, such as stealing credit card numbers, passwords, account numbers, extortion for espionage. There is some consensus that hackers are a disruptive force in society. For hackers, this disruption is part of their mission in life. A hacker may be defined as someone who enjoys creative processes involved in computer programming. In corporate America, programmers are often seen as technicians whose job it is to translate the visions of product managers into code. In damping the oscillations of creativity in the name of productivity, corporations dump the highs as well as the lows. For some talented programmers, this regimen lacks sufficient rewards. America has a great tradition of lionizing people who win by breaking rules. Hackers have this quality, plus an overriding sense of relentlessness. A great hacker will also possess empathy (which often also characterizes a great painter). In the closed ethos that defines hacking, visualizing the needs of the end user (other hackers in this case) constitutes an aesthetic factor very close to the idea of beauty. Computer science often extols lack of empathy as a mark of
  • 3. Is Hacking Art? 3 high intelligence. There are historical reasons for this, going back the Unix mainframedays, when large central computers at universities, corporations and the military were programmed and maintained by a ‘priesthood’ who depended on secrecy in order to maintain their sta as tus programmers. This paper intends to discuss the question of whether hacking can be considered art. To make any useful statements at all about th topic, it is necessary to first cons is ider what constitutes art and then to see how, if at all, hackers can claim a valid sinecure in this area. The notion of art is often defined in cultural terms, as an aspect of the realm of civilization. In this regard, a common idea of art might be an object that is beautiful, hangs in a gallery, is recognizable as the work of an individual, shows evidence of intensive labor in its production, and is often expensive. A second indicator of art is something which shows superior taste and refinement in the buyer of art. This might be called ‘art is in the eyes of the beholder’ if it were a chapter in a book. None of these ideas would be incorrect. Anyone who posts a blog on the Internet would be correct in stating that they have an opinion. The point of demarcation for a blogger or and artist (or for an art critic) would be whether that opinion is an informed opinion. This is a very pertinent question early in the third millennium, when the Internet allows an informational Babel, a true universal democracy, or a Jeffersonian meritocracy (take your pick). In this spirit, art may be defined as reflecting some vital, illuminating part of current culture, having a certain frisson that helps us locate ourselves in the context of the complexity of life. Art should be relevant, make us think, have currency, an edge, hipness, definition, focus. Victorian hair art may be beautiful in its way, but collecting and displaying it sends a message to the viewer: I have no relevance, and therefore no voice in contemporary culture. The ghastly simulacrums of Thomas Kinkade (“Painter of Light” tm) offer many of the hallmarks of conventional definitions art (including hand painting by an individual) but only the most naïve and
  • 4. Is Hacking Art? 4 gullible art buyers would fail to recognize themas commodities. The problem is that the commoditization of art and culture is by now nearly total. Even once revered icons like Van Gogh, Picasso, and Dali now pass as high-grade packaged goods for the wealthy. My contention is that hacker art is a new form of artistic expression. Hacking is a performance art. Hackers perform technology itself. We grant this status to cinema. Cinema is a performance by technology. The non-technological forms are plays, musical theater and the like. For hackers, it is information itself which is the medium of representation. This is a new concept in some ways, and in other ways, it is exactly the artistic justification behind the Abstract Expressionists of the 1950s, and later Color Field, Minimalism, and Op and Pop art. Art is pure information, the evidence of the mental activities of the artist as a sensitive interpreter of culture. Technology is the hacker’s home culture; commenting on and manipulat ng that culture, i he or she makes a perfectly valid statement of art, provided that it is done with the perception and vision expected of any skilled artist . A hacker takes culture as his or her object, just as Goya found war as a cultural subject or Warhol used thephenomenon of celebrity for the same purpose. Quoting Douglas Thomas (Hacker Culture), “The difference is that the grounding of style is shifted from the relationship from the relationship of material to cultural production to one based on the production and consumption of knowledge. Hacker culture is able to invent itself as an active system of signs rather than as a reactive system of re-articulation and re-contextualization. Hacker style reverses the hierarchy of production.” (Douglas, 2002) The demographic for hackers is often young men either in their teens or early twenties. They are smart, technologically savvy, and driven by a desire for knowledge. As a culture, hackers are dedicated to testing boundaries. The goal of a hacker is mastery- mastery of knowledge, of technology, and mastery of other hackers. They have their own language, Leet, derived from the word ‘elite’; their own magazines such as Phrack and 2600, and their own virtual
  • 5. Is Hacking Art? 5 territories on the Internet, such as BBS (online bulletin boards), where online reputations are built and software offered to the community, and the Darknet, a private Internet where business is done. Hacking culture is a mirror for mainstream culture. This mirror is dark and distorted, but a true mirror nonetheless in many ways. The truth which this mirror reveals is far from beautiful, but it is possible to find alternative answers to many of the half-truths and myths we allow material culture to use against us to control the scope of our interactions with other members of society. Mainstream culture overtly and covertly is dedicated to maintaining a status quo and class structure not conducive to mobility. For example, ordinary citizens have Facebook, privileged classes have Diamond Lounge (www.diamondlounge.com), a social networking site which only admits members recommended by other members. Those members are from the top echelons, and the information exchanged is of great monetary value. In having an alternative vision of values and lifestyles, we are better able to evade the persistent obfuscation presented as a model of ordinary life by the omniscient, omnipresent condu of mainstream media on behalf of such process owners it as the military, political and commercial interests who currently occupy the alpha predator niches of our social ecology.(Douglas, 2002) This state is often referred to as the Panopticon, an all-seeing surveillance culture. For those in opposition to the Panopticon, there are two desirable pieces of knowledge. The first is who the surveillance culture prioritizes in choosing targets, and the second Is what kind of information is being gathered. These kinds of knowledge are important to all of us, but for the hacker at the margins of legality, they are vital to freedom. One of the primary confusions in conventional society is the difference between money and wealth. Wealth is anything that creates surplus value. It need not be a physical object. It could be data, or services, or knowledge, or anything else that people want and are willing to pay for. Money is only the token of exchange for goods and
  • 6. Is Hacking Art? 6 services. Hackers understand this principle very well. This is why their labor and products (chiefly software) is offered to other hackers for free. They are ‘paid’ by having their reputation enhanced online. It is a game of honor, like jousting was for medieval knights. Knights had rules of chivalry which defined their lives, and hackers have a similar code of honor, called Hacker Ethics. At the heart of the hacker experience is an intense desire for problem solving. To gain more and more knowledge is a primary goal. Hacking is a ‘gifting culture’, similar to that of certain Native American tribes of the Pacific Northwest, where status and leadership are gained by giving potlatches. (Sternberg, 1994) The more the would-be leader gives to the tribe, the higher their social status. In the case of hackers, by giving back knowledge and making available free software tools that other hackers can use, the common enterprise of hacking and hacking culture is advanced. One of the main social contracts of this culture is ‘Hacker Ethics’. In its most articulate form, published in a book by Steven Levy “Heroes of the Computer Revolution” in 1984. (Levy, 1984) The principles dictate: 1. Access to computers-and anything that might teach you something about the way the world works- should be unlimited and total. 2. Always yield to the Hands-on Imperative! 3. All information should be free 4. Mistrust authority- promote decentralization 5. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position 6. You can create art and beauty on a computer.
  • 7. Is Hacking Art? 7 7. Computers can change your life for the better. This simple code yields some surprising insights. Who would have believed tha t over-caffenated adolescents with data fixations could be native postmodernists, as in Rule 5. But what is postmodernism? Sir Isaac Newton, the great 18th century physicist once said, late in his life, “I seem to have been only a boy playing on the seashore, and diverting myself now and then finding a smoother pebble or a prettier shell than ordinary, wilst the great ocean of truth lay all undiscovered before me.”[fl] This faith in some great but discoverable truth lay behind much of the thinking of the Enlightenment, and later the period of culture which has come to be known as modernism. In contrast, postmodernism is the study of the phenomenon of the perceived trend towards the atomization of context and the failure of meta-narratives in general to provide for social cohesion in society. It is the hangover from the grand ball of the Enlightenment, when the belief in the mind of Humankind and belief in the perpetual and inevi able advance of Civilization t was still possible. The lighthouse of the Rational has fallen in a storm. There are bricks and stones and rubble, but the great prize, the light itself that saved countless ships, has been swept away to sea. Some long for the light, but others say that it is better gone. These last are the coastal pirates, the shipbreakers whose new-found wealth has madethem the rulers of the coast. But what is really gone forever is the view from the top of the lighthouse. To picture code-obsessed teenagers taking time from their efforts to break into Strategic Air Command backbone servers to discuss the finer points of such postmodernists as Derain and Derrida is farcical. Any real similarities in philosophy between postmodernism and hacking are an example of co-evolution. It sometimes happens that in nature two entirely different species come up with the same form independently, sometimes by dint of evolutionary change, as in the case of the Viceroy butterfly, which mimics the Monarch. The Monarch butterfly feeds on the bitter tasting sap of the
  • 8. Is Hacking Art? 8 milkweed plant, and this makes it unpalatable to birds. Through the mechanism of natural selection, the Viceroy closely resembles the Monarch, and so takes advantage of the birds’ acquired distaste. An exception to this may be in the origins of postmodernism, which came about as a result of reaction against modernism. One of modernism’s chief affects is architecture, exemplified by the International Style created by Mies van der Rohes in the 1950’s. This is the familiar ‘glass box’ skyscraper, still with us today. The glass box minimized public space and by its ordered verticality, became the perfect expression of hierarchal corporate power. It is proper to speak of computer architectures in the sameway, because the same power structures that created the skyscrapers also built the corporate networks, for the same purpose and with the same philosophy. Therefore, we may think of hacker culture as closely related to the pos tmodern movement. They both are reacting in different arenas against the same authoritarian culture. Principle 2, the Hands-on Imperative (Levy’s capitalization) is worth discussing. In some ways, the idea of taking things apart to see how they work in order to produce something better defines a key aspect of hacker personality and thinking. In Victorian society, they would have been called tinkerers. Before the advent of the computer, many adolescents were into electronics, building radios, repairing TV’s, making homemade strobe lights, guitar amplifiers, and the like. They were regarded as harmless eccentrics, prototypical nerds, and usually wound up being ham radio operators or TV repairmen. The computer is a device of another order altogether. Because it can both send and receive data, and is connected via the Internet to other sources of data, the harmless tinkerer suddenly has real power. Part of the lure of becoming a hacker stems from an original state of powerlessness, of being the one who the jocks in hi h school beat up and g the pretty girls scorned. Powerlessness aligned with intelligence is a powerful cocktail in any age, but the computer provides the leverage to actuate that power into a significant force in society. I am reminded of the old Arab saying, “Never turn your back on a frog.” Just because something
  • 9. Is Hacking Art? 9 seems powerless doesn’t mean that it is. Principle 6 demonstrates that the idea of hackers as artists is already a very integral part of the culture. Modern art was largely defined by New York critics Clement Greenberg and Harold Rosenberg beginning in the 1950’s. Their theme was purity. The canvas was a field of action. What was to go on the canvas, according to Greenberg, was not a picture but an event- a record of pure activity. The contents, or message of the artwork on the canvas was to be stripped of all visual and historic referents, and the results were simply visual information. (Wolfe, 1975) Painting was to be a blueprint for ideas, in exactly the same way that software code is a blueprint for the computer program itself. Real art happened in the brain, real art speaks for itself. Given the concept that the Internet may be regarded as the ‘canvas’ of the work of hackers, we can begin to see some ready parallels between what has been accepted as the primary theory of modern art since the 1950s, albeit in modified form, and the possibility that hacking can be considered a valid art form. Hacking, like the work of Jackson Pollack or Jasper Johns, is a signifier of the state of American culture, a ready barometer for the cooling of an advanced culture as it hardens and solidifies into a late stage of decline. Furthermore, the art of hackers is a direct message written on the very life of the culture itself, since it affects and modifies the functioning of the Internet. The Internet, as frame, represents the image of culture in flux. By violating that frame, hacking’s interaction adheres to the principle that art is a diagram of culture. As comment on that diagram, hacking represents a diagram of a diagram, and a diagram of a diagram is metaphysics. (Taylor, 2004) We can see, then, that not only is hacking art, but in it could be said to signify a sacred mission to save society from itself. Hacking is the real goods, creatively. Hacking as a culture is about secrets, and secrets are the root of cool. We live in a world of predigested forms, at the
  • 10. Is Hacking Art? 10 interface of public history and secret history. As individuals, the signal-to-noise ratio for empowerment is very high. The official media represents a species of nest invasion, which seeks to maintain the crisis of self for its own ends. We have internalized the interface, and history, as internalized space, emerges from the trauma of loss of self. With the barriers to the self broken down, and the flood of messages from the Id of commercial and political American culture breaking over the levees of our souls, we seek a rescuer, an agent of change, to restore the integrity of our submerged psyches. Hackers represent an alternative order, a path to higher ground, where the individual, the ronin, the trickster, shows the way back toself-containment and detachment from the corrosive swells of the sea of media. Hackers have voluntarily abandoned the cherished values of our culture which make life comprehensible and define normality. This requires real courage. We are immigrants in a windowless passage in steerage, our destination defined by hope. Only the ‘first class’ passengers have access to sunlight, air, and a semblance of a view over the wide ocean of progress. Hackers are those passengers from the lower levels who steal onto the bridge undetected to gain some notion of our course and heading. We should celebrate this boldness not to suffer blindly in darkness. No artist can claim that calling without some sense of beauty or aesthetics. For a hacker, as a writer of software, the first consideration must be utility. His or her intended audience is going to take the code off the BBS and use it for its intended purpose. If it doesn’t work, and work well, the hacker posting the code will find their reputation in a steep, rapid decline. According to Paul Graham, Hackers and Painters, (Graham, 2004), beauty for a software designer is good design. Good design encompasses simplicity, solves the right problem, looks easy but is actually hard to write, has symmetry, and importantly, it is daring. If something is ugly, it is probably not the best design, according to Graham. The root of technology is technique. Good technique is always in favor among the cognoscenti, whether it is Jasper
  • 11. Is Hacking Art? 11 John’s wax-based encaustics, the invisible brushstrokes of Georgia O’Keefe, or DoomCowX’s level-seven OSI hack on a DOD server. Great work in any creative field tends to grow out of ideas that have been overlooked, and no idea is so overlooked as one that is unthinkable. A great hacker does not merely ignore conventional wisdom, but makes a special effort to break it. An example as an artist might be Seurat, who broke the integrity of a picture plane made up of brushstrokes that flow together to make a pictorial representation and instead broke it up into thousands and thousands of tiny dots of color. It was the right sort of wrongness. To the extent that hackers areseen to be the enemies of such manifestations of mainstream culture as the government, commerce, the military and the media, which seek to consolidate their power on the economic and social lives of citizens by any means, the central issue is: Who has the center of cool? Apple Computer’s slogan was “Think Different”, even as they strove to commodify their customer base into reliable demographics. A company either grows or it dies, the argument goes, and it grows by feeding off the economic and social nature of its customers. The military and government, too, need this fuel of coolness to finance a plethora of schemes. “Be all you can be”, whispers the Army’s advertisement; “Aim high” counters the Air Force. “Yes, we can!” trumpets a prominent presidential candidate. The media, having no substance, is all about cool. Why do millions of people tune in nightly to watch a man in a suit read from a piece of paper? There is nothing inherently interesting in the act, but the ‘news’ is pitched as relevant, ‘with it’, vital- in other words, cool. In this sense, hackers may be thought less as true enemies of the current hegemony than as a rival subculture, competing for a share of the limited oxygen that is Attention. Attention- ‘eyeballs’, to use the vernacular, is the real prize. The sustained attention of individuals is the paydirt of our civilization, the heavy grains of gold in the media stream that must be panned and sluiced to maintain power. Hackers are agents of disruption to the physical process of transmitting cultural messages about Weapons of Mass
  • 12. Is Hacking Art? 12 Destruction or the virtues of whitening strips for a clean, healthy mouth. The message of manipulation is precisely the same. Only the weight of the message is different. As McLuhan might have said, a company does not produce cigarettes, or lightbulbs, or cruise missiles, it produces information. On the surface, the disruption caused by hackers is trivial- a few servers go down, some account numbers are compromised, a company’s reputation for reliability is damaged. But the game goes on. The real hazard from hackers consists of providing an alternative vision of cool. If money and material goods aren’t hip, if a credit card with a 27 % interest rate no longer represents ‘freedom’, the commodification of context (meaningthe entire communication process) is broken. In this sense, the government and industry represent the real hackers, stealing and manipulating our personal identities for power and gain. Both the hackers and the corporations are bent on producing art. The art of corporations is concealment, that of hackers is the revelation that the concealment can be removed. Using the metaphor of the Wizard of Oz, it is the hackers in the form of Toto who pull back the curtain of power, revealing to the transfixed public the machinations of the man with the microphone. (Mizrach, 1998) Bogeymen (the ayatollah, Ghadafy, Bin Laden, radon gas) are part of the standard mechanism of distraction used by all governments and industry in their campaigns to maintain power. Yet, flaws in the nature of Power itself prevent hackers from being fully utilized for this purpose. A bank may not wish to advertise to its competitors and the public that bank accounts and other information are not safe. A government may not wish to point out that it had secrets to hide, or the nature of those secrets. Hackers are nothing if not intelligent, and realize that this phenomenon gives them additional leverage over institutions of all stripes. The hacker’s crime is that of erasing the boundaries between technology and culture,
  • 13. Is Hacking Art? 13 and in so doing, creating a space where one can perform technology as a subject of culture rather than a subject alienated by culture. (Douglas, 2002) They could becalled deconstructionists, artists who find meaning in the margins of technology where machines and relationships encounter situations they were not designed to handle. As such, they are metaphysical explorers who seek to understand all that there is to understand about the world. This is the hallmark of the highest type of humanity. Like that other explorer, Prometheus, who brought the forbidden technology of fire to civilization, we see them as agents of knowledge who have done their job too well, and must be punished for their effrontery. Those would reveal secrets must pay the price. References Douglas, Thomas. (2002). Hacker Culture. Minneapolis. University of Minnesota Press. Sternberg, Robert J. (1994). Thinking and Problem Solving. San Diego. Academic Press. Levy, Steven. (1984). Hackers: Heroes of the Computer Revol tion. Garden City. u Anchor Press. Brewster, Sir David. (1855). Memoirs of the Life, Writings, and Discoveries of Sir Isaac Newton, Volume II. Edinburgh. Thomas Constable & Co. Wolfe, Tom. (1975). The Painted Word. New York. Farrar, Straus, Giroux. Taylor, Paul. (2004). The Digital Sublime. Cambridge. MIT Press. Graham, Paul . (2004). Hackers and Painters: Big Ideas from the Computer Age. Cambridge. O’Reilly.
  • 14. Is Hacking Art? 14 Mizrach, Steven. (1998).Is There a Hacker Ethic for 90’s Hackers?. Retrieved July 15, 2008 from http:// www.fiu.edu/~mizrachs/hackerethic.html