“Hacking isn’t about breaking and entering,” Facebook’s founder Mark Zuckerberg has said. “It’s about being unafraid to break things in order to make them better.”

A computer, like capitalism, is based on the premise of systems, ownership and security. But security can be impinged, property trespassed, systems destroyed or reordered. Hacking may conjure an image of a geek in a basement. In reality, it is much more than that.

The hacker has become an emblem; a lone freedom fighter bathed in the grey-glow of a computer screen, fingers whizzing across a keyboard, determined to push the boundaries of what is and isn’t allowed. Hackers are analysts, rebels, questioners and rejectionists, drawing back the iron curtain of authority, using their relationship with technology to beckon a better world. As journalist David Leigh says, hacking is “a distinct psychological genre.”

Think of the traditional and enduring images of the hacker in cinema: Keanu Reeve’s Neo bursting awake in his grimy bachelor pad and receiving a minidisc from the White Rabbit. Tom Cruise’s Ethan Hunt high-wiring into the world’s most secure office to nab the NOC list. Wayne Knight’s Dennis taking down the mainframe and letting out the raptors in //Jurassic Park//. Jeff Goldblum and Will Smith rewiring the alien craft to celebrate //Independence Day//. Hugh Jackman, Vinnie Jones on one side and a hospitable blonde on the other, given 60 seconds to break into “The Department of Defense” in //Swordfish//. Cinema has done a remarkably good job of depicting hacking in all its guises and quandaries, from the virtuous, to the ethically dubious, to the plain naughty, to the egocentric and deranged.

Yet many of these films exhibit a Cold War perspective of a world defined by the existence of a wall. Today the defining symbol of our interactions is not a wall, but a net.

The internet has filtered into every aspect of our society. As hackers like Facebook’s Zuckerberg, Wikileaks’ Julian Assange and Pirate Bay’s Gottfrid Svartholm and Fredrik Neij have become global icons, the significance of the hacker has changed, their identity corroded, their existence maybe even endangered.

It is now easier to find a sense of community online than at your doorstep. We share the minutia of our lives, we share art and culture, we comment on events as they unfold, we treat what used to be secrets with the same familiarity as our online status. Politicians, celebrities, generals and spies are discovering to their peril that privacy isn’t easily kept these days, and revenge is a dish best served cold. When friction creates a spark, it spreads like wild-fire.

Zuckerberg, 25, whose work on Facebook has provided a 24 billion dollar kitty, is a self-confessed hacker. Facebook started life as a drunken hack-job prank in the halls of Harvard. When he was still at school, Zuckerberg invented artificial intelligence software that predicted a user’s music tastes. Microsoft and AOL wanted to buy it for millions, but he uploaded it to the net for free and joined the Ivy League. Today, with over 500 million active users, he lives in a rented flat with his Chinese girlfriend (and learns Mandarin for a couple of hours before heading to work at 6am). Refusing to watch the biopic courtesy of David Fincher and Aaron Sorkin, Zuckerberg works like any other programmer at the Facebook offices and seems to have no real relationship with the fortune he has earned.

Zuckerberg’s creation has been the source of concern for a lot of existing hacking communities who accuse it of muddying the sacred waters of interaction. As possibly the most successful produce of a traditional hack, the social network is not welcomed with particular warmth.  McKensie Wark, the author of //The Hacker’s Manifesto//, is part of this chorus. His polemical book seems to view hacking as part of a re-tuning of Marxist social theory for the modern age. Wark defines hacking as:

“The gift of time and attention to a project that can be shared with and by others. That is, and perhaps always was, the vast, invisible part of how social formations get by.”

He talked to Little White Lies about Facebook, saying:

“For those of us in the overdeveloped world, the main game is the subtle overlap of hacking, working, playing and hustling. It is now not clear which is which. Is my Facebook time labour or play, or hustling? Am I working for Zuckerberg, am I playing with my friends, am I trying to build an audience to sell my next book? Or am I spending all my time there on Farmville? This ambiguity about social communication time is I think the big question our culture will face.”

Zuckerberg’s Facebook, Gates’ Microsoft, Jobs and Wozniak’s Apple and Richard Stallman’s GNU project are all products, and statements, born from the culture of hacking. Indeed, so is the world wide web itself. Tim Berners Lee, who made his first computer with a soldering iron, an M8600 processor and an old television and is now accredited with fathering the net, did so by hacking existing software and welding it together, discovering a way to communicate that is wholly unconcerned with time and space.

But these visionaries of information technology are just the tip of the iceberg. These are the hackers known in the game as White Hats; entrepreneurs concerned with conventional ethics who hack company software with the implicit desire to improve security through exposure, and to create rather than deconstruct. Most good hackers were tapped up by the Massachusetts Institute of Technology (M.I.T) or IBM as soon as their capabilities became clear – Agent Smiths looking to turn Neo into Mr Anderson.

Before Silicon Valley existed, the cutting edge of technological America was the railroad. The Tech Model Railway Club, a legendary club at M.I.T, built sophisticated train models and complex circuits that allowed the trains to pioneer further into America. Its members were amongst the first hackers because they insistently pushed the programs beyond what they were originally designed to do. So emerged the hacking ethic – a silent doctrine based in the premise of transparency and knowledge, in which a man’s relationship to his machine could lead to a better world.

Finding the “perfect hack” is the pinnacle at M.I.T, and the stories predate the computers. Back in the 50s, on a balmy summer’s night, a bunch of students left their halls and broke into Cambridge’s Kendall Square subway station where they set about greasing down the lines. The first train to enter the station the next morning hit the grease and slid through to the other side, before eventually coming to a stop in a darkened tunnel way down the other end. When the driver backed up, the train slid through in the opposite direction. Not many people using Kendall Square got to work on time that morning. For several generations of M.I.T. engineers, it went down as the ultimate hack. A simple practical joke, but executed with such finesse that it obtained a certain beauty.

It’s a competitive environment. Stories abounded at M.I.T of some of America’s brightest and most ambitious students going into ‘wrap-around;’ foregoing meals, sleep and any social activity as they buried deeper and deeper into their computerized worlds, purely for the challenge to find the holes in the system.

M.I.T housed ethical hackers not unlike Zuckerberg. But the loose network of hackers is as nuanced, and their motivations as varied, as any community. Not every hacker hacks for capital gain or the sake of mankind. Infact, most don’t. For every straight-laced White Hat, there is a Puck-like Grey Hat or an Iago-like Black Hat.

Grey Hats are hackers unconcerned by rule of law if it stands in the way of their discoveries. Perhaps the most iconic hacker currently working is Julian Assange, the controversial face of Wikileaks. Assange, who rarely sleeps in the same bed twice, lives nocturnally, carries a desktop computer in a pack on his back and started his hacking career by heading up a group called ‘International Subversives,’ is a nailed-on Grey Hat.

By exposing in no uncertain terms the true cost of the wars in Afghanistan and Iraq, his work as a hacker is clearly servicing a thirst for a fact-based, transparent democracy and he has been applauded as a Robin Hood of the information age. But to achieve his ideals, Assange has broken every secrecy law ever passed, and has been accused of failing his sources. Bradley Manning, the US private charged with passing top secret Government files to Wikileaks under the online pseudonym Bradass87, is facing a life in jail for the theft of Government property, property that Assange eagerly published before joining the global lecture circuit. In an open letter to Assange, press freedom campaign group Reporters Without Borders accused Assange of “incredible irresponsibility” for publishing the Afghan war logs “indiscriminately.” Assange’s methods, they said, “reflects a real problem of methodology and, therefore, of credibility.” Spokesperson for The White House Robert Gates said Assange “had blood on his hands.”

Grey Hats are hackers whose intentions are shrouded in ambiguity and uncertainty. Assange’s objectives are clearly rooted in a uncompromisingly moral world-view. Morals that, justifiably or not, allow him to break international law without recourse to any process of accountability. He said recently:

“There’s a question as to what sort of information is important in the world, what sort of information can achieve reform. And there’s a lot of information.“Information that organizations are spending economic effort into concealing, that’s a really good signal that when the information gets out, there’s a hope of it doing some good.”

Assange’s assertion that the presence of money compromises the pursuit of information is deeply embedded in the culture of hacking. Many hackers seem to regard themselves and their work as standing outside of, and rejecting, the worst excesses of capital democracy, with its accompanying trade-offs and equivocations. This is an age-old thing, as prevalent in the first stories of hacking as in the latest.

This may have been true throughout the baby-boomer generation. Their world was smaller, but most of it was still closed from view. Journalism investigated, but governmental departments and big business remained enshrined in their towers. Their economies were exploding, but they dealt in material worth.

But Generation Y live in a tertiary marketplace powered by creativity and freedom of information. We were given the internet and we showed them how to make it work. What does this mean for the hacking community? What role does it now have in this brave new world of venture capitalism?

“On the one hand, hacking has become a more widespread and self-aware cultural practice, and not just in computer related fields,” Wark says.  “Lots of people now think about themselves as members of communities that share information, make a gift of their labor, and achieve recognition from others for this. On the other hand, general social production has been more seamlessly integrated into internet-based media, from search engines to games and social networking. All of these portals extract a rent from ‘hosting’ such activity. I say ‘hosting’ because, in reality, they are the parasite – that which syphons off the surplus from its host, the host being social labor and creativity or, in other words, hacking.”

Hacking, in Wark’s world, is an extension to what the guys at the bottom of the pile have always done; adapt to survive. His manifesto places hacking as the only credible and justifiable response to pernicious authority and parasitical enterprise. He views the attempts to police it, or indeed choke it at source, as a classic exercise in wagon-circling self-preservation:

“Hacking is something that certain vested interests want to criminalize. It is exactly like the criminalizing of the pre-modern forms of economy that went with the rise of capitalism. For example, weavers used to always take some of the cloth in exchange for their work. The capitalist putting-out system criminalized this as ‘theft’. Likewise, culture has always worked by borrowing and adapting. Now the theft is of so-called intellectual property.”

Back in the day, Black Hat hackers (or self-termed “social engineers”) like Kevin Mitnick could manipulate the script and jump down the rabbit-hole. Gary McKinnon, a Glasgow-born systems administrator and Aspergers sufferer, is currently awaiting extradition to the US for what one prosecutor termed “the biggest hack of all time,” after he broke into 97 different US military and NASA computers. His online pseudonym, SOLO, reflects his working habits.

McKinnon’s motivations, and indeed his grasp of reality, remain unclear. He insists to this day he uncovered on those machines evidence of alien-life cover-ups, antigravity technology and the suppression of free-energy fuels. The American government have never commented on the veracity of these claims, but successive administrations continue to seek his extradition.

Throughout his tour of America’s most secure information, McKinnon would leave his detractors the occasional goading message:

“US foreign policy is akin to Government-sponsored terrorism these days … It was not a mistake that there was a huge security stand down on September 11 last year … I am SOLO. I will continue to disrupt at the highest levels.”

One thing is clear. However much we attempt to categorise hackers, however much we attempt to understand their motivations or their relationship to the state, however much we try and justify or condemn their actions or morality, one consistent thread remains. Hackers, despite their means, are looking for the one known as Morpheus – that most alluring and elusive of ideals, the thing they call truth. The road may be changing, but the pursuit stays the same.


Twitter, Mumbai and the Climate of Fear

Fearing Fear Itself

In this scene from 25th Hour, undoubtedly Spike Lee’s finest film, Ed Norton’s character rages against New York’s multiculturalism after 9/11. A convicted drug-dealer, he’s spending his last day on the outside before being sent down for seven years. As he reveals at the end of the scene, his anger and bile are an attempt mask a closely related emotion; he is scared stiff.

Fear is powerful. Fear is so powerful it allowed Bush to occupy the White House for eight long years. Simon Jenkins recently said that America and the West must, in Roosevelt’s words, stop fearing fear itself:

“Virtually all comment on the Mumbai massacre has mentioned 9/11 and al-Qaida, and thus invited citizens to continue feeling afraid. No matter that Mumbai appears to have been primarily about Kashmir and the status of India’s Muslims. No matter that Osama bin Laden has no dog in that fight. Any stick will do to elevate al-Qaida as America’s enemy number one.”

In the words of Biz Stone, the cofounder of Twitter, news has now gone real-time. This, in my words, is the perfect incubator for this climate of fear to thrive.

Don’t get me wrong, I’m a fan of Twitter. I think its an excellent way for people to meet like minded people and to share things of interest. But, for the time being at least, as a news-breaking platform it is a fundamentally flawed journalistic tool and should be used with caution.

In his blog, Rory Cellan-Jones expands on the lecture we received from him last week:

“Each time a major disaster occurs there is more material available from witnesses – or citizen journalists – and smart mainstream media outlets are having to learn how to access that content. Twitter is the latest.

What Twitter has done is to provide instant information about anything that is happening near its millions of users, coupled with a brilliant way of sharing that information. What it doesn’t do is tell us what is true and what isn’t – and that makes the work of mainstream media outlets and professional reporters all the more relevant.”

Problematically, the modern media climate is preoccupied with 24-hour, up-to-the-minute news coverage and is embroiled in a constant scramble to find and break the story before its competitors. Seemingly within seconds, they’ll then wheel in any expert they can get their hands on for some ‘in-depth analysis.’

This isn’t a new thing. News is a perishable commodity and reporters have been looking for the next scoop for as long as news has existed within a competitive market. But as the digital revolution continues to speed news production up, so the time required to check and re-check facts and to develop investigative, analytical journalism is further compromised. And there seems to be a correlation between quick news and sensational news.

And let’s admit it, there are few better stories more universally interesting and emotionally resonant than terrorism.

At every available opportunity our media reports stories, depicts scenarios, speculates and frets about the latest attempt to destroy our decent, reasonable way of life by some cave-dwelling, nihilistic, self-regarding fundamentalist or some home-grown, bearded and track-suited radical.

The Washington Post, one of the most respected and influential news institutions in the world, has as I write an opinion piece by Richard A.Clarke as one of its lead articles. I stress the word opinion. The piece is titled “Plan of Attack,” and Clarke is ostensibly arguing that the Mumbai attacks are just part of an al-Qaida meta-plan, supplementing his argument with a half-baked dramatisation of Bin-Laden’s latest video. He concludes that the terrorists are winning.

Apart from selling papers, does this sort of journalism equate to the notions of truth-seeking that the industry was built on. Bin-Laden is probably sitting back, having his beard de-knitted and re-upholstering his cave while we do his job for him.

If you combine this mentality with the media’s newfound reliance on citizen journalism, particularly in times of crisis, then you have a potential flammable compound.

One of the first pictures, sent by a witness, of the No.30 bus in Tavistock Square during the 7/7 terrorist attacks.

As Mindy McAdams says in her post Twitter Mumbai and 10 facts about journalism now:

“Breaking news — especially disasters and attacks in the middle of a city — will be covered first by non-journalists. The non-journalists will continue providing new information even after the trained journalists arrive on the scene.”

This, in essence is a good thing. But it places an even greater responsibility on the professionals to do what they are employed to- sift through the dust and unearth the details.

And if they fail to do this- if they allow technology to cloud what their primary role is- we have a situation in which the media becomes guilty of escalating the confusion and hysteria that inevitably surrounds something like Mumbai.

The BBC, the bastion of responsible journalism, have come under sustained criticism and have partly apologised for their use of Twitter to cover Mumbai without checking any of the sources. They forgot first principles.

As Jeff Jarvis says in his post When Witnesses Take Over the News:

“Sometimes events are complicated, and we simply need to wait for more information to emerge before we can understand it. But many of us—not just the pundits—don’t have the humility to accept that. We want to feel in control, at least on an intellectual level, so reasons and theories emerge. But the world is really far too complicated for us.”

We’re in the knowledge and truth business, but we often forget about that. With our ever-increasing exposure to, usage of and reliability on such social-media sites as Twitter to cover breaking news, Cellan-Jones is right to say that the job of taking a step back from the fray and working out what is actually worth knowing and verifiably true is increasingly becoming the primary role of the journalist.

The Talmud sums it up nicely:

“Who forces time is pushed back by time; who yields to time finds time on his side.”

Obama’s Use of Social Media


Dressed as Orson Welles and swigging Bourbon the other night, I watched history unfold (such a cliched phrase, but it still captures the experience beautifully). My face did crease when Obama gave his acceptance speech although, somewhat embarrassingly on hindsight, it was when he told his kids they could have a puppy in the White House. I love puppies.

The picture above tells its own story. Notice the blackberry hanging from the president-elect’s belt. Both the world wide web and digitalisation has had a profound effect on this election and, although it would be churlish to attribute Obama’s success to a single factor, his pioneering use of social media gave him the edge over his opponents throughout the entirety of his campaign.

On the campaign trail, one of Obama’s main messages has been:

“This election isn’t about me. It is about you.”

As Jemima Kiss details, this was not simply an exercise in rhetoric. By harnessing platforms like Facebook, Twitter and MySpace and by posting directly on to You-Tube, Obama can legitimately claim not only to have communicated directly to the American people, but to have listened to them as well. This innovative approach, essentially rooted in grass-roots communication, re-energised vast swathes of people who had slipped into apathy in the face of the Bush adminstration. It is telling that almost 600 million dollars were raised towards his campaign through donations made on his website barackobama.com, over half of which were donations of less than $100.

By engaging the electorate directly, Obama not only put his opponents in a difficult position. Established media institutions whom had grown accustomed to ringleading elections were rendered impotent. Fox News, for example. Tune into Fox News for five minutes, it will make you thank sweet Jesus that we have the BBC.

Rovian smears descended into McCarthyist character assassination against Obama in the twilight hours of McCain’s bid (at least he’s still got his oven chip empire, he should be ok), but any charge leveled at Obama immediately bounced around the blogosphere, investigated by any number of people and revealed as the unfounded swiftboat it was. Take, for example, the laughable ‘lipstick on a pig’ smear. Obama, the Republicans claimed through Fox, was displaying a derogatory and sexist attitude towards the new darling of the Christian Right, the obviously qualified to be the next Vice-President, winking, Fargo, Moose-Slayin’ Palin. She can see Russia from her house y’know.

Fox News played the clip every twenty minutes for hours on end. In response, internet traffic was swiftly directed towards a video someone had found from back in the early days of the Presidential Election. McCain is asked about Hillary Clinton’s Health Care plan. His response?

If you put lipstick on a pig, its still a pig.

Four years ago, John Kerry would have had to field accusations about this kind of thing for days on end whilst Bush’s cronies rubbed their hands in glee and the big issues continued to be glossed over. This time, Fox didn’t run the story for long. It had been upstaged by a politically engaged electorate, and it ended up gritting its teeth whilst reporting that Obama walked away with the Republican’s family jewels, Florida and Ohio.

Last week, we recieved a lecture from Matthew Yeomans of Custom Communication. He outlined how the traditional media industry was struggling to come to terms with the digital revolution as user-generated content and citizenship journalism came to the fore. Good for the consumer, shame for the lazy journalist you might say. Paper’s such as the Christian Science Monitor were now purely online platforms after decades of print editions and other established institutions started to suffer. Dan Fisher’s blog details this with his unique aplomb.

Whilst the professional publisher basked in his own comfort zone, Yeomans detailed how the blog has empowered the ameuter publisher in three seperate ways:

  • The power to publish.
  • The power to participate.
  • The power to choose.

This is true, but throughout the lecture we discussed these changes in an abstract and theoretical way. All we talked about was potential. Tuesday 4 November 2008 was the day that Web 2.0 officially arrived as a tool for social amelioration and democracy. There is now, as Hannah Waldram captures by talking about Keats and as Fox unwittingly illustrated with their election coverage, a changing of the guard. Both politically and in the media, this is no time for anyone afflicted with dogmatism and cynicism. As Waldram says:

“This is not a time for old, dying Saturns of the media.”

Obama’s children will be chasing that puppy across the White House lawn because their father understands more comprehensively than many journalists that by placing his faith in new forms of communication he could truly allow the tide of normal, downtrodden people on Main Street to carry him to the White House.

Good for him, and good for us because suddenly we have living, tangible proof that the media is no longer an Ivory Tower. Fox News, or for that matter any other broadcaster or news outlet, can no longer tell us how it all works. No more can they dictate the agenda. Now we, the next generation, can. That’s right, say it. Yes We Can.

Blog at WordPress.com.