Hacker Culture / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$18.47
Buy Used
Buy Used from BN.com
$14.51
(Save 35%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 91%)
Other sellers (Paperback)
  • All (14) from $1.99   
  • New (4) from $21.39   
  • Used (10) from $1.99   

Overview

Douglas Thomas offers an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Thomas studies novels and films (Neuromancer, WarGames, Hackers, and The Matrix) and reveals contemporary views of hackers as technological wizards, high-tech pranksters, and virtual criminals. Thomas then examines the court cases of Kevin Mitnick and Chris Lamprecht to determine how hackers are defined as criminals. Thomas finds that popular hacker stereotypes express the public's anxieties about the information age far more than they do the reality of hacking.Douglas Thomas is associate professor in the Annenberg School for Communication at the University of Southern California.
Read More Show Less

Editorial Reviews

From The Critics
An unusually balanced history of the computer underground and its sensational representation in movies and newspapers. Douglas Thomas's account starkly shows what hackers have realized all along: Our unease with Kevin Mitnick and his sort actually reflects our discomfort with technology itself.
Publishers Weekly
Silently navigating the virtual corridors of the global telecom networks, peeking into restricted files and generally causing mischief, hackers are the tricksters of the digital age. But although Hollywood and the publishing industry have long been fascinated by these technosneaks, they've nearly always overestimated hackers' malicious intents and technical abilities, argues Thomas, a professor at the University of Southern California Annenberg School for Communication. He attempts to set things right, steering a middle course between the alarmists, who perceive hackers as suburban terrorists of the new century, and the apologists, who want to see them as brave revolutionaries against a corporate/government assault on personal liberties. With a real affinity for his subject, Thomas uses hacker publications like 2600 and Phrack for most of his research, instead of the all-too-common procession of online security experts doing their best Chicken Little impersonations. Thomas avoids another trap of this genre by not letting hackers the publicity-loving, self-aggrandizing ones spout off at length about their skills and achievements. He presents a sober but sympathetic analysis, maintaining that, more often than not, hackers are simply playing around, testing a system's security just to see if it's sound: "[They] see themselves as educators about issues of security, fulfilling the same function as Consumer Reports." Though Thomas may rely too heavily on that old academic touchstone, Foucault, he has produced an intelligent and approachable book on one of the most widely discussed and least understood subcultures in recent decades. (Mar.) Copyright 2001 Cahners Business Information.
Library Journal
Thomas (Univ. of Southern California; Cybercrime) traces the history and origin of hacker culture within mainstream society, the computer industry, and the media. In the first of the book's three parts, he describes the evolution of the hacker and the emergence of hacker culture, also discussing how films like War Games, Sneakers, The Net, and Hackers helped mythologize the image. Part 2 focuses on how hackers have been represented in the media, both within their own culture and to the outside world. Thomas also discusses publications such as 2600: The Hacker Quarterly, which provides insight into the political and social agendas of hacker culture, as well as the publication Phrack, which he contends has its finger on the pulse of hacker culture. In the last part, Thomas provides a judicial discourse on how hackers are defined legally and concludes by examining the cases of two hackers, Kevin Mitnick and Chris Lamprecht, who were prosecuted for their activities. Thomas effectively argues that the popular image of the hacker reflects more the public's anxieties about technology than the reality of hacking. Addressing general audiences in a readable, engaging style, his book would be of interest to students of communication and journalism. Recommended for public and academic libraries. Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL Copyright 2002 Cahners Business Information.
From The Critics
In a balanced treatment, Thomas (communication, U. of Southern California) traces the evolution of the hacking subculture over the generations and mainstream culture's projection of anxieties over computer technology onto them. He provides a reading of how the computer underground is represented in the electronic journal; examines non-hacker online youth culture; and discusses laws and cases regarding hacking. Includes photos of hackers and other visuals. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780816633463
  • Publisher: University of Minnesota Press
  • Publication date: 5/23/2003
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 296
  • Sales rank: 1,032,261
  • Product dimensions: 5.88 (w) x 9.00 (h) x 0.80 (d)

Read an Excerpt

Chapter One


Hacking Culture

Fry Guy watched the computer screen as the cursor blinked. Beside him a small electronic box chattered through a call routine, the numbers clicking audibly as each of the eleven digits of the phone number was dialed. Then the box made a shrill, electronic whistle, which meant the call had gone through; Fry Guy's computer ... had just broken into one of the most secure computer systems in the United States, one which held the credit histories of millions of American citizens.

— Paul Mungo and Bryan Clough, Approaching Zero

This is the common perception of today's hacker—a wily computer criminal calling up a bank or credit card company and utilizing mysterious tools to penetrate simply and effortlessly the secure system networks that hold our most important secrets. However, any attempt to understand today's hackers or hacking that only examines the blinking cursors and whistling boxes of computing is destined to fail. The reason is simple: hacking has never been just a technical activity. Perhaps the most striking illustration of this is that William Gibson, who in his book Neuromancer coined the term "cyberspace" and who invented a world in which hackers feel at home, for nearly a decade refused to have an e-mail address. In fact, Neuromancer, the book that has been (rightly or wrongly) held accountable for birth of the "new breed" of hackers, is rumored to have been written on a manual typewriter. Hacking, as Gibson's work demonstrates, is more about the imagination, the creative uses oftechnology, and our ability to comment on culture than about any tool, computer, or mechanism. The hacker imagination, like the literature that it is akin to, is rooted in something much deeper than microchips, phone lines, and keyboards.

    The current image of the hacker blends high-tech wizardry and criminality. Seen as the source of many evils of high-tech computing, from computer espionage and breaking and entering to the creation of computer viruses, hackers have been portrayed as the dangerous other of the computer revolution. Portrayals in the media have done little to contradict that image, often reducing hackers to lonely, malicious criminals who delight in destroying sensitive computer data or causing nationwide system crashes.

    In both the media and the popular imagination, hackers are often framed as criminals. As Mungo and Clough describe them, hackers are members of an "underworld" who "prowl through computer systems looking for information, data, links to other webs and credit card numbers." Moreover, hackers, they argue, can be "vindictive," creating viruses, for instance, that "serve no useful purpose: they simply cripple computer systems and destroy data.... In a very short time it has become a major threat to the technology-dependent societies of the Western industrial world."

    At least part of the reason for this impression rests with the media sensations caused by a few select cases. Clifford Stoll, as documented in his book The Cuckoo's Egg, for example, did trace a European hacker through the University of California at Berkeley's computer systems, ultimately revealing an attempt at international espionage, and the cases of Kevin Mitnick and Kevin Lee Poulsen, two hackers who were both arrested, prosecuted, and sent to prison for their hacking, gained considerable attention in the media and in subsequent books published about their exploits. Most of these accounts are journalistic in style and content and are more concerned with describing the events that took place than with analyzing the broader context out of which hackers have emerged. While the image of the hacker as a "criminal" seems to have taken over in the popular imagination, the broader context of the computer "underground" and, most important, the historical context force us to question such an easy categorization of this complex and varied subculture.


Between Technology and the Technical:
Hacking as a Cultural Phenomenon

In the 1980s and 1990s, hackers were the subject of numerous films, TV shows, and news reports, most of which focused on the connection between hacking and criminality. As Joe Chidley describes them in an article for Maclean's Magazine, "Hackers are people who simply love playing with computers," but there is a "malicious subset of the hacker community, who intrude on computer networks to do damage, commit fraud, or steal data," and these hackers "now have an arsenal of technologies to help them in their quest for secrets."

    Within such a limited framework, which reduces hackers to criminals with their "arsenal of technologies," it makes little sense to speak of a "culture" of hacking. Hacking appears to be, like most crime, something that malicious people do for reasons that don't always seem to make sense. Why would a talented computer programmer choose to write a virus rather than write a program that might be more useful and, potentially, economically more rewarding? Why would hackers break into unknown systems when their talents could be employed in many other more productive ways? These questions make the hacker's goals and motivations difficult to decipher.

    Rather than attempting to understand the motivation behind hacking, the media and computer industry instead focus on the manner in which computers are hacked. At this level, hackers are easy to understand—they have a specialized set of tools, and they use those tools to commit crimes. This basic theme was central to the protest against the release of SATAN (Security Administrator Tool for Analyzing Networks), a network-analysis tool that tests systems for security flaws. The program, which was written to make system administrators aware of security flaws that were already well known and often exploited by hackers, was publicly released by its authors, Dan Farmer and Wieste Venema, in April 1995. The release was met with an outpouring of anxiety about the future of Net security and fear that the public availability of the tool would turn average computer users into criminals. As the Los Angeles Times remarked, "SATAN is like a gun, and this is like handing a gun to a 12-year-old." Other newspapers followed suit, similarly invoking metaphors of increasing firepower—"It's like randomly mailing automatic rifles to 5,000 addresses. I hope some crazy teen doesn't get a hold of one," wrote the Oakland Tribune, only to be outdone by the San Jose Mercury News's characterization: "It's like distributing high-powered rocket launchers throughout the world, free of charge, available at your local library or school, and inviting people to try them out by shooting at somebody." The computer industry was more sober in its analysis. "The real dangers of SATAN," as one advisory argued, "arise from its ease of use—an automated tool makes it very easy to probe around on the network."

    The basic objection to the release of SATAN was that it provided a tool that made system intrusion too easy, and making the program publicly available prompted outcries from those afraid that anyone with the tools could (and would) now invade systems. Omitted from most stories was the fact that SATAN had been available in a less powerful form as freeware (a freely distributed software package, accessible to anyone) on the Internet for years, along with several other programs that provided similar functions, not to mention a host of more powerful programs that were already widely available for the express purpose of unauthorized system entry. Additionally, SATAN only tested computer systems for well-known, previously discovered (and easily fixed) security holes.

    SATAN was nothing new, but the discussion of it was. This response illustrated how convinced the general public was that the threat of hacking rested in the tools. While the apocalyptic effects of SATAN's release failed to materialize (no significant increase in any system intrusion has been reported, nor has any been attributed to SATAN since its release), the anxieties that SATAN tapped into are still present. The response to SATAN was in actuality a response to something deeper. It was a reaction to a basic cultural anxiety about both the complexity of technology and the contemporary culture's reliance upon that technology. SATAN appears to give anyone who wants it the tools to disrupt the system that very few people understand yet that everyone has come to rely on in their daily lives.

    A cursory examination of both public and state responses reveals a paranoia regarding the hacker that one can easily attribute to a Luddite mentality, a generation gap, or a pure and simple technophobia that seems to pervade U.S. culture. While these aspects are a very real part of contemporary culture, such a simple set of answers covers over more than it reveals. Most of the responses to hackers and hacking have served to lower the level of public discussion by confusing hackers with the tools that they use and making hyperbolic equations between computer software and high-power munitions. Like any other social and cultural phenomenon, the reasons for the growth of hacking in the United States (and as an international phenomenon) are myriad, and the reactions to hacking often reflect a wide range of reactions, from hope and fear to humor and dismay.

    The responses to hacking—in the popular imagination and in the minds of agents of law enforcement and the criminal justice system, a response documented in court records, TV shows, movies, newspapers, books, and even Web pages—reveal more about contemporary culture than about hackers and hacking. However, much as was the case with SATAN, public reaction to hackers both tells us a great deal about the public that is reacting and, ironically, shields us from an understanding of the complexities and subtleties of the culture of the computer underground. By simply equating hackers with the tools they use, the media and popular representations of hackers have failed to understand or account for even the most basic motivations that pervade hacker culture.

    In trying to determine what hacking is and what hacker culture looks like, I make a distinction between technology, as a broad, relational, and cultural phenomenon, and the technical or scientific, the products of technology itself (for example, telephones, computers, and modems). In doing so, I am also separating hackers' culture and motivation, which are very much about technology, from the idea of tools or specific technical items, which are for the most part incidental to the idea of hacking. These two concepts, technology and the technical, are different in kind, and to understand what constitutes hacking, we need to be careful to examine these two ideas as separate entities. Technology should be considered a cultural phenomenon, and in that sense, it tells us primarily about human relationships and the manner in which those relationships are mediated. The technical, by contrast, is concerned only with the instrumental means by which those relationships occur. It makes sense to speak of the technology of the telephone allowing people to have long-distance relationships. It also makes sense to discuss the technical aspects of telephones in comparison to the postal system. Both the phone and the mail as technology mediate human relationships in the same way insofar as they allow us to communicate at great distances. Yet as technical phenomena they are completely distinct. To pose questions with respect to technology is to pose cultural and relational questions. To pose questions with respect to the technical is to pose instrumental questions. Put differently, to answer the question, What is hacking? properly, we cannot simply examine the manner in which hacking is done, the tools used, or the strategies that hackers deploy—the instrumental forces that constitute hacking. Instead we must look at the cultural and relational forces that define the context in which hacking takes place.


Hackers and Hacking

Not long ago, being called a hacker meant only that one belonged to a group of technology-obsessed college or graduate students who worked tirelessly on the dual diversions of finding interesting ways around problems (often in ways that resembled Rube Goldberg machines) and perpetuating clever, but harmless, pranks. This "class" of technophile is characterized by a kind of "moral code," as documented by Steven Levy in his 1984 book, Hackers. The code, as Levy describes it, was "a philosophy, an ethic, and a dream," and it was constituted by six basic theses:

1. Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total. Always yield to the Hands-On Imperative!
2. All information should be free.

3. Mistrust Authority—Promote Decentralization.

4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
5. You can create art and beauty on a computer.
6. Computers can change your life for the better.

The hackers Levy refers to were the original champions of the information superhighway, and their ethic was utopian in nature. As Levy describes it: "To a hacker a closed door is an insult, and a locked door is an outrage. Just as information should be clearly and elegantly transported within the computer, and just as software should be freely disseminated, hackers believed people should be allowed access to files or tools which might promote the hacker quest to find out and improve the way the world works."

    The "old hacker" of the 1960s and 1970s is often characterized with no small amount of nostalgia and is frequently seen as a counterpoint to the emergence of the new breed of hacker, the "cyberpunk" or "cracker." The "old hackers," in this romanticized telling, were "a certain breed of programmers who launched the 'computer revolution,' but just can't seem to be found around anymore.... [A]ccording to these 'old-school' hackers, hacking meant a willingness to make technology accessible and open, a certain 'love affair' with the computer which meant they would 'rather code than sleep.' It meant a desire to create beauty with computers, to liberate information, to decentralize access to communication." In short, the old-school hacker was dedicated to removing the threat of high technology from the world by making that technology accessible, open, free, and "beautiful." To the 1960s hacker, hacking meant rendering technology benign, and hackers themselves not only were considered harmless but were framed as guardians of technology—scientists with an ethic that resembled Isaac Asimov's "Laws of Robotics": above all else, technology may never be used to harm human beings. Moreover, these hackers effected a strange anthropomorphism—information began to be personified, given a sense of Being usually reserved for life-forms. The old-school hacker was frequently motivated by the motto "Information wants to be free," a credo that attributed both a will and an awareness to the information itself. Interestingly, it is these two things, will and awareness, that seem to be most threatened by the evolution of technology. In an era when the public is concerned both with a loss of freedom to technology and with a fear of consistently finding themselves out of touch with the latest technological developments, there is a transference of our greatest fears about technology onto the idea of information. The hacker ethic remedies these concerns through the liberation of information. The logic is this: if technology cannot even confine information, how will it ever be able to confine us? Within the framework of this initial question we can begin to trace out the history of hacking as a history of technology.


A Genealogy of Secrecy

One of the primary issues that hackers and hacker culture negotiates is the concept of secrecy that has evolved significantly and rapidly since World War II. Indeed, hackers' relationships to technology can be understood as a cultural phenomenon and cultural response to the evolution of secrecy, particularly in relation to the broader political and social climate, the birth, growth, and institutionalization of the computer industry, and the increasing import of multinationalism in industry. The concept of secrecy seems to change from generation to generation. What secrecy means and particularly its value shift as social, political, and economic contexts change over time, but what has always remained stable within hacker culture is the need to negotiate the relationship between the technical aspects of the machines themselves and the cultural value of secrecy.

(Continues...)


Excerpted from HACKER CULTURE by Douglas Thomas. Copyright © 2002 by Regents of the University of Minnesota. Excerpted by permission. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.


Read More Show Less

Table of Contents

Acknowledgments
Introduction
Pt. I The Evolution of the Hacker 1
1 Hacking Culture 5
2 Hacking as the Performance of Technology: Reading the "Hacker Manifesto" 47
3 Hacking in the 1990s 81
Pt. II Hacking Representation 111
4 Representing Hacker Culture: Reading Phrack 115
5 (Not) Hackers: Subculture, Style, and Media Incorporation 141
Pt. III Hacking Law 173
6 Technology and Punishment: The Juridical Construction of the Hacker 177
Epilogue: Kevin Mitnick and Chris Lamprecht 220
Notes 239
Index 251
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)