Digital Underground part 1


SUBMITTED BY: ravikumarptc

DATE: Nov. 4, 2016, 4:57 p.m.

FORMAT: Text only

SIZE: 5.7 kB

HITS: 5620

  1. They've got a file on you. It's on computer. And that computer is connected
  2. to a global network. Who's going to stand up for our civil liberties in the
  3. digital era? Can the anarchic activities of hackers and cyberpunks make them
  4. freedom fighters for the information age?
  5. CYBERPUNK
  6. TECHNOLOGY
  7. Cyberspace, the Net, Non-Space, or the Electronic Frontier call it what you
  8. will, but it's out there now, spread across the world like an opulent
  9. immaterial spider's web, growing as each new computer, telephone or fax
  10. machine is plugged in, as satellites close continental divides, hooking
  11. independent phone systems together. It's almost a living entity - the
  12. backbone is the various telephone exchanges, the limbs the copper and fibre-
  13. optic links. Increasingly the world is shifting to this unseen plane. Your
  14. earnings, your purchasing patterns and your poll tax records are processed
  15. there. You may not realise it exists, but it's part of everyday life. As
  16. John Barlow, writer and electronic activist puts it, "Cyberspace is the place
  17. you are when you're on the telephone."
  18. As life moves to this electronic frontier, politicians and corporations are
  19. starting to exert increasing control over the new digital realm, policing
  20. information highways with growing strictness. Before we even realise we're
  21. there, we may find ourselves boxed into a digital ghetto, denied simple
  22. rights of access, while corporations and governments agencies make out their
  23. territory and roam free. So who will oppose the big guys? Who's going to
  24. stand up for our digital civil liberties? Who has the techno-literacy
  25. necessary to ask a few pertinent questions about what's going down in
  26. cyberspace? Perhaps the people who have been living there the longest might
  27. have a few answers.
  28. You could argue that hackers have been the most misrepresented of all sub-
  29. cultures. In the mainstream press they've been cast as full-blown electronic
  30. folk devils, either dangerous adolescents and electronic vandals or malevolent
  31. masterminds in the pay of organised crime or evil foreign powers. Others have
  32. tried to put forward a rather romantic view of hackers as freedom fighters
  33. for the information age. And the cyberpunk media industry that grew from
  34. William Gibson and Bruce Sterling's science fiction has mytholised them as
  35. digital rebels, computer cowboys.
  36. The truthis more complex. As more and more people explore cyberspace, it's
  37. becoming harder than ever to make generalisations about a hacker ethic, to
  38. even figure out what hackers are doing and why. All you can say is that
  39. between them they have created a genuine digital underground, an electronic
  40. bohemia where diverse subcultures can take root, where new ideas, dodgy
  41. tech and weird science can flourish.
  42. In Europe, the centres for hacking activity are Germany, Holland and
  43. Italy. UK hacking remains relatively stagnant and disorganised. In part it's
  44. down to the relatively high cost of computers and telephone calls. In part
  45. it's down to a difference in attitude. It seems typical that the most famous
  46. hack in Britain came when two hackers broke into Prince Philip's electronic
  47. mailbox. As Andrew Ross points out in an essay on the subject in Strange
  48. Weather, hacking in the UK has a quaint, 'Little England' air about it. Hugo
  49. Cornwall, author of The Hacker's Handbook, has compared hacking to electronic
  50. rambling and has suggested developing a kind of Country Code for computer
  51. ramblers. It's all very benign, a matter of closing gates behind you,
  52. respecting the lands you cross and never ignoring the 'No Trespassing' signs
  53. you might encounter. As Ross says, this amounts to a kind of electronic
  54. feudalism, with digital peasants respecting the inherited land rights of
  55. information barons and never asking bigger questions about property, state
  56. surveillance and the activity of corporations and governments.
  57. The Europeans tend to take a more politicised, sceptical stance. The focus
  58. for most hacking activity on the continent is the Hamburg-based Chaos
  59. Computer Club, which organises meetings, lectures, publishes magazines and
  60. books on the politics of information and holds an annual conference which
  61. usually draws hackers from around Europe. The club, who's motto is "access
  62. public data freely while protecting private data firmly", was formed by
  63. Wau Holland after the publication of the A5 hacking magazine Datenschleuder
  64. in 1982. An article in the mainstream press stimulated interest and
  65. subscribers decided to set up the club.
  66. With home computing a minority hobby in Germany during the mid-'80s, the
  67. club couldn't really limit itself to one type of computer as a similar club
  68. in the States might do. Instead it cut across product loyalties and hobbyist
  69. pettines and brought together all computer users. Similarly, the club aimed
  70. to be as open-minded about their activites. They weren't just interested in
  71. swapping access codes and passwords. Instead Datenschleuder published
  72. informed speculation about the way information technology might develop.
  73. Realising that the majority of the public were unaccustomed to, and in some
  74. cases frightened of, the new technology, they attempted to open up and
  75. demystify thre computerised landscape. Alongside the regular magazine, they
  76. have published four books on computers and hacking, including the essential
  77. Die Hacker Bible One which reprints back copies of Datenschleuder and the
  78. first 50 issues of TAP (aka Technological Assistance Program), a magazine
  79. put together back in the '70s by phone phreakers (early tech-pranksters who
  80. gained free phonecalls with gadgets like Blue Boxes and touch pads).

comments powered by Disqus