103
“Free as in Freedom”: Rhetorical Motive in Information Liberation Texts, from Stallman to Snowden By Lindsey Pamela Leitera Dr. Ben Click Mentor May 1, 2015

SMP textfile

Embed Size (px)

Citation preview

Page 1: SMP textfile

“Free as in Freedom”: Rhetorical Motive in Information Liberation Texts, from Stallman to Snowden

By

Lindsey Pamela Leitera

Dr. Ben Click Mentor

May 1, 2015

Page 2: SMP textfile

2

Abstract

In 1983, Richard Stallman's code-liberating “GNU Manifesto” was posted onto a technology mailing list; the manifesto embodies a series of political, economic and social values known as the hacker ethic. Over the next 30 years, the ethical principles outlined in Stallman's treatise have continued to manifest themselves both online and off. The scope of this project covers the time period between 1983 and 2013, exploring a series of overlapping and cyclical rhetorical trends that are present in the writings of technologists. I trace the evolution of a global debate about political ideology, enlightenment ideals, identity and transparency from the inception of the Free and Open Source Software Movement to contemporary instances of high profile national security whistleblowing. At once a product of technology and a response to it, the texts I analyze are used in part to solidify group identification within insular social scenes. More importantly, however, these texts create an ideological continuity that spans generations of hackers, programmers, cryptographers, and data security analysts. By examining rhetorical motive in representative examples of information liberation texts, I arrive at several conclusions about the future of cyber security, global technology policy and digital activism.

Page 3: SMP textfile

3

Table of Contents

Acknowledgements 4 Preface 5 Introduction 10 A Brief History of Hacking, 1959-1975 11 The Kairotic Moment: Bill Gates’ “Open Letter to Hobbyists” 17 “The GNU Manifesto”: Another Response to Gates 22 Here Comes Everybody: The Future of the Hacker Ethic 25 Section I: Political Ideology 27 “I’ve Always Been More Comfortable With Outlaws Than Republicans” 32 The Radical Cryptographers 37 New Frontiers 44 Section II: Enlightenment Ideals 45 Situated Ethos and Revolutionary Rhetoric in “A Declaration of the Independence of Cyberspace” 47

Code is Speech and the DeCSS Haiku 52 “’Normal’ People Don’t Know How to Program – Only Hackers Do That” 59

Section III: Identity 61 The #OpPayback Case Study: A ‘Rhetorical’ Analysis of Decentralised Architectures 63 Imageboard Politics and the Origin of Anonymous 71 “I Came for the Lulz – But Stayed for the Outrage” 76 Section IV: Transparency 78 Cablegate: WikiLeaks and the Question of Legitimacy 82 The Legitimacy of Openness 87 “We Are All Edward Snowden Now” 90 Conclusion 92 The Coming Cyberwar 93 Glossary 98 Works Cited 100 Works Consulted 103

Page 4: SMP textfile

4

Acknowledgements Pride of place belongs to Dr. Ben Click, an amazing advisor and editor. For putting up with my 4 A.M. drafts alone, he deserves praise; more incredible, however, is the fact that his feedback was ready for our meeting time a few hours later. This project would not have been possible without those thoughtful comments. It's been a blast, and I think we both deserve a drink. To Professors Michael Taber, Brian O'Sullivan, Robin Bates and Ruth Feingold, as well as Mandy Taylor, for all the formal and informal pieces of advice. To my family – Mom, Dad, Frankie, Grammy and Granddaddy: For your unwavering support, enthusiasm, and all the dinner table debates over the years. Thanks for being my posse, and for always showing up. To the professors and students: I owe you a debt of gratitude. If we shared a class, a Res Hall or a conversation on the path, then your perspectives, stories and ideas are all in here, too.

Page 5: SMP textfile

5

Preface When I arrived at St. Mary's College four years ago, I did not know what classes I would

take or what course requirements I would need to fulfil. I wasn't quite familiar with the campus

layout or community traditions. I wasn't even sure what my major would be. But I did know my

SMP topic.

In January 2011, as I watched the mailbox for college admissions decisions, I was following

a different development with equal interest and enthusiasm. Although the revolutionary social and

political movements taking place in Tunisia, Egypt, Libya, and throughout the Arab world were

indeed making international headlines, I had stumbled upon a largely unseen conflict, which

involved the secret arrests of Egyptian protest organisers and a string of Internet blackout events

occurring at the behest of the state. With few foreign journalists reporting from within the country,

Egyptian telecommunication companies intentionally interrupted service during the most violent

period of Hosni Mubarak's military crackdown in an effort to quell the demonstrations. Images and

footage of teargas clouds rising over Tahrir Square, the most widely circulated posts on Twitter

during in the month of January, ground to a sudden halt on the 25th as major Egyptian blogs fell

silent.

These censorship events, which lasted for nearly a week, were countered not by the

intervention of concerned Western governments or watchdog organisations, but through the

collaborative involvement of a global network of technologists. Calling themselves “tech support

for the Arab Spring,” a group of hacktivists and volunteer programmers worked tirelessly to convert

old modems and fax machines into makeshift Internet hotspots, allowing protesters in Egypt to

communicate with each other and the rest of the world. Digital activists defaced official state

websites, such that revolutionary messages, treatments for tear gas, and images of the chaos

unfolding in the streets of the capital city replaced the online platform for state propaganda. Other

volunteers re-coded an open source application designed to detect phishing attempts by the

Egyptian government: the program scanned potentially malicious emails that, if undetected, could

Page 6: SMP textfile

6

steal users' login credentials for their social media accounts. Across the Internet, a so-called

“Anonymous Care Package” was widely distributed: a 507-page document containing first aid tips,

free software how-to manuals, schematics with instructions on converting a 2-litre plastic bottle into

a riot-ready gas mask, a list of censorship-breaking Firefox plugins, and an essay by San Francisco

cyber-hippy John Perry Barlow titled, “A Declaration of the Independence of Cyberspace” dated

February 1996.

I observed the highly organised mayhem with fascination; how this decentralised and

unwieldy group of troublemakers could successfully carry out so many coordinated cyber attacks

over an extended period of time was a question that confounded me. I wondered about the

implications of this newly formed coalition: revolutionaries on the ground in MENA countries, and

revolutionaries sitting on their couches half a world away. I kept thinking about that Care Package

and the text files it contained – and what an essay criticising a U.S. telecommunications law had to

do with goings-on under some of the most repressive political regimes. Finding answers to these

questions formed the starting point of this project, which eventually compelled me to learn about

the strange and complicated world of software documentation, encryption systems and

cryptocurrencies. As an added bonus, I also managed to uncover over 9000 ways to end up on the

DHS No-Fly List.

The sections of this paper are divided into four overarching themes derived from Steven

Levy's conception of the Hacker Ethic, an ideological framework first defined in his early work,

which chronicled the rise of technologist culture and the computer hacking social scene.

Individually, these sections relate to political ideology, enlightenment ideals, collectivist values and

an adherence to civic engagement and transparency; taken together, however, each of these distinct

principles articulate a controversial political vision, advanced almost universally by democratically-

minded and egalitarian computer hackers: information ought to be free. Using representative

examples of technologist rhetoric – text files, manifestos, essays, and speeches – I trace the

historical trajectory of politically motivated hacking from its beginnings in the MIT artificial

Page 7: SMP textfile

7

intelligence lab to the anti-secrecy whistleblower websites of the present day.

The introduction describes the evolving kairotic moment, in which business-minded,

capitalist entrepreneurs are rhetorically situated in opposition to hackers, who support ethical

sharing and collaboration on free and open source software projects. These ideologies are

juxtaposed through the contrasting ideological manifestos of Bill Gates and Richard Stallman

respectively, who both articulate their vision for making money in the burgeoning personal

computer industry. Using a rhetorical analysis of “An Open Letter to Hobbyists” by Gates, followed

by detailed descriptions of technologist responses to his text, readers are introduced to the historical

context that informs the beginning stages of an ideological conflict between the hacker ethic and an

increasingly prominent capitalist faction of economically motivated programmers.

Using Burke's dramatistic pentad as an analytical tool, the first section discusses the

complex political ideologies that inform technologist advocacy of information freedom. I

contextualise and analyse increasingly fragmented hacker subcultures – such as libertarian,

anarchist, Marxist and apolitical technologists – and discuss the phenomenon of the hacker

conference as a platform for the public exercise of Aristotle's three forums of rhetoric: deliberative,

forensic and epideictic. I argue that reformist and radical hacker factions - represented by John

Perry Barlow's essay “Crime and Puzzlement” and two crypto anarchist manifestos, respectively -

reflect an expansion of the scene-actor ratio. Moreover, this section complicates the unity of the

hacker ethic that was previously discussed in the introduction.

The second section describes attempts by several technologists to create unity among the

ranks of their ideologically decentralised counterparts through Burke's notion of consubstantiality.

The first text analysis examines the symbolic significance of several Enlightenment allusions that

ultimately lend legitimacy to technologist texts, such as John Perry Barlow's “Declaration of the

Independence of Cyberspace.” In this work, for example, the nationalistic language implicit in the

Declaration of Independence, combined with the loaded and revolutionary significations created

through the invocation of the Revolutionary War, feature prominently in Barlow's arguments

Page 8: SMP textfile

8

against the Telecommunications Reform Act of 1996. The second text, a poem comprised of over

400 individual haikus, manipulates the legal language of a court case about DVD encryption, using

deliberative rhetoric to encourage hackers and onlookers alike to disregard the law, learn

programming and participate in civic engagement through direct action and civil disobedience.

The third section relates to the paradoxical notions of collectivism and individuality that are

discernible in technologist political language and software utilities. The rhetorical analyses describe

the role of collectivist rhetoric and direct action in creating both ideological and social cohesion,

such as the symbolic identifications used by anonymous rhetors in aligning the interests of skilled

programmers with those of largely apolitical, offensive trolling culture. Using the 21st century

phenomenon of hacktivism, embodied somewhat imperfectly by the global, networked collective

known as Anonymous, the narrative focuses on the role of poetic language in defining the often

ephemeral and multi-faceted nodes of contemporary politically-motivated cyber attacks. Because of

the difficulty implicit in capturing the group's organisational hierarchies in concrete terms,

commentators turned to comparisons when attempting to describe the collective. For example, this

section compares Anonymous's anti-Scientology street demonstrations in 2008 to the “same”

group's campaign in support of WikiLeaks two years later; though an identical title and similar

tactics were affixed to Anon's activities, the two events represent distinct and separate portions of

the networked collective's exploits.

The final section relates to transparency, which is a widely held value among technologists.

Using the competing claims of legitimacy evidenced in pieces by Julian Assange and Edward

Snowden, I analyse the validity of the claims apparent in both documents. Examining the situated

ethos of both authors, it is possible to draw conclusions about the texts' audiences. Finally, I connect

several ideological and rhetorical trends from their contemporary manifestation within the context

of national security whistleblowing back to the beginning of this paper. Several similarities exist

between Assange and Snowden's calls to leak classified information and Richard Stallman's

justification of open source software development in the “GNU Manifesto.”

Page 9: SMP textfile

9

The conclusion of this project functions as a means of looking to the future. In this coming

cyberwar, what obstacles confront the United States and the community of nations? Is it possible to

reach consensus when addressing pressing information security challenges, despite the myriad

actors exerting their will on the scene – from the military, law enforcement and intelligence

communities, to Silicon Valley entrepreneurs, political elites and civil societies at home and abroad?

Is the regulation of cyberspace a logistically feasible – let alone politically saleable – solution?

Finally, following the conclusion, I have included a glossary of unfamiliar phrases,

acronyms and terminology used throughout this text. It may be useful for readers unfamiliar with

niche technology lingo to briefly peruse the glossary prior to reading this document. Unless

otherwise cited, attribution for these definitions are adapted from Urban Dictionary, a crowdsourced

platform commonly used for indexing all manner of regional and cultural slang.

Page 10: SMP textfile

10

Introduction In 1983, Richard Stallman resigned from his position as a faculty member at the

Massachusetts Institute of Technology to proselytise his idea of a free and open source operating

system, which he believed would unite programmers around the world and subvert the

“commercialization” of system software. The politicisation of hacker culture1 began much earlier,

though, influenced by a strange amalgamation of labour union slogans, Anti-War activism, science

fiction tropes, and collectivist aesthetics. The events that proved most formative to later iterations of

hacker culture were similar moments of controversy. The public and fiercely contested ideological

dispute between Bill Gates and “the Hobbyists” in 1976 served as a kairotic moment for the events

that inform this research project, wherein the idealistic principles of sharing espoused by many

programmers were challenged by the spectre of capitalism.

American journalist Steven Levy produced the first of many accounts that chronicle the

history of digital culture, technology and computer security. His book, Hackers: Heroes of the

Computer Revolution (1984), investigated the formative years of computer hacker culture. At the

time of its publication, Hackers received negative treatment by the press; the New York Times called

it “trivial” and “a monstrously overblown magazine article” (Lehmann-Haupt 1984). However,

Levy's chronology of the subculture proposed a hacker taxonomy that has, subsequently, proved as

unyielding as it is expansive. Specifically, he coined the phrase “Hacker Ethic”: a set of principles

and ethical imperatives that unite each generation of computer enthusiasts. Twenty-five years after

the publication of Hackers, Levy would reflect on each of his theory's tenets:

“Some of the notions now seem forehead-smackingly obvious but at the time were far from accepted ('You can create art and beauty on a computer'). Others spoke to the meritocratic possibilities of a digital age ('Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position'). Another axiom identified computers as instruments of insurrection, granting power to any individual with a keyboard and sufficient brainpower ('Mistrust authority — promote 1 The Jargon File – the essential glossary on computer hacker slang – defines hacker culture as, “A loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who define themselves partly by rejection of ‘normal’ values and working habits, it has unusually rich and conscious traditions for an intentional culture less than 50 years old” (Raymond 1996).

Page 11: SMP textfile

11

decentralization'). But the precept I perceived as most central to hacker culture turned out to be the most controversial: 'All information should be free'” (Levy 2010). During the intervening years since 1984, the Hacker Ethic has been broadly applied to

describe the hacker subculture; in many ways, the component that Levy regarded – indeed, regards -

to be the most controversial, “All information should be free,” continues to provide the general

public with the most recognisable of contemporary narratives about hackers. Recently, for example,

the government of the United States was forced to consider which information should be free, as an

unexpected and uncomfortable series of conversations were held regarding the domestic

surveillance practices of the National Security Agency. The individual who leaked the classified

documents, military contractor Edward Snowden, was technically skilled and a self-described

“computer wizard” (Broder, Shane 2013). Meanwhile, the Guardian journalist who used Snowden

as a source, Glenn Greenwald, styled himself as an outspoken defender of digital civil liberties,

supporter of WikiLeaks, and critic of the Obama Administration's propensity to prosecute

whistleblowers. As such, Greenwald's readership prior to the NSA controversy was primarily

comprised of hackers and technologists, who considered him to be not just an ally, but also of

similar ideological reputation.

Though this project begins with the origins of the Free and Open Source Software

Movement in 1983 and concludes during the present-day phenomenon of national security leaks,

the mythology surrounding computer hacking and the Hacker Ethic begins much earlier, before the

advent of personal computers or the development of the World Wide Web.

A Brief History of Hacking, 1959-1975

The early era of computer hacking began during the late 1950s and 60s, concentrated in

Building 26 of MIT. A group of university students who participated in the Tech Model Railroad

Club (TMRC) appropriated the word “hacking” from the broader university lexicon around this

time. Traditionally, “a hack” had little to do with computing; rather, “in ancient MIT lingo,” the

word had always been used to refer to a clever or elaborate prank (Levy 1984, 18). No longer used

Page 12: SMP textfile

12

to describe the frequently occurring campus antics – usually involving the iconic Great Dome – the

railroaders used the word “hacking” to denote “a feat [that is] imbued with innovation, style, and

technical virtuosity” (19). The label of “hacker,” moreover, was used to signal the speaker's

admiration for the level of technical aptitude on display; the word acknowledged the style and

artistry required to properly execute a functional improvement to the railroad layout, fondly called

“The System” by the TMRC members. This group would be the epicentre of the nascent

programming subculture, collaboratively creating elaborate networks of track layouts using spare

parts from the MIT phone system.

In 1959, MIT offered its first undergraduate course in computer programming, instructed by

John McCarthy, a professor of mathematics and early proponent of artificial intelligence research.

For the members of the TMRC, who were mostly undergraduate students, this was the first

opportunity to use MIT's massive IBM machine, which was typically reserved for use by Officially

Sanctioned Users: faculty members, administrators, and a few select graduate students. At that time,

the IBM machine was the only computer terminal owned by MIT and its operation was constrained

by bureaucratic oversight, to ensure that inexperienced users would not tamper with the multi-

million dollar piece of technology. Programmers operated the IBM computer by first typing their

programs into keypunch machines, which would transfer their input commands onto a stiff manilla

card. By feeding the punched card through the IBM - based on the placement or absence of a hole -

the computer could execute the appropriate series of commands.

For the members of the TMRC, the most frustrating aspect of the IBM machine was the fact

that their self-designed programs, each carefully punched into manilla cards, could be fed into the

computer only by an administrator. It was common to experience long waits between the time that

cards were handed in and when the results were returned to novice programmers. Though they now

had permission to use the machine, their access was still substantially obstructed. The TMRC

members were confounded by this regulation, because the operation of the IBM system was

antithetical to the computing environment encouraged by the club. The unspoken philosophy of the

Page 13: SMP textfile

13

TMRC understood that restricting physical access to any system made understanding its workings

impossible. The basement room that housed The System was always unlocked, and club members

were known to tinker with the layout at all hours of the night. Moreover, the atmosphere of the club

room was the inverse of the mood surrounding the IBM machine. Whereas the TMRC members

enjoyed the hours spent “constantly improving The System, arguing about what could be done next,

[and] developing a jargon of their own that seemed incomprehensible to outsiders” (Levy 1984, 18),

the IBM operators eschewed this sort of unruly interactivity.

Fortunately, that same semester, the military development laboratory Lincoln Labs

indefinitely loaned MIT's Research Laboratory of Electronics (RLE) a second computer terminal.

The TX-0 model - or Tixo, as it was affectionately called – was one of the first computers of its

kind: a machine that did not use punchcards. Rather, users would punch their program into rolls of

paper tape using smaller machines called Flexowriters, which resembled typewriters. This

configuration allowed the programmers to diagnose errors in their code immediately, rather than

waiting for a technician to input their programs onto the IMB machine. More importantly, however,

it eliminated obstacles constraining the use of technology. Access to information became a

technological possibility and, shortly thereafter, a cultural norm.

For the TMRC members, another innovation surrounding the TX-0 was the absence of

bureaucratic regulations. During daylight hours, Officially Sanctioned Users did exercise their

monopoly over control of the Flexowriters; however, the TX-0 was never locked up in the evenings.

The time allocated to the rest of the student body was assigned on a first-come-first-served basis: an

adhocracy rather than a rigid structure that elevated certain demographics over others. Students

came and went as they pleased, creating an atmosphere that resembled the model railroad club room.

For these early hackers, programming was not an individualistic or goal-oriented endeavour.

On the contrary, it was standard practice for students to leave their unfinished programs on the

bookshelves of the Tixo room in Building 26, so that the next programmer could improve its design.

Officially Sanctioned Users were programming with certain outcomes in mind – “they ran statistical

Page 14: SMP textfile

14

analyses, cross correlations, simulations of an interior of the nucleus of a cell” (Levy 1984, 26) –

one TMRC member summarized the motivations of his fellow hackers by comparing computing to

playing a musical instrument. In other words, the TX-0 was a vehicle for creativity and the creation

of something beautiful. To outsiders, the programs designed by the hackers appeared unremarkable;

for example, one TMRC student, Peter Samson, spent all night coding a program that converted

Arabic numerals to Roman numerals. When the professor in charge of overseeing the TX-0

operations encountered Sampson the following morning, Levy described the situation:

“Jack Dennis, after admiring the skill with which Samson had accomplished this feat, said, 'My God, why would anyone want to do such a thing?' But Dennis knew why. There was ample justification in the feeling of power and accomplishment Sampson got when he fed in the paper tape, monitored the lights and switches, and saw what were once plain old blackboard Arabic numbers coming back as the numerals the Romans had hacked with” (Levy 1984, 28). The early hackers did not particularly care about the utility of the projects they were working on,

because the creation of programs was never intended to serve as a means to a specific end.

It was that same spirit of sharing and anarchy that would inspire the first hacker-run

institutions during the 1970s. The most famous of these informal hobbyist groups was the

Homebrew Computer Club. Though the club was advertised as an “amateur computer users group”

in the first meeting invitations, most of the members had backgrounds in engineering or computer

programming. During the inaugural meeting, the yet-unnamed group “discussed what they wanted

in a club, and the words people used most were 'cooperation' and 'sharing'” (Levy 1984, 160). Their

language and attitude suggests Kenneth Burke's notion of rhetoric as creating “social cohesion”

(Burke 1950, 22). Just like the TMRC hackers before them, the Homebrew Computer Club

eschewed bureaucratic structures of any sort, rejecting leadership hierarchies based on artificial

constructions. “In true hacker spirit,” Levy continues, “the club had no membership requirement,

asked no minimum dues... and had no elections of officers” (160). Gordon French, one of

Homebrew's co-founders - and whose garage provided the space for the first meeting, would later

quantify the Club's membership as, “The damned finest collection of engineers and technicians that

you could possibly get under one roof” (Lent 2015).

Page 15: SMP textfile

15

The primary focus of the Homebrew Computer Club's interest during the first meeting was

the Altair 8800, an unassembled microcomputer kit being marketed towards do-it-yourself hardware

hackers. The company selling the kits, Micro Instrumentation and Telemetry Systems (MITS), was

a struggling calculator manufacturing business seeking to provide a more affordable alternative to

computers built by legacy technology companies - companies selling computing machines that

innovative hackers perceived as out-of-date and in need of upgrades. In 1975, a model for the Altair

8800 was featured on the cover of the most popular hobbyist publication, Popular Electronics.

Under the headline, “Breakthrough!” MITS promised to revolutionise the industry and make

computers more accessible. However, after being flooded with orders – reportedly over 4,000 –

MITS was unable to produce the necessary quantity of machines within the quoted timeframe of 60

days. The long delays in shipment frustrated many, as did the rumours that the Altair lacked an

ample supply of memory. On the occasion of the first Club meeting, the first shipment of Altair

parts had arrived in the Bay Area. Despite their shared annoyance at MITS with regard to the

machine's perceived shortcomings, the assembled hackers were interested in assembling the kit and,

eventually, improving the computer's design.

Technology historians have credited the MITS Altair 8800 as the catalyst for the personal

computer revolution, largely as a consequence of the decentralised network of amateur technologist

clubs that formed around its inception. At the same time, however, the Altair was also the piece of

technology around which the first fragmentations of the Hacker Ethic became visible. One of the

most fundamental ethical principles governing computer hacking was called into question: “the free

flow of information, particularly information that helped fellow hackers understand, explore and

build systems” (Levy 1984, 179).

The controversy developed over a roll of paper tape containing a program called BASIC,2

2 BASIC was a well-known computer language. Altair BASIC was particularly coveted because, once implemented, Altair owners were able to program by typing commands directly to their machine, rather than the laborious, time-consuming practice of using paper tape. Getting the BASIC language to run on an Altair 8800 would allow users to write programs more efficiently and, in the view of many hackers, finally make

Page 16: SMP textfile

16

the first piece of software developed by Microsoft – then spelled Micro-Soft and staffed by three

employees: Bill Gates, Paul Allen, and Monte Davidoff. Gates and Allen, first-year college students

who believed that the future of the hobby market depended on good software, approached MITS

with their functioning Altair BASIC application. The company began listing the BASIC script in

their catalogue, alongside the hardware products that it sold. Members of computer clubs around the

world began ordering the application, only to endure the same lengthy wait as one year prior, when

MITS delayed the shipment of the initial Altair kits. Despite the increase in consumer frustration

and MITS's apparent inability to service their existing base of customers, company president Ed

Roberts created a public relations campaign called the “MITS Caravan”: a motor home full of

MITS engineers who travelled from city to city “setting up Altairs in motel seminar rooms” and

inviting the public to see “the amazing low-cost computers at work” (Levy 1984, 182). Sardonically

dubbed the MITS-mobile by disgruntled hackers, the actual audience encountered by the Caravan

were hobbyists:

“People who ordered Altairs had questions on when they could expect delivery. People who owned them would want to know where they went wrong in assembling the monster. People who owned MITS memory boards would want to know why they didn't work. And people who'd ordered Altair BASIC would complain that they hadn't gotten it” (Levy 1984, 182).

When the Caravan reached Palo Alto, California during the summer of 1975, the Homebrew

Computer Club was similarly intent on confronting MITS. There, the members were “amazed” to

find an Altair on display running BASIC, allowing anyone to type a command and get responses

instantly. When questioned about the eventual shipment of the promised BASIC applications, the

MITS employees were non-committal. One Homebrew member, Steve Dompier, would describe

the ensuing controversy years later, saying, “Somebody, I don't think anyone figured out who,

borrowed one of their [BASIC] paper tapes lying on the floor” (Levy 1984, 182). In the following

months, the paper tape was passed around during the Homebrew Computer Club meetings, copied

using tape-copying machines, and mailed to other Computer Clubs; “[they] charged what in hacker

the machine worth the money and time spent assembling it (Crosby 2008, 25).

Page 17: SMP textfile

17

terms was the proper price for software: nothing” (Levy 1984, 183).

The coherent ethos and objectives of the hacker community were at odds with business

ventures; capitalism stands opposed to sharing. In describing the discovery of the BASIC paper tape,

Steve Dompier's language itself reflects the existence of the capitalism versus sharing binary:

“Someone... borrowed” the software, as opposed to “someone found,” “took” or “appropriated” it.

By linguistically softening – some would argue obscuring - what occurred during the BASIC

controversy, hobbyists like Dompier were able to create ethical distance between their community

and the encroaching conventions of businesses. In the words of Steven Levy, “The stage was set for

what some would call a crime and others would call liberation” (182).

The Kairotic Moment: Bill Gates' “Open Letter to Hobbyists”

The circulation of “pirated” copies of Altair BASIC were summarily passed around the

world: a symbolic affirmation of collectivity and a gesture of goodwill between hobbyists. Though

the response among hackers was unified, it was not long before the BASIC programmers were able

to voice their objections to the heist. The Homebrew Computer Club received a letter at the

beginning of 1976, signed by “Bill Gates: General Partner, Micro-Soft.” Titled, “An Open Letter to

Hobbyists,” the editor of the Club Newsletter, Robert Reiling, published the full text of the

document in the January 1976 issue. Prefacing the letter, Reiling offered his own introduction,

saying:

“Just as the Newsletter was in final preparation, a letter arrived from Bill Gates via MITS. Reproduced... on page 2, it should be read by every computer hobbyist. Surely many of you will want to write to Bill. Send a copy of your correspondence to me... and I will try to summarize your comments” (Reiling 1976, 1). Copies of the letter were also sent to every major electronics publication in the country, sparking a

widespread debate by technologists of both sides' positions.

Simply put, Gates' letter is a defence of capitalistic economic systems and ethics, arguing

that Micro-Soft deserves compensation from the community of hobbyists for their “theft” of the

Altair BASIC paper tape. The text makes multiple appeals to the audience, most obviously through

Page 18: SMP textfile

18

its gratuitous use of rhetorical questions; however, the letter's simultaneous use of business jargon

(“market,” “hired,” “royalties,” “invested”) and the top-down presentation of demands (“pay up”)

demonstrates Gates' fundamental misunderstanding of the culture he seeks to address.

After briefly outlining his business motivations for developing the BASIC software –

chiefly, the inevitable expansion of the hobby computer market - Gates concludes the first

paragraph by stating that “a hobby computer is wasted” without “good software and an owner who

understands programming.” The implications of this statement, which Gates' audience no doubt

grasped, was that their own Altair applications – which were shared freely at club meetings – were

substandard and, further, hobbyists' knowledge of programming was inferior. Gates builds from this

statement later, through the following rhetorical questions: “Who can afford to do professional work

for nothing? What hobbyist can put 3-man years into programming, finding all bugs, documenting

his product and distribute for free?” In hobbyists clubs around the world, however, members had,

indeed, spent years programming, finding bugs, issuing documentation and distributing their

projects for free. Gates' letter invalidates the utility of hobbyist work, then dismisses the skill and

artistry apparent in hobby software. To a community that considered these attributes its greatest

virtue, such dismissiveness by an outsider was a clear affront.

The following two paragraphs of his letter serve to vaguely describe the development

process of Gates, Allen, and later Davidoff, in coding the BASIC software, reasserting Gates'

invented ethos of a company CEO. Gates concedes that the initial work “took only two months,”

but goes on to assert that the subsequent time spent debugging and documenting was valued at a

price “exceeding forty thousand dollars.” Additionally, he claims that 90% of the BASIC “users”

did not buy the program and hypothesises that, based on the royalties Micro-Soft had received thus

far, his time spent on BASIC was worth “less than two dollars an hour.” Rather than convincing the

hobbyists to “pay up,” though, Gates' evidence provoked quite a different response.

Lee Felsenstein, a prominent Homebrew Club member, reflected on the inflated numbers

provided by Gates, describing the situation as “[A] delineated rift within the industry... There's the

Page 19: SMP textfile

19

actual industry where they're trying to make money and there's the hobbyists where we're trying to

make things happen” (Crosby 2008, 25). In Felsenstein's opinion, the hobbyists immediately

rejected Gates' proposed monetary calculations and, by extension, his argument:

“We all knew... the evaluation of computer time was the ultimate in funny money... So we all knew this to be a spurious argument. And I doubt that anyone sent in the five hundred dollars that Bill Gates requested from that letter” (Crosby 2008, 25). In addition to scepticism surrounding the legitimacy of his data, the hobbyists suspected that Gates'

attempts to monopolise software commodities were a thinly veiled, dishonourable cash-grab.

Ironically, Gates' CEO persona was a convincing one to the hobbyists, but not for the reasons he

intended: rather than bolstering the legitimacy of his statistics, Gates' invented ethos inspired broad

distaste among his audience, who viewed all institutions as fundamentally untrustworthy.

Gates' use of invented ethos – as the founder of Micro-Soft – glorifies top-down power

hierarchies, a convention that offended the sensibilities of the hobbyist community. Specifically,

Gates elevates himself and the work of Micro-Soft over the contributions of the masses of

programmers hacking at club meetings, even presuming to give clubs instructions about how to deal

with members who pirated the Altair BASIC software: “What about the guys who re-sell Altair

BASIC, aren't they making money on hobby software? […] They are the ones who give hobbyists a

bad name, and should be kicked out of any club meeting they show up at.” For the Homebrew

Computer Club in particular, this comment reflected a lack of understanding about the adhocratic

nature of hacker communities; no one possessed the authority to lead discussions or collect dues, let

alone wield the legitimate power to force a fellow member to leave. Based on precedents, moreover,

it was well known that voting privileges in club matters were extended to the participants who

attended that meeting; whether they were a first-time attendee or a club founder, everyone

assembled was given a single vote without regard for seniority. Gates had not attended any club

meetings and was therefor unqualified to advise the club about conducting its business.

Gates presupposes the hobbyists' collective motivations for “stealing software,” attempting

to undermine the honesty and morality of his audience by indicting all of the communities without

Page 20: SMP textfile

20

providing substantial evidence to prove the legitimacy of his claims. He states:

“As the majority of hobbyists must be aware, most of you steal your software. Hardware must be paid for, but software is something to share. Who cares if the people who worked on it get paid? Is this fair? One thing you don't do by stealing software is get back at MITS for some problem you may have had” (Gates 1976). Rather than a philosophical debate over free information and access – which was how the

discussion was framed by members of the Computer Clubs – Gates simplifies hobbyist motivations

into a juvenile, impulsive, and vindictive act of theft. Gates' sarcastic style - “Who cares if the

people who worked on it get paid?” - functions similarly: to call into question the honourable

ethical framework championed by hobbyists. This rhetorical strategy was designed by the author to

further heighten the ethical distance between his own respectable, capitalist position and that of the

anarchic, ill-behaved masses.

In the February 1976 issue of the Homebrew Computer Club Newsletter, Robert Reiling

published one response to Gates' “Open Letter.” Written by Homebrew member Dr. Mike Hayes,

the first paragraph of the answer is steeped in mild-mannered pleasantries; Hayes thanks Gates,

declaring that “[his] software has helped many hobbyists” and describing the Micro-Soft product as

“marvellous.” It quickly becomes clear, however, that Hayes' apparent politeness is intentionally

derisive - a co-optation of Gates' sarcastic style in defence of the opposite opinion. The succeeding

sentences accuse Gates of “asking for software welfare” - a phrase meant to mock Gates' capitalist

“Open Letter” through the ironic subversion of its premier enthymeme: quality work ought to be

monetarily compensated. The final paragraph provides additional evidence to support this notion:

“If you want monetary reward for your software creations, you had better stop writing code for a minute and think a little harder about your market and how you are going to sell to it. And, by the way, calling all of your potential future customers thieves is perhaps [an] 'uncool' marketing strategy” (Hayes 1976). Adopting the business jargon present in the “Open Letter,” Hayes critiques Gates' understanding of

not only capitalism (by implying that the free market has spoken to price the Altair BASIC software

as free), but also his ability to run a business in the more general sense (by directly referencing

Gates' lack of professionalism). In typical hacker fashion, Hayes is able to summarise the entire

Page 21: SMP textfile

21

hobbyist ethos not by methodically or rationally breaking down each of Gates' points, but by curtly

dismissing his behaviour as “uncool.”

The stated goals of amateur technology groups like the Homebrew Computer Club sought to

improve the functionality of computing machines, bring technology to the people and, ultimately,

create a more ethical society built on cooperation, creativity and sharing. However, the Altair

BASIC controversy suggested that the expansion of the computer market could signal the downfall

of the Hacker Ethic, forcing programmers to compromise their principles. Worse still, hackers

began to realise that the existence of less altruistic philosophies could corrupt the possibility of a

digital utopia.

Gates' letter heralded the beginning of the computer revolution: with affordable and easy-to-

use machines, technology would indeed be brought to the people. Though poorly received by the

hacker community, Gates' assumptions about the commercial software industry were economically

salient and confirmed in short order. In some ways, with the inception of the personal computer and

user-friendly operating systems, computing machines would become more accessible than ever

before. However, many of the individuals who identified as hackers saw the limitations of this

accessibility: though more people owned computers, they were policed by legal restrictions such as

software license agreements, passwords, and embargoes on sharing intellectual property. Hackers

began to devise new methods of subverting these legal obstacles; the most ambitious - and

successful – of these plans was Richard Stallman's GNU Project. While Bill Gates' letter suggested

a practical and familiar trajectory of technologist involvement in the future of global marketplaces,

Stallman's response, years later, advocated for a radical economic approach. As a consequence,

subsequent generations of hackers and technologists would develop a similarly radical rhetorical

tradition.

“The GNU Manifesto”: Another Response to Gates

By 1983, the decay and death of the hacker ethic was complete, according to Richard

Stallman, signalling the stasis moving from evaluation to extreme proposal. The MIT professor of

Page 22: SMP textfile

22

Artificial Intelligence, who “was militant in his execution of [The hacker ethic's] principles” (Levy

1983, 342), began to style himself as the “Last Hacker” in the years preceding his resignation from

the institution. Once the epicentre of hacker culture, wherein lively and audacious creativity was

encouraged, Stallman viewed MIT as a bureaucratic sell-out - an obsolete machine - that had slowly

but surely betrayed its ideological origins. Citing a series of the institution's incursions upon open

access, the increasing presence of the Department of Defence in the Research Laboratory of

Electronics and the dwindling spirit of professional camaraderie, Stallman adopted a bleak outlook

on the future. In one interview, he explained: “I'm the last survivor of a dead culture and I don't

really belong in the world anymore. And in some ways I feel I ought to be dead” (Levy 1984, 352).

Symbolically, Stallman's resignation can be viewed as an act of civil disobedience, in line

with the archetypal hacker's propensity to mistrust authority. Only through the public rejection of

oppressive and hierarchical institutional constructs – how Stallman came to view MIT – was he was

able to pursue its decentralised antithesis in the form of the GNU Project. Rather than creating a

software project in the hierarchical style of the commercial industries he despised, Stallman opted

instead for a political organisation as ephemeral and global as the technical infrastructure he sought

to develop. The ARPANet,3 populated by many like-minded hobbyists and hackers, provided a

collaborative atmosphere similar to the golden age of programming at MIT, though its participants

were geographically situated around the world.

Stallman announced his plan to create an entirely free and open source operating system in

September of 1983 over the ARPANet by using the computers in the MIT's Artificial Intelligence

3 Designed and developed by the U.S. military's Advanced Research Projects Agency (ARPA) and later the Department of Defence, the ARPANet was a non-commercial project aimed at connecting various universities and research centres in the United States to share information. The network functioned using the TCP/IP communications protocol. Though the U.S. military attempted to discourage ARPANet users from “sending electronic mail over the ARPANet for commercial profit or political purposes” (Stacy 1982, 9), the network allowed for the sort of digital interaction that is frequently referenced as a model for the modern Internet. For the most part, universities tried to police users' operation of the ARPANet internally, as evidenced by MIT's AI Lab handbook of terminal etiquette, which reminds readers, “Sending electronic mail over the ARPANet for commercial profit or political purposes is both anti-social and illegal. By sending such messages, you can offend many people, and it is possible to get MIT in serious trouble with the Government agencies which manage the ARPANet” (Stacy 1982, 9).

Page 23: SMP textfile

23

Lab. His original “GNU Manifesto” was subsequently circulated over numerous programming

mailing lists, and many hackers volunteered their “time, money, programs and equipment”

(Stallman 1983) in accordance with Stallman's request. Though technologists are notorious for their

varied and fiercely contested opinions, Stallman was symbolically well-positioned to lead this

radical movement due to his ethos as both a hacker “insider” and an outspoken critic. He remained

affiliated with MIT until the Thanksgiving of 1983, at which point he devoted all of his energy to

the creation of the GNU operating system.

In addition to his frustration at MIT, proprietary software companies, and the increasingly

commercial interests of his fellow programmers, Stallman also regarded the use of commercial

software to present an unacceptable moral dilemma. Before using certain programs, for example,

users were mandated to sign a legal contract promising not to share the software. Stallman counters

the ethics of this strategy by referencing the Golden Rule - “do as you would be done by” - an

ethical code with cross-denominational spiritual connotations. Stallman references his own

academic and professional experiences when dealing with this moral conflict, saying, “I worked

within the Artificial Intelligence Lab to resist such tendencies and other inhospitalities, but

eventually they had gone too far: I could not remain in an institution where such things are done for

me against my will” (Stallman 1983). Due to its historical connections to the early days of hacker

culture, MIT's AI Lab was a well-known and regarded feature in the annals of hacker mythology;

using the audience's assumptions about the institution, Stallman emphasises the extent of the

problem at hand.

In direct opposition to Bill Gates' “Open Letter to Hobbyists,” Stallman makes frequent

allusions to communism throughout the text of the GNU Manifesto – most visibly in the title of the

document. Though the GNU Manifesto does not resemble Karl Marx's “Communist Manifesto” in

structure or style, Stallman's word choice throughout the piece suggests his similarly political,

social and economic goals. For example, in addition to his stated goal of subverting the commercial

interests of the software industry, he refers to fellow programmers as “comrades” and decries

Page 24: SMP textfile

24

licensing agreements for forcing users to “break solidarity” with each other. This loaded

terminology prompts the audience to consider the GNU Manifesto as part of a larger political

tradition. This tradition, which inspired political action in the United States such as the labour,

worker's rights, and anti-war movements, feature top-down leadership models that are overthrown

for the benefit of society. By referencing these events, Stallman is able to subtly associate his own

project with the revolutionary elements of progressive political movements, establishing Burkean

identifications between symbols.

In addition to references to communism and the Golden Rule, Stallman uses allusions that

frame his arguments in terms of the both the philosophical and the practical. Jeremy Bentham's

“utilitarianism,” Kantian ethics, the American patent system, personal experiences, and Murphy's

Law demonstrate the diversity of Stallman's proof. Stallman even uses the language of capitalism as

justification for sharing. Under the heading titled, “Nobody will use it if it is free, because that

means they can't rely on support,” he comments, “If it is true that users would rather spend money

and get a product with service, they will also be willing to buy the service having got the program

free. The service companies will compete in quality and price; users will not be tied to any

particular one” (Stallman 1985). While Stallman's identifications work on multiple levels of

persuasion, Gates' argument - by merely using capitalism as evidence - appears monolithic by

comparison.

At the same time, Stallman is also able to construct his ethos around the collective, building

credibility among his hacker audience. For example, after briefly outlining the basics of the GNU

Project – including an explanation of the title GNU, a recursive acronym that stands for “GNU's

Not Unix” - the author shifts point-of-view from the individual “I” to the collective “we” when

detailing the technical components of the operating system. The second paragraph of the document

states in part:

“We will use TeX as our text formatter, but an nroff is being worked on. We will use the free, portable X Window System as well. After this we will add a portable Common Lisp, and Empire game, a spreadsheet, and hundreds of other things, plus online documentation. We hope to supply,

Page 25: SMP textfile

25

eventually, everything useful that normally comes with a Unix system, and more” (Stallman 1983). In a modern context, this statement may appear to reflect Stallman exerting his control over the

project. However, given the deficit of non-proprietary software available to all hackers, the

specified details he does provide - such as the inclusion of the text formatter that will be employed -

were the only viable options. Though steeped in technical lingo – with which the audience would

already be intimately familiar – the Manifesto is non-specific about the shape of the eventual

operating system. This non-specificity bestows ownership of the GNU Project on the audience,

inverting the traditional model of production and furthering the appeal of openness. With the

exception of the first section, titled “What's GNU? GNU's Not Unix,” the Manifesto largely ignores

the components of the project that relate directly to technology; instead, the text serves as a

justification and defence of ethical behaviour and sharing.

Because of its expansive scope and reasoning, the stakes in Stallman's argument eclipse

those in Gates' piece. At one point, Stallman compares the importance of making “good systems

software” freely available to the importance of air remaining a free commodity. The implications of

this comparison would seem extreme to computer users today – let alone during a time when so few

individuals had access to such technologies. The effect of this comparison on his argument remains

clear, however: to Richard Stallman, the creation of free software is vital, and will serve the

interests of humanity.

Here Comes Everybody: The Future of the Hacker Ethic

Early computers were defined by their inaccessibility: not only were they massive and

nearly impossible to use but also, up to the 1950s, the only individuals who had access to

computing machines were affiliated with the U.S. military. Although the security and defence

industries developed the first computers, the culture that has since surrounded this technology since

has always welcomed - and inspired - the transgressive. The irreconcilable philosophical differences

existing between the United States military and computer hackers remain a lasting source of tension

in both communities. Similarly, the commercial interests that Stallman sought to dismantle play an

Page 26: SMP textfile

26

even greater role in the control of private information today.

Embracing Stallman's solution to the moral problems of 1983, a vocal contingent of hackers

maintain that the ideological underpinnings of the Free Software Movement offer the most viable

practical means to eliminate the world's reliance on proprietary systems by providing individuals

with alternative technological frameworks. However, others have adopted a more disruptive

aesthetic, in line with Levy's archetypal hacker image. “Liberating information” is an umbrella term,

which can encompass a variety of tactics, from gaining unauthorised access to systems, to stealing

private communications, to turning classified information over to journalists.

Richard Stallman considered himself to be the Last Hacker; however, the future of hacking,

despite its increasingly fragmented adherents, would continue to reframe political debates, create

digital spectacle and challenge the discourses of the status quo.

Page 27: SMP textfile

27

Section 1: Political Ideology

“While geek culture kind of grew up as an outsider culture, that changed. It's at the heart of politics and the heart of social movements now... Hacker culture used to be relatively apolitical, but now,

every action that you take and every piece of code that you write has political effects.” - Eleanor Saitta, 2013

Though many post-Stallman hackers were content to use computers for purely non-political

ends, the networked world and “the meatspace”4 were becoming increasingly intertwined – and at

odds. In the past, social circles of hackers were able to emerge based on geographic proximity –

MIT's Tech Model Railway Club, for example, or the Homebrew Computer Club: like-minded

students or professionals with obscure, niche interests. With the advent of the Net, however,

connectivity and engagement increased: the threshold of expertise required to access to the Internet

remained high, and those who learned to parse the arcane technical protocols to partake in online

discussions could uniformly be defined as technologists. Kenneth Burke would describe the

evolving situation, which took place in the late 1980s and early 90s, as an alteration of the scene-

actor ratio. As the number of participants, or actors, debating online, creating technologies and

attempting to establish legal order increased, the platform - or scene - through which their

communications occurred likewise expanded. This sudden disruption of established order prompted

a series of social, political and legal controversies, as the lawless culture of the computer hackers

met opposition in the form of criminal cases and regulatory legislative proposals.

It was around this time that the word “cyberspace” - adapted from William Gibson's science

fiction writings – was applied to the Internet. No longer regarded by technologists and outsiders as

an abstract collection of wires, writings about the Internet began to define it as a place: “a

qualitatively new world, a frontier” (Sterling 1994, 549). This framework was not understood and

reiterated solely by hacker “insiders”: law enforcement agencies and politicians were increasingly

4 Defined by Urban Dictionary, the de facto encyclopaedia of slang, the noun “meatspace” is, “a term, originating from cyberpunk fiction and culture, referring to the real (that is, not virtual) world, the world of flesh and blood. Somewhat tongue-in-cheek. The opposite of cyberspace” (2005).

Page 28: SMP textfile

28

aware of cyberspace - as a place where crimes were being committed, just like in the physical world.

In the United States, following a series of arrests related to computer crime throughout the late-

1980s, computer hobbyists and hackers envisioned an apocalyptic future for their beloved Net.

Resurrecting the spirit of Richard Stallman's “last hacker” persona, public debates among

technologists began to surface on B.B.S.s,5 then Usenet boards and, finally, on the World Wide

Web as questions regarding legal control of technology were presented for consideration. As a new

generation of technologists – more actors prepared to influence the scene - found their way onto the

Internet, their priorities solidified around a single objective: keeping cyberspace open to all and out

of the reach of the state. Despite some persistent similarities, the methods by which these

technologists influenced the scene often differed, causing internal discord and fragmentation.

The above quote comes from a contemporary lecture “No Neutral Ground in a Burning

World” by Quinn Norton and Eleanor Saitta, two journalists, computer security researchers and

social justice advocates, at the 30th annual Chaos Communication Congress (CCC) in Hamburg,

Germany (2013). In the early 1990s, the hacker conference was a new “scene” that technologists

adopted with enthusiasm, and the only one that occurred outside the confines of cyberspace. The

increasing significance of “real life” meet-ups – for hackers to present computer security papers,

“learn new things, meet new people, and drink a beer or twelve” (Trumpbour 2003) – is a specific

example of the expanding scene-actor ratio, as described by Burke.

In the mailing list announcement for one such conference, planned to take place from

August 6th-8th, 2003 in Pittsburgh, author Mark Trumpbour gestures jokingly at the immensity of

the technologist “scene,” referencing the diverse cast of characters who were known to frequent the

cons: “Come out and meet your favorite hackers, phreakers, phrackers, feds, 2600 kids, cops,

security professionals, U4EA, r00t kids club, press, groupies, chicks, conference whores, k0d3 kids,

convicted felons, and concerned parents!” (Trumpbour 2003). This sprawling list of personalities is 5 B.B.S., which stands for Bulletin Board System, refers to a computer server running software that allows connected users to relay messages to each other, share links to outside news sites, and uploading or downloading software. B.B.S.s are regarded as the forerunner of the modern social networking site.

Page 29: SMP textfile

29

far removed from the specificity present in classifications of the TMRC, or the Homebrew

Computer Club, or even the early GNU developers. The 1990s can be viewed as a liminal space

between a time period of coherence and one of decentralisation: whereas early technologist

generations are fairly homogenized in their makeup, later iterations are impossible to group together,

as evidenced by Trumpbour's haphazard inventory.

Even within the limited framework of computer security conferences, the scene likewise

expanded: in 1987, Phrack magazine sponsored the first hacker conference to be hosted in the

United States, SummerCon, which was held annually and would pave the way for similar events to

be developed over the next five years. DEF CON and Blackhat in Las Vegas, ToorCon in San

Diego and Hackers On Planet Earth (H.O.P.E) in New York City are all examples of conferences

that were founded within this window of time.

As an institution, the hacker conference is an LED-light and Club-Mate fuelled celebration

of hacker culture, and the most identifiable platform for the practice of Aristotle's three forums of

rhetoric among technologists: deliberative, forensic and epideictic. Keynote addresses, for example,

serve as an example of deliberative rhetoric, as they typically relate to the utilisation of technology

to solve societal problems, followed by an invocation of political action. Elements of epideictic

rhetoric appear throughout panel discussions and lectures, which frequently praise larger-than-life

figures – whilst blaming their detractors – and occasionally involving spirited heckling from the

audience.6 Finally, popular conference games, such as “Spot the Fed” at Las Vegas's DEF CON,

can be interpreted as a form of judicial rhetoric. Originally conceived as a paranoia-motivated way

for hackers to “win free T-shirts for identifying federal agents” (Thomas 2002, xxv), the contest

functions as an ironic dialectic, wherein conference-goers publicly accuse suspected Feds, both

participants are invited onstage to defend their positions (or, conversely, the Fed can “confess”),

6 A modern example of failed epideictic speech occurred during the keynote address at Blackhat, delivered by then-NSA Director General Keith Alexander, in the wake of the 2013 scandal. In his defence of the intelligence agency, Alexander stated, “We [the NSA] stand for freedom,” to shouts of “Bullshit” by the crowd. Someone else interrupted the speech, accusing the General of lying to Congress: “Why would people believe you're not lying to us right now?” (Greenberg 2013)

Page 30: SMP textfile

30

and the assembled audience votes “guilty” or “innocent.” Subverting the expectations of police-

hacker relations, “Spot the Fed” facilitates the public shaming, heckling, and adjudication of

traditionally “law abiding” attendees by those who are wont to be tried in a federal court themselves.

The wide range of topics covered in hacker conferences suggest high and diverse levels of

community participation, which includes interests in subjects ranging from lock picking and

network security lectures, new technology and civil disobedience training sessions, or Internet

memes and coffee brewing competitions. The lecture by Norton and Saitta provides one example of

this phenomenon. Despite its presentation at one of the oldest worldwide technology conferences,

the topics discussed in “No Neutral Ground in a Burning World” do not reside in the realm of the

technical; on the contrary, Norton and Saitta are primarily concerned with the societal implications

of technology and the resulting ethical imperatives that software developers must confront in the

modern era. This lecture is one example of the often pluralistic and conflicting approaches to

understanding technology present within hacker subcultures today. Upon referencing the 2013 CCC

presentation line up, a colour-coordinated schedule that categorises lectures by topic, attendees can

easily understand the diversity apparent in the lectures: for reference, listed concurrently with

Norton and Saitta's talk are panels on firmware configurations, hacking SmartTV devices and

particle collision experiments. Following their talk, the room would be used to host “Hacker

Jeopardy” (Zeitplan für Tag 1 2013). Although technology and programming continues to be the

focus around which technologists and hackers assemble, the introduction of new actors, which

began in earnest in the early 1990s, meant that the voices of feminists, politicians, anarchists,

minors and law enforcement personnel were superimposed onto a scene that was once an upper or

middle class, professional “boys club.”

Expectedly, factions began to develop among technologists as they constructed different

strategies to achieve their objectives given increasingly varied perspectives and values. Stallman's

Free Software Movement sought to establish technological systems that would allow users to

withdraw completely from unacceptable and restrictive legal conditions; yet, some technologists

Page 31: SMP textfile

31

and programmers suspected that divorcing their work from reality was, in itself, an unethical

solution. Moreover, Stallman's GNU system limped slowly toward completion, as its team of

developers struggled to code the most critical component of the operating system: the kernel, or the

part of the computer responsible for managing memory, processing and application performance. A

vocal contingent of technologists began to question whether or not Stallman's dream was even

possible.

The deficit of practical alternatives to proprietary software was one motivating factor for the

rise of the criminal hacker: a technologist who uses his or her knowledge of computers to break into

systems, steal trade secrets, or vandalise websites. Representational signs created unity within

earlier technologist collectives, such as mutually understood mythologies, in-jokes, jargon and,

perhaps most importantly, the unspoken adherence to a broader ethic. For example, MIT's Artificial

Intelligence Lab transcended its academic influence, becoming an early technologist symbol.

Universally viewed as the birthplace of hacker culture, the AI Lab once encapsulated the values of

the culture, conveying the prestige, creativity and intellectual rigour categorising the “art” of

hacking. For some new actors, however, both the signifier and the signified no longer occupied a

place of high esteem; on the contrary, many younger hackers asserted that the first instances of

hacking were perpetrated by the a subculture known as the Phone Phreaks, individuals who

manipulated audio frequencies in early telecom systems to place unpaid, untraceable prank calls.

Criminal hackers were younger, more concerned with economic gain or status, and usually less

interested in the craft of hacking – which explains their identification with the Phreaks rather than

MIT's computer science faculty. Incendiary political language and irreverence toward authority are

also part and parcel of the criminal hacker, or cyberpunk, aesthetic.

Because the GNU Manifesto did not contain ideologically satisfactory, or even feasible,

answers according to some hackers, groups continued to invent different, but equally elaborate,

technical fixes, such as cryptographic algorithms, digital currencies and radical “free information”

campaigns. Others took to the streets, crafted slogans and advocated for reform, adopting the

Page 32: SMP textfile

32

political sensibilities of conventional activists. Still others simply logged on to the Net to talk shop

or debate with ageing anti-war techno-hippies, San Francisco liberals, and the new class of digital

rebels calling themselves “Cyberpunks.” In general, the divisions that emerged can be grouped into

two camps: reformist and radical political campaigns. To service practical as well as symbolic gains,

reformist hackers began to embrace varied political ideologies in an effort to voice specific

grievances, organize demonstrations, explain unfolding events and devise new social or

technological institutions. Meanwhile, the radical faction manipulated or disregarded the law to

great effect, sometimes avoiding legal prosecution, and often creating spectacle.

The Electronic Frontier Foundation (EFF) – described by some as the American Civil

Liberties Union of the Internet – was the first formal technology-centric interest group. Created in

response to an unprecedented hacker crackdown by the United States government beginning in the

late 1980s, the 501(c)(3) non-profit organization remains an ever-present fixture in the canon of

technologist lore in both the United States and abroad. John Perry Barlow, one of the organization's

three founders, has written extensively about his personal exigence for undertaking the project,

explaining his intention to “fund, conduct, and support legal efforts to demonstrate that the Secret

Service has exercised prior restraint on publications, limited free speech, conducted improper

seizure of equipment and data, used undue force, and generally conducted itself in a fashion which

is arbitrary, oppressive, and unconstitutional” (Barlow 1990). Just as Stallman's GNU Project

sought to combat the legal and cultural failings of proprietary software systems, the EFF similarly

aspired to “hack” what he perceived to be unjust political and judicial institutions.

“I've Always Been More Comfortable With Outlaws Than Republicans”

John Perry Barlow's account of the events leading up to the creation of the EFF are

recounted in the essay “Crime and Puzzlement,” a title spoofing Dostoyevsky's late-19th century

Russian novel. Combining the literary influences of American Western tropes, science fiction

allusions, and Kafkaesque absurdity, Barlow describes his experiences in Cyberspace, including

bizarre encounters with a rogue band of cyberpunk “outlaws” known as the Legion of Doom and

Page 33: SMP textfile

33

the inept FBI agents whose efforts to police the deputed legal territory proved laughably ineffective

In the opening sentences of his manifesto, Barlow crafts a humorous narrative, casting

himself as the main character in a cartoonish Western. The opening conflict is a banal situation that

occurred in the late 1980s, recognisable to anyone familiar with the subtleties of B.B.S. or chat

room etiquette: two unknown, pseudonymous strangers enter a digital discussion board, prompting

confusion from community regulars. Barlow uses comedic language and irony to subvert the

audience's expectations about the event, reimagining the atmosphere of an online B.B.S. as a 19th

century frontier saloon and casting the “strangers” as mysterious bandits. This opening introduces

the notion of villainous, presumably masked cyberpunks, whose arrival alone is enough to disrupt

the established digital tranquillity. In this opening section, Barlow briefly adopts a cartoonish

Western dialect, only to revert back to standard English for the duration of the essay: “So me and

my sidekick Howard, we was sitting out in front of the 40 Rod Saloon one evening when he all of a

sudden says, 'Lookee here. What do you reckon?' I look up and there's these two strangers riding

into town. They're young and got kind of a restless, bored way about 'em. A person don't need both

eyes to see they mean trouble...”

Though he uses the metaphor initially for comedic purposes, Barlow's “Wild, Wild West”

functions on multiple literary and rhetorical levels. By drawing upon existing means of

identification, the author is able to make use of associations that are familiar to his audience.

Through the comparison, Barlow uses symbolic coding to suggest a host of meanings, which

associate the Internet to the mythic “Frontier” in the minds of his audience: specifically, notions of

freedom, exploration, lawlessness, progress, and opportunities to profit. Barlow unpacks the nature

of his metaphor explicitly, describing the Internet as,

“Vast, unmapped, culturally and legally ambiguous, verbally terse, hard to get around in, and up for grabs. Large institutions already claim to own the place, but most of the actual natives are solitary and independent, sometimes to the point of sociopathy. It is, of course, a perfect breeding ground for both outlaws and new ideas about liberty” (Barlow 1990). Barlow rejects the claim that “large institutions... own [cyberspace],” an assertion that, in itself,

Page 34: SMP textfile

34

situates his allegiance with the hackers and against any entity attempting to control the Net's

anarchic users. Although the “two strangers” in his opening are “looking for trouble,” Barlow's use

of Frontier imagery nevertheless romanticises the criminality and on display, as well as indicates

the author's sympathetic treatment of his subject. The comparison of cyberspace to the Wild West

was so foundational to Barlow's beliefs about the nature of technology that he would make

reference to it in the very title of his non-profit.

The cyberpunks that Barlow encountered on the electronic frontier, whose handles ranged

from the political (Karl Marx and The Leftist) and provocative (Prime Suspect and Unknown

Soldier) to the haphazardly misspelled (acid phreak and phiber optik), were a part of a hacker group

known as the Legion of Doom (LoD) and representative examples of a new class of technologist

actors. Named after the council of super-villains from the DC Comics universe, Barlow describes

their ilk as “fractious, vulgar, immature, amoral, insulting, and too damned good at their work”

(1990). Though their collective criminal exploits often involved fraud and identity theft, many of

the participants were most interested in pranking and stunts, such as placing unpaid calls or

disconnecting the phone lines of celebrities. The group maintained the controversial opinion that, if

computer systems are improperly or inadequately secured, hackers should be encouraged to break

into them. By that same logic, unlocked houses ought to be robbed.

The LoD frequently engaged in public, online debates with non-members over the ethics of

gaining unauthorised access to computer networks – specifically, Barlow mentions an online

conference moderated by Harper's magazine. During that conversation, reformist technologists

struggled to map Stallman-esque reasoning onto the more radical cyberpunk agenda. For example,

in one exchange, Dave Hughes, a retired army colonel, asserts, “Networks are built on trust. If they

aren't, they should be.” To which the cyberpunk acid phreak replies sarcastically, “Yeah. Sure. And

we should use the 'honor system' as the first line of security against hack attempts” (Barlow 1990).

The idealistic philosophical allusions that comprise major ethical claims in “The GNU Manifesto” -

Jeremy Bentham's utilitarianism and “The Golden Rule” among them – are situated in opposition to

Page 35: SMP textfile

35

the pragmatic, result-driven objectives of the cyberpunks. Despite the heated nature of the

conversation, the assembled company's differing ideological perspectives, and the fact that the LoD

would target Barlow's telnet connection, Barlow maintains that he was inclined to sympathise with

the cyberpunks, stating, “I've always been more comfortable with outlaws than Republicans, despite

having more certain credentials in the latter camp.”

Indeed, the cyberpunk subculture of hackers share some similarities with the original

adherents of Steven Levy's hacker ethic; however, many Free and Open Source Software

developers refused to bestow the title of hacker upon individuals who engage in criminal activities,

resetting the stasis of the issue back to a matter of definition. Debates over the meaning of the word

“hacker” became a reoccurring source of controversy, with law-abiding, white-collar programmers

claiming ownership over the word and referring to illegal computer use disparagingly as “cracking,”

because it involves breaking network or software security. Other definitions of the word began to

emerge, stating an opposite claim and limiting the scope of hacking to solely criminal acts. The

abundance of technologist manifestos penned during this narrow window of time function as a

means of asserting probable truths, usually to an audience that is predestined to agree with all major

premises. The inability of the community to resolve disputes about definition parallels its inability

to move forward as a collective; at a foundational level, the controversy was indicative of

representational systems that had disintegrated or utterly failed.

Despite their differing ideological leanings, John Perry Barlow regarded the systematic

roundup of the Legion of Doom members by the Secret Service with outrage in “Crime and

Puzzlement.” The members were accused of breaking into a computer owned by the telecom

company Bell South and downloading a document that outlined the administrative procedures,

servicing, upgrading and billing protocols for a 911 emergency telecom system. As Barlow points

out, no proprietary information or access codes were contained in the three-page text file. The

document was subsequently passed around the Net and picked up for publication by various mailing

lists and hacker magazines; as a result, federal authorities convened a Grand Jury, eventually

Page 36: SMP textfile

36

executing 27 search warrants and indicting three LoD members. “The law had come to cyberspace,”

Barlow says, adding, “I've begun to wonder if we wouldn't also regard spelunkers as desperate

criminals if AT&T owned the caves” (Barlow 1990), reinforcing the exploratory – rather then

criminal – nature of cyberpunk offences.

Agents of the federal government constituted another new category of actors exerting their

influence on cyberspace. As law enforcement agencies investigated the cases, it became

increasingly clear to both new and existing technologists that “the Feds” misunderstood even

rudimentary computer processes, as evidenced by the number of search warrants served on

individuals who merely downloaded the Bell South documents out of curiosity, but had no part in

the seizure of the private information. Despite the fact that an ever-increasing number of civilians,

whose geographic locations were situated in many jurisdictions, now populated the Net, the number

of actors who determined the legality of digital speech remained confined to a select – and under-

educated – few.

Barlow contextualises the goals of his non-profit in terms of free speech and open access: to

protect the rights of “the future's opinionated nerds” (Barlow 1990). Recognising that the federal

government has the monopoly of legitimate power in adjudicating the matter, he acknowledges the

high stakes implicit in the court cases of the coming years. The outcomes of these legal proceedings

were crucial to the persistence of the lax standards of free speech and open access on the Net.

Similarly, Barlow recognises the strategic political benefits created by a unified front of

technologists, lobbying in concert for the preservation of rights via existing legal channels. Barlow's

essay thus becomes as much a defence of the cyberpunks as it is about his exigence for creating the

Electronic Frontier Foundation. Using insider hacker humour, Barlow gestures at the fact that

technologist factions were ideologically decentralised, conceding to his audience that, “Not

everyone will agree. Crackers are, after all, generally beyond... sympathy.” The non-profit, then,

can be viewed as Barlow's attempt to alter the number of actors exerting control over the political

scene of the Internet: limiting the influence of institutions like the federal government, while

Page 37: SMP textfile

37

affirming the rights of the Net's sub-category of rabble-rousers, however unpopular their actions

may be.

The language of frontier America can be used to explain the motivations of both camps of

technologists, both reformist and radical. If cyberspace takes on symbolic significance as a region

of unexplored territory, the cyberpunks adopted the southern frontiersman attitude of Captain

Simon Suggs, the fictional creation of Johnson Jones Hooper, who advised, “It is good to be shifty

in a new country.” The quote summarises the independence, intrigue and subtle humour inherent in

the criminal hacker identity, as well as captures the dubious or averse nature of authority figures –

the individuals who supply the motivation behind for their “shifty” behaviour – within that

historical narrative. Conversely, the life motto of Davy Crockett, “Be always sure you're right –

then go ahead” (1834), shares similarities with that of Stallman's or Barlow's adherents: if the

ethical stipulations of a matter are met, individuals have the authority to act unilaterally within their

own power.

The Radical Cryptographers

Barlow's reluctant defence of digital shiftiness became a more controversial position through

the involvement of the crypto anarchists: mathematicians and revolutionaries who viewed secure

communication as a multifaceted solution to numerous societal ills. Cryptography, a technological

utility, provided the practical means of ensuring that secure communication. Despite its

technological origins in the realm of military strategy, the development of superior cryptographic

tools was a cause sustained by private citizens – most of them academics – throughout the 1990s, at

which point the issue was framed as a national security concern by the intelligence community.

Over the years, self-described crypto anarchists began to seek out a forum to express their political

and social ideas anonymously, leading to the creation of entrenched social norms such as radical

notions of individual freedom, privacy and free speech. The so-called “CryptoWars” were the first

notable confrontation in a lasting conflict between governments and this faction of libertarian

hackers. Although a different scene and new actors were involved in the development of

Page 38: SMP textfile

38

cryptographic tools, as well as the ideological imperatives that were constructed around them, the

matter of legal encryption would become the first issue that reformist hackers would organize to

oppose, prompting the eventual involvement of the broader technologist community, including

reformist groups like the Electronic Frontier Foundation.

The promise of unbreakable encryption was a scientific puzzle that baffled mathematicians

throughout the 20th century; reaching this objective would allow data to be securely and

anonymously shared. The solution to the encryption conundrum ensured absolute privacy for

anyone, anywhere. Articles written in the Scientific American magazine throughout the 1970s and

80s speculated that perfect secrecy could be attained through the application of public key

encryption.7 To digital trouble-makers, this technology offered protection to political dissidents and

revolutionaries; to law enforcement, however, the result would lead to criminals trafficking in

stolen information and plotting their offences with impunity. Given the high-stakes implicit in

sharing anti-government ideas, the academy, the military and ordinary hobbyists began to test the

hypothetical systems outlined in scientific articles.

One of the first technologists to invoke the ethos of crypto anarchy was Tim May, a former

Intel engineer, who was a founding member and prolific contributor to the Cypherpunks Mailing

List, an electronic message board for cryptography enthusiasts – and the occasional scholar. The

speculative writings that appeared on the mailing list, as well as the casual discussions that

frequently occurred, combined the intellectualism of the academy with the impulsivity of the

7 The work of Martin Gardner on key encryption was a non-traditional and theoretical approach to cryptography, which led scientists to consider using two keys to scramble messages instead of the conventional generation scheme of one. Imagine that Alice and Bob – cryptographers’ favourite hypothetical actors - are attempting to communicate with each other. Each would generate their own set of encryption keys: a public key for scrambling messages and a private key for decrypting them. Alice's public key can be publicised and made widely available, because it is only used for harmlessly scrambling secrets, not unscrambling them. Bob would then write his message to Alice, encrypt it using her public key, and ship the message through cyberspace. Without access to Alice's private key – the only way to decrypt a message intended for Alice – the message would remain scrambled. Provided she keeps the private key securely stored, any communications between the two would remain safe from snooping by meddling third parties (Greenberg 2012, 62).

Page 39: SMP textfile

39

telecom-hacking cyberpunks.8 Many members of the electronic mailing list identified politically as

libertarians, while others eschewed politics completely. May was just as fascinated by the societal

impacts of complete anonymity as he was by the technological structures that made such a system

possible; as such, his writings predicted and, ultimately, galvanized supporters of legal access to

cryptography, deploying both deliberative and forensic rhetoric.

A brief text, titled “The Crypto Anarchist Manifesto,” was written by May and posted online

on November 22, 1992, after passing it around at a real life cypherpunk meet up in San Francisco.

In his post to the mailing list, May prefaces the manifesto by addressing his audience as, “The entire

readership of the Cypherpunks list, spooks [law enforcement officers], eavesdroppers, and all.

<gulp>” (1992). This sarcastic designation is indicative of the paranoia implicit in community

engagement, as well as the public acknowledgement the Mailing List’s lack of privacy under the

current technological system. Through this sentence, not only does May establish the intended

audience of his piece, but he also acknowledges the dichotomous relationship between his intended

readership and its actual audience.

Alluding to the language and revolutionary exigence of “The Communist Manifesto,” May

draws the conclusion that the dissemination of cryptographic technology is not only “practically

realizable,” but also a political and economical inevitability (1992). He begins by stating, “A

spectre is haunting the modern world, the spectre of crypto anarchy.” Like Marx, May appeals to

his audience's understanding of the societal structures that surround financial and political decisions.

However, rather than offering Marx’s remedy of class war between the bourgeoisie and the

proletariat, May reimagines the technologically-savvy masses as a kind of 21st century proletariat,

8 To distinguish the two radical groups, it is useful to know that the cypherpunks appropriated their name from that other technologist subculture (In cryptography, a 'cypher,' refers to the decryption key, used to unscramble a secret message). Both factions shared an affinity for cyberpunk science fiction and, indeed, some overlap existed within members’ identification. For example, before becoming the founder of WikiLeaks, Julian Assange participated in Legion of Doom style criminal hacking, as well as proposed a deniable encryption scheme called Rubberhose to the Cypherpunk mailing list. The Rubberhose system was designed to withstand attempts by enemy third parties to gain access to encryption keys through the use of torture.

Page 40: SMP textfile

40

rising up to overthrow security-controlling political elites. Moreover, according to May,

cryptography – not capital - will fuel the coming revolution.

May bolsters his ethos not only among an audience of Cypherpunk Mailing List readers, but

also within a broader discourse of (decidedly unwelcome) participants, by using specific examples

of developing technologies, combined with esoteric scientific language. Before referencing, “High-

speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-

MIPS personal computers, and encryption chips” - some of the devices or systems that would

challenge the political authority of governments – May indicts the National Security Agency for

“monitoring” cryptographers presenting mathematical research at European and American

technology conferences. Although the language of his manifesto does not explicitly reference the

forms of intimidation deployed by intelligence agencies, their tactics were widely discussed within

technologist circles to both rationalize paranoia and pragmatically motivate cryptographic progress.

May begins to build a case against those individuals, likely listening in, who he views as

overreaching government actors, endlessly striving to interfere with the work of scientists and limit

the progress of independent citizens. By including the claim that the NSA had conducted

surveillance on scientists, he charges the intelligence agency with incompetence and frivolity. At

the same time, he elevates the ethical claims of the cryptographers in question, casting them as

courageous truth-tellers, who continue to make scientific headway, despite the unceasing intrusions

of the state.

Throughout the piece, May repeatedly reminds his audience that his conclusions are sound,

despite the limits posed by the power of the state and the absence of workable encryption solutions

at the present. To endue his manifesto with legitimacy, May evokes a symbol of progress – one

familiar to any technologist, yet broadly applicable to any American reader: the frontier West. First,

May compares cryptography to the printing press and medieval guilds, grouping them together as

similar forces for limiting state power. Next, he metaphorically raises the idea of private property

by referencing another piece of technology: barbed wire. He states:

Page 41: SMP textfile

41

“And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery of an arcane branch of mathematics come to be the wire- clippers which dismantle the barbed wire around intellectual property” (May 1992). True to technologist form, May illustrates his distain for intellectual property through an adherence

to the principle of free information, which he suggests will be liberated by cryptography. The notion

of the frontier is applied to technology again, for slightly different reasons than in Barlow's “Crime

and Puzzlement.” Unlike the printing presses and medieval guilds of Europe, the West refers to a

specific and American concept of progress – a notion of freedom - that was lost, presumably, with

the establishment of superfluous law, order and government regulation. Despite this, May's

comparison does not end pessimistically; rather, his essay supplies the strategy required to restore

the uniquely American ideals of freedom and progress represented by the West: Crypto Anarchy.

He concludes by declaring, “Arise, you have nothing to lose but your barbed wire fences!”

In 1996, the application of cryptography left the realm of hypotheticals, using some of the

same technological protocols that May suggested in his 1992 manifesto. Jim Bell, another

outspoken member of the Cypherpunk mailing list and self-described crypto-anarchist, imagined the

elimination of global governments through a revolutionary technological scheme. “Assassination

Politics” was widely circulated by the members of the Cypherpunk mailing list, as well as similarly

libertarian Usenet discussion boards. Readers' responses spanned a range of opinions, ranging from

confusion to outrage to outright glee. Bell's 40-page manifesto9 suggests that computer users

harness the power of encryption and digital currencies, awarding cash-prizes to anyone who

accurately “'predicts' the death of any government employees, officeholders, or appointees” (Bell

1997, 1), effectively putting a bounty on the head of any politician in the world. In the long-term,

Bell predicted, “nobody above the level of county commissioner would even risk staying in office”

(4), ushering in a new era of limited government. Not only did the plan purport to be

technologically untraceable; Bell also asserted that the scheme would bring justice to governments

9 For the purposes of this analysis, I will examine the first two parts of “Assassination Politics.”

Page 42: SMP textfile

42

worldwide.

Bell reiterates the word “organization” throughout the “Assassination Politics” essay; he

also repeatedly revisits the practical and legal logistics of the system he devises. Both rhetorical

characteristics are attempts to legitimise the assassination lottery as a valid type of political

institution. Along similar lines, when publishing his essay, Bell does not utilise any cryptographic

tools to obscure his identity (4); on the contrary, his name appears on the title page of the document.

This decision begins the process through which Bell invents an ethos for himself: using his real

name lends currency to the seemingly fantastical notion that killing politicians for digital cash is a

legitimate form of political participation. Bell signals to his audience that he is unafraid of the legal

repercussions of his plans, not because these law enforcement officers cannot locate him, but

because he is operating within the bounds of the law.

Bell offers a stoic report of his system's technical makeup as a means of instilling trust in his

audience – the individuals who will presumably participate in the betting and killing of targeted

politicians - as well as to reinforce his own ethos as a transparency advocate. He describes the

process by which individuals would securely participate in the lottery through the following

sentences:

“Associated with each name would be a dollar figure, the total amount of money the organization has received as a contribution, which is the amount they would give for correctly 'predicting' the person's death, presumably naming the exact date. 'Guessers' would formulate their 'guess' into a file, encrypt it with the organization's public key, then transmit it to the organization, possibly using methods as untraceable as putting a floppy disk in an envelope and tossing it into a mailbox, but more likely either a cascade of encrypted anonymous remailers, or possibly public-access Internet locations, such as terminals at a local library, etc...” (1997, 1-2).

Bell is appealing to the logos of his audience by explaining his system's construction in detail,

offering them the option to “review the source code” of his system for themselves before deciding

to participate. This logical argument is almost identical to the pragmatic appeal of free and open

source software, which verifies its security through robust opportunities for peer review. The virtue

of transparency also illustrates that Bell does not stand to gain, from a monetary standpoint, by

devoting his time and resources required to create the assassination lottery. On the contrary,

Page 43: SMP textfile

43

members of his audience would be acutely aware that Bell was inviting the scrutiny of the Feds by

posting the essay onto the Internet under his own name. Again, Bell's ethos is constructed around

the premise that he is courageously standing up to the government and unafraid of the consequences.

Like Tim May, Bell was similarly interested in notions of revolution though technology; the

preface of Part 2 of “Assassination Politics” functions as a fictional narrative concerning the subject

of revolution. In it, a fictionalised Jim has a conversation with his friend Dorothy over pizza,

referring to one of his new inventions as, “A new idea, but it's really evolutionary. Literally

REVOLUTIONARY.” When Dorothy jokingly asks, “Which government [he is] planning to

overthrow,” Jim responds, “All of them” (3). The invented exchange calls attention to what the

audience is likely thinking: that Bell's assassination lottery resides in the realm of action movies or

science fiction novels. However, through this exchange, Bell suggests that scientific or

technological progress can lead to political revolution – if someone is willing to devise an inventive

system. Such a claim, with its reimagination of Marx’s bourgeoisie as political elites, relies upon

his audience's preexisting beliefs. To members of the Cypherpunk Mailing List, who had read Tim

May's manifesto years prior, the notion that technology could engender political revolution was an

idea as widely accepted as technologists’ support for civil liberties issues.

Following the fictional narrative, Part 2 opens with the following hypothetical scenario,

which echoes the sentiments of a more familiar sort of revolution: “Imagine for a moment that as

ordinary citizens are watching the evening news, they see an act by a government employee or

officeholder that they feel violates their rights, abuses the public's trust, or misuses the powers that

they feel should be limited. A person whose actions are so abusive or improper that the citizenry

shouldn't have to tolerate it” (Bell 1997, 3). Bell provides a sense of urgency and importance to his

own revolutionary statements by using the logical appeals of the Declaration of Independence, a

document which serves as justification for the American Revolution. Moreover, by paralleling his

argument to that of the United States' favourite political rebels – specifically, the Founding Fathers

– Bell establishes the historical precedent for using lawlessness and violence to bring about a more

Page 44: SMP textfile

44

just society.

New Frontiers

References to founding documents or events in United States history are predicated upon

Enlightenment-era ideals of human nature, state building and individual freedom. “Assassination

Politics” exemplifies the trend towards classical liberalism, which became increasingly pronounced

within later examples of technologist writings. As the reformist and radical factions of technologists

established differing systems of identification among their community-oriented devotees, both

subcultures were united in their renewed adherence to the virtues of private property, free

expression, and the primacy of the individual. By aspiring to such ideals, instances of ideological

diffusion and cooperation became increasingly noticeable within the ever-expanding technologist

scene.

To return to the earlier analysis of quotes from the frontier West: “It's good to be shifty in a

new country” and “Be always sure you're right – then go ahead” are phrases that offer a convenient

place-holder for the ideological differences between the radicals and the reformers. The spirit of

independence and individual agency, however, is ultimately reflected in both statements. During the

second half of the 1990s, the dragnet of illegality spread ever wider, through legislative attempts to

curtail digital privacy, limit online speech and regulate access to cryptography. Increasingly, the

representational appeal of shiftiness – an ideological mechanism that criminal hackers used to

divorce themselves from “upright” programmers and hobbyists - would morph into a broader,

community-wide obligation or virtue. The threat of arrest was not just a reality for the shiftiest of

hackers, but it was also a risk for technologists who were “just doing their jobs” as security

researchers, software developers, cryptography experts and computer enthusiasts. In other words,

while some hackers were born shifty, others had shiftiness thrust upon them.

Page 45: SMP textfile

45

Section 2: Enlightenment Ideals

“We're already passed the time when one would wrap hacking in the First Amendment. There's a traditional distinction between words – expressions of opinions, beliefs, and information – and deeds... The philosophical problem posed by hacking is that computer programs transcend this

distinction: they are pure language that dictates action when read by the device being addressed... Blurring the line between language and action, as computer programming does, could eventually undermine the First Amendment. That's a very high price to pay, even for all the good things that

computers make possible.” - Robert Horvitz (1990)

Horvitz's prediction about computers and the law, offered during the Harper's conference

referenced in John Perry Barlow's “Crime and Puzzlement,” present a perspective counter to the

idealistic defences of programming proposed by the technologists. Compared to the other forum

participants, Horvitz's claims are starkly juxtaposed, appearing beside the voices of Stallman,

Barlow and several Legion of Doom (LoD) members – all proponents of the technologist ideology.

While hackers tend to justify radical applications of technology by referencing freedom of

“opinions, beliefs, and information,” Horvitz's rebuttal recontextualises that definition, drawing a

line between the civil liberties outlined in the First Amendment and potentially harmful actions. As

a means to critique technologist understandings of “free speech,” Horvitz raises definitional

questions about the term, a persuasive technique with its roots in Stasis Theory.

Horvitz asserts that, by nature, computer programming differs from other forms of

expression, though technologists often diminish – or brazenly defy - these distinctions. Beginning

with Stallman and the Free Software Movement, the freedom to write and share code was seen as

comparable to the right to speak freely. Among open source developers, it is typical to encounter an

insistence that fellow programmers refer to their craft as “free” software, rather than simply “open

source.” This slight linguistic preference endues the process of writing code with explicit

ideological significance, prioritizing abstract ideals of liberty over the practical appeal of cheap,

peer reviewed code. Even more prevalent is the use of the phrase, “Free as in speech, not free as in

beer” (Free Software Foundation), which reflects the distinction between liberty and price when

Page 46: SMP textfile

46

discussing free software. Though free software typically does not cost money, programmers are not

referring to the monetary advantages of their software's use; rather, “free” indicates the abstract

rights that are afforded to its users, such as the right to use, study, copy, or distribute the code as

they see fit. Anthropologist Gabriella Coleman discusses the significance of the “Free speech/free

beer” dichotomy, which became popularised around the mid-1990s, within the Debian community.

When applying to become a Debian developer or maintainer, in addition to understanding the

technical details of OS development, potential members must understand the moral agenda of the

Debian project (known as the Debian Social Contract) and be able to explain the phrase, “Free as in

speech versus free as in beer” (Coleman 2012, 37).

Although similar notions of liberalism have always operated at the periphery of hacking

communities - usually taking the form of the hacker ethic - direct allusions to the political

philosophers of the Enlightenment, as well as related historical events such as the American and

French Revolutions, became a staple within examples of technologist rhetoric around the mid 1990s.

The Age of Enlightenment, as a historical reference, provided hackers with a point of comparison:

to technologists, the scientific and intellectual pursuits encapsulated by the Enlightenment resonated

with their own legal, political and social struggles. Like the Founding Fathers rebelling against an

unjust political regime, hackers cast themselves as the freedom-defending revolutionaries of the

digital age, convicted of fault in both the courts of public opinion and the law, yet morally correct.

In defence of technologist principles, the Electronic Frontier Foundation became actively

involved in a number of legal battles throughout the 1990s, becoming a respected authority within

the burgeoning area of cyber law and utilising both deliberative and forensic rhetoric to unify the

hacker community. Within the judicial system, several high profile cases were decided relating to

the Internet and civil liberties. One early case challenged the process by which state and federal

authorities executed search warrants and seized property from game developers. Another case

defended professor Daniel Bernstein's right to publish encryption software online, as well as an

academic paper describing his findings. Despite its victories in the legal realm, the non-profit was

Page 47: SMP textfile

47

increasingly concerned with attempts by the legislature to curtail digital civil liberties, particularly

with regard to online censorship and the accessibility of cryptographic tools. John Perry Barlow

continued to be a prolific writer and commenter, crafting numerous opinion pieces during this time

period. The most famous of these manifestos was his response to a piece of anti-obscenity

legislation, which asserted cyberspace's independence from all forms of governance.

Situated Ethos and Revolutionary Rhetoric in “A Declaration of the Independence of Cyberspace” The rhetorical strategies present in John Perry Barlow's “A Declaration of the Independence

of Cyberspace” rely on a strong appeal to ethos throughout. The text operates as a call to action,

with dramatic stylistic choices that are intentionally reminiscent of renowned manifestos and liberal

treatises. Written during a period of heightened tensions between Internet users and the United

States government, notions of time and place are tied to the text's persuasive claims. Additionally,

the author is particularly aware of both audience and exigence. Using his reputation as a defender of

civil liberties and an outspoken critic of technological regulation by governments - a commitment

known to the majority of technologists – Barlow deploys his situated ethos to compose an essay that

speaks not only to an existing contingent of radical veteran Internet users, but also to new actors

who have not yet been culturally and socially assimilated into the mythos of digital communities.

Written in 1996, the political motivation that inspired his confrontational address to the

“governments of the industrial world” is a piece of legislation what sought to restrict the ability of

users to communicate online. The Telecommunications Reform Act of 1996, which was signed into

law by President Bill Clinton on February 8, amended the Communications Act of 1934 and

defined the Internet as a broadcast entity, thereby allowing the government to regulate it. Free

speech advocates and civil liberties groups immediately objected to the legislation, specifically the

provisions outlined in Title V, “Obscenity and Violence,” which would criminalise profanity and

pornography online, subjecting the Internet to the same standards of decency as cable television.

Under the provision, many online communities, which were known for their profane, freewheeling

Page 48: SMP textfile

48

discussions about taboo subjects, would be censored by Internet Service Providers, acting as agents

of the U.S. government. Technologists, in particular, were concerned about the implications of the

law. Not only are hackers predisposed to support the liberal applications of free expression due to

their identification with the hacker ethic, but some were also notorious for their criminal dealings;

in other words, their opposition to the law was practical as well as philosophical.

Barlow published the essay on the Internet on February 9th, the day after the Act was signed,

accompanied by a statement that outlined his motivations for writing. In this preface, the author

addresses his readership saying, “If you find it useful, I hope you will pass it on as widely as

possible. You can leave my name off it if you like, because I don't care about the credit. I really

don't. But I do hope this cry will echo across Cyberspace, changing and growing and self-

replicating, until it becomes a great shout equal to the idiocy they have just inflicted upon us.”

One consequence of its expeditious publication is that the appeals to logos present in the essay are

connected to time and place; seizing upon the kairos of the moment, Barlow articulates both a legal

and societal rebuttal to the legislation in question. The essay itself quickly proliferated across the

Net; within three months, an estimated 5,000 websites had replicated the document, amounting to a

number of pageviews too great to be calculated.

Though it seems at first as if Barlow is surrendering his situated ethos through this statement

of purpose, the opposite is true. Despite his status as the document's author, Barlow's willing

surrender of this title – or, at least, his dismissal of trivialities such as “credit” and praise – elevate

his respectability within a substantial faction of his intended audience: programmers with an

elevated admiration for meritocracy. By subordinating his own interests in favour of principle,

Barlow gains a degree of social influence greater than he ever could while demanding recognition.

Moreover, by downplaying his own situated ethos – accepting the persona of an Internet everyman,

rather than the founder of an influential non-profit – the exigence of the piece becomes evident and

more palatable for the general public.

Barlow's persona, combined with his compelling rhetoric, may have contributed to the

Page 49: SMP textfile

49

essay's rise to prominence online. As a founding member of the Electronic Frontier Foundation,

Barlow was a well-known and respected advocate for freedom on the Internet. Moreover, his

previous encounters with the FBI and other law enforcement agencies earned him a degree of

esteem among overlapping factions of hacker subcultures. To reformers, Barlow was a Thomas

Jefferson-esque visionary: a well-educated and liberally minded Renaissance Man, with cultural ties

to numerous philosophical communities and demographics. Similarly, radicals, who were often

beneficiaries of legal support by the EFF, viewed him as a similarly minded and knowledgeable ally.

Beginning with the title of the piece, Barlow creates a tone of collectivity, subtly inviting all

readers to contribute to a dialogue that is already in progress, as well as acknowledging the

contributions of previous hacker manifestos. The article “A” - as opposed to “The Declaration of the

Independence of Cyberspace” - indicates the author's manifesto as only one of many. This stylistic

decision also serves to leave room for ambiguity, signalling to the audience that, if they are

unsatisfied with the trajectory of the text or its claims, they can replicate or revise it. In doing so, the

author expresses his knowledge of insider norms and asserts his membership in the technologist

community: in accordance with established online ethics, there can be no definitive authority on the

freedoms of the Internet, and all contributions, however outlandish, are typically regarded as valid.

Although Barlow's voice is magnified by his situational ethos, he explicitly states that he addresses

the audience with “no greater authority than that with which liberty itself always speaks,”

downplaying his own legitimacy and prioritizing the principle of free speech over himself.

Moreover, the title is a direct allusion to the enlightenment-era document, “Declaration of the

Rights of Man and of the Citizen” (1789), which informed the ideals of the French and American

Revolutions, as well as subsequent legal standards for human rights.

By invoking the broad constituencies implicit in the word “cyberspace,” the title indicates

the author's appeal to a more universal readership. The threats to free speech online do not solely

target and jeopardise the radical; by including all of cyberspace in his manifesto, Barlow is warning

all Internet users, even those who do not believe that their activity online is at odds with the

Page 50: SMP textfile

50

provisions of the Telecommunications Act. The title of the essay expands the audience beyond an

insular community of the technologically proficient to include an average, though politically-

minded, person.

Though the language of the essay can certainly be described as theatrical or “over-the-top,”

Barlow's rhetoric is markedly more subdued than the existing canon of anti-censorship rhetoric

online, such as the radical hacker manifestos written by Tim May and Jim Bell. This comparatively

“toned-down” style of reasoning tactically extends his message to a wider demographic. Barlow

does offer direct allusions to hacker writings – an oeuvre seldom known outside of tech

communities at the margins - but he applies them in an easily-understood and traditional context,

familiar to anyone versed in the Western philosophical tradition of Hobbes, Locke and Rousseau.

To solidify his identification with Enlightenment-era thinkers, Barlow lists some of them by name;

one sentence indicts the Telecommunications Act by stating that it, “repudiates... [the] Constitution

and insults the dreams of Jefferson, Washington, Mill, Madison, De Tocqueville, and Brandeis”

(1996). In solidarity with the political standards set in radical hacker writings, one short paragraph

states, “We are creating a world that all may enter without privilege or prejudice accorded by race,

economic power, military force, or station of birth.” This sentence is identical in meaning to a

sentence in “The Hacker's Manifesto,” written from prison by Loyd “The Mentor” Blankenship, a

member of the Legion of Doom, and widely circulated among hackers: “We exist without skin

colour, without nationality, without religious bias... and you call us criminals” (1986). Yet, this

sentiment is also the same notion expressed in the Declaration of Independence: that “all men are

created equal” and rebellion against tyranny is justified (US 1776).

The essay also resembles the textposts of another radical hacker group, the Cult of the Dead

Cow, which frequently published indignant condemnations of traditional government authority. For

example, one publication from 1987 takes an absolutist stance to sovereignty and individual

autonomy: “You must fight for your rights as a person. Not as an American, but as a person who

gives a shit about the environment you live in... You must let yourself become the spirit of

Page 51: SMP textfile

51

resistance. We want to create a world so free we can run wild” (“Psychotic Opposition” 1987).

Barlow is likewise calling for a type of political anarchy in his essay. He ultimately lobbies for a

line of complete separation between the governments of the world and the Internet, rejecting the

coercive power of the US government in particular through the line: “We must declare our virtual

selves immune to your sovereignty, even as we continue to consent to your rule over out bodies.”

Moreover, he again rejects the authority of traditional government powers, declaring that they are

“not welcome” among Internet users and referring to regulatory laws as “tyrannies.” It is worth

noting that Stallman's “GNU Manifesto” categorised proprietary software restrictions in similar

terms, defining them as “inhospitable” and “not free” (1983).

Though the hacker manifestos that Barlow alludes to are radical and transgressive, the

author invokes the political terminology and the widely accepted ideas of John Locke to create an

argument that is persuasive to all individuals who believe in the foundational paradigms of western

democracies. Barlow creates a loose enthymeme here: if readers espouse the principles defined by

the likes of liberal writers such as Locke, Mill and Jefferson – and they believe that these political

and social principles can be applied equally to the Internet – then no governments can claim the

authority to pass legislation about the Internet, as citizens of cyberspace have not consented to be

governed.

Finally, sentence-level decisions contribute to the overall tone of Barlow's manifesto, once

again relating to his appeals to ethos. The speaker begins by creating a clear “us versus them”

dichotomy, situating the tyrannical government in opposition to patriotic and ethical computer users.

After defining these powers, the government and Cyberspace, during the opening paragraph,

Barlow abandons these terms in favour of simplistic pronouns. He frames these views in terms of

negatives: “We did not invite you,” “Cyberspace does not lie within your borders,” and simply,

“You cannot.” These sentences are short and abrupt, punctuating the argument and contributing to

the combative tone, which continues throughout.

John Perry Barlow's essay was composed in the hours immediately following the enactment

Page 52: SMP textfile

52

of the Telecommunications Act. Despite this limited compositional timespan, he manages to craft a

convincing call to action using his reputation among multiple groups of online constituencies, as

well as his knowledge of the prevailing online ideology among his audience, which can be defined

as the “ethos of the rebel.” The persuasive elements of Barlow's essay are built upon the

assumptions of his audience – about the subject matter at hand, and the author himself. Through

allusion, Barlow equates contemporary liberal radicals - hackers and technologists - with the

Enlightenment thinkers of the past; by doing so, the logical appeals to political action become a

matter of patriotism, individualism and morality.

Attempts to formulate regulatory legislation comprised only half of the government's

strategy that, in association with corporations, would limit the technological functions of most

computers, as well as curtail the civil liberties of the machines' operators. In contrast to legislation,

a different branch of government made use of the judicial system, prosecuting those who wrote and

distributed questionably legal source code. Barlow's assumptions about his technologist audience

confirm that the virtue of free speech and unfettered communication was a value that most hackers

were inclined to defend; however, the foundational principle that all hackers – regardless of

ideological persuasion – valued most highly was their own uninterrupted freedom to write code.

This point of unity influenced the cypherpunks, whose de facto motto was “cypherpunks write code”

(Hughes 1993), in equal measure as the free and open source developers.

The political interests of all factions of hackers would converge around the issue of DVD

encryption - bringing together EFF lawyers, cryptographers, open source dev teams and computer

science professors – under the slogan, “Code is Speech.”

Code is Speech and the DeCSS Haiku

Published onto the Internet in October of 1999, the source code to a program called DeCSS

provided the kairotic moment for the “Code is Speech” movement; the defence of the open source

application offered yet another opportunity for technologists to – as Barlow prompted in his

Declaration - “throw some tea in the proverbial harbour” (1996). Posted to a mailing list called

Page 53: SMP textfile

53

LiViD – or Linux Video and DVD - the program was coded by three developers and capable of

unscrambling the security system used to encrypt most commercially produced DVD disks, thereby

allowing them to be played on a computer using a Linux operating system. Shortly after its public

release, a Norwegian teenager named Jon Lech Johansen was arrested and tried in Norwegian court,

though his collaborators were never discovered. Although Johansen remained in prison, the DeCSS

script continued to circulate around the Internet, passing between technologists hell-bent on

continuing the work started through LiViD. Hollywood – in particular, Universal Studios - argued

that the ability to break DVD encryption would allow the discs to be pirated; at the same time,

however, the open source community believed that the script was harmless, increasing the

functionality of their Linux computers by enabling the DVDs to be read, just like on a machine

running Windows. What's more: according to hackers, the act of repressing the code would result in

an unacceptable legal precedent, which distinguished technical information from other forms of

knowledge, subjecting it to heightened levels of judicial scrutiny. Although all charges against

Johansen were eventually dropped in 2004, internationally accessible websites which hosted the

DeCSS script – many of them situated inside the United States – faced legal prosecution for

facilitating the spread of information that allegedly violated the Digital Millennium Copyright Act

(DMCA)10 - including, notably, the hacker zine 2600. Emboldened by the perceived abuses of a

billion dollar industry, the stage was set for hackers to once again mobilise around a freedom of

speech issue.

As a form of civil disobedience, technologists and hackers began to devise elaborate and

creative modes of sharing the DeCSS code. As a result, on January 20, 2000, several individuals

were sued by Universal Studios in the Southern District of New York for “distributing computer

10 Approved in 1996 by Bill Clinton, the United States DMCA criminalises the production and dissemination of “technology, devices, or services” intended to circumvent, destroy or otherwise tamper with measures that control access to copyrighted works. In addition, the law increased the criminal penalties for committing copyright infringement on the Internet. Finally, some provisions of the law removed culpability from third party Internet Service Providers and onto their users.

Page 54: SMP textfile

54

code for reading encrypted DVDs” (Kaplan 2001). Emboldened by the court's opinion, Dr. David

Touretzky, a professor of computer science at Carnegie Mellon University, solicited and archived

artistic renditions of the illegal DeCSS source code. Touretzky's web-based “Gallery of CSS

Descramblers,” functioning as a virtual art exhibit, sought to explore the legal ambiguities of free

speech, particularly as it applied to source code. Specifically, he wondered about the dissemination

of illegal computer code; do the same restrictions apply to an artist singing the coded instructions as

the lyrics of a song, or a poet speaking the commands aloud? The Gallery web page description

reads in part:

“If code that can be directly compiled and executed may be suppressed under the DMCA, as Judge Kaplan asserts in his preliminary ruling, but a textual description of the same algorithm may not be suppressed, then where exactly should the line be drawn? This web site was created to explore this issue, and point out the absurdity of Judge Kaplan's position that source code can be legally differentiated from other forms of written expression” (2000). Contributions to the page include instances of programmers rewriting the code in different

programming languages, doing dramatic readings, creating a Star Wars-inspired text crawl and

reanimating Microsoft Office assistants, such as the famous talking paperclip, to explain the process

of decryption to listeners.11 Technologists were the primary contributors – and readers – of the page,

as creating the artistic alternate-DeCSS scripts required not only progressive political inclinations,

but also technical know-how.

The most famous contribution to Touretzky's gallery was known as the “DeCSS Haiku,”12

composed originally as an anonymous 465-stanza poetic epic, but later revealed to be authored by

open source programmer Seth Schoen.13 The thesis statement of the poem, which appears in haikus

11 A clothing vendor called CopyLeft printed the CSS Descramble source code on the back of a t-shirt and was subsequently “sued for their trouble,” prompting Dr. Touretzky to memorably retort, “If you can put it on a t-shirt, it's speech” (Schoen 2004). CopyLeft went on to manufacture a new design bearing the slogan, “I am a circumvention device” (Touretzky 2000), gesturing ironically at the often overlooked role of authorship in the development of any computer code. 12 The full title is derived from the poem's first stanza: “How to decrypt a / DVD: in haiku form. / (Thanks, Prof. D. S. T.)” 13 Despite his cogent merging of literary and poetic conventions, Schoen's background resided solely in the realm of the political and technical: he studied computer science at UC Berkley, then founded the anti-

Page 55: SMP textfile

55

96-98, mirrors Touretzky's description of the CSS Descrambler gallery. Addressing his audience,

the author states, “Reader, see how yet / technical communicants / deserve free speech rights; / see

how numbers, rules, patterns, / languages you don't / yourself speak yet, / still should in law be /

protected from suppression, / called valuable speech!” Simultaneously, however, the poem

functions to educate its readers about the technical process of recreating the DeCSS code, educating

them about both the political implications of the code's suppression, as well as its practical

application. Whole sections of the poem are lists of numbers and characters, creating a poetic

rendition of the banned source code; for example, in describing how to code the Xing Player, one

stanza reads in part: “Eighty-one; and then / one hundred three -- two times; then / two hundred

(less three); / two hundred twenty / four; and last (of course not least) / the humble zero” (Schoen

2001). Though most contributions to the Gallery are aspirationally driven by political motivations,

the informational component of the “DeCSS Haiku” reveal the author's intended audience: not only

technologists, who would nevertheless be entertained by his reference-laden poetry, but also

uninitiated audience, not yet versed in the political or technical facets of the decryption debate. The

aesthetic appeal of the haiku, then, is propelled by its underlying rhetorical complexities, seamlessly

channelled through a poetic medium.

Written in lines of 5 syllables, then 7, then 5, the rigid structure of the haiku lends itself

easily to the skill set of programmers, who were already adept at working within arcane boundaries.

Dating back to the early TX-0 hackers, who competed amongst themselves to reduce the length of

their programs, programmers are known for their affinity for condensing meaning and eliminating

redundancy – their shared distaste for bureaucracy is a related characteristic. The relationship

between computer science enthusiasts and haikus is one that has not been systematically

documented, but remains nevertheless observable, practiced by hackers for pseudo-ceremonial

institutional advocacy group Californians for Academic Freedom in opposition to the loyalty oath that the state made university employees swear. Finally, Schoen helped to develop LinuxCare, which provided 24-hour user support for new adopters of GNU/Linux operating systems. Taken together, these experiences reinforce the political priorities of open source developers, recalling the mistrust of authority implicit in the hacker ethic, as well as Stallman's “GNU Manifesto.”

Page 56: SMP textfile

56

purposes; for example, at the UC Berkeley Computer Science Undergraduate Association, new

students traditionally “write haiku poems about the chemical element zinc” (Schoen 2004).14 A

more recent phenomenon involved the creation of an automated script, which was then used to scan

for naturally occurring haikus in the WikiLeaks cable release, generating bureaucratic Found Poetry

such as, “Whether such tactics / will have a chilling effect / remains to be seen” and “King Hamad

flatly / stated that Bahrain is not / happy with Qatar” (Jardin 2010).15 More broadly, poetic eulogies

are equally common within hacker communities, serving as a form of epideictic rhetoric. A

humorous example comes from the poem by Vinton G. Cerf titled, “Requiem for the ARPANet,”

which first lauds the network for its role in connecting the speaker with like-minded individuals,

then traces its legacy from inception to extinction – all in iambic pentameter.16

References to Homeric epics abound throughout the haiku, including its didactic objective,

tangential mini-narratives about legendary figures, and invocation of the muse. In accordance with

the precedent set by ancient Greek epic poetry, the presence of the muse serves to elevate the

subject matter. Schoen indicates his topic repeatedly, referring to the DeCSS code euphemistically

as “controversial math”; he states, “Now help me Muse, for / I wish to tell a piece of / controversial

math” (Schoen 2001). In the same tradition of the ancients, Schoen seeks to historicise his topic,

tracing the progression of mathematics from Pythagoras to Einstein and describing the evolution of

mathematics from “shuffling... numbers” (2001, haiku 4) to computation. Connecting mathematics

to Greek literary motifs situates the legal battle between technologists and companies within the

existing canon of historic epics. The Greeks, moreover, serve as a loaded ethical symbol,

14 “This being geek humour,” the author continues, “it also expanded to include horrible puns.” One example, positioned at the intersection of philosophy, literature and weird science, reads, “Rene Descartes finds / his elemental self: I / zinc therefore I am” (Schoen 2004). 15 A similar script was deployed on a speech by Richard Stallman, generating a haiku about the economic harm caused by proprietary software: “One person gains one / dollar by destroying two / dollars' worth of wealth” (Linux Journal 2002). 16 A far less whimsical example serves as an actual eulogy: written by Tim Berners-Lee, the creator of the World Wide Web, it is a poem composed via tweets following the suicide of Aaron Swartz, a prominent open access advocate and hacker, in 2013.

Page 57: SMP textfile

57

positioning the contemporary situation within a lengthy artistic and scientific trajectory.

Mathematics, as a concept, is often thought of as diametrically opposed to art; yet, by creating

parallels between numbers and words, Schoen asserts that writing code is analogous with writing

poetry. The notion that code ought to be thought of as protected speech, moreover, follows logically

from this enthymeme.

Perhaps the poem's enduring legacy and popularity relate not solely to its union of artistic

and technological elements, nor its definitional obfuscation of concepts like free speech and

literature, but from its wide ranging implementations of the rhetorical forums. Deliberative, forensic

and epideictic rhetoric all play a role in the author's claims. Most immediately, the text functions as

an accusation of “the lawyers,” who are portrayed as rash and lawless – a deliberate role-reversal.

The author poses the rhetorical question to the readers, “Do they understand / the content, or is it

just / the effects they see?” (haiku 12), at once calling attention to the ineptitude on display, while

simultaneously elevating the wisdom of the technologically-savvy reader. In describing his

exigence for writing the poem, Schoen would later state, “I believe, and I said repeatedly in my

poem, that one of the reasons courts and others have countenanced the censorship of software is that

they do not understand it” (2004). The author goes on to declare the public guilty, too, accusing

them of “brand[ing] tinkerers as thieves!” (haiku 128) and ignoring the broad First Amendment

implications of criminalising certain computer programs. Elements of forensic rhetoric are also

manifested in the text's transparent attempts to exonerate programmers of wrongdoing – not in a

court of law, but in the court of public opinion.

Epideictic speech occurs through the author's praise of allegedly criminal programmers “for

advancing the / knowledge of their colleagues / or the public mind” (haiku 129). Throughout the

text, programming, as both a hobby and an occupation, is romanticised – elevated to a plane of

higher understanding, even – though the author's intentional parody of archaic references. Haikus

13-15 read in part: “And all mathematics / is full of stories... and CSS is / no exception to this rule. /

Sing, Muse, decryption / once secret, as all / knowledge, once unknown: know to / decrypt DVDs”

Page 58: SMP textfile

58

(2001). In these lines, knowledge of decryption corresponds once again to knowledge in its

traditionally understood context, as the author asserts that all knowledge has been limited by the

logistical obstacles of the past. These lines also call attention to the democratising effect of

knowledge revealed, glorifying the dissemination of secret information. Finally, Schoen

intentionally defines mathematics as “stories,” situating the technical within the same context as “all

knowledge”: the study of poetics, the humanities and the liberal arts (2001).

Perhaps most interesting are the aspects of deliberative rhetoric present in the haiku. Schoen

is concerned with the future, urging readers to defy the judicial decision of the New York court and

defend the “free speech rights” of programmers through civil disobedience, regardless of whether or

not members of the audience are programmers themselves. When Schoen reflected upon the legacy

of the DeCSS Haiku years later, he succinctly described the poem's function as an explicit call to

action:

“If, reader, however, you are at a loss for what political act to take; if you are no designer of network architectures, no writer of legal briefs or op-eds, no poet and unacknowledged legislator - then I have a suggestion for you. Learn to program, perhaps in the Python language, which was created specifically to be a first programming language for new programmers. Then teach one other person to be a programmer, too” (2004). This reconceptualisation of hacking purposefully politicises the activity, moving the stasis of the

word's definition from a connotation of criminality to one of noble rebellion. Additionally, the

author lists the occupation of “programmer” among that of “legislators” and “poets,” creating

symbolic similarity between the words, once again critiquing the societally understood connotations

of the word. Finally, by describing the process of reconstructing the DeCSS script as a step-by-step

process, including exact numerical values and functions, the author urges the audience to recreate

the banned code. Not only is the poem itself an act of civil disobedience, but it also serves as a

recursive call to future protests.

“'Normal' People Don't Know How to Program – Only Hackers Do That”

At its heart, the issue of DVD decryption was a controversy over the rights of institutions

versus the rights of individuals; the Wall Street Journal framed the matter as “a war over the control

Page 59: SMP textfile

59

of digital media” (Hamilton 2001). Like the “proprietary restrictions” of Stallman's day,

commercial creators, determined to capitalise on the monetary value of their works, occupied one

side of the DeCSS debate. This opinion was threatened by technologists, who could use their

knowledge of cryptography to subvert the very business model upon which these enterprises relied.

Comparatively, the technologists were outraged that Hollywood would harness their own inventive

systems in pursuit of ideologically unacceptable ends, imposing hard limits on the application of

systems typically defined by their free accessibility. Throughout the early and mid 1990s, as their

radical manifestos illustrate, the cypherpunks were confident that encryption would usher in a new

era of respect for individual rights; however, Hollywood's use of these systems in the service of

profit and suppression called their assumptions into question.

At the same time, governments and the media also sought to cast hacking and hackers in a

negative light, framing the issue of digital regulation as a matter of national security. In a Senate

judicial hearing in 1997, FBI Director Louis French testified about the increasing prominence of

online criminal activity and urged Congress to place a regulatory embargo on cryptographic utilities.

He stated: “Law enforcement is in unanimous agreement that the widespread use of robust non-key

recovery encryption ultimately will devastate our ability to fight crime and prevent terrorism.

Uncrackable encryption will allow drug lords, spies, terrorists and even violent gangs to

communicate about their crimes and their conspiracies with impunity. We will lose one of the few

remaining vulnerabilities of the worst criminals and terrorists upon which law enforcement depends

to successfully investigate and often prevent the worst crimes” (Encryption 1997). The efforts by

the judiciary and legislature served as a means of deterrence; it is common among technologists to

declare that federal prosecution is “making an example” out of a particular individual through harsh

charges and lengthy prison sentences. However, just as troubling to the hacker community was the

increasingly prevalent negative image of programming – namely, the notion that hacking is a

fundamentally illicit activity and, by that logic, all hackers are criminals. Seth Schoen's description

of his haiku references this sentiment: “The larger culture today assumes - and many people rely on

Page 60: SMP textfile

60

the assumption - that 'normal' people don't know how to program, that only hackers do that. In

many ways, programming is a socially marginal activity, viewed with considerable suspicion”

(Schoen 2004).

Hackers sought to address these misconceptions by adopting the rhetorical conventions and

claims of Enlightenment figures. Rather than eschewing or denying the purported corporate,

governmental or media image of hacking, technologists in both the reformist and radical camps

adopted the image with enthusiasm, using allusions to past historical examples or philosophical

doctrines to recontextualise the very notion of freedom and point out the term's origins in resistance.

As such, examples of technologist writings employ deliberative rhetoric, encouraging readers to

participate in symbolic acts of civil disobedience and rebellion. In doing so, hackers disregarded the

whims of corporations, eluded the regulation of government institutions and defied the expectations

of the public.

Page 61: SMP textfile

61

Section 3: Identity

“It doesn't take a lot of people to change anything. It only takes one good programmer.” - Oxblood Ruffin, 2004

The rhetorical claims surrounding hacker culture are typically framed in binaries. Within the

hacker community, among both insiders and outsiders, these reactionary debates often encompass

paradoxical ideals. Fluid organisational topics - such as national security and civil liberties, privacy

and openness, patriots and traitors - coexist within the same frame of discourse, uniting or

subdividing demographics, then prompting a passionate dialectic, like an online reimagination of

Burke's Parlour metaphor. Another binary can be added to that list of binaries: the dual ethos of

collectivism versus individualism, which came to encompass the ever evolving politicised hacking

scene from the early 2000s to the present.

The term 'hacktivism' – a portmanteau of 'hack' and 'activism' – was coined as a joke in 1996

by a member of the Cult of the Dead Cow (CoD); since that point, its practical application has

covered a wide range of acts, including defacing webpages, redirecting URLs, stealing information,

spreading intentionally misleading information, obstructing access to websites through denial of

service attacks, developing anti-censorship technologies and issuing anonymous speech. Not all

hacktivist tactics are illegal; however, the most high-profile activities frequently skirt the law,

proving that criminality is conducive to garnering media attention and generating public spectacle.

While technologists are prone to debate over the ethics of hacktivist tactics, the symbolic appeal of

collective actions remain deeply embedded into rhetorical ethos of many online communities, with

many subgroups creating elaborate in-jokes, shared value systems, manifestos, narratives - even

alternate linguistic systems and vocabularies.

In the contemporary era, parsing hacker attitudes about various topics is difficult,

particularly in light of the ferocious and public technologist disagreements over hacktivist actions.

Within insular hacker communities, opinions are fluid, making generalisations impossible. The

Page 62: SMP textfile

62

relationship between collective action and radical individualism is no exception, as epitomised in

the above quote by pseudonymous CoD member and self-described “chief evangelist for

hacktivism,” Oxblood Ruffin. The notion that “one programmer” has the power create change is

seemingly at odds with technologists' enduring affinity for collectivism, a trend that is identifiable

throughout the history of technologist lore, dating back to early iterations of open source principles,

which universally promoted an ethos of cooperation. Oxblood Ruffin's declaration, delivered during

a lecture on hacktivism to Yale Law School, gestures at the appeal of decisive and swift actions, as

opposed to the plodding, gradual nature of coalition building or grassroots activism required of

collective action. Compromise, which is traditionally viewed as the practical remedy to all manner

of technologist ills – from proprietary software to impossible encryption schemes to repressive

legislation - plays no discernible role in Ruffin's pronouncement, despite its historical centrality. If

Ruffin's claim is to be believed, the number of actors lobbying for change – a number that

continued to increase as ever more agents entered the scene of the Internet – becomes irrelevant. On

its surface, the statement is not only in conflict with idealised technologist visions of political and

social change, but also with most modern notions of protest politics.

Ruffin's quote serves as an endorsement of pragmatism, affirming individualistic hacktivism

and broadly elevating technologist tactics over those of traditional activists. The value of “hacking

for freedom,” derives from its utility as an outlet for autonomous political expression. Ruffin

suggests that all activist-hackers – whether they work alone or collaborate - are well positioned to

enact change, purely because their tactics are, by nature, diverse and direct. Street demonstrations or

boycotts can only subsist with the unified participation of thousands; yet, online, only one person is

required to devise an inventive program or steal incriminating documents,17 ensuring the continued

propagation of the message.

Technologist writings have consistently merged individualistic and collective rhetorical

appeals. Indeed, there is power in acting alone, though it does not always preclude technologists 17 Or spoof a mob to manufacture the unified participation of thousands.

Page 63: SMP textfile

63

from collaborating with others. Throughout the history of hacking, notions of collectivism and

individuality have always coexisted: although Stallman's “GNU Manifesto” creates unity within the

ranks of developers by using collective voice, he simultaneously vests authority in individuals,

stating, “a user who needs changes in the system will always be free to make them himself” (1983).

Technologist authors frequently call attention to the large and ideologically decentralised

community of hackers, as if to suggest that they are a force to be reckoned with. For example,

though there is a single speaker in “A Declaration of the Independence of Cyberspace,” Barlow

broadens the application of the word “hacker” to include all “citizens of cyberspace.” Throughout

the text, these united Internet users take on the form of a fearsome digital mob – resembling

Hobbes' great leviathan in both size and temperament – threatening global systems of government

by saying, “You are not welcome among us. You have no sovereignty where we gather... You have

no moral right to rule us nor do you possess any methods of enforcement we have true reason to

fear” (1996).

Appeals to collectivism certainly appear throughout the previous examples of written

manifestos. However, hacker “texts” are not solely understood as works that are comprised of

words and sentences. On the contrary, some of the most convincing technologist appeals to

collective action occur in the development and infrastructure of networked utilities, such as privacy-

conscious email providers and an application that, according to many hacktivists, simulates a

“virtual sit-in” (Encyclopaedia Britannica). If “code is speech,” then it is no surprise that the very

infrastructure of technologist projects function through an adherence to the ideals of collectivism

and group unity.

The #OpPayback Case Study: A “Rhetorical” Analysis of Decentralised Architectures

Developed with collective action at the centre of their very design, open source hacktivist

tools are typically developed using collectivist appeals as both the organisational principle and the

motivational goal of their creation. By “reading” these appeals, it is possible to discern the political

motives of hacktivist users. For example, when developing software - beginning even in the earliest

Page 64: SMP textfile

64

developmental stages - hacktivist programmers consistently make use of Stallman's GNU General

Public License, a legal framework developed to establish a more flexible approach to free software

licensing. Throughout the development process, numerous programmers contribute to the source

code, as is typical in GNU/Linux communities. Finally, in implementation, hacktivist software

utilities tend to rely on users' active participation - not solely through testing and feedback, but also

to ensure that the application fulfils its most basic practical functions. The creation of successful

open source software is not exclusively dependent upon the dedicated work of a development team,

but also upon the collective participation of an engaged user base.

A distributed denial of service (DDoS) attack18 is one hacktivist protest tactic; its

widespread utilisation is likely a consequence of its simple technical mechanics and accessible

implementation. Deployed by hacktivists to obstruct access to web pages, proponents of the tactic

claim that the results of the attack are comparable to a virtual sit-in, because no permanent damage

is caused to targeted websites. A basic DDoS attack can be staged when hundreds of participants

attempt to access the same website at the same time, preventing legitimate users from having their

requests serviced. The most famous example of a successful DDoS attack occurred in late 2010, a

situation explicated in detail below.

Several hacktivists – for the purposes of this example, our rhetors – subsequently devised a

system to automate user interaction during a DDoS attack, channelling the power of all available

participants and deploying them en masse. Their design was able to more easily facilitate the

organisation of a DDoS action, as well as prolong the attack's effectiveness. Calling their creation

the Low Orbit Ion Canon (LOIC) – a homage to a video game weapon – the programmers created

18 Net infrastructure dictates that every website can only support a limited number of users; the exact number fluctuates based on a number of variables such as allocated server bandwidth. Simply put, a distributed denial of service occurs when a server receives too many requests and, as a result, crashes. To borrow an analogy from anthropologist Gabriella Coleman, a DDoS attack is like hundreds of people trying to fit through the same door at the same time. Although participating in a DDoS attack requires no technical skill and the tactic is not a “hack,” it is considered to be a serious cybercrime and punishable by up to ten years in prison (Espiner 2006).

Page 65: SMP textfile

65

an ideal tool for direct and collective action campaigns: on their own, participants' attempts to

disrupt websites were futile; however, when hundreds of individuals used the LOIC at the same

time, the results could be staggering. To create the application, the programmers first appropriated

an open source network testing tool by Praetox Technologies, originally designed “to allow

developers to stress test their servers and applications to see how well they will perform under

heavy load” (Nardi 2012). After adding several new features, discussed at length below, the

hacktivists re-released the application to serve a completely different purpose, making their creation

available for download on Windows, Apple, Android and Linux operating systems. The

development of the LOIC demonstrates the practical utility of Stallman's “freedom to modify”

clause, as its developers repurposed an existing piece of code, tailoring its operations to fit their

unique situation and requirements.

The LOIC revolutionised distributed denial of service attacks. The most successful

campaign was launched against the webpages of Visa, MasterCard, PayPal and Amazon by a

loosely aligned and ephemeral network of trolls,19 tech enthusiasts and hacktivists known as

Anonymous. The online payment companies attracted Anonymous' ire when they froze donations to

WikiLeaks at the behest of the U.S. government, shortly after the whistleblowing website published

a trove of secret diplomatic cables. Using the modified LOIC program, roughly 8,000 individuals

downloaded the application, congregated in a IRC20 channel called #OperationPayback and

successfully obstructed access to the sites. The campaign began on December 8, 2010 and

19 In Internet slang, a troll is a person who deliberately causes controversy by posting disruptive, inflammatory or provocative messages online. Although the word has become synonymous with cyberbullying in recent years, pranks perpetrated by trolls occupy a spectrum ranging between the humorously lighthearted to outright malicious. One famous troll, Andrew 'weev' Auernheimer, categorised trolling activities by ironically elevating the practice, saying, “Trolling is a method, a style of rhetoric and action. It can be used for constructive or destructive purposes. Some of the greatest champions of Western philosophy have implemented the troll method” (Encyclopedia Dramatica). 20 IRC stands for Internet Relay Chat, an electronic messaging platform. Users, or clients, connect to discussion forums called channels, which are subdivided by topic. Considered by many to be an obsolete system, Anonymous participants tend to prefer IRC as a means of communication.

Page 66: SMP textfile

66

continued for two days; the DDoS attack against PayPal was the most effective, delaying loading

times and paralysing the service's ability to transfer funds on behalf of their clients. The DDoS was

widely regarded by participants as a success, due to the loss of revenue to the services and the

ensuing media coverage of their activities. Deploying his now-familiar style of patriotic rhetoric,

John Perry Barlow commented on the event in an interview with the New York Times, referring to

the DDoS as, “Kind of the shot heard round the world... This is Lexington” (Cohen 2010).

In the past, political issues related to technology were steeped in jargon or concealed from

view on arcane computing systems. As a result, the heated online debates over encryption,

proprietary software and online censorship were overly obscure and inaccessible to otherwise

politically-conscious citizens. Because the majority of the population did not understand the finer

technical details of, say, telecommunication systems, a sense of urgency and importance was lost to

them, despite the fact that the outcomes of these legal or judicial battles effected their daily lives –

and despite attempts by technologists to harness suitable rhetorical forums to advance their

perspectives. The 8,000 people gathered on IRC, however, largely identified themselves as ordinary

people, not tech-savvy hacktivists. For example, one OpPayback participant, referred to as <m> in

archived chat logs, defended his involvement in the DDoS protest by saying, “There's nothing

wrong with technological protest. Other then we struggle to organize... Hardly any of us are proper

hackers” (Coleman 2014, 132). His statement, while acknowledging the logistical and technological

deficiencies of the assembled masses, asserts the legitimacy of DDoS as a conventional protest

tactic.

The LOIC program facilitated this high level of participation and engagement among non-

hacker demographics, providing some technological solutions to the obstacles <m> describes. The

ease of access to the application, combined with its non-technical instructional materials, epitomise

Michel de Certeau's notion of “Everyday acts of resistance,” defined as an opportunistic protest

tactic used to improvise organisation and facilitate improvised support structures (Coleman 2014,

127). Because DDoS attacks are only possible through the participation of a large number of

Page 67: SMP textfile

67

individuals, it was necessary that the LOIC tool be 'user friendly' enough for casual Internet

enthusiasts to use – not just the code-writing hackers, who had spent years learning programming,

attending hobbyist meetings and contributing to mailing list discussions. In describing the

simplicity of the tool, researcher Gabriella Coleman says that the application “allows users to

individually contribute to a DDoS campaign from the comfort of their own home by simply

entering the target address and clicking the temptingly giant button marked 'IMMA CHARGIN

MAH LAZER'” (2014, 101-2). To cease the attack and disconnect from the DDoSing leviathan, a

user can click a button clearly marked “Stop.” The program also calculates the amount of time it has

been running, and alerts users of potential problems through humorous error messages.

Not only did these improvements and features increase the clarity of the application's use for

the benefit of unknowledgeable audiences, but they also instilled a sense of superficial

professionalism into the protest. With its myriad customisable options and features, the LOIC

resembles pushbutton applications with whole teams of paid developers, rather than a piece of

unsupported freeware; this appearance disguised that fact that the LOIC was, contrary to the claims

of its developers, not a secure, low-risk utility. It would soon be revealed that the identities of LOIC

users could be easily obtained by law enforcement personnel, exposing them to prosecution and up

to 10 years in prison; 14 Operation Payback participants would later be formally charged.

Throughout the campaign, this dangerous reality went unaddressed by most Anonymous

participants, including the de facto organisers of the action. What's more, the basic mechanics – and

vulnerabilities - of the LOIC went unnoticed even by technology journalists covering the event.

Somewhat famously, the tech site Gizmodo published an article on December 8th claiming that

using the application involves “little risk to the user.” The reporter goes on to assert: “Because a

DDoS knocks everything offline – at least when it works as intended – the log files that would

normally record each incoming connection typically just don't work” (Johnson 2010). Casual

Internet users – those who could not review the source code of the open source LOIC program –

had no available means of discerning the tool's capabilities besides blind trust. It would have been

Page 68: SMP textfile

68

easy for the original developers to create a program without a fluent user interface system; however,

by using professional-looking designs and graphics, the developers promote an allusion of

legitimacy and confidence.

The LOIC further appeals to non-hackers through the use of motifs and phraseology known

as Internet memes,21 or pieces of micro-media that quickly replicate via social interactions across

cyberspace. These instances of silly or off-colour allusion attempt to recruit trolls and technology

enthusiasts – individuals who knew little about programming, but who still spent lots time on the

Internet, becoming a different brand of computer hobbyist: one more interested in the social

elements of cyberspace. To recruit these casual technologists and invent a collective ethos, subtle

details in the LOIC architecture are designed to appeal to the social norms embedded in Internet

culture. For example, “Imma chargin mah lazer” seems like gibberish to technology outsiders;

however, the slogan is derived from a well-known video circulated among trolls and tech

enthusiasts. The LOIC error messages, too, make use of similarly humorous and obscure slang,

such as the phrase, “U dun goofed,” an allusion to a Youtube video wherein a victim of trolling

attempts to confront her harassers. Among casual technologists, who shared many of the ideological

imperatives outlined in the hacker ethic, details as subtle as a shout-out or in-joke were an effective

means of inciting them to action, particularly because the matter at hand related to information

freedom.

Despite their similar adherence to principles outlined in the hacker ethic, Anonymous

participants were a radically different brand of technologist actor than earlier iterations of

technologist subcultures. Many Operation Payback participants were sympathetic toward the

21 To outsiders and the uninitiated, memes often sound like bits of unintelligible nonsense. In 2010, for example, several researchers from MIT conducted a content analysis of 4chan and its random board, /b/ – a notorious website sometimes called the “meme factory” of the Internet. In describing the content of /b/, the researchers compare their role to that of a “translator,” adding, “The extreme nature of community practices on /b/ can obscure the underlying role these behaviours play to the casual observer” (Bernstein et al. 2010, 7).

Page 69: SMP textfile

69

political claims of previous technologist groups - and at least tangentially aware of their legacies;22

however, these new actors were by no means assimilated easily into their ranks. In the aftermath of

the Payback DDoS, Oxblood Ruffin criticised the group's tactics and impulsivity, accusing them of

the very crime they were protesting: censorship. He describes the demonstration's participants as

hypocritical and impulsive, saying:

“Anonymous is fighting for free speech on the Internet, but it's hard to support that when you're DoSing and not allowing people to talk. How is that consistent? They remind me of awkward teenagers. I think they're trying to do the right thing, but they're stumbling around and doing some really stupid shit” (Mills 2012). This statement is most notable for its logical framing of an anti-DDoS argument, which Ruffin

would staunchly support for decades. Operation Payback united participants who self-identified as

“information freedom” activists – one promotional Payback manifesto exuberantly declares, “Julian

Assange deifies everything we hold dear. He despises and fights censorship constantly”

(Anonymous 2010). Yet, Ruffin points out the hypocrisy implicit in that claim by deploying a long-

standing definitional argument in opposition to DDoSing: censorship means robbing a person or

organisation of open channels for communication, and DDoS attacks do just that. By blocking

access to websites, DDoS participants are using the master's tools to dismantle the master's house, a

comparison borrowed from radical feminist scholarship. Obstructing any individual's right to speak

freely remains ideologically and ethically repellent to many hackers – even among those who have

no issue with breaking the law (Coleman 2014, 137). The logic of Ruffin's comments – and his glib

description of the DDoS event as “some really dumb shit” - was further legitimised when it became

clear that Payback participants could face jail time as a consequence of their involvement.

Ruffin's comments, moreover, were amplified by the speaker's situated ethos; as the self-

described “chief evangelist for hacktivism,” his accusation of hypocrisy quickly generated

discussion among Operation Payback participants, prompting debates and extended moral scrutiny

22 After all, Operation Payback was a campaign in support of WikiLeaks; Julian Assange, the founder of that site, was known for his previous exploits as a criminal hacker and member of the Cypherpunk Mailing List.

Page 70: SMP textfile

70

on IRC. Some members of Anonymous acquiesced to Ruffin's logic: one member of the initial

protest retroactively commented, “Trying to find a sure-fire ethical defence for Anonymous

DDoSing is going to twist you into moral pretzels” (Coleman 2014, 137). Others, after examining

the costs and benefits of the act, defended the tactic despite its ethical dubiousness: “I have had

several discussions about DDoS with people who, similar to myself, are not overly fond of it, but

we keep coming back to it, as it is effective; the media does drive a lot of this activity” (Coleman

2014, 137).

Technologists' inability to rectify their disagreements in opinion form yet another example

of collectivism. Pluralistic ideological workings are apparent throughout examples hacktivist

rhetoric and, more broadly, their relationship to earlier manifestos. The impossibility of consensus

was easily recognisable as early as Anonymous' first traditional demonstration in opposition to

censorship by the Church of Scientology. One observer, a journalist for the Baltimore Sun,

commented on this characteristic absence of unity, turning to poetic language as a means of

definition. He uses a comparison, stating:

“[Anonymous is] the first Internet-based superconsciousness. Anonymous is a group, in the sense that a flock of birds is a group. How do you know they're a group? Because they're travelling in the same direction. At any given moment, more birds could join, leave, peel off in another direction entirely” (Landers 2008). This sentiment, an endorsement of plurality, is likewise reflected in the words of many participants:

“Anonymous is not unanimous.” Although their joint label simulates unity, the collective is

comprised of numerous independent projects, channels or centres of activity, a phenomenon that

Gabriella Coleman compares to the mythic hydra. “Members” of Anonymous – a turn of phrase that

fails to capture the fluidity implicit in participation – feud amongst themselves, drift between

operations, disappear from IRC channels or, in a few notable instances, assist law enforcement

agencies in arresting fellow “Anons.”

To understand the collectivist language and organisation of Anonymous during the 2010

DDoS, it is crucial to interpret the collective's birthplace on the notorious website 4chan.org, known

Page 71: SMP textfile

71

for its grotesque imagery, shocking humour and borderline-illegal content. Urban Dictionary

attempted to capture the website's ethos by calling it, “An image board in which jaded and cynical

Internet users compete to see who can be the biggest asshole” (2008). Similarly, one academic

observer described the site's random board, /b/ – its most heavily trafficked and virtually

uncensored page – in more eloquent terms, calling it, “the single most broadly offensive artefact in

the history of human media” (Schulz 2010). The production of a single text is credited with

inspiring the political manifestation of Anonymous, encouraging the Internet's hivemind to leave

cyberspace; in it, the then-decentralised and apolitical members of the group are urged to adopt a

serious cause: “taking down” the Church of Scientology.

Imageboard Politics and the Origin of Anonymous Created in 2005 by a high school student, the broadly applied and widely enforced social

norms on 4chan dictate that users post anonymously when interacting with other online participants.

Instead of a chosen handle, the name “Anonymous” is used by default. Users invented a complex

mythology surrounding the Anonymous signifier, joking about the existence of a single person

named Anonymous – the collective embodiment of 4chan's ethos - who is responsible for every post

on the site; this figure is typically stylised as a featureless, suited man. For 4chan's participants, the

conventional appeal of anonymity serves dual purposes, one practical and the other symbolic. First,

because unsavoury material typically circulates on 4chan, users rely on anonymity to protect their

real life identities. Second, anonymity is viewed as a tool to ensure that posts are judged by their

content, rather than the reputation or status of their author – in democratic terms, a “great equalizer.”

Anonymity is the only enforced “rule” on /b/, where standards of decency are anathema. Nothing is

considered too vulgar or off-topic, with participants frequently excusing racism, sexism and

cyberbullying by declaring “I did it for the lulz,” or, “I did it for the laughs.”

In addition to the collective identity of 4chan's participants – their shared adherence to

values of free information, free speech, and anarchy - the very infrastructure of the website

reinforces a culture of radically open communication. Discussions are unarchived, and the only way

Page 72: SMP textfile

72

to ensure that a conversation remains online is for comments to be posted at a continuous rate,

“bumping” the thread up to the front page. Because the average length of a thread on /b/ is three

minutes (Bernstein et al. 2010), the use of shocking language and imagery is a culturally reinforced

norm, as these references are an effective means of generating attention. Scholars frequently

reference the ephemeral nature of discussions on 4chan as one of the primary reasons for its

popularity among trolls and free speech enthusiasts:

“One of the important things about 4chan is to have a thread that really explodes and lasts for a really long time. Because, if it doesn't, it disappears – it's a site that's unarchived. So it creates conditions for anything that grabs attention... and humour and grotesqueness are very good for that” (Knappenberger 2012). The exigence for Anonymous' first overtly political action – which catapulted the nebulous

collective from the darkest corners of the Internet into the public's view - was a leaked Church of

Scientology propaganda video, which was uploaded onto the Net, then censored by the Church.

Designed for internal use and featuring an interview with actor Tom Cruise, the video found its way

onto the video hosting site, Youtube, and was summarily picked up by online news media sites in

January of 2008. Famous for attacking critics via litigation and harassment, the Church of

Scientology was able to remove the original video from Youtube – presumably at the behest of a

copyright notice. However, the online magazine Gawker was undeterred, refusing to take down the

republished video hosted on their site; under the headline “The Cruise Indoctrination Video

Scientology Tried to Suppress,” the article boldly concludes, “It's newsworthy; and we will not be

removing it” (Denton 2008). Shortly thereafter, lawyers from Scientology's Religious Technology

Center – the department in charge of intellectual property – served the magazine a DMCA

takedown notice, the same legal standard invoked by Universal Studios to prevent the spread of the

DeCSS code in 2001.

Adopting the ethos of the technologists, 4chan's trolls mobilised under the banner of “free

information,” posting numerous outraged calls-to-arms on /b/, decrying the Church's abuses and

defending Gawker's right to publish the leaked footage. The content of the video itself likely drew

Page 73: SMP textfile

73

the attention of 4chan and Anonymous, as trolls were eager to ridicule Cruise's strange behaviour.

In the video, he speaks erratically, oscillating between seriousness and mania, fanatically praising L.

Ron Hubbard, the founder of Scientology, and the Church's pseudo-scientific practices. If the

potential for cheap laughs wasn't enough, there was also the controversial nature of the subject

matter to capture the attention of the trolls: provoking the Church would undoubtedly elicit a

response, which typically provides the motivating force for trolling. As one Anon explained,

“Streisand was in full effect”23 (Coleman 2014, 55); in other words, because the Church was known

to ruthlessly hound their enemies, some Anons speculated that antagonizing Scientology would not

only generate hilarity and spectacle, but it could also produce a positive outcome: raising awareness

about the human rights abuses and secrecy of the Church. In a thread on 4chan, one anonymous

user urged his fellow trolls to “use [their] resources to do something that is right,” describing

Scientology as “an organisation that makes absolutely no fucking sense.”24

Once again, Anonymous was not unanimous. The online debate proved lengthy and

antagonistic, perhaps as a consequence of the vague original post, which serves as an example of

failed deliberative rhetoric. Some commentators were sceptical about Anonymous' chances for

success, sarcastically invoking the Cruise blockbuster and calling the hypothetical action “Mission

Impossible”; however, it was not long before other 4chan threads and IRC channels devoted to anti-

Scientology activism began to propagate. Although the initial idea took a few days – and several

threads - to gain traction, the online “raid,” which became known as Project Chanology, soon found

a dedicated audience through early successes, as well as the employment of varied and inventive

23 The Streisand Effect is a well-known Internet phenomenon wherein, by trying to censor a piece of information, an author's attempts prompt the inverse outcome: the troublesome information spreads more rapidly, as more people try to access it to understand the motivation for the censorship. The situation is named after Barbara Streisand's 2003 effort to stop photographs of her Malibu home from being published. 24 The fact that Anonymous could, to outsiders, likewise be defined as “an organisation that makes absolutely no fucking sense” was an irony not lost on some Anons. Mike Vitale, a Project Chanology participant, commented on the protest retrospectively, saying, “People who knew what Anonymous was to begin with, they were, like, 'Oh my god, Anonymous is going to go to war with Scientology? This should be really interesting.' Especially because it's two weird ass groups. I mean, you know, I've been an Anon for a long fucking time, I know Anonymous is really strange” (Knappenberger 2012).

Page 74: SMP textfile

74

tactics. In describing the structure of the operation, one core participant referenced both the

collective fitness of Anon, as well as the personal satisfaction implicit in individualistic actions:

“The unified bulk of Anonymous collaborated through massive chat rooms to engage in various forms of ultracoordinated motherfuckery. For very short periods of time between January 15th and the 23rd, Scientology websites were hacked and DDoSed to remove them from the Internet. The Dianetics telephone hotline was completely bombarded with prank calls. All-black pieces of paper were faxed to every fax number we could get our hands on. And the 'secrets' of their religion were lasted all over the Internet. I also personally scanned my bare ass and faxed it to them. Because fuck them” (Coleman 2014, 58). Participants' enthusiasm spread memetically, fortified by instances of triumph; the symbolic effect

of removing the Scientology website swayed sceptics, reversing the initial power structure: now,

Scientology was being censored.

Despite Anonymous' successful online actions, a small but vocal minority began to

ironically suggest organising “IRL” street protests, proposing something unheard of: a political

demonstration, which required Anonymous to leave the confines of cyberspace. Eight devoted

participants gathered in a chatroom and began to collaboratively draft a video manifesto titled “A

Message to Scientology,” which was uploaded to Youtube on January 21. The message, which

deliberately parodies Anon's perception of the Church's own propaganda; is both ironic and earnest,

comical but menacing. Threatening clouds gather over industrial skylines, while a robotic voice

recites an ominous message, first listing Scientology's numerous crimes, then concluding

dramatically: “Anonymous has therefore decided that your organisation should be destroyed – for

the good of our followers, for the good of mankind, and for the laughs – we shall expel you from

the Internet and systematically dismantle the Church of Scientology in its present form”

(Church0fScientology 2008). The final sentences of the message inaugurated the group's now

famous tagline – which was used during Operation Payback and all subsequent actions: “We are

Anonymous. We are Legion. We do not forgive. We do not forget. Expect us” (2008). The video

was well received by existing Chanology participants; however, many Anons could not tell if the

suggestion to protest was legitimate or not.

Although the Message contains direct and uncompromising language, threatening the

Page 75: SMP textfile

75

Church with destruction, its success as a piece of deliberative rhetoric depends upon its ambiguities.

Rather than outlining a direct plan of action, the authors of the manifesto obscure their specific

intentions to reinforce a hostile tone. For example, there is no mention of the authors' desire to

incite Anonymous to organise street protests. Rather, they vaguely state the intended outcome of

Anonymous' operation and the relentless dedication of the hivemind to continue its assault unabated:

“We acknowledge you as a serious opponent, and we are prepared for a long, long campaign”

(2008). The most memorable line of the message is its final sentence - “Expect us” - which

simultaneously threatens the Church, and also reassures participants of the campaign's legitimacy.

By expressing these statements in a formalised fashion, satirising the very propaganda that the

Church regularly produced, the authors seek to unite the collective interests of their audience,

moving the stasis from qualitative to translative.

Collective voice is another feature of the Message, used not only to signal the text's multiple

authors, but also to create solidarity between passive audience members and the broader network of

Anonymous. Punctuated by short, disjointed declarations, such as “We cannot die,” “We are forever”

and “We're getting bigger every day,” the authors reaffirm their threatening tone. Collective voice

also becomes a symbolic trope: using an allusion that directly references the Christian bible, the

authors address the Church, “If you want another name for your opponent, then call us Legion, for

we are many” (2008). The identifications inspired by the word 'Legion' first call to mind the

pluralistic madness – or demonic possession – of a man with an “impure spirit” who, when asked

his name by Jesus, replies, “My name is Legion, for we are many.” At the same time, however, the

word also inspires militaristic identifications, and is featured as collectivist characters in numerous

science fiction texts and video games storylines.

Finally, the text draws parallels between the Church of Scientology and the collective

speakers themselves. The authors state: “Our methods are a parallel to your own,” indicating the

similarities between both groups. The text casts its subject as a larger-then-life nemesis, addressing

its leaders directly and supplying a list of the Church's evils: “Your campaigns of misinformation;

Page 76: SMP textfile

76

suppression of dissent; your litigious nature.” However, rather than confronting the Church's

practices with morality and virtue – as Stallman does in his opposition of proprietary software –

Anonymous gleefully adopts the characteristics of a villain, one that not only utilises the same

tactics as the Church, but also surpasses their efficiencies in terms of ruthlessness and competency.

Finally, the speakers adopt internally-used Scientology acronyms to mock these terms' use and

subvert their legitimacy. By inverting the connotations of these phrases – such as the term

“Suppressive Person,” which is used by Scientologists to identify and attack its so-called enemies –

Anonymous participants reclaim them. The Message declares, “Yes, we are SPs” - uniting their

own supporters against the Church by making use of its own phraseology.

“I came for the lulz – but stayed for the outrage” Prior to January of 2008, most Anons were content to remain apolitical trolls; yet, the IRL

protests that materialised in early February attracted tens of hundreds of protesters, surpassing the

expectations of onlookers and participants alike, as well as attracting the interest of the international

news media. At Scientology locations in major cities around the world, Anons – many wearing the

Guy Fawkes mask popularised by the movie V For Vendetta, another collectivist pop culture

symbol - gathered to chant slogans and shout obscenities. Gregg Housh, one of the protest

organisers and authors of the “Message to Scientology” video, compared the rapid transition of

Anonymous from trolling to political activism – or anonymity to publicness – to the act of flipping

a switch. Like a popular thread on /b/, the linear progression of Anonymous' actions self-replicated

and intensified, beginning as a single, insufficient call to digital arms then expanding, less than one

month later, into a protest movement with defined socio-political objectives. Housh – and many

other participants and academic spectators – questioned how that transformation took place.

Participants' own responses to the protests stress the qualities of spontaneity and

ephemerality. According to many Anons, their politically charged provocation against the Church

of Scientology was the product of happenstance or the consequence of serendipity; perhaps if a

different post had suggested targeting a different organisation, it is possible that the protests would

Page 77: SMP textfile

77

have occurred at a different time for different reasons. However, these claims are reasonable only if

one views Anonymous as an entity that is divorced from previous iterations of technologist

subcultures. The collectivist rhetorical appeals made during both the 2008 and 2010 operations are

situated within an existing canon of technology writings, which have consistently challenged

opponents of free speech, harnessed creative or disruptive digital tactics, and asserted the individual

freedoms of online actors.

Moreover, the insular community exemplified in collectivist rhetorical texts suggest that the

symbolic identifications fostered within online meeting spaces were effective in creating unity.

Participants occupying both online and IRL spheres of influence were willing to subordinate their

own individuality in favour of symbolic and pragmatic unification – a designation that transcends

mere notions of collaboration and consensus. Adopting the figure and styling of a single individual

– calling themselves Anonymous or “Legion” - the most concrete source of Anon's success was its

unity. Mike Vitale, a Chanology participant, likewise credited the existence of shared norms and

values as the reason for the protests' success: “We all met each other. The idea of an Anon is that

you're fucking alone until you get to 4chan... and then, you know, these people all think like you.

And then, all of a sudden, you're not alone – you're with 500 others – and they all know the same

jokes as you, they all clearly have the same interests as you. Here's your culture” (Knappenberger

2012).

Page 78: SMP textfile

78

Section 4: Transparency

“The State will fight back, of course. They will improve their controls on secrets, raise surveillance and punishment of possible leakers, try to negotiate multilateral media controls. But even then, the net change is likely to be advantageous to the leakers – less free today, perhaps, but more free than prior to 2006. Assange has claimed, when the history of statecraft of the era is written, that it will be divided into pre- and post-WikiLeaks periods. This claim is grandiose and premature; it is not,

however, obviously wrong.” - Clay Shirky, 2013

During the concluding months of 2010, a website called WikiLeaks – framing itself as a

legitimate media organisation – attracted international scrutiny by publishing a trove of the U.S.

government's classified diplomatic secrets. Under the banner of free information and the free press,

Julian Assange, the founder and editor in chief of the website, evaded jail time by employing

dramatic geopolitical spectacle, eventually taking up residence in the Ecuadorian Embassy in

London, England to avoid answering questions in Sweden as part of a sexual assault investigation.

Fearing subsequent extradition to the United States, where Grand Jury hearings had already been

opened, Assange requested and was granted diplomatic asylum by Ecuador, continuing to work on

various WikiLeaks projects, conduct media interviews, and occasionally deliver speeches from the

window of the Embassy.

The above quote comes from an article published shortly following the Cablegate scandal,

wherein over 250,000 State Department cables – followed by 400,000 documents about the Iraq

War - were published in October 2010. WikiLeaks' source was later revealed to be Chelsea (then

known as Bradley) Manning, a young Army Private. In 2012, Manning testified in a military court

that her motivation for leaking the cables was to spark a domestic debate about the ethics of the

“role of the military and our foreign policy... as it related to Iraq and Afghanistan” and to provide

herself with “a clear conscience” (Manning 2012). Among the cables, Manning also revealed a

classified video of a 2007 airstrike in Bagdad, which showed an Apache helicopter firing upon a

group of unarmed Afghani citizens – two of them Reuters journalists – after the pilots mistook their

Page 79: SMP textfile

79

cameras for weapons.25

Clay Shirky, a fellow at Harvard's Berkman Center for Internet and Society, provides a

summary of this new scene of technologist dissent, as well as qualifies the government's response to

the headline-grabbing leaks, which supplanted Daniel Ellsberg's release of the Pentagon Papers as

the largest disclosure of classified documents in U.S. history. Largely, Shirky's hypothetical

forecast of future State attempts to reign in cyberspace did indeed materialise: Chelsea Manning,

WikiLeaks' source, was sentenced to 35 years in prison; there is no sign that attempts to reform

“Washington's culture of secrecy” (Ball 2012) will produce any significant outcomes. International

telecommunication treaties, such as the Anti-Counterfeiting Trade Agreement (ACTA) have been

signed by the United States to combat intellectual property theft, prompting a coalition of Polish

parliamentarians to don Guy Fawkes masks – a deliberate homage to Anonymous – to protest the

treaty, a gesture that legitimised the hacktivist collective on the international stage. Yet, the author's

conclusion does not indicate the imminent breakdown of the unregulated Internet. On the contrary,

he argues that transparency is coming whether governments like it or not, citing the simple technical

processes that are used to share classified information securely and the difficult task of tracking

down leakers.

Because the WikiLeaks scandal was a fluid situation, reactions from the traditional press

about the episode varied. In the same article, Shirky responds to the predominant media response to

the website, claiming that the initial leak and distribution of the State Department cables were the

result of “a series of unfortunate events” (2011). Distancing himself from those media outlets,

however, Shirky recognises trends in journalism during the Internet age, arguing that cyberspace

does not merely pose a challenge to the traditional press; rather, the utility represents a paradigm-

shifting alternative to the comparatively sluggish and increasingly state manipulated news media

25 Provocatively titled “Collateral Murder,” the video also contains audio of the strike, including the voices of the pilots. During a particularly chilling clip, after firing upon the van of a family who stopped to recover the bodies and discovering that two children had been killed, one pilot states, “Well, it's their fault for bringing kids into a battle” (Sunshine Press 2010).

Page 80: SMP textfile

80

industry. As newspapers and cable television programs attempted to understand the geopolitical

implications of the leak, Shirky focuses instead on the unfolding meta-story: according to many

commentators, the fact that the intimate details of the United States' foreign agenda were being

gleaned from internal emails proved that the traditional press had failed to ask the right questions of

public officials.

The media was overlooking another emerging trend, however – one that Shirky fails to

reference, too. Both before and after the 2010 WikiLeaks episode, numerous technologically skilled

government whistleblowers acted to release documents relating to national security issues. The

leakers made each revelation independently of each other and were often respected, life-long

government employees - unlike in the highest-profile cases of Chelsea Manning and, later, Edward

Snowden. Moreover, all possessed sets of skills relating to information technology and, during

subsequent court cases - and sometimes jail sentences - they expressed their discomfort at the

State's lack of transparency and a perceived disregard for the rule of law. The notion that

whistleblowers are impulsive, young and unaware of the consequences of their actions – a thesis

that has been amplified by the press – ignores the scores of whistleblowers who have recently

challenged the post-9/11 security apparatus in the United States, many by referencing and publicly

discussing the same surveillance programs that Snowden revealed. The cast of actors in this scene

was much larger than the media acknowledged, a sentiment that many technologist commentators

recognised.

Before Edward Snowden revealed specifics about various NSA programs to the Guardian,

for example, Thomas Drake, William Binney, Edward Loomis and J. Kirk Wiebe – whistleblowers

and Agency veterans – resigned from their positions to go public about the government's

warrantless collection of domestic phone and Internet records. Their actions were preceded by

Russell D. Tice, a technical intelligence specialist who expressed concern about the lack of judicial

oversight involved in NSA communications interceptions, then was dismissed from the Agency

after urging Congress to reform whistleblower protection laws. In 2006, an AT&T technician

Page 81: SMP textfile

81

named Mark Klein exposed the company's cooperation with the NSA to knowingly monitor

domestic telecommunications by installing network hardware. He had been an employee for 22

years.

The National Security Agency was not the only organisation to come under scrutiny as a

result of this cacophony of whistleblowing. In 2002, Department of Justice employee Jesselyn

Radack disclosed that the FBI had committed an ethics violation during the interrogation of John

Walker Lindt, the so-called “American Taliban.” After advising her supervisor via email that Lindt

had been questioned without his lawyer present26, Radack later discovered that those interrogations

were, indeed, submitted in evidence by the FBI and that her emails had been deleted. She was able

to recover those missing emails, then handed them over to the media – and resigned. John Kiriakou,

a CIA analyst, was the first government official to discuss the United States' use of waterboarding

when interrogating Al Qaeda prisoners, describing the technique as torture to a reporter. Though

seemingly unrelated to the NSA leaks, both Radack and Kiriakou are two more examples of a

growing trend towards open disclosure. The ensuing policy debates surrounding both cases are

evidence of the strategic power of leaking; without Radack and Kiriakou's testimony, both national

security issues would have never been debated by members of the civil society.

In particular, the question of legitimacy surrounding the WikiLeaks disclosures vis-a-vis the

traditional press allowed the stasis of the argument to stall. The WikiLeaks case was notable

because of the sheer volume of documents leaked, as well as the unredacted nature of those

documents. In the past, other leakers sought out experienced journalists and established journalistic

institutions – Kiriakou talked to CBS News, for example, Radack sent those incriminating emails to

Newsweek magazine and William Binney provided information to the New York Times. Manning,

on the other hand, sent military documents in bulk to Julian Assange, a computer hacker, who

proceeded to publish them onto the Internet without consulting any foreign policy professionals,

26 It was later revealed that, while reading the Miranda rights, an FBI agent stated, “Of course, there are no lawyers here in Afghanistan” when noting Lindt's right to council (Radack 2005).

Page 82: SMP textfile

82

making discretionary redactions or considering the security implications of that information

becoming public. Although the leak was circulated by transparency advocates in the name of

government accountability, the stasis of the mainstream debate was stuck in the realm of

definitional arguments, with many observers rejecting Manning's action as an act of whistleblowing

in the first place.

Cablegate: WikiLeaks and the Question of Legitimacy

Founded in 2006, WikiLeaks was a relatively unknown enterprise prior to the Cablegate

scandal, which were leaked to the “not-for-profit media organisation” by U.S. Army Private

Chelsea Manning. The website's low profile is likely the consequence of the niche political subjects

covered by WikiLeaks prior to Cablegate; Nigerian elections, for example, or an Icelandic bank are

not as prominent a target as the U.S. State Department and military, or its conflicts abroad. Despite

the website's dignified self-description, found on a webpage labelled “About,” it is easy to refute

each of Assange's three claims about his project's definition and purpose. Little is known about

WikiLeaks' financial structure, so the assertion that it is “not-for-profit” remains dubious; the fact

that “articles” on the website are written by anonymous volunteers sets it apart from legitimate

media outlets; and - given that one volunteer has described Assange as, “the heart and soul of

[WikiLeaks], its founder, philosopher, spokesperson, original coder, organizer, financier, and all the

rest" (Burns, Somaiya 2010) – it can hardly be classified as an “organisation.” Regardless, the

“About” document finds many opportunities to restate its legitimacy as a well-established media

institution, referring to itself as “a publishing organisation” and “a new model of journalism”

throughout (2011). Within the public sphere, WikiLeaks had no recognisable ethos; as such, its

sudden arrival on the geopolitical scene was widely regarded as suspect and illegitimate.

Assange's own description of himself attempts to rectify these uncertainties, yet fails to do

so with any semblance of credibility. Under the subheading “What is WikiLeaks?” the author states,

“We provide an innovative, secure and anonymous way for sources to leak information to our

journalists” (2011). Yet, given the conventional definition of a journalist, his claim is in conflict

Page 83: SMP textfile

83

with the very next sentence, “One of our most important activities is to publish the original source

material.” The role of journalists is not solely to publish the information that is leaked to them;

rather, they must also convey to their readers details about the unique context and varied

perspectives that result from the issues they cover. Assange's redefinition of the word “journalist”

notwithstanding, the prioritisation of source material – and its disclosure in full to ensure that

“readers and historians alike can see evidence of the truth” - is reminiscent of the practical

aspirations of free and open source software developers.27 To programmers, the value of source

code results from the same appeals of transparency: without the ability to review the work of fellow

hackers, or improve upon their ideas, it is impossible to ensure that the software does what it claims

to do. Source material and source code thus function in an identical fashion: to remove the necessity

of trust within human interactions, to eliminate hierarchies of expertise, and to facilitate the

democratic propagation of knowledge. Among a technologist audience, these allusions to open

source institutions indeed inspire confidence; yet, predictably, these details did little to convince the

general public or the mainstream press of the site's legitimacy.

The parallels to open source software continue, as Assange indirectly likens liberal

notions of freedom with the dissemination of restricted information, creating a comparison that is

more accessible to general audiences. To do this, he references the Declaration of Human Rights, in

particular Article 19, saying, “Everyone has the right to freedom of opinion and expression; this

right includes the freedom to hold opinions without interference and to seek, receive and impart

information through any medium regardless of frontiers.” The construction of this comparison relies

on the assumptions of the audience; namely, it requires readers to make a logical leap from

supporting the relatively uncontroversial freedoms of opinion and expression to defending the

“transparency-by-force” agenda of WikiLeaks. Yet, by using the universal language of the

Declaration of Human Rights, Assange endues his enthymeme with global, collectivist and ethical

27 Assange's hacker ethic-inspired approach to journalism is not surprising, given his background reading and contributing to the Cypherpunk Mailing List, as well as hacking into U.S. military servers.

Page 84: SMP textfile

84

significations: although the organisation is unapologetically breaking the law by making classified

information public, the ethical justifications being deployed transcend the moral authority of the law.

In this respect, the author is successfully able to build the legitimacy of the organisation.

The author utilises another enthymeme, which indicts the traditional media for charging

money to access stories and for acting as knowledge gatekeepers rather than bestowing agency on

their readers. Assange states, “Because we are not motivated by making a profit, we work

cooperatively with other publishing and media organisations around the globe, instead of following

the traditional model of competing with other media. We don't hoard our information” (2011). The

unspoken claim implicit here is that the traditional press is motivated by self-interest and beholden

to capitalism, whereas WikiLeaks' proposed methods offer solutions to these vices. Assange implies

that, because WikiLeaks is able to uncover so many stories “that are often picked up by other media

outlets,” this is evidence that the traditional press has failed to report on newsworthy matters

promptly. In order to accept this conclusion, the audience must already be familiar with the internal

workings of the publishing industry; moreover, to embrace Assange's criticisms, readers must

experience the same dissatisfaction with the press as Assange outlines.

Despite his knowledge of audience, Assange deploys a number of inartistic proofs when

discussing the specific technical elements of WikiLeaks that are put into place to protect its sources.

This absence of specificity and detail seems surprising, given the fact that Assange demands

absolute openness and transparency from governments. The subsection titled, “How WikiLeaks

Works” describes its internal process as “combin[ing] high-end security technologies with

journalism and ethical principles” (2011), without detailing the specifics of these technological

processes. The submission process for potential leakers, for example, is described in vague terms.

Assange deploys empty verbiage in his description of the WikiLeaks dropbox, calling it “a high

security anonymous dropbox fortified by cutting-edge cryptographic information technologies”

(2011). There are a number of encryption schemes and implementations that have been developed

as a means of scrambling communications, so merely describing WikiLeaks' method of source

Page 85: SMP textfile

85

protection as “cutting-edge cryptographic information technologies” is insufficient in proving that

their tools are dependable – or even in defining what those tools are. Moreover, many newspapers

maintain “secure dropboxes” for potential sources to utilise; yet, no details are provided to

differentiate between WikiLeaks' security system from other, allegedly inadequate news platforms.

Among open source hackers and transparency advocates, these claims of security would likely be

met with scepticism, as Assange is requesting the same trust of potential sources - “just trust us” -

as he so vehemently denounces when identical requests of confidence are issued by governments.

In the section titled, “How WikiLeaks Verifies Its News Stories,” Assange issues another

similarly vague and patently anti-transparency claim. Specifics are once again missing from the

descriptive section on document verification; instead, the author references extrinsic evidence, such

as examples and the testimony of witnesses. For example, to support the claim that WikiLeaks

“use[s] traditional investigative journalism techniques as well as more modern technology-based

methods,” Assange describes the process of verification used prior to the release of the Collateral

Murder video. The account states:

“We sent a team of journalists to Iraq to interview the victims and observers of the helicopter attack. The team obtained copies of hospital records, death certificates, eye witness statements and other corroborating evidence supporting the truth of the story. Our verification process does not mean we will never make a mistake, but so far our method has meant that WikiLeaks has correctly identified the veracity of every document it has published” (Assange 2011). Once again, rather than justifying the process of verification using a logic-based defence of the

organisation's practices, the above description issues a piece of testimonial evidence to support

claims that each document is subjected to a “very detailed examination procedure.”

Finally, no names or data about the organisation's volunteers are mentioned throughout the

explanatory text; rather, in the subheading focusing on “The People Behind WikiLeaks,” a general

list of occupations are provided: “accredited journalists, software programmers, network engineers,

mathematicians and others” (2011). Instead of naming or providing examples of WikiLeaks' writers,

the author uses the section to address the rumour that an intelligence agency or government is using

WikiLeaks as a front, rebutting that claim by again using examples. Assange puts into practice

Page 86: SMP textfile

86

Aristotle's refutation enthymeme, stating, “By definition, intelligence agencies want to hoard

information. By contrast, WikiLeaks has shown that it wants to do just the opposite. Our track

record shows we go to great lengths bring the truth to the world without fear or favour” (2011).

These sentences indeed rule out ownership by an “intelligence agency or government”; yet, readers

are still unable to glean information about who – specifically – is behind the WikiLeaks

organisation. Even Assange's name is absent from this section of text, despite his prominent role as

the face of the organisation and its founder. Rather, the section prioritises the notion the WikiLeaks

volunteers work and publish anonymously. Names and reputations do not play a role in WikiLeaks'

defence of itself, therefore none of its arguments are overtly ethos driven, creating another claim

based on trust.

Ultimately, however, the author's character is nevertheless revealed to its audience. The tone

of the piece, for example, borders on paranoid in several subheadings – as evidenced in the claim

that intelligence agencies started the rumour that WikiLeaks is actually a front for governments

seeking to entrap potential whistleblowers. Another sentence discusses the potential risks of leaking

information, stating, “Sources who are of substantial political or intelligence interest may have their

computers bugged or their homes fitted with hidden video cameras.” Once again, the speaker aligns

the actions of the government with overt corruption, juxtaposing its nefarious behaviour against the

comparatively ethical – yet illegal – acts of whistleblowing by potential sources. More important is

the speaker's attitude of paranoia and fear towards the government; yet, despite these apparent risks,

WikiLeaks remains nevertheless committed to protecting its sources and advocating for radical

transparency. The tone of the piece is used to invent an ethos of legitimacy for the organisation, as

well as assure the audience that WikiLeaks is acting with honourable intentions. The author then

solidifies this point, bolstering WikiLeaks' “journalism record” by including a list of the awards that

the organisation has received.

Collective voice is used throughout the piece, functioning once again to establish the

organisation's legitimacy and reassert the anonymity of its volunteers. The speaker of the text,

Page 87: SMP textfile

87

therefore, takes on a broad range of characteristics, embodying the qualities and voices of

WikiLeaks unspecified number of volunteers. In technology manifestos, the faceless mob trope is

one reoccurring collectivist image, usually appearing in texts that operate at the margins of the law:

from Anonymous' unruly calls to digital protest to the untraceable hoards of potential assassins in

“Assassination Politics,” technologist texts frequently use anonymous speech as both a practical

tactic and symbol of dissent or secrecy. When these texts are penned as a defence of openness and

transparency, however, it is difficult to reconcile the contradiction implicit in the method of

authorship and its intended meaning.

The anonymous nature of publishing and whistleblowing espoused by WikiLeaks is both

reflected and challenged in the example of Edward Snowden, who publicly leaked classified

information to established journalists then swiftly revealed his identity to the public. Although

Assange equates anonymity with security, asserting that sources would be harassed and jailed for

their disclosures, this identification does not hold true in Snowden's case, as he was eventually

granted diplomatic asylum. The fact that Snowden was able to avoid arrest – combined with the

unrelenting nature of the NSA-related reportage – served to amplify the story and prolong its impact.

While anonymity is a valuable and protective utility, its deployment can be delegitimised and

framed as an act of cowardice.

The Legitimacy of Openness

On June 5, 2013, The Guardian published the first of many stories revealing the technical

details of various NSA surveillance programs – specifics pieced together using documents provided

by defence contractor Edward Snowden. The minimally redacted “source material” was published

alongside the reports, to allow readers to verify the presented information. Snowden had not used

WikiLeaks' document-sharing service, nor did he follow the model of leaking espoused by the

organisation; rather, the process mirrored that of traditional whistleblowers, with sources contacting

investigative reporters directly.

Following the first wave of reporting, in August of 2013, Snowden's first public statement

Page 88: SMP textfile

88

was read aloud by another prominent Internet privacy advocate at an awards ceremony in Germany.

The setting and occasion for the text are notable. Given the political history of Germany in relation

to the threat of domestic surveillance, polls conducted at the outset of the NSA scandal concluded

that German citizens were particularly supportive of Snowden, with many advocating for his

diplomatic asylum request. The speech is presented on the site of a 20th century surveillance state;

though the institutions of that state are now defunct, the fact remains that the reading occurs before

an audience that is able to recall with clarity living conditions under an oppressive government. The

fact that German citizens identify and readily oppose the NSA's domestic surveillance programs,

comparing their malign influence to that of the East German secret police, is a particularly

provocative and convincing attestation.

The ceremonial nature of the piece is disrupted by the fact that it is delivered by proxy:

Jacob Appelbaum, a privacy advocate and vocal supporter of WikiLeaks, read the statement aloud,

as it would be impossible for Snowden to accept the award in person.28 Although Snowden's own

ethos is brought to bear on the subsequent text, the influence of another agent is also at play;

Appelbaum's work on online anti-censorship tools have earned him a degree of respect within

hacktivist and technologist circles. Moreover, his support of WikiLeaks – and subsequent

harassment by law enforcement in the United States as a result of this support – have made

Appelbaum both the public face and spokesperson of organisations that support individuals' rights

to privacy and anonymity, such as his position as a core developer of the Tor Project, an open

source anonymity browser. As a result, Appelbaum's experiences run somewhat parallel to

Snowden's, making him an ideal proxy in this situation.

The text of Snowden's speech functions to praise the efforts of individuals around the world

who advocated for reform both before and after the NSA story broke. The epideictic forum of the

piece, therefore, takes on dual significance: not only is the award ceremony intended to commend 28 In an interesting coincidence, Appelbaum first established himself as an influential figure within the technologist subculture in 2010, when he unexpectedly spoke on behalf of Julian Assange, delivering the WikiLeaks keynote address at a hacker conference called H.O.P.E. following the Cablegate scandal.

Page 89: SMP textfile

89

Snowden for his actions, but through the text of his speech, another demographic of individuals are

praised in turn. Snowden begins by minimising his own action, stating:

“In is a great honour to be recognised for the public good created by this act of whistleblowing. However, the greater reward and recognition belongs to the individuals and organisations in countless countries around the world who shattered boundaries of language and geography to stand together in defence of the public right to know, and the value of our privacy” (2013). Snowden acknowledges the efforts of numerous individuals – from the journalists who helped bring

the story to the public to the protest organisers who subsequently mobilised global coalitions of

activists. By doing so, Snowden counters the prevailing media narrative, which revolved

exclusively around his own identity and the heroism or villainy implicit in his actions. By

recognising the contributions of the civil society in response to the scandal, Snowden gestures at the

meta-discourses surrounding media production. Without an audience, there can be no author; or,

without the public's reaction and advocacy, there can be no change.

The images Snowden utilises as representative examples of concerned citizens demonstrate

his attention to audience, as well as his attempts to situate the historical moment into a broader

context of technologist references. He does this by introducing emblematic characters into an

otherwise unemotional and logic-driven speech. He states:

“My gratitude belongs to all of those who have reached out to their friends and family to explain why suspicionless surveillance matters. It belongs to the man in a mask, on the street, on a hot day; and the woman with a sign and an umbrella in the rain. It belongs to the young people in college with a civil liberties sticker on their laptops, and the kid in the back of a class in high school making memes” (2011). These examples reference and elevate the subtle or unobtrusive political acts of ordinary citizens,

likening them to his own comparatively grandiose endeavour. Although the “mask” referenced in

the first example is likely an allusion to Anonymous, which mobilised their supporters to organise

pro-4th amendment rallies on July 4, 2013, the abstract nature of the successive examples allow for

a more broad application. Both the first and second figures represent the ordinary and unremarkable

activism characteristic of democratic life, invoked to signify the patriotism and importance of

traditional demonstrations. The last two images are less overtly connected to conventional activism,

Page 90: SMP textfile

90

embodying a passive form of resistance, which occurs when participants identify as members of a

group. The civil liberties sticker, for instance, signifies a more passive form of resistance than

participating in a rally. Snowden's shout-out to the creation of online jokes, or memes, appears at

first as an out-of-place, apolitical reference as well. These allusions, however, serves to praise the

oft-overlooked elements of resistance, enduing the most minuscule act – silently supporting a cause,

for example - with political significance.

Taken together, Snowden's enthymeme is particularly obvious within the context of the

setting: an intellectual German audience, familiar with the writings of Nobel Laureate Thomas

Mann, would readily identify the message: “Everything is politics.”

“We Are All Edward Snowden Now”

Edward Snowden's speech gestures at the symbolic advantages of grassroots activism,

glorifying everyday acts of overt or subtle resistance. The effects of his call to action – its

successful appeals to logos and pathos – manifested themselves in the continued and widespread

political mobilisation he glorifies. Indeed, the July 4th protests were the first of many

demonstrations against domestic surveillance in major American cities; this initial protest facilitated

the unification of localised coalitions of actors, meeting to discuss ideas and plan future political

actions. Once a decentralised web of individual groups united by progressive politics, Restore the

4th was an exercise in coalition building; at the Washington D.C. protest, for example, activists from

Code Pink and Amnesty International marched with Anonymous participants, EFF supporters and

former Occupy Wall Street organisers. This unification proved crucial in establishing the staying

power of the movement.

Personal identification between Snowden and the community of technologists is a subtle

element of his speech, hidden behind the speaker's humble deflection of public praise. However, the

importance of these identifications cannot be understated for their role in reunifying existing

subcultures of hacktivists in pursuit of a more opened society. Snowden himself became a symbol

to many hackers: his middle class upbringing, eloquent justifications for leaking and victorious

Page 91: SMP textfile

91

thwarting of U.S. imprisonment allowed him to take on the ethos of a heroic leader. Snowden's

whistleblower origin story was one that paralleled the political and social experiences of hackers

universally – even down to his laptop cover, plastered with stickers supporting the Tor Project and

the EFF. A slogan printed on anti-surveillance picket signs embodies the significance of these

technologist identifications. Held up during European demonstrations for Snowden's asylum bid

and at American Restore the 4th Rallies alike, it read, “We are all Edward Snowden now” - a

sentiment that glorifies acts of whistleblowing, reinforces collectivist iconography and forecasts the

leaks to come.

Page 92: SMP textfile

92

Conclusion

This project can be summarised in one picture.

It's an image posted by the WikiLeaks Twitter account: in front of a staged backdrop in the

Ecuadorian Embassy, Julian Assange and Richard Stallman hold up a picture of Edward Snowden,

redesigned to look like Barack Obama's HOPE poster popularised during the 2008 presidential

campaign. The tweet reads, “Yes We Can” - a remixed statement of inspiration for a freshly

mobilised grassroots campaign, dedicated to pressuring EU countries to pass surveillance reform

and extend asylum protections to Snowden, then a fugitive of the United States residing in a

Moscow airport terminal. The image circulated on a predictable list of social media sites, leading

science fiction author Bruce Sterling to reflect on the monumental implications of the meeting

between Stallman and Assange, a concrete manifestation of an apparent geopolitical trend thirty

years in the making. Together, the two comprise what Andy Greenberg calls “the Secret-Killing

Machine”: Stallman, the ideological kernel of the information liberation movement, accompanied

by Assange, the compiler, who converted that philosophical and legal jumble into an executable

language of resistance – though, leaking documents may not have been Stallman originally had in

mind. Ironically calling the image “epic,” Sterling intones: “They have the beatific look of

righteousness rewarded. Che Guevara in his starred beret had more self-doubt than these guys. They

are thrilled with themselves” (2013).

Prior to the NSA scandal, the contemporary trajectory of technologist political activity can

be categorised by widespread pessimism. At hacker conferences and in online discussions, the

general technologist sentiment is one of lethargy and defeat - the collective repetition of “We Lost

the War,” an allusion to a 2005 lecture given at the Chaos Computer Club in Berlin. The now

famous and oft-quoted panel summarised “the eminent loss of privacy and civil rights” online and

promised to instruct attendees about how to “simply survive the times ahead” (Gonggrijp, Rieger

2005). The broad idealism and early technologist successes of the past had given way to a bleak

outcome: the re-appropriation of hacker utilities by intelligence agencies and corporations to repress

Page 93: SMP textfile

93

open access and the once-venerated cause of information freedom. For example, after the

development of the Linux kernel successfully launched the free and open source software

movement from conception to reality, law enforcement infiltration of F/OSS communities and the

successful backdooring of open source distributions inundated many hackers with a sense of futility

toward both their mission and methodology. Moreover, in the past, hackers were inclined to meet

federal suppression and scrutiny with vitriolic opposition; however, rather than devising holistic

surveillance-bypassing systems, contemporary technologists began to publicly reject the feasibility

of absolute security, opting instead for strategies of mere “survival” (Gonggrijp, Rieger 2005).

Yet, following the government's trial of Chelsea Manning and its widely successful

muzzling of WikiLeaks, the NSA scandal reinvigorated the aspirational objectives of technologists.

Suddenly, issues of surveillance entered the stage of the mainstream news cycle, leaving the

comparably insular scene of science journals and shadowy encryption debate forums. The Snowden

disclosures confirmed what many technologists already knew about the data collection in the U.S.,

such as the workings of secret FISA courts tasked with approving NSA requests, the cooperation of

technology enterprises like Google or Microsoft, and the passive indifference of Congressional

oversight committees. The fact that the civil society was now able to debate the merits of the U.S.'s

security strategy ultimately inspired unity among technologists and moved the stasis of the

argument about free information forward once again. At conference keynotes throughout the

summer of 2013 – when they weren't too busy heckling suspected feds - technologist panelists and

lecturers encouraged attendees to “Leak it all.” Among many technologists, the NSA scandal stood

as a shining example of the most effective and ethical possible course of action against

unacceptable political realities, replacing Stallman's vision of an open source solution with acts of

whistleblowing.

The Coming Cyberwar

Political involvement and civic engagement is at an all-time low in the United States, yet

technologists have consistently displayed high levels of interest in political and social commitments

Page 94: SMP textfile

94

– from filling courtrooms to donating money to nonprofit organisations. Despite a brief spike in

political enthusiasm during the 2008 election, the celebratory atmosphere once again reverted to a

climate of political frustration. Technologist engagement can be attributed in part to the social unity

and cohesion that can be observed throughout these representative examples of technologist rhetoric:

the often casual repetition of symbols, jokes and slogans. The appeal of these communal cultural

identifications spans generations of hacker politics, which explains Anonymous hacktivists'

decision to include a John Perry Barlow's essay when assisting pro-democracy Egyptian

demonstrators. In his examination of the declining relevance of political society, contemporary

political theorist Robert D. Putnam outlines a method for addressing the disengagement of the

citizenry in his work, Bowling Alone: the Collapse and Revival of American Community. Across the

board, Putnam notes, Americans' involvement in the political sphere has diminished over time: we

distrust our government, avoid membership in civic organisations, rarely attend community

meetings and are unenthusiastic participants even during the most contentious of election cycles.

Somewhat famously, in proposing a remedy to these democratic ills, Putnam encourages

individuals to join a bowling league, so that they are exposed to valuable social interactions and

civic discussions with other citizens. Technologists and computer hackers never stopped

participating in the conversations Putnam describes; instead of joining a bowling league, though,

they became members of mailing lists and deface crews.

These strong associational ties may seem out-of-place in a culture that tends to devalue

individual identity, prioritising meritocratic ideals such as “the quality of the code” instead.

Anonymous hackers, an extreme example of this phenomenon, frequently attest to the sense of

community and camaraderie that occurs between participants, despite the lack of information about

the real people behind the online pseudonyms. Rather than conventional forms of interaction, bonds

are formed instead through hours of exclusively text-based communication. The importance of

these “weak ties” of association can be similarly observed in open source communities, where

developers are likewise geographically situated around the globe, yet are able to collaboratively

Page 95: SMP textfile

95

code complicated software utilities and craft jointly-authored press releases.

All of this indicates long-term trouble for the United States security apparatus, which has

already revealed its hiring paranoia, taking a page from the hacker playbook. Federal agencies are

anxiously seeking to enlist young, computer-savvy college graduates – new recruits eager to create

and deploy the sophisticated cyber weapons of tomorrow. Military and intelligence recruiters

organise digital “Capture the Flag” games on college campuses to survey the field of potential

employees; DARPA funds computer upgrades and robotics tournaments in American high schools.

There is a knowledge vacuum that demands to be filled; yet, oftentimes, the most skilled

programmers do not boast resumes with computer science degrees from elite universities or

experience gleaned through competitive internships. On the contrary, the self-taught criminal

hackers, who are inclined to use their knowledge of computer systems “for fun and profit,” are

usually the most qualified for computer security positions, having clocked thousands of hours of

experience on IRC. Oxblood Ruffin, who spouts pithy technologist wisdom from Twitter these days,

summarised the difficult position of intelligence agencies by saying, “No nation will come to a state

of cybersecurity preparedness until they get rid of their hiring phobias against the hacking

community” (2012). The problem transcends mere phobia, however; these days, intelligence

agencies are acutely aware of the pro-leaking attitudes of new computer science hires, measuring

technological expertise and ideological fitness in equal measure.

The hacker ideology diametrically opposes that of the intelligence industry ideology – and

many corporate tech outfits, too. The patriotic slogans about “Securing the Homeland” plastered on

NSA recruitment pamphlets represent a direct affront to the anarchic, anti-government sentiments

expressed in the hacker ethic. For-profit technology utilities are another hacker villain; not only is

the code proprietary, but the Snowden documents also revealed corporate compliance with

government spying, indicting massive tech giants for funnelling user metadata onto NSA databases.

According to many hackers, the U.S. government and corporate enterprises alike have revealed

themselves to be unethical and inhumane, disregarding the rule of law in favour of convenience. In

Page 96: SMP textfile

96

the coming cyberwar, the sides have already been appointed – the participants chose where to stand

over thirty years ago.

The future of cyber security in the United States, then, is all rhetoric. Not always the kind of

rhetoric that is relevant to the analyses presented in this paper – rhetoric in the Aristotelian sense,

meaning “the faculty of observing the available means of persuasion” - but a more sinister

definition of the word, indicating calculated manipulations and falsehoods. In this country,

technology debates are rarely built on fact. On the contrary, technology issues represent a perfect

storm for public misinformation: a potent combination of technical complexity, public

incomprehension and the nature of matters about classified intelligence. For example, in a 2010

interview with General Keith Alexander, the Director of the NSA told reporters that hacktivists

were capable and inclined to target electronic utilities such as the power grid, which would cause

nationwide blackouts. In a Wall Street Journal report, technology writer Soibhan Gorman debunks

the legitimacy of the alleged security threat, referencing Anon's precedent for targeting government

and corporate entities, not the very infrastructure upon which their ability to communicate relies.

When the story went public, few journalists countered Alexander's claims with facts - such as the

simple reality that no parts of the power grid are attached to the Internet, making it a secure utility –

or approached Anonymous participants to comment on the validity of the General's assertions.

Rhetoric is the study of probable truth, making it an exceptionally valuable tool for

examining the contradictory, well-articulated and sometimes maddeningly dubious truths about the

political implications of networked living. I am not convinced that viable solutions to this security

powder-keg can be found in blind trust of the NSA, an agency that has demonstrated its willingness

to curtail inter-governmental oversight and manipulate private companies. Politicians lack the

interest, expertise and political will to address this problem, let alone provide solutions. CEOs of

technology companies have been summoned to the White House to discuss the process of

rebuilding user trust in the wake of the NSA scandal; however, businesses should not be entrusted

with the important task of representing the public's interest, as their primary goal is the pursuit of

Page 97: SMP textfile

97

capital. Perhaps the first step toward consensus would resemble a White House advisory panel

composed of the cryptographers, private computer security researchers and free speech advocates

who have followed the stasis of this debate from its inception.

During all these discussions of cyberwarfare, few people are considering the feasibility of

cyberpeacebuilding. It is true that computers were originally designed for spying and censoring and

controlling contingents who can't keep up; “That's what Alan Turing was all about,” technology

writer Bruce Sterling summarises, pointedly calling out the militaristic origin story of the modern

information technology industry. It is also true that computers represent vast corporate interests,

designed for calculated efficiency, brand recognition and a competitive market space. Computers

are built for data-mining and serving targeted advertisements, using algorithms to ensure that the

right people get paid. What Sterling's quote calls attention to is the fact that, without an exigence of

domination – whether it is the pursuit of corporate or military hegemony – computers would not

exist. Notions of violence are tied to technology, as in any other form of rhetorical identification.

Computers were invented to make war and to make money – in that order.

But within that bleak context, in a proudly democratic society, technologist reactions to

these truths should be greeted with understanding - even sympathy. The hacker notions that

computers can create beauty, impart knowledge, expand frontiers and, ultimately, spread humanity?

That is the only vision worth fighting for.

Page 98: SMP textfile

98

Glossary

Adapted from Anonymous entries to UrbanDictionary.com, a crowdsourced archive of regional and cultural slang. Anonymous: (n.) A loosely-associated international network of activist and hacktivist entities. A website nominally associated with the group describes it as "an internet gathering" with "a very loose and decentralized command structure that operates on ideas rather than directives." The network became known for a series of well-publicized publicity stunts and distributed denial of service attacks on government, religious, and corporate websites. /b/: (n.) 1. 4chan's "Random" imageboard. A place where you go to become your inner asshole and live out your sickest fantasies. Or, 2. Hell. Backdoor: (n.) A piece of code built into software that allows the creator entry. This type of system is usually unnecessary, but has two main functions: 1. To automatically create an account with full privileges that is hidden from the user(s) of the program, to more easily facilitate the creation of a maintenance account Or 2. As above, but with ulterior motives. See spyware. BBS: (acr.) An acronym for “Bulletin Board System,” which were old-timey computer networks. Each was privately owned, and users would dial in to connect. The first one went up in 1978, and they reached their peak in 1996 with over 5000 systems in the USA alone. They were essentially killed off by the Internet. CryptoWars: (n.) The unofficial name for the U.S. government's attempts to limit access to strong cryptographic systems. Cyberpunk: (n.) 1. In fiction, the word is considered a sub-genre of Science Fiction. Or 2. A term that generally covers the computing underworld of hackers, as well as various underground technology. Cypherpunk: (n.) An activist advocating for widespread use of strong encryption as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. DDoS Attack: (n.) A form of electronic attack involving multiple computers, which send repeated HTTP requests or pings to a server to load it down and render it inaccessible for a period of time. Often used by freedom fighters on the Internet, usually attacking the systems of greedy corporations who want to sacrifice your freedom for their profits. Dropbox: (n.) A file sharing application F/OSS: (acr.) An abbreviation for “Free and Open Source Software.” I did it for the lulz: (phrase) A slogan which serves as justification for any trolling or Internet drama caused. IRC: (acr.) Abbreviation for “Internet Relay Chat,” a chat protocol initially developed as a means of communication back in the days of Bulletin Board Systems. IRC is a text only means of communication; non-text communications or files are sent via IRC's file transfer protocol, known as DCC.

Page 99: SMP textfile

99

IRL: (acr.) An abbreviation for "In Real Life." Often used in Internet chat rooms to let other users know that you are talking about something in the real world and not in the Internet world. Legion of Doom: (n.) A notable cyberpunk group that was active from the 1980s to the late 1990s. LOIC: (acr.) An acronym for “Low Orbit Ion Cannon,” an open source distributed denial of service client. Meatspace: (n.) A term, originating from cyberpunk fiction and culture, referring to the real - that is, not virtual - world, the world of flesh and blood. Somewhat tongue-in-cheek. The opposite of cyberspace. Meme: (n.) 1. A unit of cultural information that represents a basic idea to be transferred from one individual to another, and subjected to mutation, crossover and adaptation. Or 2. A word used to give a bit of pseudo-academic gravitas to stupid viral shit. Metadata: (n.) A fancy word for "information" invented by tech folks to make their jobs sound harder than they really are. Phishing: (v.) Tricking an Internet user into giving up his/her login name and password. Could also be used to get credit card information. Spyware: (n.) 1. Software that collects personal information about the user, such as mining workstations or monitoring behaviour. Or 2. A piece of shit program designed to track you down and collect personal information. TMRC: (acr.) An abbreviation for “Tech Model Railroad Club.” Troll: (n.) A person who posts a deliberately provocative message to a newsgroup or message board with the intention of causing maximum disruption and argumentation. TX-0: (acr.) An abbreviation for “Transistorized Experimental Computer Zero,” affectionately referred to as “Tixo.” An early, fully transistorized computer that was developed by the military and is now regarded as the computer of hacker culture. WikiLeaks: (n.) A “not-for-profit media organisation” that publishes anonymous submissions and leaks of classified, "top secret" or sensitive government and corporate documents. 4chan: (n.) 1. A message board and imageboard on the Internet where people congregate to post various kinds of pictures, flash animations, and discuss things such as anime. Or 2. A meeting place and breeding ground for the utter dregs of humanity. A festering polyp in the colon of society.

Page 100: SMP textfile

100

Works Cited

Anonymous. "UpFront." Linux Journal June 2002: n. pag. Print. Anonymous. "Zeitplan Für Tag 1." Chaos Communication Club 2013. Web. February 18, 2015 2015. Barlow, John P. "A Declaration of the Independence of Cyberspace." Web log post. John Perry Barlow Library. Electronic Frontier Foundation, 8 Feb. 1996. Web. Barlow, John P. "Crime and Puzzlement." Web log post. John Perry Barlow Library. Electronic Frontier Foundation, 8 June 1990. Web. Bell, Jim. Assassination Politics. N.p.: JR Books Online, 3 Apr. 1997. PDF. Blankenship, Loyd 'The Mentor'. "The Hacker Manifesto." Phrack 1986. Print. Broder, John, and Scott Shane. "For Snowden, a Life of Ambition, Despite the Drifting." The New York Times 2013: A20. Print. Cohen, Noam. "Web Attackers Point to Cause in WikiLeaks." The New York Times 9 Dec. 2010: A1. Print. Coleman, E. Gabriella. "Code Is Speech: Legal Tinkering, Expertise, and Protest among Free and Open Source Software Developers." Cultural Anthropology 24.24.3 (2009): 420-54. Print. Coleman, E. Gabriella. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton, New Jersey: Princeton UP, 2012. Print. Crockett, Davy. A Narrative of the Life of Davy Crockett of the State of Tennessee. 6th ed. Philadelphia: E. L. Carey and A. Hart, 1834. Print. Crosby, Kip. An Oral History of Lee Felsenstein. El Cerrto, California: Computer History Museum, 2008. Print. "denial of service attack (DoS attack)". Encyclopædia Britannica. Encyclopædia Britannica Online. Encyclopædia Britannica Inc., 2015. Web. 25 Apr. 2015 Encryption, Senate Judiciary Committee Cong. (1997) testimony of Louis J. Freeh, Director of the Federal Bureau of Investigation. Print. Gates, Bill. "An Open Letter to Hobbyists." Homebrew Computer Club Newsletter 1976. Print. Greenberg, Andy. This Machine Kills Secrets: How WikiLeakers, Cypherpunks and Hacktivists Aim to Free the World's Information. New York: Dutton, 2012. Print. Greenberg, Andy. "NSA Director Heckled at Conference as He Asks for Security Community's Understanding." Forbes. N.p., 31 July 2013. Web. Hamilton, David P. "Banned Code Lives in Poetry and Song: Critics of DVD-Copyright Ruling Argue Constitution Protects Posting in All Forms." The Wall Street Journal [New York City,

Page 101: SMP textfile

101

New York] 12 Apr. 2001: n. pag. Print. Hayes, Mike. "Regarding Your Letter of 3 February 1976 Appearing in Homebrew Computer Club Newsletter Vol. 2 No. 1." Homebrew Computer Club Newsletter 29 Feb. 1976: 2. Print. Hitt, Jack, and Paul Tough. "Is Computer Hacking a Crime?" Ed. Lewis Lapham. Harper's Mar. 1990: 45-55, 57. Print. Hughes, Eric. "A Cypherpunk's Manifesto." N.p., 9 Mar. 1993. Web. Jardin, Xeni. "HaikuLeaks: 'Cable Is Poetry'" BoingBoing. 29 Dec. 2010. Web. 25 Apr. 2015. Lehmann-Haupt, Christopher. "Books of the Times; Hackers as Heroes." The New York Times 1984. Print. Lent, Adam. Small Is Powerful: Why the Era of Big Business, Big Government and Big Culture Is Over. Unbound, 2015. Print. Levy, Steven. Hackers: Heroes of the Computer Revolution. New York City, New York: Dell Publishing, 1984. Print. Levy, Steven. "Geek Power: Steven Levy Revisits Tech Titans, Hackers, Idealists." Wired Magazine 2010. Print. May, Timothy C. "The Crypto Anarchist Manifesto." Mailing List. Cypherpunks Mailing List. N.p., 22 Nov. 1992. Web. Norton, Quinn, and Eleanor Saitta. "No Neutral Ground in a Burning World." 30th Chaos Communication Congress. Congress Centrum Hamburg, Hamburg, Germany. 30 Dec. 2013. Psychotic Opposition. "Society Sucks (And What To Do About It)." Cult of the Dead Cow Files. cDc Communications, Inc., Sept. 1987. Web. Putnam, Robert D. Bowling Alone: The Collapse and Revival of American Community. New York: Simon & Schuster, 2000. Print. Raymond, Eric S. The New Hacker's Dictionary. 3 ed. Boston, Massachusetts MIT Press, 1996. Print. Reiling, Robert. "A Letter from MITS." Homebrew Computer Club Newsletter 31 Jan. 1976: 1. Print. Ruffin, Oxblood. "Hacktivism, From Here to There." CyberCrime and Digital Law Enforcement Conference. Yale Law School, New Haven, Connecticut. 28 Mar. 2004. Speech. Schoen, Seth. "decss-haiku.txt." Gallery of DeCSS Descramblers. Carnegie Mellon University Computer Science Department, 12 Feb. 2001. Web. 25 Apr. 2015. Schoen, Seth. "The History of the DeCSS Haiku." Web log post. Loyalty. N.p., 2004. Web. 25 Apr. 2015.

Page 102: SMP textfile

102

Stacy, Christopher C. Getting Started Computing at the AI Lab. N.p.: Massachusetts Institute of Technology, 7 Sept. 1982. Stallman, Richard. "The GNU Manifesto." GNU Operating System. The Free Software Foundation, 1983. Web. Sterling, Bruce. The Hacker Crackdown: Law and Disorder on the Electronic Frontier. N.p.: Project Gutenberg, 1994. Print. Sterling, Bruce. "The Ecuadorian Library Or, the Blast Shack After Three Years." Web log post. Medium. N.p., 2 Aug. 2013. Web. The Other Joey. "Meatspace." Urban Dictionary. N.p., 24 Feb. 2005. Web. Thomas, Douglas. Hacker Culture. Minneapolis, Minnesota: U of Minnesota P, 2002. Print. Touretzky, David S. "Gallery of CSS Descramblers." Carnegie Mellon University, 2000. Web. Trumpbour, Mark. "Official SummerCon 2003 Announcement." Message to InfoSec News. 5 Feb. 2003. E-mail. Universal City Studios, Inc. v. Reimerdes. Southern District of New York. 17 Aug. 2001. Print.

Page 103: SMP textfile

103

Works Consulted

Aristotle. The Rhetoric. Trans. Edward, Meredith C. Cambridge, England: Cambridge UP, 1877. Print. Aristotle. The Politics and The Constitution of Athens. Ed. Stephen Everson, Raymond Geuss, and Quentin Skinner. Cambridge, England: Cambridge UP, 1996. Print. Burke, Kenneth. A Grammar of Motives. Berkeley, California: U of California P, 1969. Print.

Crowley, Sharon, and Debra Hawhee. Ancient Rhetorics for Contemporary Students. Boston, Massachusetts: Allyn and Bacon, 1999. Print. Jensen, Richard J. "Analysing Social Movement Rhetoric." Rhetoric Review 25.4 (2006): 372-75. Print. Kavanagh, James H. "Ideology." Critical Terms for Literary Study. Ed. Frank Lentricchia and Thomas McLaughlin. 2nd ed. Chicago, Illinois: U of Chicago, 1995. Print. Kelty, Christopher. Two Bits: The Cultural Significance of Free Software. Duke UP, 2008. Print. Locke, John. Two Treatises of Government and A Letter Concerning Toleration. Ed. Ian Shapiro. New Haven, Connecticut: Yale UP, 2003. Print. Marx, Karl, Friedrich Engels, and E. J. Hobsbawm. The Communist Manifesto: A Modern Edition. London: Verso, 1998. Print. Pease, Donald E. "Author." Critical Terms for Literary Study. Ed. Frank Lentricchia and Thomas McLaughlin. 2nd ed. Chicago, Illinois: U of Chicago, 1995. 105-17. Print. Parker, Robert D. "Marxism." How to Interpret Literature: Critical Theory for Literary and Cultural Studies. Oxford, England: Oxford UP, 2008. 211-43. Print.