Anthropology of Hackers

From P2P Foundation
Jump to: navigation, search

= an undergraduate class on computer hackers at New York University taught by Gabriella Coleman, Assistant Professor in the Department of Media, Culture and Communication, since 2007


The class opens a window into the esoteric facets of hacking: its complicated ethical codes and the multifaceted experiences of pleasures and frustrations in making, breaking, and especially dwelling in technology. Hacking, however, is as much a gateway into familiar cultural and political territory. For instance, hacker commitments to freedom, meritocracy, privacy and free speech are not theirs alone, nor are they hitched solely to the contemporary moment. Indeed, hacker ethical principles hearken back to sensibilities and conundrums that precipitated out of the Enlightenment's political ferment; hackers have refashioned many political concerns -- such as a commitments to free speech -- through technological and legal artifacts, thus providing a particularly compelling angle by which to view the continued salience of liberal principles in the context of the digital present.

Week One: Introductions and the MIT Hackers

One of the canonical books on hackers is Steven Levy's superb journalistic account Hackers: Heroes of the Computer Revolution published in 1984. The book is famous for defining the "hacker ethic," a set of aesthetic and ethical imperatives that include a commitment to access, meritocracy, and a belief that computers can the be the basis for beauty, even a better world. While in a general sense, the hacker ethic can be said to exist -- in part because many hackers have adopted this terminology -- this benchmark at times acts as the Achilles heel of journalistic and academic studies of hackers; it is often invoked in simplified terms, applied wholesale to hackers whitewashing the most fascinating ethical dimensions that flow out of computer hacking, which are precisely the ethical eddies, cracks, and tides that render hacker action more ambivalent and ambiguous than a crystal clear standard.

Week Two: The Craft and Liberalism of Hacking

Hacking may be contemporary but the logic of its labor goes back centuries for it is a prime example of a "craft" as defined by the sociologist Richard Sennett in The Craftsman. Reading about craftsmanship helps students understand the material and social life of hacking. But in reading the pages of Levy, one also gets a whiff of an ideological scent among hackers, for example, in their hyper-elevation of meritocracy and individualism, both of which have a long and complicated life in the liberal tradition. Since liberalism becomes important in the course later and is hard to define, we start grappling with it early on and we lean heavily on Stuart Hall's piece, "Variants of Liberalism."

Week Three: Phreaking The canonical (and I think misleading) story about hacking is that was born at MIT and evolved outward from there. Although MIT was certainly one place where hacking got its start, there were other genealogies in formation at the same time. We thus reappraise this version of history when we pay visit to another class of technologist, the phone phreakers -- the direct ancestors to the hacker underground. In the late 1950s, they started to study, explore, and enter the phone system by recreating the audio frequencies that the system used to route calls. To learn about these technological spelunkers of the phone system, we rely on a few of the early chapters in Bruce Sterling's The Hacker Crackdown and on Ron Rosenbaum's riveting Esquire article "Secrets of the Little Blue Box". The institutional independence of phreakers, in combination with some early political influences, such as the the Yippies (Youth International Party), made for a class of technologist whose aesthetic sensibilities and linguistic practices proved to be more daring, vivacious, audacious, and more transgressive than university-based hackers at MIT, Carnegie Mellon, and Stanford.

Week Four: Poor Man's ARPAnet (aka USENET) versus the Internet and the Politics of Technology

Hackers build technology that behaves not only technologically but also politically. To start thinking through this issue, we read one of the seminal pieces on the topic, Langdon Winners' "Do Artifacts have Politics." We use the framework to think about ARPAnet and its successor, the Internet, whose contradictory politics are laid out by Roy Rosenzweig in "Wizards, Bureaucrats, Warriors, and Hackers: Writing the History of the Internet." We also read Bryan Pfaffenberger, "If I Want It, It's OK: Usenet and the (Outer) Limits of Free Speech," as it covers some the earliest free speech battles that raged among hackers on USENET, battles that brought into relief the tension between elitism and populism that continues to be a defining mark of hacker sociality.

Week Five: The Hacker Underground and the Politics of Transgression

Phreaking was eventually eclipsed by what is commonalty referred to as the hacker underground, although for a period of time the two co-existed, a relationship signaled by one of the most popular e-zines in the history of hacking, Phrack, which my students read, along with textfiles, churned out in massive quantities by hackers. To learn about the underground, we read parts of Bruce Sterling's Hacker Crackdown as well one of the most definitive academic accounts on the subject Hacker Culture by Douglas Thomas. We supplement this material with a short piece by Dick Hebdige -- Threats, Striking... Poses -- as a way to understand how transgressive subcultures derive pleasure in performing the spectacle that is expected of them.

Weeks Six and Seven: The Politics of Free and Open Source Software

Perhaps one of the most important political interventions made by hackers is through the production of Free and Open Source Software (such as the web browser Firefox and the GNU/Linux Operating System). We start with the intellectual progenitor of Free Software, uber-hacker Richard Stallman. We read the "GNU Manifesto" published in 1985 where he proposes his philosophical and practical vision for Free Software. To get students up to speed about the fraught three hundred year history of intellectual property law, we read Carla Hesse's magnificent "The Rise of Intellectual Property, 700 B.C - A.D. 2000: an Idea in Balance" -- a gem for its ability to convey so much in such economical terms. Finally, we rely heavily on Chris Kelty's excellent account: Two Bits: The Cultural Significance of Free Software.

Week Eight: The Aesthetics and Politics of Code

Free and Open Source Software is about software, specifically source code, the underlying directions written by programmers and powering software. But what is code? What are its politics? To acquaint ourselves with the material and aesthetic properties of software, we read a handful of chapters from Software Studies by Mathew Fuller. We then move more squarely to the politics of code with Lawrence Lessig's piece "Open Code and Open Societies" as well "Code is Speech: Legal Tinkering, Expertise, and Protest among Free and Open Source Software Developers" based on my fieldwork with Free Software developers.

Week Nine: Encryption, Privacy, and Anonymity

Many hackers are concerned with privacy, some dedicating their lives to building and refining encryption software that can ensure privacy or anonymity. To get a bit of this history down, we read Steven Levy's "Crypto Rebels" and "How PGP Works/Why Do You Need PGP?" by Phil Zimmerman, the maker and liberator of one of the most famous pieces of encryption software (PGP stands for Pretty Good Privacy). We top things off with Cory Doctrow's novel Little Brother, which hits many flagship issues concerning privacy and encryption. Finally, I have students visit the Tor project website to acquaint themselves with a contemporary and vibrant Free Software project that makes software that helps ensure privacy and security.

Week Ten: The Pleasure of Creation

By the time we reach this point in the class, one thing is certain: hackers are obsessed creatures, motivated by the deep pleasures of hacking, learning, sharing, and for some, transgressing. We spend a week exploring the multi-facted, even kaleidoscopic, nature of pleasure. Martha's Nussbaum's short article -- "Mill between Aristotle & Bentham" -- introduces students to the theory of eudaimonia. First defined by Aristotle, eudaimonia identifies happiness as form of human flourishing, secured through the unfolding of human capacities, a version of pleasure quite common among Free Software developers. We read excerpts of Nietzsche's Birth of Tragedy and Roland Barthes' The Pleasure of the Text (which students tend not to find all the pleasurable) to get a taste of the more blissful, hedonistic, and Dionysian features of pleasure that can also mark many instances of hacking and especially transgression.

Week Eleven: Anarchism and the Politically Minded Hacker

Many hackers express some degree of ambivalence over the politics of hacking as Patrice Riemens has argued and as hackers themselves have raised. This is not the case with a small but well organized cadre of hackers located primarily in Latin America, Europe, and North America who have charted collectives, many of them influenced by the political philosophy of anarchism. To grapple with anarchism as a political philosophy (which, similar to hacking, is plagued with a parade of misconceptions), we turn to David Graeber's fantastic pamphlet, Fragments of an Anarchist Anthropology. We also read Jeff Juris's ethnographic work about technology activists during the counter-globalization era Networking Futures.

Week Twelve: Trolls and the Politics of Spectacle

If anyone has been paying attention to the Internet in recent years, it has been impossible to miss a class of provocateur and saboteur: the Internet troll, whose raison d'être is to be as offensive as humanely possible via raunchy (but often humorous and quite esoteric) language, images, pranks, and tricks, basically, doing it for what they call the "lulz." To get a sense of the cultural logic and exploits of trolls we read "The Trolls Among Us" by Mattathias Schwarts. To help us grapple with the nature of spectacle, we read a couple of chapters of Dream: Re-imagining Progressive Politics in an Age of Fantasy by Stephen Duncombe. We read excerpts from Lewis Hyde's magnificent book on tricksters to consider whether the troll might be an example of these mythical creatures that have dazzled countless societies with their trickery. We watch a talk on a protest movement against the Church of Scientology whose roots lie in the act of trolling but eventually turned into a morally serious protest movement, which nonetheless retained the tactics of spectacle as part of its political arsenal.

Week Thirteen: Nerds

Not all hackers are nerds but nerdiness does seem to crop up an awful lot among hackers (although many hackers grow out of nerdiness to become "geeks"). What does it mean to be a nerd? Where did the term even come from? What is the history of nerdom and its relationship to other ethnic groups? Benjamin Nugent's account American Nerd, The Story of my People is the way to get at these questions and issues, which we then apply to computer hackers. The book is a real hit with the students, probably because it is jargon free yet conceptually quite rich." (