robotnik2004: (Default)
[personal profile] robotnik2004
This weekend's reading:
Douglas Thomas' Hacker Culture,
Ron Rosenbaum's Little Blue Box article,
Larry Lessig's The Future of Ideas,
Stephen Usselman's Regulating Railroad Innovation,
and Nightwork: A History of Hacks and Pranks at MIT.

What do these have in common?

Mostly me chewing over whether I want to do an article on the history and politics of telephone hacking. Thomas' book was recommended to me as the best academic writing to date on hackers, which is a lot like being the tallest midget in the circus or the most articulate member of the Road Rules cast. Jeremiah lent me Rosenbaum's 1971 article on phone phreaks, often cited as a key inspiration for hacker culture and indeed the invention of the personal computer. Usselman's book is about a different technological system, but is the closest thing I've yet seen to a genuinely political history of technology the way I'm trying to write it. And Lessig has a nice succinct comparison of political choices embedded in the telephone network and the internet. The outlier here is Nightwork, which despite the title has little connection to that other kind of hacking. I just read that for fun. (ARFF!)

I know it's a little perverse to set about learning about hacker culture from anything so prehistoric as books. Whatever makes into onto a printed page is almost certain to be a) written by an outsider and b) woefully out of date (cf Thomas' chapter-long digression on the merits of the movie Hackers starring Angelina Jolie). But being up to date is not particularly important to me. And plunging into the history of hackerdom online would probably be a one way ticket down a rabbit hole of badly spelled cybermanifestos and memorials to deceased Shadowrun PCs. (Actually the spelling of that first link seems fine. But you know the kind of pages I mean.)

Now, for those of you just joining us, my dissertation is a history of the telephone network from the 1870s through the 1920s. And one of the axes I grind is that technological choices are inescapably political. Both in that they are made through the exercise of power and in that even innocuous technical choices have political relevance. The architecture of our communications infrastructure is itself political, and can't be understood outside the context of the Gilded Age and Progressive Era politics that produced it. And one of the ways I get at the question is by looking at people who "misuse" the telephone system of the day.

So the question is whether there is a similiar story to tell about phone phreaks and hackers in the 1970s and 1990s. Well, there's certainly a story. The question is whether there is a genuinely interesting historical argument to make. I have this suspicion there is one, either in connections or contrasts between the phone phreaks and the hackers, or in explicating choices embedded in the original construction of the telephone system, in the pre-breakup Bell of the 1970s, or in the internet of the 1990s, and in misuses of those systems. And then how all this is intersected by the Bell breakup, the Microsoft antitrust suit, and the politics of monopoly and antitrust in general. But I don't know. The politics of the hackers themselves usually seem pretty superficial, and are all bound up in psycho-social issues of geek culture and technological mastery. It's understandable, given who they were and hardly a slam on them, but I fear "boys will be boys" doesn't make for particularly revealing history. The real story might lie in Bell's responses to the phreaks and in analogous responses to computer hacking in the 1990s. But the hook, damn it, remains beyond my reach.

It may be just as well. The primary sources on this are very hard to get to. AT&T closed access to their archives in 2001. And Captain Crunch has not donated his papers to the Library of Congress, as far as I know. Still, it's frustrating.

Tangent #1: Thomas and Rosenbaum both make the interesting (to me) point that hacking is essentially a social, rather than a technological, activity. The key to a big hack (they say) is far more likely to be the hacker's ability to fast talk someone into giving up their password than it is some virtuoso technological performance. Which is funny because I haven't really read much that dissuades me from the stereotype of hackers as socially inept. (Angelina Jolie notwithstanding.) Rosenbaum's article is full of classic undersocialized guys who bluster in cheesy 1970s argot about all the action they're getting from highly hypothetical girlfriends. "I'm going to do some phreaking tonight of another kind... if you know what I mean," Captain Crunch tells his buddies. If you say so, Cap'n.

Tangent #2: Of a dozen master phone phreaks cited in Rosenbaum's article, five were blind. Got nothing to say about that, it's just an interesting factoid for you.

Date: 2003-11-22 02:15 pm (UTC)
From: [identity profile] mizalaina.livejournal.com
I *loved* reading about the MIT hacks. Some of them were sheer brilliance.

Date: 2003-11-23 08:22 am (UTC)
From: [identity profile] robotnik.livejournal.com
Oh yes indeedy. People around here still talk about the balloon emerging from the turf at the Harvard-Yale game.

Hack Attack, Mr. Mac?

Date: 2003-11-22 03:57 pm (UTC)
From: [identity profile] dreamsanon.livejournal.com
How does this fit into the history of sabotage? I mean, in some ways the phone phreaks were more modern sabot chucking clogs in the mills...or something. I know that the overtly political rationale wasn't always there. But isn't there an implied political act in fucking with the machinery. I've often thought that there were some strong parallels in monkeywrenching and hacking/phreaking. You know you can't beat the system, but taking out a bulldozer here and there has surely got to help.

Have you plundered the archives of 2600 magazine? They were inspirational growing up...

Date: 2003-11-23 08:25 am (UTC)
From: [identity profile] robotnik.livejournal.com
Good point, & I'm probably not being fair to dismiss hacker politics so quickly. There are likely good monkeywrenching parallels. But then hackers & phreaks have a complicated relationship to "the system" - they may be rebels against it in some senses but they also love it and require it to do what it is they do.

2600 = good idea.

Date: 2003-11-23 10:14 am (UTC)
bryant: (Default)
From: [personal profile] bryant
And if you're looking for that sort of thing, don't forget Textfiles.

Date: 2003-11-23 05:28 am (UTC)
From: [identity profile] krustukles.livejournal.com
Håpnes and Sørensen have an article in Keith Grint and Rosalind Gill's anthology about the production and performance of masculinity in hax0r culture. Of course the venerable Turkle has argued about the role of mastery and control in defining male hax0rs. From my notes:

In this chapter, Håpnes and Sørensen examine a male Norwegian hacker culture to "explore the interrelationship between gender and technology… [and] maleness and computing."(p.175) They are curious as to whether it is possible to view the gender identity of hackers as autonomous from their mode of computing.

Identifying some theoretical roots, Håpnes and Sørensen note some problems in much of the theory on gender and technology. First, there is the difficulty of "reflexivity… reduction and reification" in ascribing certain kinds of masculinity to the creation and use of technology. Second, "there are the preconditions of arguing the translation of masculinity into the artefact or system being designed"; this is reminiscent of feminist postmodernists arguing against the designation of sexual difference as the difference.

In choosing their research subjects, Håpnes and Sørensen set out to examine a group who stood for everything problematic about gender and technology. In their deviance and marginality, they represent some extremes of the intersection between masculinity and technology. Håpnes and Sørensen's project was threefold: "first, to analyse this particular culture to learn about the interaction between gender and computers; second, to improve our understanding of how users of an artefact construct the artefact, so to speak, as an ensemble of technical and cultural elements through processes of negotiations with human and nonhuman actors; and third, to assess the notions of a universal hacker culture…"(p.179)

Interestingly, despite the construction of this group as an extreme of macho culture, Håpnes and Sørensen noted some disparities between models of masculinity and positivist technology use and actual cultural practice. For example, they noted combinations of "competition and collaboration, individualism and caring"(p.186) which were inherent to the imagining of the community. In fact the culture was quite complex, evidence of both the fluidity of masculinity and the flexibility of computers as a cultural medium.

Date: 2003-11-23 08:32 am (UTC)
From: [identity profile] robotnik.livejournal.com
Thanks for the cites and the quotes. Consider them yoinked.

Once again, the gender people get to a topic first and show the rest of us how it's done. You don't need to do gender study (whispers: or even really care that much about it) to be deeply in the methodological debt of these academic monsters.

Don't you wish you had a dotted å or a crossed ø in your name to give you some extra Euro-theory cred?

Dëth Fück

Date: 2003-11-23 09:42 am (UTC)
From: [identity profile] krustukles.livejournal.com
It's also interesting that certain groups of males have become "proletarianized". The big ones in my mind are the corporate or academic IT depts, who remain male despite significant female inroads into the field. The IT guys, despite their claim to (perceived) elite types of knowledge (though this advantage is also degrading), are also sort of like plumbers---you call them when your computer is plugged. Claims to geek superiority within a limited context (i.e. among peers) are a bit like farting against thunder, given the overwhelming social rejection in other arenas, not to mention that they are deskilled and knocked a few rungs down the class ladder. So sad: a temporary window of technophallic domination slams shut on the socioeconomic genitals.


P.S. You owe us.
P.P.S. I said fart.

Date: 2003-11-23 12:03 pm (UTC)
From: [identity profile] robotnik.livejournal.com
There are worse things to be than a plumber. In fact, maybe that's a model IT could emulate. Given that all those dudes in the computer lab are not going to be dot-com millionaires, IT workers could unionize in a skilled trade union / guild approach. Highly skilled blue collar workers have a pretty good gig as long as everybody with that skill set maintains solidarity.

p.s. You said genitals.

Date: 2003-11-25 11:32 am (UTC)
From: [identity profile] sneech515.livejournal.com
Bruce Sterling's The Hacker Crackdown is, by now, certainly showing its age, but it's still a good, reasonably intelligent look at the hacker culture of the late 80s/early 90s as it related to the famous AT&T crash of 1990 and the bygone days of phone phreaking.

I was reminded of your research, Rob, in the first chapter when Sterling is describing all the weirdness and screw-ups in the early phone system of the 20s and 30s. Apparently Ma Bell -- perhaps likening the new job of "operator" to that of "paperboy" -- originally hired only teenage boys to work in their switching stations. Until, that is, the precocious little proto-hackers started screwing around with the circuitry.

I guess that was how Bell first discovered that boys + technology = trouble.

-- S

Profile

robotnik2004: (Default)
robotnik2004

July 2014

S M T W T F S
  12 3 4 5
6789101112
13141516171819
20212223242526
2728293031  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jul. 10th, 2025 02:27 pm
Powered by Dreamwidth Studios