Friday, February 11, 2022

COPYRIGHT DOES NOT EXIST

 

COPYRIGHT DOES NOT EXIST

By Linus Walleij, 1998

Translation: Daniel Arnrup (svenskefaen@svenskefaen.no), 2000

TABLE OF CONTENTS

Preface

Chapter 1 - Introduction

Chapter 2 - Hackers!

Chapter 3 - Grass Roots

Chapter 4 - Underground Hackers

Chapter 5 - Subculture of the Subcultures

Chapter 6 - The Bleep Culture

Chapter 7 - Rave, Techno, and Acid

Chapter 8 - Cyberpunk

Chapter 9 - An Electronic Interest Group

Chapter 10 - Computer Crime

Chapter 11 - Artificial Intelligence

Chapter 12 - Virtual Reality

Chapter 13 - Technocracy

Chapter 14 - Female Hackers

Chapter 15 - Cybernetic Society

Chapter 16 - The Future

Chapter 17 - A Cybernetic Utopia

Appendix - White Knight vs. Otto Sync


PREFACE

I'm going to start by telling you what it cost me to create this book: lots. Lots of time, and in actuality, lots of money. I'm not complaining. I've had plenty of both. A large part of the book was written during a phase of my studies at a vocational college. It's therefore more or less financed by the public means in the form of student financial aid that I received at the time. In a way, you could propose that due to this fact the book belongs to society. The question is whether society wants to have it.

When you publish a book in a conventional manner, i. e. through a publisher, there is always some kind of quality control. People with many years of experience in the field read the material and ascertain that the content is both well formulated and well motivated. The problem is that they also make sure that the content is, as we say, "politically correct", i. e. that no one will take inordinate offense at it. If a publisher releases obviously inappropriate books, it will suffer from badwill. This is why obviously well-written and even more obviously portentous books such as Mein Kampf are printed and distributed by smaller publishers that don't have to worry so much about their reputation.

I don't know if any publisher wants to release this book in print, but I leave this as a possibility. [Translator’s not: the book If I haven't received an offer within a year or so, I'll release this book under public domain, which means that it will always be free of copyright. Until then, the following applies to this material:

1: It will be absolutely free in electronic form. It may be copied and distributed through media such as diskettes, CD-ROMs, through BBSs and the Internet, and through public and private organizations without any prior permission from me. I would, however, be grateful for receiving a reference copy in case the book would be mass distributed. These terms will not be altered if a publisher prints the book. I do not intend to commit to a contract with anyone who wants the electronic rights to its content.

2. At the moment it is not permissible to mass-distribute the book in printed form without my prior permission. If you want to print a large run of this book I'm sure I wont have a problem with it, but I'm afraid I need to retain control over this process.

Now that you've read this far, you probably realize that I give you free reign in general terms. The distribution of this book is your responsibility too, and the sound of its message is already ringing in your ear. Put it on disks and give it to your friends. Put it on CDs and distribute it with magazines. Print it out on paper if you want to.

With the exception of electronic and personal use, this work is currently (and ironically) copyright-protected. In an earlier version of this preface I came down on the entire capitalist system, and elaborated on how much I hated attempts to treat information as property. I've now settled down a little and realized that if my thoughts are going to have a chance to reach ordinary people through an established publisher, I must be able to give that publisher some competitive advantages.(1) I'm not a utopianist; therefore, I have to make compromises. (And I'll be damned if I'll lose any sleep over it…)

Finally, I will issue the warning that my own values and opinions heavily influence this book. I'm a declared individualist, and I don't mind being called a socialist. At the intersection of these two values there is a little-known ideology called syndicalism or Kropotkin anarchism. Basically, I consider all private property to be equivalent to theft(2), but I'm not so bloody stupid that I don't realize that a society without private property is a utopia. My opinions on freedom of speech and of the press are similar to those of the most liberal organizations in Sweden. I have nothing against small and medium-sized companies, but to me, enormous intercontinental corporations are more dangerous factions of power than democratic governments, and as such, corporations must be subject to the same oversight as that for governmental organizations.

I'm now going to tell you about the culture that made me what I am.


1.      I have now realized that compromises are worthless in this context.

2.      Private material property is theft. "Intellectual property" is even worse, possibly armed robbery. Censorship is rape.


COPYRIGHT DOES NOT EXIST

A book about information and power
For everyone and for no one

By Linus Walleij


DEUS EX MACHINA
CARCERES EX NOVUM

This book is about currents of thought in literature, technology, music, film, law and ideology. It was written after I realized that if I didn't write it, somebody else would. It was also written because I wanted all of the nice hackers in Sweden to be aware of, and educated about, their historical and ideological heritage. Finally, the work has been written with an air of popular science, to make it somewhat easier to understand (although the last statement can probably be debated; some chapters are considerably more difficult and technical than others).

Some questions to which you should know the answers before you start reading this book:

Q: Why should I read this stuff?
A: To understand new concepts within information society, emerging youth culture, and public debate, and also to give yourself the opportunity to form your own opinions through confronting those of myself and others. The book is focused on cultural phenomena in particular, since they are the strongest indicators of the direction of a society. Our society, at the brink of the information society, is called the post-industrial society. I will not hide the fact that I will also attempt to make you question that society.

Q: What is a computer?
A: A computer is an object that obeys the laws of nature, just like a human being. Like a person, it is neither evil, boring, kind, troublesome, or particularly intelligent. It becomes what it is made to become, just like an individual in society. The difference between a human being and a computer is that the computer has the opportunity to know with certainty who has created it, and it can look like virtually anything. In 1995, most people think that a computer looks like a square box. The computing field distinguishes between microcomputers , minicomputers , mainframes , and supercomputers , each being more powerful and cool than the previous. Today, the lines that separate one from the other are so blurry that these labels are a bit antiquated. A microcomputer, for example, is a PC, Mac, or similar home computer. The average person has hardly seen any of the other types.

Q: What is a computer network?
A: A computer network consists of two or more independent computers that have been connected by a cable. It is customary to distinguish between LANs ( Local Area Networks ), where computers inside the same building or at most the same block are connected, MANs ( Metropolitan Area Networks ), which connect computers throughout an entire city, and WANs ( Wide Area Networks ), which connect computers across great distances. The greatest network of them all is the Internet, which links all kinds of computers - and networks - across the entire world. A computer network allows for the transfer of information between different computers, may it be text, images, sounds, or anything that can be entered into a computer. It is similar to telephones or postal transport, but better and faster. Actually, the entire phone network is a computer network, except it connects people instead of computers. Many WANs such as the Internet employ the phone networks instead of laying their own cables. Computers that hold together a computer network are almost exclusively minicomputers or mainframes, i.e. large, refrigerator-looking boxes.

Q: What is a BBS?
A: BBS stands for Bulletin Board System , which really means an electronic bulletin or poster board. Similar to a regular bulletin board, it is necessary to visit it frequently to see its contents. You can also put up your own "notices" and receive replies to your submissions through other written messages on the board. There are BBSs that are partially connected to the Internet, and some that are stand-alone. Today, you connect to a BBS through the use of a modem, a computer, and a telephone line. In the future, BBSs will probably be replaced by conferencing systems (a type of giant BBS) on the vastly more efficient Internet. Newsgroups are an example of such conferencing systems. Users can also send private electronic mail to each other or mass-distribute computer software through a BBS.

Q: What is Cyberspace?
A: Cyberspace is where the money you keep in the bank resides. It is where a telephone conversation takes place and the space through which television programs travel on their way to your receiver. It is an electronic reality consisting of information, and it actually only exists because people have agreed that it works. Physically speaking, it consists of cables, radio waves, pulses of light and large computers with gigantic memory capacities. It is a physical occurrence in the "real" world that we may, with an ounce of faith, consider a universe of its own. It is a reality in which man is God and has created all. It is something of a religion. Most people "believe" in cyberspace, or they wouldn't use an ATM to withdraw currency. The entire economic system of the West exists inside it. Cyberspace was born on March 10, 1876, when Alexander Greham Bell "invented" it. Without electricity, there is no cyberspace. Our civilization is already dependent on cyberspace; if it disappeared, the economy would collapse and the West would perish.


Chapter 2
HACKERS!

HACKER... the word itself has an air of magic, and many connotations. Some associate it with computer crime, intrusion, and espionage. Others imagine a skinny and myopic teenager, whose acned face is constantly illuminated by the glare of a computer screen. Many immediately think of the information officer at work. In recent years, some have even embraced the hacker as a hero. Personally, I see the hacker as a messenger sent by humanity to explore the worlds of information. This mission may seem superficial and self-imposed - perhaps even foolish - but it will make more and more sense the more you read on.

The word originally applied to the people who spent their time crawling under the railroad tracks at the Tech Model Railroad Club's (TMRC) facilities at the Massachusetts Institute of Technology (MIT) in the 1950's, connecting switches and relays with cables. This model railroad was one of the first computer-like structures. A hack originally meant a prank of the kind that students and faculty played on their school (or rivaling institutions), such as wrapping the entire roof in tinfoil. A good hack would be very conspicuous, and also prompt the observer to ask him- or herself: "How in the hell did they do that!?". Later, the word became synonymous with a spectacular solution to a technical problem, or an ingenious computer program, or some other generally brilliant design. A hacker , therefore, was someone who created and implemented things of this kind.

A hacker, generally speaking, is a person who uses a computer for its own sake because it's fun. An author that uses a word processor all day is not a hacker. Neither is a graphic designer, inventory specialist, or computer instructor. Their professions simply require them to use a computer to simplify or improve the efficiency of some other task. However, a programmer that loves his or her work is a hacker. Likewise, an enthusiastic computer technician or microcomputer designer is also a hacker. Last but definitely not least, there are hobby hackers , who actually constitute the largest and most overlooked group of computer enthusiasts - probably because they don't use a computer in a professional sense. These amateurs do not have PR directors shouting their cause, nor do they have publishers or trade journals that print their opinions. Some elements of the media focus on this group, but they seldom speak for them; rather, the computer media generally focuses on "bringing up" the amateurs to the standards and norms of the professionals.

In the following section, I will try to summarize a variety of concepts, names, and ideas, all relating to electronic culture and especially the hacker culture. I will also attempt the rather difficult task of classifying these events and ideas from a historical perspective. This can be a risky venture, considering that the time frame is short and it is the type of thing that often generates lots of criticism. Nevertheless, I will proceed; I feel worthy of this task because I have grown up in this culture, and I consider myself to have a very personal relationship to it. I will even suggest that I have some of my information generation's spirit in my blood. Furthermore, I feel that it needs to be done

It is a tangled story primarily concerned with young people in the 60's, 70's, 80's, and 90's. It is a history of devotion, computer programs, authority and ingenious scientists. The tale is about hippies, yippies, libertarians, anarchists and classical socialists in one sordid mess, and the ideology that was born out of this mess through a conglomerate of subcultures. We will be thrust between order and chaos, from quiet computer rooms where the only the soft clicking of keyboards can be heard, to high-octane decibels at techno-rave parties in European warehouses.

Let us travel to MIT, sometime in the 60's, for it is where the story begins...

The Cradle of the Hacker Culture

 It was no coincidence that the hacker culture was born at MIT. This is where the first large computer networks were created, and the faculty discovered that some of their students were so devoted to their computer studies that the teachers let them work independently. Among the more famous people at this liberal faculty we find Marvin Minsky , now a legendary scientist in the field of artificial intelligence. Thus, the first hacker's association was born out of a close-knit group of dedicated students. The work ethic that formed among these early hackers resembled both that of academic study and that of a non-profit organization.

A "Hacker Club" by itself was hardly anything new; like other student groups, both bad and good things came of the association. However, this club became more sectarian and devoted (read: fanatic) as it grew. The mood of the group came to resemble that of the groupof students in the movie Dead Poets' Society , and the members increasingly neglected their studies in favor of the exploration of computers and computer technology. In particular, Digital Equipment Corporation's PDP-1 computer turned out to be incredibly addictive. This machine differed from the mammoth IBM machines that had been used by universities since 1948, in that you could work directly with the computer. You could see your program's execution, and you could correct errors (debug) while the program was running. In a flash, the hackers invented a number of new programming tricks and developed, among other things, the first computer game (Spacewar ) and the first joystick. The accomplishments of these hackers became so notable that they were asked to assist in the development of the PDP-6 computer, which became a huge hit for Digital. The company currently manufactures behemoths like VAX and DEC computers, and it owes a great deal of its success to the hackers at MIT.

If these hackers had been treated like other students, they would have been expelled when it turned out that they spent their days (and especially nights) hacking away on the school's computers instead of studying for their finals. That would have been the end of the story. However, by a stroke of luck, the American Department of Defense developed an interest in MIT's resources through ARPA (Advanced Research Projects Agency), which paid MIT to hire developers for a project named MAC . MAC stood for Multiple Access Computing and Machine Aided Cognition; the goals of these projects were to have several users sharing a computer, and to make it simple for users to take advantage of the computer's resources.

At MIT, the hackers progressed to developing networks, message systems (one of the worlds first time-sharing systems, which allowed users to share a computer by allowing it to process the requests of one user at a time), and above all artificial intelligence (AI), a research area in which MIT is still a world leader. The hackers speculated about the nature of intelligence, and could not understand what made it so difficult to capture even the simplest operation of intelligence within the circuits of a processor. In the late 70's, a computer science professor by the name of Douglas Hofstadter released a book with positively religious undertones called Gödel, Escher, Bach: an Eternal Golden Braid , which has served as an articulated statement of the hackers' world view. This work is well-known among hackers, and is also considered a masterpiece by literary experts. Unfortunately, the book is challenging (but not hard to read), and it is found in the mathematics section in most libraries, which tends to scare off many potential readers.

Hackers derived a philosophical foundation for their culture from Hofstadter, and speculations about self-referential intelligent systems (self-referential means "learning from mistakes", or simply: learning ) figured heavily in this philosophy. Parallels were drawn to such varied subjects as paradoxes among the ancient philosophers, Bach's mathematical play with harmonies, Escher's mathematically inspired etchings and drawings, and Benoit Mandelbrot 's theories of order within chaos (which are physically illustrated by computer-generated chaos images, also known as fractals ). The arguments in the book eventually lead to an understanding of Gödel's Theorem, which proves that every complete mathematical system, by virtue of its characteristics, contains errors - i.e., there must exist statements that are true, but cannot be proven inside the system.

Hofstadter's book culminates in an argument regarding self-reference and artificial intelligence, which is designed to describe human and machine intelligence as a function of mathematical systems. As mentioned, MIT housed the pioneers in artificial intelligence, and many of its hackers were convinced (and remain convinced) of the possibility of building intelligent machines. However, it is sufficient to establish that this early generation of hackers were very concerned with mathematics, mathematical philosophy, and classical natural sciences. This MIT-born philosophy, centered around intelligent systems, became the mainstay of the hacker generation. It also became important for hackers to display their own cultural identity. According to Sherry Turkle , a Harvard sociologist and the author of the book The Second Self: Computers and the Human Spirit , the hackers that she has interviewed prefer listening to Bach in particular, and avoid more romantic composers such as Beethoven because of a lack of order in these compositions.

That the hackers formed a tight core, with their own esthetic and philosophical values, was also a result of their voluntary seclusion. Among all university students, technology majors tend to keep the most to themselves, and an overwhelming majority are male. Among technology majors, computer science students are the most reclusive, and they are even more disproportionately male. If you happen to be a "reject" from the beginning, it is not hard to start re-evaluating your view of society and your environment in general. If you also happen to be Army buddies, this process is almost inevitable. The hackers mostly associated with each other, preferably by computer. In essence, they formed a government-sanctioned subculture.

The original hackers at MIT were, among others, Alan Kotok, Stewart Nelson, Richard Greenblatt, Tom Knight, and Bill Gosper . They were known to pull thirty-hour shifts in front of the computer and then crash for twelve hours. They found the machines so fascinating that they forgot about everything else while they were working. At the same time, they nurtured an ideology that held that all information should be free, ate Chinese take-out, and taught themselves how to pick every lock in the computer science building - which they justified with their devotion to putting all available equipment to its best use. Many considered this behavior to be careless and disrespectful, but the hackers considered it necessary to get the job done.

The fact is that the hackers constituted a homogeneous group that should be the envy of any teacher: they were interested in the subject of their studies, and they spent all day and all night solving problems related to their field. The faculty did not try to constrain them.

At this time, the history of networks began. Two computers were connected, then three, then many - and shortly, an entire network was created. Communicating by computer removes a host of irritating particulars present in real life: you don't have to dress up while punching on a keyboard, you can be totally anonymous, nobody will notice you belching or eating with your hands, and no one will know what the color of your skin is. Another user forms his or her opinion of you solely based on your written communication. Social status identifiers are virtually erased, and your opinions are just as valid as anyone else's. Nobody can beat you, fire you, or repress you if you decide to be insolent or speak from your heart. People who communicate by computer tend to be surprisingly honest and forthright, since the discussion is created by everyone and anyone can participate.

MIT, Stanford, Berkeley, and other major American universities were the pillars of the American defense project ARPAnet , which became the core of what is today known as the Internet. Through this network, MIT hackers came into contact with hackers at other universities, laying the groundwork for an national hacker culture which would later spread to Europe and, in particular, Sweden. Many of the slang terms that can be found in The Jargon File (a widely available file that includes a dictionary of hacker terminology) stem from this period. Some of the most venerable expressions can be traced to the original model railroad club, TMRC. In addition to the dictionary, the file contains anecdotes and observations on the nature of hacking, making it perhaps the most important written work of the original hacker culture.

When hacker culture spread from MIT through ARPAnet, it first reached the other large American universities that performed computer research, including the prominent Stanford and Berkeley schools on the other side of the continent. Thanks to ARPAnet, the hackers were not hindered by geographic distances, and could cooperate and exchange all kinds of information across this vast expanse - a privilege that normal people would not enjoy until the 90's. In San Francisco during the late 60's and early 70's, hackers were influenced by hippie culture, and this influence spread throughout the hacker communities of the entire world through ARPAnet. This was the first interaction between the hacker community and the hippie culture.

The hacker culture first reached Sweden in 1973, when the Linköping School of Technology (LiTH) started specializing in computer technology. The students formed a computer association called Lysator, which still claims to be the oldest computer club in Sweden (which is true), and the origin of the true Swedish hacking tradition (which is more questionable). Lysator will play a part in later sections of this book.

Hacker culture not only has its roots in the academic realm; these university hackers only constitute a small part of the digital culture scene. Now and then someone comes along and states that only the hackers that attend college and basically live in the computer labs are "real" hackers. Such a statement is ignorant and stupid. The meaning of a word is, naturally, defined by its users, and anyone who chooses to call him- or herself a hacker has the right to do so.

If we now allow the 60's to roll into the 70's, we will observe a monumental event: the introduction of the high-tech amateurs, who were just as much hackers as Bill Gosper and his MIT buddies.


Chapter 3
THE GRASS-ROOTS OF HACKER CULTURE

The grass-roots of hacker culture consisted of amateur radio and electronics hobbyists, who built their own microcomputers using the very first mail-order kits. Radio amateurs have been around since 1915, and they are organized in several camps. The most puritan insist that the telegraph key and Morse code are still the best tools for international communication. Others prefer radio telephony, i.e. voice transmissions. Still others have tried amateur TV, and some fiddle around with data communication by radio. Radio amateurs are found in any city worth its name, and many have turned to data transfer through the Internet, where they explore yet another means of communication. In a sense, the radio enthusiasts became the first hackers, even before MIT.

The radio amateurs, as opposed to the hackers, seldom attracted young people to any great extent. In Sweden, part of the reason is that you have to be sixteen years old and become certified to use shortwave radios. The average Swedish youth can't afford the courses and testing required for radio certification. Some mess around with radio anyway, and are known as radio pirates. Broadcasting amateur radio without certification is not a big deal, as long as you don't cause problems. You have to be careful to stick to the correct frequencies; broadcasting on bands that are reserved for specific purposes, such as emergency or military channels, carries a risk of being traced and fined. To keep track of what frequencies to use to avoid trouble, radio amateurs soon began cooperating internationally. This became the first virtual society , which transcended geographic boundaries but was limited by technology.

Radio amateurs embody a great deal of the culture that would later be adopted by the hackers: a fascination with technology (machines), and a fascination with interpersonal communication. Some are constantly on the lookout for new, cool equipment (gadget freaks). Others only want to find ways to communicate with other people as efficiently as possible, and try to improve existing systems (evolutionists), and some feel that they've mastered an aspect of technology and simply stay with it (these are sometimes called conservatives). Finally, there are those that most amateurs do not want anything to do with: the people that think that broadcasting pirate radio is the most awesome thing in the world, and who use technology as a means of rebelling against society.

The early computer-oriented electronics hobbyists initially gathered around the very first personal computer: the Altair 8800 , which was introduced as a mail-order kit in 1975. The computer got its name from a planet in a Star Trek episode, and sold in such large quantities that some of the enthusiasts formed their own user groups. They were invariably electronics hobbyists, and often professional engineers. Virtually all of them were adults, but they were struck by the same technical fascination with programming that kept the university hackers awake all night and made them forget everything but the machines. The most active user group was the Homebrew Computer Club in San Fransisco. One of its members was Steve Wozniak , a dedicated hacker who was to build the Apple II computer. His friend Steve Jobs successfully marketed it in 1977 as the first real personal computer. Homebrew Computer Club's Swedish counterpart was called PD68 , which catered to happy engineers and others who found microcomputers fascinating.

Personal Computers for a Broad Market
In 1978, the Swedish companies Luxor and Scandia Metric contracted with Data Industrier AB (DIAB) to build a computer called ABC80 . DIAB manufactured the chips, while Luxor built the case, monitor, and keyboard. Despite its monochrome display (which required a special monitor), the ABC80 was a quality machine. As with its contemporaries Apple II and Tandy Radio Shack TRS-80, the established American computer industry considered these computers virtually useless. IBM displayed no interest whatsoever. The current trend was toward manufacturing minicomputers such as Digital Equipment's enormous DEC, since the industry giants (spearheaded by IBM and Digital) projected a global need for about 50 large computers in the year 2000. Users would connect to these computers through terminal networks.

It is unclear what prompted Luxor and Scandia Metric to produce a computer for the regular consumer. Most likely, the chief engineers observed personal computing trends in the U.S., where the Apple II and TRS-80 had entered mass-production, and somehow persuaded the management to approve such a venture.

ABC80 became a great success among Sweden's early computer enthusiasts, who had been waiting a long time for a real computer (previous computers had been very expensive and directly imported from the U.S.). Now there was one - and to top it off, it was Swedish! In 1981, it was succeeded by the ABC800. In 1980, electronics hobbyists, engineers, and other enthusiasts formed ABC-klubben (the ABC Club) under the leadership of the legendary Gunnar Tidner . The ABC Club showed an interest in computer communications from the start, and at the end of that year it opened Monitorn (The Monitor), which probably was Sweden's first non-profit BBS. It ran thanks to a program written by Tidner himself. For the rest of the 80's, most new Swedish BBS's were named X-Monitorn (such as Örebro-Monitorn, Eskilstuna-Monitorn, etc.) as a tribute to Tidner's breakthrough. The club still has a "monitor" that's used as an internal switchboard for all kinds of things.

The ABC Club grew exponentially as personal computing in Sweden became all the rage it was in the U.S. It became a center for debating the technology of ABC computers as well as data communications in general. In 1985, through a contract with the QZ Computer Center in Stockholm, the ABC club gained access to a DEC-10 computer. On this machine, the members started a central BBS (a "real" conferencing system) with several discussion groups. The BBS, named Q-Zentralen (The Q-Zentral) ran on QZ's KOM-system, and resembled past and present networks such as U.S.A.'s Usenet and Prodigy, or England's Compunet.

Many of the pioneers of the future electronic Sweden were found on Q-Zentral's discussion groups: Sven Wickberg, Anders Franzén, Henrik Schyffert, and Jan-Inge Flücht.

It was not until the early 80's, after the introduction of small, cheap computers, that any real changes in personal computing took place. It was no longer necessary to know how to build your own equipment; therefore, anyone who could afford it could have access to their own computer (albeit not very advanced). Overnight, an array of personal computers appeared, in the U.S. as well as Europe: Sord, Atari 800, Sol, Texas TI-99A, Vic-20, Spectravideo, etc. Most remained on the market for only a few years before production was halted and/or their manufacturers went bankrupt. In Sweden, only three survived the competition: Sinclair ZX-80 (thanks to its low price), ABC-80 (because of its industrial applications and strong support from the ABC-Club), and Commodore 64 (which will be referred to as the C64 ), simply because it was the most technologically advanced home computer of the time. Even the first PC's hit the market in early 1981, but they commanded such exorbitant prices that no normal person would consider them personal computers. In America, the Apple II, Atari 800, Commodore PET, and C64 were the main survivors. Apple II, in particular, was to the U.S. as the ABC-80 was to Sweden. To this day, there are resilient Apple II-fanatics who still use their late 70's computers, just like Sweden has its resilient ABC-80 users (some of which make up the heart of the ABC80 Club).

Initially, most European hackers were of the same kind as the American ones: old radio amateurs, engineers, or electronics enthusiasts who dreamed of using a real computer such as VAX or IBM (those lovely, gray, refrigerator-looking things) instead of simple home computers. The hacker culture from MIT in the 60's, and its extension of the radio amateurs' philosophy, were considered an ideal; a real hacker was a person who wrote programs that did something useful (or appeared to do something useful), or who had mastered electronics and could modify their computer to the amazement of their friends. The most fortunate computer clubs had been able to start their own BBS's on a used minicomputer purchased from some company. The hackers that had gotten started on ABC80, minicomputers, and electronics were generally shocked and somewhat disgusted by the culture that emerged in the mid-80's through the invasion of the C64 (this will be discussed in the chapter 5, Subculture of the Subcultures ). Many of those hackers have now obtained a PC, and consider writing shareware programs and other real "hacks" to be a noble art.

Hackers of this sort also started the alternative computer network Fidonet . In San Francisco, amateurs Tom Jennings and John Madill devised a system in which different BBS's called each other according to a specific pattern, and through skillful coordination managed to provide coverage as broad as the Internet's. The main difference was that electronic mail had longer delivery times, and there were no permanent connections; the mail was distributed through substations, just like in an old-fashioned postal system. The network also allowed for globally accessible discussion groups. In the beginning of 1985, the Swedish Fidonet was started in Karlstad by Conny Johnsson .

Because of the increased affordability of the Internet, many think that Fidonet has become obsolete. Far from everyone agrees - Fidonet is a true amateur creation, while the Internet has mainly been constructed by academicians. However, for a long time there have been bridges connecting the two networks, enabling their respective users to send mail to each other. Personal computing became a public concept, and many teenagers received their first computer in the mid-80's. Most futuristic parents who bought a computer probably hadn't expected their children to spend as much time on the computer as they did, but this was a result of a marketing glitch. Personal computers were marketed as office systems to be used for financial, word processing, and database applications, for all of which they turned out to be quite useless. Apparently, it was simpler to find a recipe in a cookbook than to boot up the computer and look through some database which took five minutes to load. The only "useful" tasks that the machines could perform efficiently were word processing and simple calculations, which was something that few people were familiar with or could appreciate.

The only adults who really used their computers were almost exclusively technicians or technology fans, who could stay up all night and fight with their ABC80 to make it do one thing or another. Many were electronics hobbyists that modified the computer to suit their own wants and needs. (I belong to the wave of youths who were completely captured by the ABC computers around 13 or 14 years of age; for many in my generation, those machines became a ticket to the electronic world).

It would be until the 90's before the personal computer really got its breakthrough as a popular appliance - but when it came, it came with a vengeance. It is only recently that IBM PC's have become common in the home. If it hadn't been for the Altair 8800, Apple II, Atari 800, and ABC80, it would never even have occurred to IBM to manufacture PC's. The previous trend had been toward building mainframes: mammoth boxes that consumed several kilowatts per hour, and generated so much heat that they needed a separate cooling system to be able to operate. The idea of one computer for each user was and remains a hacker's notion, which goes all the way back to MIT, where many late nights were spent working alone on a PDP-1.

Had these microcomputers not emerged, the industry would still be working on their 50 supercomputers that were to provide computing power for the entire world. Without the microcomputer, modern information systems such as the Client-Server model (in which a coordinated network of computers distribute tasks and information between them) would never have been invented.


Chapter 4
UNDERGROUND HACKERS

As a product of the home computing trend and the futuristic spirit that followed the space race (which culminated in the moon landing in 1969), several technology-oriented subcultures formed. Some were perfectly normal associations of science-fiction enthusiasts and amateur radio hobbyists. Others were... peculiar. It was these organizations that drew a stigma on hacker culture, and are responsible for the fact that hackers are frequently thought of as criminals. How many of you - raise your right hand - have ever pondered what it would be like to have control of technology? To have the power to decide what radio and television programs will be broadcast? Imagine having these enormous electronic systems under your control. Imagine being able to fill all TV screens with white noise when that guy you hate shows up, or knock out all the telephones in the nation when you know that your beloved is chatting sweetly with his/her ex-lover. Imagine being the master of the information systems of society...

Phreakers
A collection of electronics fanatics in the 60's and 70's, called Phone Phreaks , were among the first to study the emerging computer technologies. These "phreakers" specialized in fooling the phone companies' switches into connecting free calls all over the continent, through a technique called Blue Boxing (which refers to a small blue box containing electronic components that produced the tones which manipulated the switches).

Some of the phreakers were university students. As the hackers had been mesmerized by computer technology, others had found it fascinating to try different number sequences on the school's telephones to see how far you could get connected. Some succeeded in connecting to the public telephone networks and call for free, since the school's local telephone network was a complimentary service.

A young man by the name of Mark Bernay (a. k. a. The Midnight Skulker ) had in-depth knowledge of the phone system. He went up and down the American West Coast and put up notices in phone booths with party-line numbers that he had established, and in this manner created a small network of technology-oriented youths. However, these youngsters did not turn phreaking into the considerable criminal operation it is today.

Instead, a man called Joe Engressia created (without knowing it) the underground movement of telephone manipulators at the end of the 60's. Even though the telephone company (then called Bell) had traced and prosecuted the first phreakers back in 1961, few of them had been members of an organized movement: most were businessmen, some were general laborers or students, and one was even a millionaire. The reason for this wave of phreaking was that Bell had made publicly available the information that anyone needed to build a blue box.

Joe Engressia was blind, but he had been compensated by the fascinating gift of perfect pitch. He could recall a note he had heard, and perfectly reproduce it by whistling. At age eight, he had already discovered that he could manipulate the system of telephone switches by whistling certain tones. These systems were called multi-frequency systems (MF), and it was information about these systems that Bell made the mistake of publishing in 1960. Joe was arrested after connecting free calls for some friends by simply whistling into the receiver. Thanks to the publicity surrounding the incident, Joe and other telephone enthusiasts formed a rapidly growing underground network mainly consisting of blind people. A few knew how to whistle the tones, while others employed early keyboards and synthesizers to produce the necessary sounds. Through Joe, phreaking grew into a major youth movement. He was arrested again in 1971, and was given a suspended sentence in exchange for promising never to manipulate telephones again. Later, he was hired by a small Tennessee company as a telephone repairman.

Allow me to make an observation at this point. Frequently, I hear of people that claim to know someone who can "whistle" their way through the telephone system and call for free. The person telling the story is never the one that knows how to do this, and upon closer inspection it turns out that it was really a friend of a friend... etc. Stories about "whistlers" should be treated as common myths, just like many other stories about phreakers and hackers. Please note that "whistling" requires perfect pitch, which is a talent that few people possess. It is also necessary to know (and have listened to) the tones that are required. Therefore, there is a diminishing number of people who would be able to do the trick - perhaps only a handful in any given country. Finally, this technique is useless against modern telephone systems such as the AXE-system ( translator's note : AXE is an acronym for Automatic Cross-Connection Equipment).

Joe and his buddies used keyboards to make calls. Other methods to produce the necessary tones were even more common. John T. Draper , a. k. a. Cap'n Crunch , used a toy whistle from boxes of the cereal brand with the same name. By covering one of the holes and blowing through the whistle, he produced a tone with the frequency of exactly 2600 Hz (which roughly corresponds to an E in the five-times-accented octave - not a very pleasant tone). This happened to be the exact note that AT&T and other long-distance companies used to indicate that long-distance lines were available. If either party to a call emitted this tone, the switch performing the call would be fooled into thinking that the call had ended (because that was how the switches signaled that the line was free), and therefore all billing for the call stopped. The whistle enabled people to call for free.

Draper was a very active phreaker. He initiated big party-line calls where he came into contact with many of the blind people, and disseminated his knowledge among other phreakers. He kept a list of contacts and directed the exchange of ideas between phreakers. Like some of them, he was an electronics fanatic, and himself built the tone generators that allowed total control of the entire telephone system. These generators were called MF-boxes (or, as mentioned earlier, Blue Boxes), and gave their owners complete access to national and international telephone traffic - totally free. It wasn't very difficult to construct these boxes, since all information concerning the MF-system had been made public. As it is not exactly cheap to replace an entire telephone system, there are still countries whose systems can be manipulated by blue boxes.

Many were (like Drapner) completely spellbound by the blue boxes' power to hook up calls across the world through cables and satellites; they inspired a feeling of unlimited power over the telephone system. One of Draper's more known tricks was to connect back to himself around the globe through seven countries, simply for the incredible satisfaction of hearing his own voice with a 20-second delay.

In 1971, the media caught wind of the phreaking phenomenon. One journalist, John Rosenbaum , wrote an article about the movement, and Draper was arrested and imprisoned shortly after its publication. He was approached by the Mafia (who wanted to exploit his skills), and severely beaten after he refused. Upon his release, an old friend (Steve Wozniak, who developed the Apple II computer) came to his aid and made him quit phreaking in favor of programming. After a few modem-related incidents on the Apple II (the modems in question were rather computerized blue boxes), he wrote the word processing program Easy Writer , which was sold by IBM with their PCs. He made more than a million dollars off the project.

In the same year (1971), the hippies discovered the possibility of making free calls. A militant faction of the hippie movement, known as yippies , started a magazine called Youth International Party Line (the name both referred to the political nature of the movement and to its obvious telephonic emphasis). The paper's mission was to teach methods of telephone fraud. Yippies are a kind of tough hippies that do not hesitate to use violence and terrorism to obliterate (as far as possible) American society. They also advocate the use of hallucinogens. Yippies consist of people that have become so sick of American society and its system that they only see one solution to the problem - total destruction. As opposed to classical anarchists, they were not opposed to technology; rather, they exploited all knowledge and resources available to them. One of the most frightening aspects of the yippie movement was that many of its members were quite intelligent . The yippies represented fundamentally different values and norms, which rocked the foundation of American culture. This political force would later sow the seeds of the ideology that is today known as cyberpunk , to which I will return in a separate chapter. Prominent yippie leaders include Abbie Hoffman and Jerry Rubin.

In 1973, a faction of technology fanatics broke away from the yippie movement and formed an expressly anti-social and anarchistic organization around the paper (now known as TAP , or Technical Assistance Program ) . In this new version, the magazine provided instruction in subjects far beyond simple telephone scams: it contained formulas for explosives, blueprints for electronic sabotage, information on credit card fraud, etc. Much of this content was naturally "exciting" for teenagers and slightly immature young men, and the periodical was widely copied and transmitted across the globe. Within a short period of time, there was a global network of phreakers. The basic philosophy of the paper is still the same as that of the yippie party (Youth International Party).

In TAP, peculiar forms of writing were introduced, such as substituting "z" for "s", 0 (zero) for o, and spelling the word freak "phreak". These trends have remained. In the early 90's, a character named B1FF showed up on the Usenet computer network and took this abuse of the written word to the limits of the absurd, writing words the way they were pronounced rather than the way they were spelled. B1FF combined this practice with an artificial habit of typing 1 for I, 4 for A, + for T, 3 (a reversed E) for E, etc. B1FF's typographical antics drove some people totally nuts, but the hackers thought the practice was super-cool and started writing like B1FF, to annoy generally anal-retentive people and to put an anarchistic stamp on the otherwise disciplined Usenet. They have even gone so far as to randomly mix lower- and upercase letters, resulting in text that is almost painful to read.

In Sweden, a sister publication to TAP surfaced. It was called Rolig Teknik ("Fun With Technology"), and aroused some attention in the dailies. Rolig Teknik was started by Nils Johan Alsätra, a legendary figure in Swedish underground culture. He was inspired by TAP, and published several articles between 1984 and 1993, all based on the same social philosophy as that of its American counterpart. The publication described how to make fake hundred-crown notes to fool gas station machines ( translator's note : In Sweden, the crown is the official unit of currency, and most gas stations have automatic gasoline dispensers that are used outside the station's business hours), how to fool electric meters, and (naturally) different methods for making free calls. Nils started the magazine after being fined for building and selling Black Boxes (or, as he himself termed them, unit-eaters ), which enabled owners to make free calls after connecting the boxes to their telephone jacks. Before he started selling them, he gave the phone company the opportunity to purchase the device for three million crowns (about $450,000). The phone company never replied.

Rolig Teknik expired after a raid in Gothenburg, Sweden, in 1993. The raid was precipitated by the event that Alsätra had begun to publish anonymous classifieds where the advertisers could offer goods, using the paper as a middle-man, without having to display their name and address. For every transaction where the payment was handled by the publication, Rolig Teknik received SEK 10 (SEK=Swedish crowns, SEK 10 = about $1.50). Since the content of many of these ads was rather questionable, this practice was considered equivalent to fencing and arms dealing. After the police obtained permission from the executive branch of the government (for the first time in Swedish history), they raided the editorial offices of the paper. Since then, not a peep has been heard about the paper or Alsätra himself. The possibility of using the "unit-eaters" that Alsätra invented disappeared with the modern AXE telephone system, but many of the other tricks remain effective to this day.

For the modern hacker, magazines such as Phrack or Phun are the hottest items. In Sweden, there is also a newfangled print magazine (in the spirit of Rolig Teknik) called Alias 1 . Phrack is probably the most popular, since it has received a great deal of publicity. It is free to individuals, while organizations and governmental institutions have to pay $100 per year for a subscription. In this way, the authorities actually help finance the publication of the magazine, since they have to keep up with underground trends and developments 2 . As the telephone companies have started to fix the glitches in their systems, phreakers have learned to use exceptionally sophisticated methods to make free calls. One technique involves actually reprogramming phone company switches. Another consists of using stolen or artificial credit card numbers to bill the call to some other (sometimes non-existent) person or company. Ideally, the bill should be sent to international conglomerates such as Coca-Cola, McDonald's, or the phone companies themselves.

The point of using credit cards is that by calling through a specific 800 number, you should be able to bill the call to the card in question, no matter which private or public phone you are calling from. Since you can't show the card to an operator (human or computerized), you enter the card number and PIN ( Private Identification Number , a personal code associated with the card number) that are necessary for credit purchases over the phone.

Another free-call method is to use a PBX ( Private Branch eXchange) , which is usually a corporation's internal switchboard. Using a PBX frequently involves dialing an 800 number associated with an automated switchboard, entering a code, and then dialing the number of the desired target. The call will be billed to the company that owns (or employs) the switchboard. The procedure is a simplified and automated version of the debit/credit card payment system, which means that a human operator is not required to verify and record numbers and codes. In the beginning, PIN codes were not even used; it was simply a matter of calling the correct toll-free number and then dialing the desired phone number. It was believed that keeping the toll-free number secret would offer enough protection. Since phreakers are known to systematically dial extensive series of 800 numbers, they soon discovered that it was possible to dial other locations from some of these numbers, and before long the phone companies introduced PINs. For reasons which I will soon explain, PBX codes are constantly circulating outside the spheres of their proper owners.

The phreakers, then, more or less randomly dial toll-free numbers in their search for PBXs, computers, phone company switches, and other interesting telecommunications devices, a practice commonly referred to as war-dialling (from the movie War Games ) or simply scanning (this practice is by no means illegal; the point of having a telephone is to be able to call the numbers you want, and as many as you want). During these treks across the phone networks, phreakers often run into all kinds of intriguing things, such as the phone companies' private service lines and voice mail boxes (VMBs). Through voice mail boxes, you can send messages to each other if nothing else works (read: in case the phone company has blocked all other means of communicating for free). Voice mail is usually employed by large corporations with many employees on the go, such as consulting or sales and marketing companies, as a more efficient alternative to written communication. Voice mail boxes use private codes just like an ATM machine, and the codes are just as easy to crack (simple codes like 1234, 0001, or the same number as that of the box itself are common). Some voice mail boxes also allow for further connections, which means that it's possible to call long-distance from such a box.

Most phreakers learn of technical methods and stolen or faked codes from other phreakers. Information of this kind is often disseminated by private BBSs and confidential relationships. Most people involved with phreaking know nothing about actually getting these codes or what the technical instructions they receive actually mean. They simply follow the instructions and advice they receive from others, punch in a few numbers and Presto! - they're hooked up with the other side of the world!

However, there are also people like John Draper, who really know what they're doing. The most zealous ones are often youngsters less than 20 years old, who nevertheless possess enough knowledge to match a degree in electrical engineering, or beyond . Naturally, this is considered a very dangerous situation in a society where knowledge is power. Of course, the phone companies' systems are idiot-proof. Not even all the idiots in the world would be able to re-program a telephone switch to give them free calls. The problem is the smart criminals.

Bright, inquisitive youths, who want to know how the phone networks function, usually begin by reading standard, college-level telecommunications literature. Many of the more accomplished ones could easily pass professional exams with a flourish. They master the jargon of communications technicians, and are able to recite obvious acronyms such as DCE, OSI, V.24, MUX, NCC, or PAD in their sleep. They seem to have a sort of fetish for the telephone network.

Not all (but a great majority) of the technical information regarding the telephone systems is public. The missing details are usually discovered through a method called "trashing", which entails going to the dumpsters outside a major telecommunications company and digging through the trash for useful documentation (that should have been run through a paper shredder, since it is not at all appropriate literature for teenage technology geniuses). In this manner, phreakers find out about functions, system commands, and secret phone numbers that are meant for internal use. Sometimes it's worse - the hackers actually have access to a person on the inside, who intentionally reveal company secrets to them. Today, these security leaks have been virtually eradicated, despite the fact that the number of people that must have access to this information is great. Trashing is also performed to retrieve obsolete or discarded equipment, which is not really a criminal practice. It is also not very common, especially in Sweden.

The art of "social engineering" is more widespread (and often more effective). The technique is based on attacking the weakest link in the entire phone and banking system: the human being. The expression comes from the telemarketing field, where it is part of the telemarketer's job to dissimulate him- or herself and focus on the customer's weaknesses, to build trust while still remaining concise and effective. The following is an example of social engineering by a phreaker, loosely based on a case published in a highly improper hacker periodical (WARNING: use this example to protect yourself and others from becoming victims of this type of crime, not to commit the same type of crime yourself. If you abuse this information, I will be sorely disappointed!).
  
P = Phreaker
V = Innocent victim
T = The victim's telephone


T : Ring!
V : Hello!
P: Hello, is this Mr. X?
V: Yes... who's calling?
P : Good morning, this is Noam Chomsky at the Accounts Security Division of the Chase Manhattan Bank. How are you doing this morning?
V : Er... just fine. What's the problem?
P : We have a situation here right now involving our databases. Your Chase Visa card is currently unusable due to the loss of a large portion of our customer files. If you would give me your card number and PIN, we can restore your account immediately.
V : Just a minute, who did you say you were?
P : My name is Noam Chomsky, and I'm with the Accounts Security Division of Chase Manhattan Bank. There's a situation here... (repeats what he just said)
V : (Suspicious) I wasn't aware of this. Is there a number I can call you back on?
P : Sure, no problem. I appreciate your carefulness. Give me a call back at 800-555-5555, (fake number that connects to a phone booth or that has been programmed into the phone company switches by P himself, which he can remove at will without trace. Naturally, it's not his home phone number).
V : Thanks! Talk to you in a moment.
T : Click. Silence. Buzz...
P : Chase Manhattan Bank, Accounts Security Division, Noam Chomsky speaking. How can I help you?
V : Great! This is Mr. X. I was afraid you were a scammer. OK, my Visa card number is XXXX... and my PIN is XXXX.
P : (Pauses, writing). Thank you. We will restore your account as soon as possible. Please refrain from using your card during the next 24 hours. Goodbye, and thank you for your cooperation.
V : Goodbye.
T : Click.



If you fall for this type of con, the consequences could be devastating. Normally, the credit card companies will absorb the loss if you can prove that it wasn't you that used the card, but if you can't... ouch! It is not only consumer credit accounts that are victimized; company accounts are also relentlessly exploited in this manner. Other methods of obtaining card numbers include trashing (see above) or simply searching through mail boxes for letters from banks that might contain cards or PINs.

Credit card numbers are also used by phreakers to purchase merchandise, such as computers and peripherals, synthesizers, stereo equipment, and other capital goods. The criminal orders the merchandise for general delivery or gives the address of an abandoned building, which makes it impossible to trace the perpetrator. This method is known as "carding" among phreakers and hackers. A fair number of Swedes have been arrested and sentenced for these crimes. A considerably greater number have (as usual) gotten away with it.

Phreakers are social people, who love to use their skills to talk for hours about basically nothing and everything. Naturally, conversation tends to focus on methods, codes, and other things that are essential to phreaking. Sometimes international party conferences lasting up to eight hours are created. Some talk, others simply listen, someone hangs up and someone else dials in. The conversation lasts as long as the moderator can maintain it, or until the phone company catches on and disconnects it. A very famous conference was the 2111-conference , which took place on the 2111 number in Vancouver (a test number for telex transmissions). Phreakers as well as sympathizing operators (!) used to call this number to chat away a few hours.

Clearly, these practices are illegal and terribly immoral, etc. However, I am sure that some readers would agree that it is rather amusing to see a few bright teenagers using the conferencing systems of multi-national corporations to set up global party lines, simply in order to shoot the bull for a while! The phreakers consider this gross exploitation to be harmless, at least in those cases where they just snatch bandwidth by using technical tricks. They are of the opinion that since the cables are already there, why not use them? Where's the harm in that? Does it damage the phone network? Hardly, unless you don't know what you're doing. Does it hurt any individuals? Not as long as you stay away from hospital and military lines. Do the phone companies lose money? Not at all, since none of the phreakers would have made these calls if they had to pay for them. Does it overload the phone network, forcing the companies to expand? No it doesn't, since international connections have a fairly high ceiling.

The real crime committed by phreakers is that of interfering with the social order. What if everyone started doing this? Everything would go straight to hell! International lines would break down, and chaos and anarchy would ensue. It's not a question of theft; more appropriately, it is a question of order . Stealing credit card numbers and using them, on the other hand, is fraud. These arguments are completely irrelevant to a true yippie, since he/she is only out to destroy society. In contrast, many phreakers are fairly average and law-abiding members of the middle and working classes. However, they have taken Nietzsche to heart and consider themselves a type of elite (or even superhuman) with the natural right to take advantage of the system. They would never suggest that everyone should exploit these systems in this manner, and claim that they also want to help the phone companies discover their security gaps by pointing out existing flaws. Therefore, they contend that actions can not be defined as good or evil solely on a legal basis, just like Zarathustra through Nietzsche had to reject the concepts of right and wrong . This has nothing to do with fascism; it's a theory of the improvement of systems through individual transcendence.

 The phreaker magazine TAP has been followed by other publications such as 2600: The Hacker Quarterly (the name is derived from the 2600-Hz tone that was discussed earlier), Iron Feather Journal, and a cornucopia of electronic magazines that are too numerous to list.

Telia ( translator's note: Telia is the largest telephone company in Sweden, and is a governmentally supported corporation. Before deregulation a few years ago, it was a state agency that had a monopoly on telecommunications traffic in Sweden) is reluctant to acknowledge that phreakers exist, and it would be safe to assume that a number of phreaking cases are kept in the dark (most likely to avoid consumer complaints such as: "Why do they get to call for free when I have to pay?", "Why doesn't somebody do something about this?", " I'm by God an honest taxpayer, and I demand ...", etc. etc.).

In Sweden, phreakers have actually succeeded in manufacturing fake phone cards, re-programming mobile phones to bill to someone else's number, using Telia's own access codes, using blue boxes to fool Telia's switches, and (most frequently) using foreign credit card numbers to make international calls 3 . Additionally, the oldest form of phreaking (known as gray-boxing ) still plays a part. Gray boxes (predecessors to the blue ones) are the boxes found attached to telephone poles or beside the electric company's fuse boxes. By hooking into a gray box, you can physically connect yourself to someone else's phone line and make calls in their name.

There are no reports on the extent of these crimes, and Telia would rather have it that way. To put the spotlight on security breaches would be fatal in the current market, where Telia competes with private telephone companies and has to be concerned with its image. Therefore, incidents of fraud are frequently covered up.

The situation is even worse in the United States, where many phreakers have studied corporate public relations in depth in order to use social engineering to set up fake credit cards or telephone service. They exploit the corporations' strong emphasis on customer service to pit the telephone companies against each other. For example, if a phreaker encounters problems in setting up a fake 800 number, he or she will say something like "well, if that's the way it's going to be, I might as well call X or Y or Z (competitors)". This serves to discourage phone company sales reps from asking too many questions or asking for too many details.

These problems point to shortcomings in a society where social interaction between businesses and people has become neglected, due to the extreme size of modern corporations. The social aspect of a business has been separated from its sphere of productivity in the struggle toward increased efficiency, which has created an anonymous society. According to conversations I have had with phreakers, the large companies are the easiest to deceive: they can't tell who's fake and who's for real since they've never encountered either one in person. The only available means of separating the wheat from the chaff is by observing what the individual sounds like and the quality of his/her vocabulary and verbal communication. The phone companies have turned into anonymous logotypes toward their customers, and as long as the business world works this way, phreakers will find ways to call for free.

Network hackers
Let us now leave the telephone networks and take a look at computer networks. As technology fanatics, the phreakers soon discovered computer technology. There were plenty of phreakers similar to Cap'n Crunch, who initially engaged in phreaking because they didn't have access to computers. Together with renegade college students and other less savory characters, they created small hacker groups that engaged in downright intrusive activities. In addition to being experts at tweaking telco switches, many of these hackers attained great proficiency in manipulating the large computer systems (VAX, IBM etc.) that governed the nodes of the Internet, which had become virtually global by the late 80's. These systems were usually UNIX systems (synonyms include machine , site , host , mainframe , etc.). Others specialized in VAX systems, which used the VMS operating system instead of UNIX. VMS became somewhat more popular among hackers, since it was easier to penetrate than UNIX.

The first hackers to become publicly known were Ronald Mark Austin and the members of his hacking group 414-gang , based in Milwaukee. 414-gang started "hacking" remote computers as early as 1980, and it was the 1983 discovery (just after the opening of the movie War Games ) of these hackers that sparked the entire debate of hackers and computer security. The 414-gang had entered the computer system of a cancer hospital in New York. While the group was removing the traces of the intrusion (after an interview in the New York Times, which included a demonstration of possible entry methods), they accidentally erased the contents of a certain file in an incorrect manner, with resulting in the destruction of the entire file. The mere notion of the possibility of this file containing important research results, or a patient journal, was terrifying. Prior to 1983, few people knew what hackers were. Now, everyone talked about them. It was probably this early debate that imbued the word with its negative connotations.

Personally, I use the term network hacker (they are also known as crackers or netrunners ) to define this type of hacker. Most of the first-generation network hackers used Apple II computers, for which there were several phreaker magazines such as Bootlegger . These magazines would become the predecessors of the future multitude of hacking and phreaking publications. When network hackers came to Europe, they primarily used C64 computers, and had no papers or magazines since such a tradition hadn't emerged among European hackers. This lack of forums greatly limited European hackers' activities. As they didn't have access to American Apple II's, they couldn't read the American hacking publications to learn to hack better. Network hacking has never been as extensive on this (the European) side of the Atlantic.

A funny detail is that after the 414-gang became famous, most hacker groups developed a penchant for putting equally incomprehensible numbers before or after their proper names. 414-gang derived its number from the Milwaukee area code.

It can be difficult to immediately understand what it means to "gain entry" to a computer system. To "crack" or "break into" a system simply entails convincing a remote computer to do things it isn't supposed to do (for you, at least). It could be referred to as instigation or fraud in more common terms. Let me illustrate it through the following dialogue:

   "Hello", the computer says.
   "Hi," says the hacker, "I would like some information."
   "Hold on a minute", the computer responds. "Who do you think you are?"
   "I'm the system administrator", the hacker says (or something like that).
   "Oh well, then it's OK", says the computer and gives the hacker the desired information.

Naturally, it doesn't look like this in real life, but the principle is the same. Hacking into a system involves a form of social engineering applied to electronic individuals. Since computers aren't that smart to begin with, one can't call them stupid for not being able to tell the difference between a system administrator or a hacker. Therefore, many think that the hacker is not playing fair by tricking the computer in this way (similar to stealing candy from a baby). To enable the computer to distinguish between a hacker and the system administrator, it has been given special identifying strings that the user must repeat, together with his or her username, when access is needed. These are called passwords , and the idea is that hackers shouldn't know about them. Sometimes, hackers find out what the password(s) is/are anyway, or in some other manner convince the computer to think that they are the system administrator or someone else who has the right to access the computer. An functioning username-password pair is called a NUI (Network User Identification, or user identity). A hacker sometimes refers to security systems as ICE (Intrusion Countermeasure Electronics). The on-screen exchange between a hacker and a computer can look something like this:

  *** WELCOME TO LEKSAND KOMMUNDATA ICE ***

  UserID:
QSECOFR (the hacker enters a name)
   Password : ******* (the hacker enters a password, which is normally not echoed to the screen)
   SECURITY OFFICER LOGGED IN AT 19.07 . (The userID and password together constitute a valid user identity named "Security Officer").
   ENTER COMMAND> GO MAIN (the hacker has "gained access" to the system). 4

The usual methods for finding passwords are not that spectacular. The simplest is to glance over an authorized user's shoulder, or actually recording the log-in keystrokes on video (since they rarely appear on the screen). Other "tricks" include searching for notes under desktop pads, or guessing different combinations of initials, birthdates, or other words and numbers that relate to the person whose user identity the hacker wants to take over. It is especially common for users to use their spouse's maiden name as a password. If the target identity is that of a system officer, the hacker tries different computing terms. All of this falls under the definition of social engineering, which I mentioned in relation to phreaking. A surprisingly effective method is simply calling the system operator and saying that you are an employee who's forgotten his/her password. "Trashing" and collecting loose pieces of paper at computing conventions are other common techniques.

The most sophisticated methods bypass the entire security system by exploiting gaps in the system programs ( operating systems , drivers , or communications protocols ) running the computer in question. To be usable, a computer must have system software running on it. Since VAX/VMS systems are fairly rare, it is mostly UNIX systems that are attacked using this approach. It is especially common to use glitches in the commands and protocols that bear mysterious names such as FTP, finger, NIS, sendmail, TFTP, or UUCP.

Methods such as the above are becoming less and less viable, since the security gaps are usually closed as soon as they are discovered. The "filling" of the gaps is accomplished as the system administrator receives (or in a worst-case scenario, should have received ) disks containing updated system software, which is then installed on the system. The programs are usually called fixes, patches, or updates. However, many systems officers fail to completely update the system programs, with the result that many of the security gaps remain for quite some time. Others neglect parts of the security system because it creates a hassle for authorized users. For example, many system administrators remove the function which requires users to change their password frequently, or which prevents the usage of passwords that are too common. Some computers (in 1995) still have security holes that were cautioned against in 1987. Swedish computers are no exception.

When a hacker has gained entry to a system, he or she can (often) easily obtain more passwords and usernames through manipulating system software. Sometimes, they read through electronic mail stored on the computer, in search of passwords. Imagine one such message: "Bob, I won't be at work on Friday, but if you need access to my numbers, the password is 'platypus'."

Most of these hackers never caused (and still don't cause) any damage to computer systems. Mainly, the intruders are driven by curiosity and a desire to see "if they can do it". It's about the same type of thrill that comes from wandering subway tunnels, or crawling through underground sewers, i.e. an exciting form of "forbidden" exploration. In fact, hackers in general follow an unwritten rule which states that one should never steal and never destroy anything on purpose. Those who break this rule are called dark side hackers (from the movie Star Wars ). In Clifford Stoll's book The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage , one can follow the chase of such a hacker.

The hacker that Stoll had problems with obviously belonged to the dark side: he tried to systematically retrieve classified military information, and had ties to the KGB (the events took place during the height of the Cold War). He had the assistance of one of the most feared hacker groups: Chaos Computer Club , an organization with a political agenda, founded in 1984 by Hewart Holland-Moritz . They purported to fight for individual rights in the information society, and were known for killing the project for a German information system called Bildschirmtext , by exposing its lack of security and reliability at a press conference.

In 1989, the case of the spying hacker made worldwide headlines, and Stoll wrote his book shortly thereafter. The case has spurred its own mythology: one of the players, who called himself Hagbard , was found burned to death in a forest, and many speculated that the death was KGB's doing. This is probably not true; the hacker in question was named Karl Koch , and had severe psychological and drug problems even before he started hacking, and it was most likely (as the police suspected) a matter of suicide. Among other things, Koch believed that the world was ultimately controlled by the Illuminati , a fictional Islamic mafia that has supposedly infiltrated governments and organizations since the 13th century, an idea he had gotten from the books by the same name. He was also fond of psychedelic drugs, which didn't help much. Upon closer examination, it is easy to reach the conclusion that Koch was a raging paranoid, but the headline "Hacker Assassinated by the KGB?" obviously sells more papers than "Hacker Committed Suicide?".

Koch, together with Pengo (Hans Hübner) and Markus Hess , were members f the hacker group Leitstelle 511 , which had a clear political profile and a taste for long nights of hacking and drug orgies. They had obtained classified information and software through the Internet, with Markus as a UNIX expert and Pengo masterminding the intrusions. The project, which consisted of systematically exploring American defense installations, was code named Project Equalizer . The name was derived from the hackers' slightly naive idea that their espionage would even the odds between East and West in the Cold War. This was more properly an excuse to spy for their own gain than an expression of real political intentions. Markus and Pengo, as the two most talented hackers of the group, mostly hacked for their own pleasure, and did not receive any considerable financial gains. All of the involved, after being caught, were sentenced to between one and two years imprisonment, but the sentences were suspended. Pengo was not charged, since he had fully cooperated with the police.

This is one of the few known cases of network hackers making money off their "hobby". Generally, people engage in this type of hacking for the intellectual challenge, or for the social aspects of data communications. Kevin Mitnick is another hacker to become more or less legendary. Originally, he was a phreaker who developed a hitherto unsurpassed skill in manipulating people as well as computers and telephone switches. Mitnick is the archetypal dark side hacker: He stole the source code ( source code is the version of a computer program that can be read, written, and modified by humans. After a process known as compilation , the program is readable only to computers - and hackers) for Digital 's operating system VMS 5.0 by breaking into their software development division through phone and computer networks. He was very vindictive, and punished police and companies that crossed him by giving them outrageous telephone bills or spreading lies about them through phones and fax machines. When police tried to trace his calls, he was instantly alerted and could abort the call, since he had hacked into the phone company Pacific Bell 's surveillance systems. When he was arrested, he was just about to steal the source code for the not entirely unknown computer game Doom.

After his arrest in December 1988, he was sentenced to one year's imprisonment and six months of rehabilitation. He was treated together with alcoholics and drug addicts for his almost pathological obsession with hacking. Recently, he was again apprehended after being pursued by a security expert by the name of Tsutomu Shimomura , and a journalist named John Markoff (who had earlier written a book about Mitnick).

Much of the publicity surrounding Mitnick was hyped to the point of witch hunting. Many were of the opinion that he wasn't as dangerous as Markoff portrayed him to be. Nevertheless, Kevin has become a symbol for the "dangerous" hacker: cold, anti-social, vindictive, and extraordinarily proficient in manipulating people and phone switches. On the other hand, he was never a master of computer hacking - a field in which he has many superiors. It is worth noting that Kevin never sold the information he captured to any third parties. He only wanted the VMS operating system to be able to improve his hacking skills, and he never cooperated with organized criminals.

This type of illegal break-in has been glorified in films such as War Games, Sneakers (1992), and the TV series Whiz Kids , and as a result, many (completely erroneously) think that hackers in general primarily engage in this criminal form of hacking. Even in the Swedish film Drömmen om Rita ( Dreaming of Rita , 1992), a romanticized hacker has one of the cameo roles. He is a symbol for the young, the new, the wild; a modern Jack Kerouac who drifts through the streets with his computer. The hacker is portrayed as a modern-day beatnik. An interesting detail is that the hacker in this movie goes by the name Erik XIV , which is the same pseudonym used by a real hacker in a few interviews with Aktuellt (a Swedish news program) and Z-Magazine in 1989, where he explained how to trick credit card companies into paying for international calls and merchandise ordered from abroad (crimes for which he was later convicted and sentenced).

Actually, very few youths interested in computers take to criminal activities. Nevertheless, computer crime is frequent, but the real problem is that computer systems do not have adequate protection; no hacker would be able to force a sufficiently protected system, even if theoretically possible. No one can fool a computer that is smart enough. Most security breaches are probably kept in the dark for PR reasons. As far as I know, no bank has officially lost money because of dark side hackers; on the other hand, if I were a bank and some hacker transferred a few million dollars to his or her own account, would I want to prosecute the hacker so that all of my customers would realize how insecure my computer system was? Swedes may remember the publicity surrounding the software bug in Sparbanken's (a large Swedish bank) computer system in 1994...

Companies with poor security would probably find it embarrassing if the public found out that teenage hackers could read their secrets or transfer money from their accounts. In those cases, it's PR-correct to put a lid on the incident, which is exactly what has happened in many instances.

The distinction between network hackers and phreakers is blurred. It is customary to say that a phreaker explores computer systems for social reasons, primarily to be able to call their friends long-distance for free, while an intrusion-prone hacker explores the systems for their own sake and for the thrill of outwitting technology. The anarchistic yippie attitude and the urge to break down systems stem from the phreakers.

Many have rightfully questioned society's negative view of hacking, i.e. "hobby intrusions". Hackers have been compared to cave explorers, searching for new realms out of curiosity and a desire for challenge rather than greed. Since the networks are so complex that there is no comprehensive map, hackers are of the opinion that cyberspace is the uncharted territory where electronic discussions take place, a universe which they curiously explore. To compare hacking to burglary is insipid. During a burglary, there is physical damage to doors and locks, and real objects are stolen. A typical hacker never damages anything during an intrusion (very few hackers are vandals5 ), and to the extent that he/she "steals" information, it is only copied, not removed. Essentially, the only "theft" that takes place is a few cent's worth of electricity and some minimal wear on the machine being used, but considering the high rate of depreciation of computer equipment, this can hardly be considered a loss. Furthermore, any computer connected to the Internet allows outsiders to use it to search for and distribute information.

I suspect that the main reason that the establishment fears hackers is that hackers assume the role of someone else - that they present themselves as system operators or other authorized users, and enjoy the privileges associated with their assumed status. The worst part is that they seem to be able to do this with ease, thus publicly embarrassing the computer experts that the corporations pay dearly for. This tends to be aggravating, especially since the business world in general and (to an even higher degree) the corporate world depend on a system of fundamental status symbols, where every person is at the top of their own little hierarchy. To act like someone or something that you are not is considered a cardinal sin (remember Refaat El-Sayed's fake doctoral degree!) ( translator's note : In the 80's, Refaat El-Sayed was the CEO of Fermenta, a large Swedish pharmaceutical company, who was ousted following a scandal involving purchased credentials).

The condemnation of hackers is disproportionate to their criminal acts, and sentences are way too severe. This is grounded in an almost paranoid fear of what the hacker accomplishes, and the code of ethics that he or she subscribes to. The hacker is (like most people) definitely not evil by nature, nor a hardened criminal, but an individual that listens to his/her own heart. The hacker is not a psychopath, nor interested in hurting or stealing from other people in a traditional sense. Possibly, the hacker wants to steal secrets, which frightens many. Later, we will go deeper into hacker ethics and ideology.

Swedish network hackers appeared at a later stage than the ones in the U.S., partially because of Televerket's ( translator's note : Televerket was the government authority that later became Telia - the name literally translates into "The Telephone Service") monopoly on the modems that are needed to connect to a computer across the phone networks. The first case that I know of happened in 1980, when a student at Chalmers School of Technology (at Gothenburg University) was fined for manipulating the billing system at Gothenburg's computer center in order to use the system for free. The first case to attract media attention occurred when a journalist from Aftonbladet (a major Swedish daily), Lars Ohlson , hired a couple of 17-year-olds, a few modems, and a few computers, and tried to break into Stockholm's QZ computer center (after seeing the movie War Games) . The QZ operators noticed what they were doing, which led to Ohlson's arrest and subsequent fining, under loud protests from (among others) Dagens Nyheter (one of Sweden's largest, oldest, and most respected newspapers). The three never succeeded in breaking into QZ, and the original purpose had been to test its security, which turned out to be very good... in 1983.

In the first 1984 issue of the paper Allt om Hemdatorer ("All About Personal Computers"), there was a report of a considerably more successful intrusion attempt. With the help of an imported Apple II, two youths (17 and 19 years old, respectively) managed to get into DAFA-Spar , the government's individual address database. Even though the information contained in the database was far from classified, it is easy to imagine the consequences if, for example, a foreign power could retrieve information about every Swedish citizen. DAFA-Spar themselves were surprised and shocked by the incident. The youths, inspired by War Games , had also succeeded in entering Gothenburg's Computer Center, Medicin-Data and the computers at Livsmedelsverket (the Swedish equivalent to the U.S. Food and Drug Administration) The hackers claimed to have performed the break-ins to point out security deficiencies.

Like their American counterparts, most Swedish network hackers seem to have worked alone, i.e., without forming groups. Reportedly, many of the first Swedish hackers were inspired by the BBS Tungelstamonitorn , which was run on an ABC806 computer by Jan-Inge Flücht in Haninge (a Stockholm suburb) in 1986-87. The BBS later changed its name to Jinges TCL and became known as one of the most outspoken and insolent Swedish boards through the amateur network Fidonet. In 1987, SHA (the Swedish Hackers Association ) was formed, which (curiously enough) is most famous for irritating freelance journalist and security consultant Mikael Winterkvist , after he attempted to chart the transmission of computer viruses in Sweden.

The SHA itself claimed to be Sweden's largest and most well-organized hackers group. Others see them as boastful people from Stockholm with a strong need for self-assertion, which is a rather empty sentiment considering that nearly all underground hackers have an enormous need to assert themselves ( translator's note: and people from Stockholm are often considered to be boastful and arrogant by other Swedes not from Stockholm). One of their most successful hacks involved an SHA member gaining access to Swedish Radio's computers, and becoming so familiar with the system that he could change the programming schedules at will. Just for fun, he changed Pontus Enhörning's (a famous Swedish radio personality) password and emailed him to tell him about it, which generated some publicity.

SHA succeeded, during its heydays, in entering several computer systems around Sweden: among others, SICS, KTH/NADA, ASEA, Dimension AB, S-E Banken, SMHI, OPIAB, DATEMA, and - last but not least - FOA ( translator's note: FOA stands for Försvarets Forskningsanstalt, or Sweden's Defense Research Facility). None of the victimized companies or authorities have shown any great desire to talk about the intrusions. Swedish security experts shrug and sigh when SHA is mentioned. The police, as well as many companies' own security teams, know exactly who the SHA is, but they can't prove anything. Mostly, the SHA is given free reins, since the authorities feel that they have the group "under control". They're not afraid of the SHA, and they have no reason to be, since the group consists of relatively benign hackers who are not out to destroy or corrupt anything. For the most part, all that they want is some system time and open telephone lines. If you shut them out, they respect it, but if you act in an arrogant and authoritarian manner toward the SHA, they tend to get pissed off and threaten with horrendous retaliation.

Sweden has also been subject to hacker attacks from abroad. Perhaps the most well-known incident occurred when a couple of UK hackers, Neil Woods and Karl Strickland (known under pseudonyms as PAD and Gandalf , collectively as 8LGM , which stood for 8 Little Green Men or the 8-Legged Groove Machine ), broke into the Swedish Datapak and Decnet networks during Christmas of 1990. Using a computer program, they searched through 22,000 subscribers looking for computers to access, and established contact in 380 cases. The two 20-year-olds were sentenced to six months imprisonment on the 4th of June, 1993, for computer violations in fifteen countries (they were the first to be sentenced under the new UK computer security regulations). Before one passes judgment on Pad and Gandalf, one should know that they were the ones that hacked into one of the EU's computers and helped expose Jacques Delors ' (a French EU representative) exorbitant expense accounts.

Virus Hackers
Computer viruses are constantly a hot item. This exciting area is still fertile ground for publicity in magazines and periodicals. The Michelangelo virus, discovered around March 6, 1992, attracted lots of attention. The virus was believed to cause great damage to data and computers around the world. These fears turned out to be greatly exaggerated; basically, the virus didn't do anything. This was taken to indicate that media warnings had been effective, and the theory, so to speak, proved itself. The question is whether the Michelangelo virus ever constituted a threat.

Computer viruses are small programs, and like all other programs, they are created by people. Hackers who engage in virus programming are made out to be the worst villains among hackers, and are thought to only be interested in screwing things up for other people. At the time of this writing, legislation is underway that would make the manufacture as well as distribution of computer viruses a criminal offense. The first modern viruses (such as the Michelangelo virus), the link and boot viruses , surfaced in the beginning of the 80's. Many of the first ones came from Bulgaria of all places, and it was in this country that the first BBS dedicated only to virus exchange and discussion appeared: the Virus Exchange . Supposedly, the reason for Bulgaria's central position in the virus industry was that the East Bloc, during some phase of the Cold War, decided to manufacture viruses for electronic warfare. Bulgaria is known for its high-class computer scientists, and so it was a natural choice for construction of these "weapons". Thus, many Bulgarian students came into contact with government-financed virus programming and later continued to develop viruses as a hobby. The most prominent of these students is Dark Avenger , who has attained cult status among today's virus hackers.

Individual link and boot viruses possess different attributes, but share the ability to propagate efficiently. Most are written by hackers, and not all viruses are destructive. Computer viruses have been classified as electronic life by researchers as prominent as Stephen B. Hawking . If so, then it is the first life form to be created by humans. Some virus hackers are just regular hobby hackers who have developed an interest in viruses, while others are network hackers. The electronic magazine 40hex (named after an MS-DOS function) is a forum for American virus builders, and primarily provides code for virus programs and explores virus techniques, but also reports on political and economic aspects of viruses. The magazine is published by the virus hacker groups Phalcon and SKISM (Smart Kids Into Sick Methods). (Notice the pun?).

It's a shame to say that virus builders are only concerned with destruction. Mostly, it is just another manifestation of the graffiti phenomenon , which is a desire to see one's name on as many screens as possible, and to read in the papers about the effects of the virus one wrote. It's a question of becoming someone. In addition, constructing a virus is an intellectual challenge that requires a relatively high degree of programming knowledge. The virus hackers are probably the most intellectual hackers next to the university hackers. In the case of destructive viruses, it is usually a manifestation of the phreakers' old yippie attitudes. The virus hacker is the fascinating person produced when you cross a yippie anarchist with a disciplined programmer. A related fact is that viruses are exclusively written in assembly language, which is the hardest and most complicated programming language to learn. No virus hacker that I've heard of has ever made money from making a virus.

The virus hackers have a sort of love-hate relationship to John McAfee and his company, which makes the virus-removing program VirusScan . Before he started working on computer viruses, he supported himself by selling membership cards for an association which simply guaranteed their members to be AIDS-free, so it is fair to say that he has had experience with viruses. It has been implied that his company supports virus production, since it is vital to its continued existence that new viruses or new versions of viruses are constantly appearing. The company's main source of income comes from program updates , i.e. selling new versions of the software that can neutralize and protect against the newest viruses. McAfee worked under a similar system selling AIDS-certificates. He was accused of bolstering the public fear of the Michelangelo virus in 1992.

Computer viruses can also be considered an art form. A virus is a computer program just like any other, and according to copyright laws, every creative computer program contains an artistic element. It is obvious that the creation of a virus requires determination, effort, and imagination. Imagine that while systems analysts and administrators are breaking their backs to get their systems to work in an orderly and coordinated fashion, there are little hoodlums out there trying to accomplish the exact opposite , i.e. chaos, disorder, and ruin. It doesn't take a lot of inside knowledge to see the humor in the situation. The virus builders are taunting the nearly pathological fixation on order within corporations and governmental agencies. It can very well be viewed as a protest against a nearly fascistic desire for control, order, and structure.
  
   "To some, we are demons; to others, angels...
  ... Blessed is the one who expects nothing, for he will not be disappointed."


  (Excerpt from the source code of the virus Dark Avenger, by the Bulgarian virus hacker of the same name. Translator's note: one does notice a mere whiff of inspiration from Hellraiser...).

The most notorious Swedish virus hacker is known as Tormentor . In 1992, he formed a loosely connected network of Swedish virus hackers by the name Demoralized Youth . Tormentor belonged to the relatively small group of hackers that became interested in virus building, and established contact with similarly interested Swedish youths. Among others, he got to know a 13-year-old who had collected over a hundred viruses, and downloaded new ones from the Bulgarian Virus Exchange BBS. During the late fall of that year, Tormentor distributed a virus of his own creation to different BBS's in Gothenburg, and could observe it spreading like a wave across Sweden. Intense Fidonet discussions ensued.

Someone discovered an "antidote" to Tormentor's virus, and he modified it and distributed it again, only to have it trounced by another anti-virus technique. This process was repeated five times before Tormentor got sick of constantly updating and distributing the virus. Afterwards, Tormentor concluded that the virus contained several errors. To start with, he had only tested it against McAfee's VirusScan; additionally, it was afflicted by several programming errors, and - worst of all - it was not destructive! Those are the words of a true anarchist. Tormentor embodies the virus hacker in a nutshell, and he is probably an eternal Swedish legend in the field. He was in contact with the SHA from the beginning, and is still involved in a feud with Mikael Winterkvist at the company Computer Security Center/Virus Help Center.

Among other well-known viruses we also find the so-called Trojan Horse AIDS (Trojan horses are viruses that infiltrate remote computers or networks). AIDS was a program that was distributed free-of-charge to companies across the world, following an international AIDS conference in London, and it purports to contain information about AIDS. When the program is run, it locks up the computer's hard drive and the user is prompted to deposit a certain amount in a an account in Panama (talk about electronic extortion). However, this virus has nothing to do with hackers; it was created by a man named Joseph Papp , who was not considered mentally fit to stand trial.

Another famous virus is RTM , a.k.a. The Internet Worm . This was a worm virus , which copied itself across computer networks. The program was written by the student and hacker Robert Tappan Morris (hence the name 'RTM'), and his idea was to write a program that traversed the Internet on its own, finding out how many systems it could get into. It was then supposed to report back to its author with a list of its destinations. Unfortunately, Morris had made a programming error which caused an overload of the entire Internet. For this little trick, he was sentenced to fines and probation. The worm virus idea originated at the Xerox Research Center in Palo Alto, California, where they were used to maximize the use of machine resources (for example, by having some programs run only at night, when no one else was using the computers).

Cable and Satellite Hackers
It is uncertain whether satellite and cable hackers should be referred to as hackers, and it is even more uncertain whether I have the right to call them "illegal hackers". First, what these hackers do is seldom illegal. Second, they are closer to radio amateurs and electronics freaks than computer users. On the other hand, phreakers and computer constructors are often considered to be hackers, and furthermore, neither radio amateurs nor electronics hobbyists want anything to do with them. Plus, they also subscribe to the fundamental hacker principle that holds that information should be free... so I guess they're hackers.

If you flip to the last pages of an evening newspaper, right after the sports pages, where you find all the ads for porno movies and Rogaine, you will also find ads offering cable TV decoder kits. These kits are built by this type of hacker. The entire Swedish branch of this underground operation can be traced to the close-knit circle of Rolig Teknik (which was mentioned earlier) readers. It is hardly possible to find a decoder builder that has not read Rolig Teknik.

The absolutely most famous hack that has been performed by this kind of hacker was witnessed by HBO viewers on April 27, 1987. In the middle of the movie The Falcon And The Snowman , the broadcast was interrupted by a blank screen on which the following text appeared: "Good Evening HBO from Captain Midnight. $12.95 a month? No Way! (Showtime/Movie Channel, Beware!)".

The basis for this message was HBO's plans to encrypt their broadcasts so that whoever wanted to see their programs would have to purchase a decoder. Captain Midnight , whose real name turned out to be John MacDougall , had interrupted HBO's broadcast by reprogramming the satellite that transmitted on that channel.

The transmission was interesting because it showed how vulnerable the technological society is. What if Captain Midnight had instead decided to alter the satellite's trajectory, and thus sabotaged millions of dollars worth of equipment? Perhaps worst of all, the hacker penetrated every television viewers consciousness and distributed the unequivocal political message which stated that TV, as a form of information, shouldn't cost anything.

On this subject, I would also like to mention some other electronics hackers like the Uppsala-based Atari enthusiast by the name of Marvin (an assumed name), who together with some friends constructed their own telephone cards - "eternal" cards that never ran out.... After a lengthy process, these Uppsala hackers were given suspended sentences and fines, while Telia never received a cent in reimbursement (which was partially due to the fact that Telia itself had made orders for these cards, as they were mighty curious about the invention). Many engineering students across Sweden became so impressed by Marvin's cards that they made copies, and soon there was a considerably greater number of copies than originals. Marvin himself never manufactured very many cards. Mainly he wanted to prove that it was possible, since Telia had boasted of the superior security features of these cards.

A similar case involved the Amiga hacker Wolf , a resident of Helsingborg (located in southern Sweden), who managed to acquire a card reader of the type that was used for public transit (bus) cards. Wolf was an unusually crafty young man, who was familiar with all types of electronic equipment, and also very mechanically talented. He had a two-year gymnasium degree ( translator's note: in Sweden, like many other European countries, the gymnasium offers an intermediate level of schooling somewhere between High School and university, and in some cases offers degrees) in electronics and telecommunications, but he was more dedicated than most university engineers. He had already had a run-in with the justice system for moonshining. Without any major difficulty, he managed to hook up the card reader to his Amiga and write a program that could control it. Initially, he probably only wanted to test the system to see if he could program the cards himself, but as time passed it turned into an enterprise. Eventually, it became an operation in which hundreds, perhaps thousands, of cards were forged. Due to a solid and secure database system, the regional transit authority was able to trace and block the forged cards. During a search of Wolf's residence, authorities found (among other things) Marvin's extensive description of Telia's phone cards.

The need for proper legislation for these types of crimes is pressing. There are operations that border the illegal, but that cannot be outright criminalized. It is not illegal to own a card reader or to manufacture fake cards. Electronic "identity documents", such as phone cards or decoders, are not considered identity documents by virtue of the fact that they are electronic, and therefore it is not illegal to possess them. Swedish legislation has simply not yet been adapted to electronic documents. However, using fake documents is clearly illegal. Only commercial manufacture and sales of pirate decoders is illegal - not private possession or distribution. Presumably, legislation has been limited so as not to infringe upon the freedoms of radio amateurs, which means that mail-order kits or other tools for amateur use are permitted. It would be totally legal to put up ads for phone card kits, just as decoder kits are being sold.

The solution to this controversy is, of course, not prohibition, but building systems that are so safe that they cannot be penetrated even if the attacker knows everything about their inner workings, which is possible through crypto-technology. The question is whether this solution is really that good. In a society that is based on electronic currency, this would serve to prevent all types of fraud and forgery. I will return to this subject in a later section.
  
Anarchists
The "hackers" that call themselves anarchists are hardly hackers in the traditional sense. Neither are they anarchists. More accurately, they're teenagers with a general interest in bombs, poisons, weapons, and drugs. Since relevant information cannot be found in most libraries, these teenagers find their way to that electronic computer culture in which all information is cross-distributed to other youths who do not themselves have children, and therefore do not feel any sort of responsibility for the information being distributed. For obvious reasons, the youths see themselves as equals, and consider the whole thing a rebellion against adult values and norms. Childish? Perhaps. As a protest against Big Brotherism, it can hardly be considered childish. In any case, there are plenty of adult "anarchists".

Anarchists distinguish themselves by distributing blueprints for weapons and bombs, drug recipes, and instructions on how to efficiently kill another person, etc., with inexhaustible interest. Some hackers become angry when they find their BBS's swamped with such material (which is often totally erroneous, dangerous, and useless); others let the anarchists carry on. The most controversial anarchist publication in Sweden is The Terrorist's Handbook 6 . Much of the information in the book has to do with basic pyrotechnics, and has nothing to do with terrorism (sometimes I wonder if one of my student neighbors has developed an obsession with this book, as he with inexhaustible energy detonates home-built fireworks every evening. Apparently, many chemistry students have learned a lot about pyrotechnics by studying this type of material).

Some people seem to collect similar blueprints and books in the same manner that others collect rocks or stamps. It is only recently that so-called ASCII-traders (ASCII stands for American Standard Code for Information Interchange, which is really a method of coding text) have surfaced; these people are information collectors who dial into different BBS's and look for exciting and somewhat suspicious information. Don't ask me why they do this. Collecting non-living objects is something that one engages in for no reason whatsoever. The digital information collector's obsession is obviously as strong as that of a collector of physical items.



1 Alias Publications is one of the publishers that have offered to print this book. The editor-in-chief, Mikael Borg, wanted me to write more about Alias in this book, which I can understand. Alias is an excellent magazine for those who are interested in this type of material, but who don't have access to BBS's and the Internet, or the energy to dig out the electronic documents that describe hacking techniques. Alias has a shortage of good contributing writers, but they do the best they can, and the paper is interesting to read. Wicked voices claim that Alias is just out to make a quick buck, but as far as I can tell, this claim is not true. Most of the material seems to be thoroughly edited, and the design is far above underground standards.
Update
: At present, Alias Publications has ceased doing business, and Mikael Borg has gone underground by moving to Thailand.
2
After writing this, one of my articles was accepted by Phrack (see Phrack #48, article 17): a historical summary of Swedish hacking culture, based on the research I did for this book.
3
The current method is manufacturing your own home-made cards that the new public phones accept as real credit cards.
4
An experienced hacker will instantly note that I've chosen a totally boring system: the AS-400.
5
Security experts constantly emphasize that there are destructive hackers out there. Remember that this threatening image provides the reason for their existence.
6
Pay attention to our definition of "anarchist" (see the first paragraph). Do not confuse hacker-anarchists with political anarchists. The Terrorist's Handbook was published in Sweden by a company that also published quite a bit of Nazi propaganda.


Chapter 5
SUBCULTURE OF THE SUBCULTURES


The phenomenon
that started at MIT, becoming global through personal computers and networks, has reached us in a subtle way. It is hard to recognize it as the same thing that drove American youth to spend their days and nights hacking. Few parents had any idea that their sons (and in some cases, daughters) could be influenced by a culture rooted in American universities simply by spending a few hours in front of a computer screen. The screen in question would be hooked up to a Commodore 64, for (in Sweden) it is with this machine that it all began.

The high-tech ( 1984) C64 had gone into full bloom; hundreds of thousands of youngsters in Europe, the U.S., and Australia sat hunched over their breadbox-looking machine, fascinated by its possibilities. The C64, like the Apple II and Atari 800, was built around MOS's 6502 microprocessor (which is still in use, including in Nintendo's entertainment system), and therefore many Apple and Atari owners saw the transition to C64 as a natural progression. At first, most programs (primarily games) for the C64 were quite primitive, with poor graphics and sound reminiscent of those produced by a PC internal speaker - that is, beeps and screeches. At some point, however, the market broke through a magic barrier and so many C64's were sold that it became profitable to start companies producing software solely for this computer. This had occurred with the Apple II and Atari in the U.S., but since the C64 was first real European home computer, these companies were completely new phenomena on the east side of the Atlantic. The first companies started in the UK, which was the country that had first started importing the C64, and which became the leading edge for European computer culture.

It was the games, with their (for the time) advanced graphics and sound, that would be copied and distributed through the so-called Scene. The Scene, a kind of virtual society, started in the U.S. around 1979, when Apple II and Atari games were hot stuff. The software companies were angry, and called the Sceners pirates and criminals. Pirate BBSs for personal computers (usually consisting of an Apple II and the program ASCII Express Professional ) had mushroomed and mixed their own values and electronic magazines into the underground hacker/phreaker movement. The most notorious BBS was Pirate's Harbour , which had such prominent users as the well-known crackers Mr. Xerox and Krakowicz .

Just before the C64's arrival in Sweden, and parallel with The ABC Club growing into a representative and presentable computer club, a small and tight group of Apple II enthusiasts had created an underground network. This network included Captain Kidd , Mr. Big , Mr. Sweden , TAD , TMC (The Mad Computerfreak), and others. Since there was no Swedish market for Apple II software, the group had imported games to crack and share. They even had contact with the infamous American Apple II underground and its BBSs. Most of the group's members advanced to a C64, and it was through them that the Swedish Scene originated. (1)

The concept of a "scene" is the same as in a theater or music stage. A scene is the location of a performance, where the purpose is to show off one's abilities, not to make money or dominate other people. Scenes (or stages) are found in almost all cultural spheres, and, fascinatingly, also in techno-cultural ones such as those of radio amateurs, model airplane hobbyists, and hackers. What separates the personal computer scene from other scenes is that it ran against commercial interests, and therefore it came to be considered a dangerous and criminal subculture.

The Scene (capital S) is thus a label for the large group of users that exchange programs (primarily games) and also so-called demos. The thinking was straightforward: why buy a game for 25 bucks if I can copy it for free from my neighbor? This practice was, of course, illegal (which most people realized); however, it was a crime comparable to copying the neighbor's records to a cassette tape, with the exception that the copy did not suffer a loss of quality and could be infinitely reproduced. A copy of a copy of a copy would be identical to the original.

The Swedish prosecuting pioneer Christer Ström (from Kristianstad) and his colleagues around the world have, to an extent, been successful in curbing the commercial mass-distribution of pirated copies. However, private distribution is still alive and well, even though it is currently somewhat hampered by the fact that modern games are usually delivered on CD-ROMs, and not very easy to copy (if they are copied, they usually have to be transferred to around 50 diskettes, which makes the practice rather unwieldy and expensive). One buys the original rather than spending hours copying it (2) (more on this subject will follow later).

Starting January 1, 1993, all reproduction and distribution of copyrighted software (even to friends) is against Swedish law, although no individual has been sentenced for giving copies of programs to his/her friends. The crime is, as previously stated, comparable to copying records or videos, or not using your turn signal when making a turn. You can relax as long as you don't mass-distribute pirated software. Perhaps I shouldn't have said that - it is a terribly politically incorrect statement.

Anyway, back to 1984. The people that removed the (often virtually nonexistent) copy protection from the games, the so-called crackers, came up with the excellent idea of displaying their name or pseudonym (handle) on the start-up screen of a cracked program. The phenomenon is, together with many other phenomena in the hacking world, related to graffiti. If we take into account that such a copy could reach tens of thousands of people (many more than would read something sprayed on a concrete wall), it is not hard to understand how the practice became so popular. Hackers with handles such as Mr. Z , TMC (The Mercenary Hacker), WASP (We Against Software Protection), Radwar , Dynamic Duo , or CCS (Computerbrains Cracking Service) figured heavily on screens everywhere. Sometimes individual hackers hid behind these pseudonyms, sometimes loosely connected groups. In the U.S., there were already firmly established and well-organized cracking groups, but in Sweden and Europe, the phenomenon was completely new. The underground hacker movement started to grow from scratch, especially in the larger cities, where there were plenty of hackers that would meet at different computer clubs and exchange knowledge and programs.

The personal computer had incredible penetration as a medium, and several hacker groups soon formed, spending all their time removing copy protections from games, and then compressing and distributing the products (known as wares or warez). Among the first groups was the American Elite Circle , which had its roots in both phreaker and hacker culture, and had already managed pirate BBSs for Apple II and Atari software. The notion of cracking and distributing games came from the USA, where it had started with an Apple II program called Locksmith . It could remove copy protections from programs using certain parameters. In the beginning, it was enough to simply change the parameters for this program to crack a piece of software, but later it became necessary to spend more work on the actual cracking, and the cracker him/herself would have to be a programmer.

The hackers cracked programs because they were pissed off at the software companies for putting in copy protection routines that prevented them from looking around inside the programs and copying them for their friends. They wanted information to be free. This was the true reason, even though many gave justifications such as "The programs are too expensive, I only copy programs I couldn't afford to buy anyway, I want to test it before I buy it", etc., which were only partially true. The fundamental belief was that information was not property, and that they did not want to be part of any software industry.

One of the first programs to be pirated, and perhaps the first ever, was Altair BASIC . It was delivered on a punch card for the computer with the same name. BASIC stands for Beginner's All-purpose Symbolic Instruction Code, and Altair BASIC was written by none less than Bill Gates himself. Behind the reproduction was one of the members of Homebrew Computer Club in Silicon Valley, a hacker ( Dan Sokol ) who would later be known as Nightstalker . He wrote a program that copied the punch card pattern and thus became the world's first cracker. The 19-year-old Gates was up in arms: he wrote an angry letter to the user groups in which he claimed that copying a program was theft and would ruin the industry. Most thought little Bill was an idiot; no one had ever tried to sell computer programs before, and the norm was for everyone to share everything. For the large computer systems, the software came with the machine, and nobody really cared if it was copied. With personal computers came software piracy, simply because there were software companies that wanted to profit from this new hobby. The hobbyists themselves never asked for any software companies.

Here, it is necessary to make a crucial distinction: hackers distinguish between regular distribution of a program to friends and the activities of pirates. Pirates are not friends but people who try to profit from reproducing and distributing software. Pirates are parasites that prey on personal computer users, who just want software, as well as the computer industry in general. Both hackers and members of the software industry think that pirates are scum. The software companies hate them for stealing their income, and hackers hate them because they try create a new dependency relationship that is no better than the old one. Hackers, in general, firmly believe that copying should be done on a friendly basis and for free. Only in a few exceptional cases have hackers cooperated with pirates to get original games (nowadays known under the more cryptic term "licenses") for cracking purposes. Sweden's greatest pirate of all time, Jerker (fictitious name), was a retired father of two, in his forties, and hated by the industry as well as the hackers (with the possible exception of the Xakk group, which depended on him for their originals). Rumor has it that he's not given up piracy, and still makes his living selling illegal copies. Jerker says that he is not really interested in computers, and it seems to be true. Personally, I think that he has a considerably greater interest in money.

The Scene in 1986: as hackers developed their programming expertise, the introductory screens displayed at the beginning of cracked games became more advanced and grew into several dimensions. Hackers were inspired by title screens and sequences from games, and the introductory screens went from comprising mainly vertically scrolling text to advanced graphics with animation, sound, and sophisticated technical tricks that made the show more cool. A new art form, the Intro , was born, and it was practiced solely by programmers. Although the art of demo writing had existed (in a simple form) in the time of the Apple II, the C64 and its advanced technology permitted it to bloom. Groups like Eagle Soft , Hotline , Comics Group , FAC (Federation Against Copyright), Triad , and Fairlight flooded the Scene in the last half of the 80's.

Some of these groups started their own BBS's where ideas were exchanged and programs distributed. The word elite was adopted as a term for the groups that were the most productive and had the most distribution channels (especially to the USA). The European part of the Scene had an obsession with distributing their cracked games to the United States as quickly as possible. It was probably due to a form of "sibling rivalry", since the Scene itself started with the American Apple II computers, and the most experienced hackers were from the U.S. It was important to impress "big brother" with your cracked games. In the European Scene, more ties to the USA meant higher elite status.

The demand for open communication channels led to the hackers attacking the Internet (among other things), and cooperating with European and American phreakers to open more channels to the West. The phreakers and network hackers called these newcomers from the world of personal computing Warez d00ds , since they were always bringing "wares" in the form of pirated or cracked games. They referred to themselves as traders, or, more expressly, modem traders, since they used modems to connect to different BBSs. At first it was Americans skilled in the fine art of phreaking who contacted different European cracking groups, and later the Europeans themselves started calling the U.S., hacking Internet computers, etc.

Eventually, the Europeans' inferiority complex with respect to the "big brother of the west" had the result that the European home computer hackers, in their struggle to excel, developed programming and cracking skills totally superior to their American counterparts. During 1987-88, American computer game companies began adding copy protection to software exported to Europe, but not to the games sold within the U.S. They feared the European cracking groups, and Sweden in particular was considered an unusually dangerous country. The computer gaming industry suggested that much of the pirated software that circulated through the U.S. and Europe originated in Sweden, which is actually true. Most of these games came from an imports store in Göteborg (Gothenburg), which was visited once a week by a Swedish hacker who was supposedly "reviewing" new games. Without the storekeepers' knowledge, he copied the games and distributed them to various Swedish crackers.

It didn't take long for someone to come up with the idea of separating the intros from the games, letting them stand for themselves; the intro would even be allowed to occupy all of the computer's memory. This resulted in the birth of demo programs (or demos ), which were dedicated to graphical and musical performances and extraordinary technical tricks. The first demos were collections of musical themes from various games, usually accompanied by a simple text screen. For the most part, it was the same groups that had previously done cracking and intros that migrated to demo creation, but "pure" demo groups also surfaced, such as 1001 Crew , The Judges , Scoop , and Ash & Dave . A distinct jargon and theory of beauty developed, mainly through the exchange of programs and knowledge on England's Compunet , which was an enormous conferencing system dedicated solely to personal computer fans. Compunet became the hard core of the demo groups, but most of the software exchange still took place through disk trading and BBSs. Later, and especially during 1988, the underground magazine Illegal became a sort of cultural nexus for this rapidly growing society.

Norms for telling the bad from the good evolved quickly, and the widespread expression lamer was introduced as a term for people who didn't want to program, and instead used presentation software to produce demos. Probably, the term originates in skater slang. The word lamer spread far outside hackers' circles, and soon applied to any computer-illiterate person. Many similar slang terms have been derived from the Scene, but these relationships are not expressed in the Jargon File; rather, the document serves to perpetuate the negative view of subcultural hackers (to whom it invariably refers to as warez d00ds). This view is both erroneous and prejudiced.

From an American perspective, it is understandable that the academic hackers from MIT, Berkeley, Stanford etc. considered the personal computer hackers amateurs of little value; in the U.S., virtually all teenagers with a personal computer were exclusively interested in games. American demos and intros were primitive, and nowhere near the level of sophistication of the European ones. On the whole, the American part of the Scene had a less developed culture than the European side. The American hackers were heavily influenced by the phreaker culture, and as a result usually insolent and aggressive. The feelings of contempt were mutual.

An unfortunate consequence of this animosity is that European hackers searching for their identity are easily attracted by American hacker ideals, and thus assume a slightly scornful attitude towards personal computer enthusiasts. It is worth noting that the cultural foundation of European hackers consisted of personal computer hobbyists, and not of phreakers, network hackers, or small academic clubs at universities. The European hacker identity was built around Commodore's and Atari's personal computers, and this is where the European hacker should seek his/her roots. In addition, there are (of course) values and traditions inherited from the American universities. However, one thing is fairly certain: the European personal computer hackers developed the art of computing in a way that never occurred in the U.S. The aggregate of European teenage hackers created a beautiful and amateur-based art form of a kind that MIT and Stanford never witnessed.

The Art Form of the Demo
A demo is somewhat difficult to define; it really has to be experienced. Even the first hackers at MIT created (around 1961) simple demos in the form of small mathematical patterns that were displayed on a simple screen. These were called Tri-pos or Minskytron -patterns (after the professor of the same name). The demos were beautiful, but lacked practical applications.

Sine curves, scrolling text, and mobile blocks of graphics coupled with music constituted the first personal computer intros. As time has progressed, the products have come to resemble motion pictures or corporate demonstrations, known as trackmos . The name is derived from the fact that new data has to be loaded continuously from disk to keep the demo running (a disk is subdivided into tracks, hence trackmo). Since MIT, demo programmers have had a passion for weaving mathematical image patterns into their creations.

As the demos appeared, this new cultural expression began spreading from the C64 to other computer platforms. First, it migrated to the Atari ST (1984) with groups such as TCB (The Care Bears) and Omega , and later (1986) to the Commodore Amiga, where (among others) Defjam , Top Swap , Northstar and TCC/Red Sector , and later Skid Row and Paradox , became well-known. In 1988-89, demos started to appear even for the IBM PC, from (among others) the Swedish pioneers TDT (The Dream Team) and Space Pigs . (The Macintosh has, to my knowledge, never nurtured any significant demo activity, but this may change as the Mac has become more of a "personal computer"). The transfer of games, intros, and demos was completely dependent on a network of postal mail and a great number of individuals and BBS's that called cross-nationally and cross-continentally to distribute the programs. During the 80's, the demo groups couldn't afford to connect to the Internet; only a few university hackers had that opportunity, and most of the Commodore hackers were in secondary school. Most of the university hackers were of the "old-fashioned" kind, and completely ignored personal computers in favor of minicomputers (which were the coolest things around in their opinion).

Since computer programs are often copied through several generations (copies distributed and then copied and distributed.... etc.), they offer an exceptional opportunity for the distribution of names and addresses to help expand the trading market. Fairly quickly, the early hacking groups recruited members whose only purpose was to copy and trade demos with others of similar mind, primarily in order to spread their own group's creations. These members were known as swappers , and a diligent swapper could have around a hundred contacts. Since it wasn't very economical to send dozens of letters a month, many (to the chagrin of the postal service) started spraying liquid Band-Aid on the postage stamps so that they would "last longer".

Pure swappers soon discovered that it was possible to trade merchandise other than disks, and two new subcultures emerged: film-swappers and tape-swappers. The former engaged in the exchange of videos of all types, although primarily movies that were banned by some government, or that were exciting for some other reason. The tape-swappers exchanged music cassettes.

Disk swaps among hackers have been extremely important as a contact surface for these subcultures. The word disk-swapper is never used in writing by the hackers, since the word (in its pure form) simply indicates the exchange of disks. Film-swappers in particular are connected to the hacker culture, since the breakthrough of the VCR coincided with the personal computer boom in the mid-80's. Frequently, a swapper trades disks, cassettes, video tapes, or any other media that can be duplicated. The difference between a swapper and a regular pen-pal is that the content of the swap (the disk, cassette, or whatever) is more important than anything else. If you don't feel like writing a letter, you just send a disk labeled with your own name so that the recipient will know who sent it. Disk swapping is, however, a phenomenon associated with the European personal computer hackers of the 80's. For the IBM PC of the 90's, this procedure is relatively uncommon - the standard nowadays is to get the programs you want from a BBS or even the Internet. Swapping has given way to trading, that is, the exchange of information has gone from disks to modems.

In the beginning, hacker groups consisted of just programmers and swappers, or individuals that were a combination of the two. The most successful groups of this kind have always been those who enjoyed geographic proximity, enabling their members to exchange ideas and knowledge without expensive and troublesome telephone connections. After some time, a need for more specialized hackers arose, and categories like musicians, graphics experts, the previously mentioned crackers, and coders emerged. The difference between a cracker and a coder was that the former specialized in removing copy protection (i.e. modifying existing programs), while the latter was concerned with pure programming (or coding).

To destroy copy protection routines is not illegal in itself (actually, you pretty much have the right to do whatever you want to with a product that you have purchased). On the other hand, widespread distribution of the "cracked" program, which the swappers frequently engaged in, is highly illegal (although I should point out that many of the swappers only traded demos, and stayed away from distributing copyrighted software). However, we again run into the similar act of copying music CD's, which is just as illegal. No law enforcement agency in its right mind would ever get the urge to strike against a hobby hacker who copied software for his or her friends, as long as it wasn't not done in a commercial capacity. The crackers and traders did not know this, which made the practice more exciting and "forbidden" (remember that the average hacker was in his or her teens, and that it is very important to rebel against society at that age).

In the U.S., there was another category of hackers called fixers. The fixers modified the code generating the signals for European PAL television systems to fit the American NTSC standard. (These hackers did not exist among the PC hackers, because all PC's have their own video systems intended for monitors rather than TVs). Some hackers also had suppliers, who acquired the original programs that the crackers stripped of copy protection routines. It was not unusual for these suppliers to work in software retail stores or even at software companies.

For social reasons, so-called copy-parties were held, as early as 1984, at which many hackers from different groups got together (in some city) to interact and trade knowledge and experiences. Possibly, the hackers drew inspiration from The Whole Earth Catalog's first hacker conference in that year. The event is reminiscent of role-playing conventions in that it is a rather narrow group of interested parties that gather, but it is different in that the mood is rather tumultuous and unrestrained, more like a big party than a regular convention. The term copy-party stems from the fact that a great deal of copying took place at these parties, both legal and illegal. Nowadays, salience has been reduced by calling the events demo-parties or simply parties. A famous series of recurring copy- parties were held during the 80's in the small Dutch town of Venlo. The Party (capital P) is probably Europe's (or even the world's) largest and most frequented copy party. Since 1991, it is held annually during December 27-30 in Herning Messecenter, Denmark, and attracted close to 2000 people in 1994.

Not even hackers always get along: confrontations between groups or individuals often escalated into "gang wars", mostly involving psychological warfare. The objective was to ostracize a person or group by refusing to exchange disks, and encouraging friends to join in the boycott. In this manner, an individual or a group could be "excommunicated" from the community. To reach this goal, lengthy text files containing pointed truths or pure lies were distributed, whereupon the accused retaliated using the same technique. The wars basically never produced any tangible outcomes, and copy-party melees were extremely rare. Conducting psychological warfare against other hackers should be regarded as rather harmless, even though the participants were often fervently committed to the battle. It should be assumed that these schisms taught teenage hackers a great deal about the true nature of war: it rages for a while, then dissipates, only to flare up elsewhere. Some leave the Scene (or die in a real war), but most remain, and some day another disagreement occurs.

I would like to take the opportunity to mention that among the phreakers, these wars ended much more quickly: you simply reported your enemy to the police. This was the only way to practically interfere with a phreaker's life. Among both the phreakers and hackers, however, friendship dominated over strife. Through the occasional wars between hacker groups, yet another aspect of human behavior was transferred to cyberspace. Abstractions of war as an advanced chess game in the form of confrontations on the Scene as well as in many different role-playing games, or tangibly as in the movie War Games, have given many hackers a cynical view of human nature.

Those who are (and were) active on the Scene participate because they have a relationship with the computer that is different from that of any previous generation. Where one person only sees a box, a machine with a screen and keyboard, the hobby hacker sees an entire world, filled with its own secrets and social mores. It is these hidden secrets that spellbind and beckon the hacker, and makes him or her forget everything else. The search for more knowledge accelerates toward a critical mass, a sustained level of intensive productivity. This is the state in which a hacker produces a demo in two weeks or cracks one game per day. All social interaction outside the realm of the computer and its users becomes insignificant.

Eventually, most reach a limit at which they grow weary of the Scene and the eternal quest for something newer, bigger, and better. They simply quit. One hacker that I know well once told me: "The only real way to quit is dragging the computer to a swamp and dumping it". This serves to illustrate the weariness following exaggerated participation on the Scene. Others keep their hacking to moderate levels, and lead normal lives apart from their hobby. These moderates tend to stay on the Scene the longest (personally I've been on the Scene since 1986 and I remain there today, albeit as a somewhat sporadically active member).

The Scene reveals a great deal about the true nature of hacking culture; it is a roof under which to gather. Hacking is about the exploration of computers, computer systems, and networks, but also an inquiry into the workings of society, and the creation of new and personal things through experimenting with subcultures. That is why hackers break into systems to which they are not authorized, spray fixative on postage stamps, and blatantly disregard any form of copyright. They want to explore and see how things work. Perhaps subconsciously, they want to prepare for the future. The hacker culture emphasizes exploration, not cold-blooded theft, and hackers are not egocentric criminals that only seek destruction (3).

 The actual motivation for real hackers is simply exploration, while someone who hacks with theft or sabotage as a motive is a computer criminal and not a hacker. Jörgen Nissens has written a fascinating thesis called Pojkarna Vid Datorn (The Boys at the Computer), which makes it clear how special the hacker culture surrounding personal computing really is. He has interviewed some of the hackers in the groups Fairlight and TCB, and points out how strange it is to hear members speaking of market shares of the Scene, and how the groups are run under something similar to corporate principles, even though they lack a profit motive. He also emphasizes that hackers behave more like bored consumers than criminals or classical youth gangs; they are members of what Douglas Coupland refers to as Generation X.

The personal computer groups are typical of Generation X. They abhor politically correct messages, they run everything like a business, and they are sick of the enormous market. Instead of consuming, they started producing. Instead of manipulating money to achieve status and enjoy the admiration of others, they have created a market where they trade creativity for admiration without any material layers in between. No CD's, promotion tours, or marketing schemes are necessary. There is only a need for pure information products in the form of demos and cracked games, which are traded for pure information in the form of respect and admiration.

The only subcultural hackers to receive any great media attention were those who crossed the line to network hacking or phreaking and got busted. In 1989, parts of the circle surrounding the demo group Agile were arrested after one of their members, Erik XIV (fictitious name), went to the media and exposed how vulnerable credit card transactions really were. At the same time, another of their members, Erlang (also a fictitious name), ordered video editing equipment for a quarter of a million crowns (about $35,000) to his own home address using fake credit card numbers. Driven by their slightly elitist attitude from the demo culture, they wanted to be alone in their mastery of credit card technology, and tested the limits of what was possible using artificial codes.

When the police arrested Erlang after he had ordered the editing equipment, he started telling them everything with an almost pathological obsession with detail. Phreakers and hackers often do this; it seems as if they believe the police will be impressed by their feats. The people involved in the Agile case were all given suspended sentences, high fines, and probation. All of them, save Erlang, now work in the computer industry (surprise?).

Attitudes
The first hackers at MIT always made use of all the technological resources they could lay their hands on. It wasn't always the case that the "authorities", the professors and custodians responsible for the equipment, approved of this behavior. Most teachers thought that instruction in computer science should be of the classical authoritarian kind, where the professor stood at the lectern and lectured. If the students were to have access to the computers it should be through explicit assignments to be turned in for grading, not through the learning by doing that the hackers practiced. They loved the computers, and couldn't for the life of them imagine why they would be kept away from the machines. They sneaked in at night and used the machines unbeknownst to the instructors.

After several personal confrontations with computer professors, and especially after having worked as a computer instructor myself, I have realized that this classical emphasis on utility is all too common among Swedish computer teachers. It is simply not possible to get people to think that "computers are fun" if you at the same time force them to adhere to rules for what they are allowed and not allowed to do with the computer. Many computer instructors throw a fit when they discover that the students have installed their own programs on the computers, or have programmed something that wasn't the subject of an assignment. Common reasons for this behavior are a paranoid fear of viruses, the view that computer games are just a waste of time, and so on. One teacher at my old gymnasium (secondary school), which we will call X, installed a program on his computers which triggered a screeching alarm as soon as someone tried to change any of the machines' configurations (the machine configuration, in this case, is a couple of files with information that allows the computer to use different accessories). Of course, an exploring hacker will feel like changing the configurations, and the school's own binary geniuses naturally ignored the large posters all over the computer room proclaiming that this activity was absolutely prohibited. Central to this story is the fact that the teacher was a foreign language instructor, who could not under any circumstances accept that "his" computers would be used for anything else than language programs, word processing, or other authorized activities. Some students that triggered the alarm were banned from the linguistics computer lab, while the more skillful students (who knew how to change the configuration without setting off the alarm) were still permitted in the computer room, despite having changed the configuration many times.

These students, who possessed some of the true hacker mentality that says that you shouldn't accept a monopoly on knowledge or computing power, wrote an amusing little program. Besides completely circumventing X's little security system, the program also randomly displayed a requester, a small text window which said: X IS A MORON. Below this text was an "OK"-button that had to be pressed in order to proceed. The program was a classical hack: it wasn't very useful, but it didn't do any real harm, and it was funny. The first hackers at MIT would surely have appreciated this prank (personally, I find it exquisite!). It was completely impossible for the teacher in question to find and remove the program. In the end, he had to format all the hard drives on the computers and reinstall all the software from scratch. To face the music and ask the hacking students to remove the program, or even apologize to them, never occurred to him. Doing this would not only mean recognizing the students' right to use the computers, it would also mean confessing the truth - that some of the students were more adept in computer science than himself.

The fact is: the parents of these students had paid taxes to enable their children to use computers at school. The students, like hackers in general, were therefore of the opinion that the natural thing would be to let them use the computers to do whatever they wanted, and as much as they wanted (outside regular class hours, of course). This obvious right has been known since the time of the MIT hackers as the hands-on imperative.

Computer instructors frequently do not understand hackers. They think that if the hackers have to mess around with the computers all the time, why can't they do something useful and authorized, such as figuring out a repayment plan, or writing a summary of African history, or something along those lines? The predominant attitude seems to be that the students should only use the machines, not explore them, and definitely not hack them. The machine should only be a tool, and the user should preferably know as little as possible about the processes that take place behind the screen. The hacker is the one who, in spite of these authoritarian attitudes, actually wants to know.

Hackers don't want to do "useful" things. They want to do fun things, like exploring the computer's operating system, installing their own programs, and trying out different technological features. This is what makes it fun to use a computer. I have tried to mention this to several computer instructors of my acquaintance, but alas, mostly with no results. I personally believe that this kind of exploration is beneficial, and wouldn't for the life of me want to prohibit students from engaging in it. It is the foundation for the enthusiasm that makes some people think that "computers are so much fun". If a student, after all, manages to screw up the computer, I consider it my responsibility as a teacher to restore the machine to full functionality again. If I can't do this, I'm incompetent. If I don't have time to do this, the school is short-staffed. I have never had any significant problems with my own students; in fact, I have invariably had positive experiences with them. The fact is that I encourage my students to explore the operating system even if it is not the subject matter of the course. If the computers I'm responsible for are infected by viruses or crash, then it is my problem rather than the students'.

At MIT in 1960, the possibilities that opened up when students were allowed to freely access the equipment were quickly discovered. Professor Marvin Minsky would walk into the computer room, put down some electronic device and then let the students try to develop a control program for it on their own. This was not instruction - it was high-level research, and it was the students, the hackers, that conducted it. If it hadn't been for this attitude towards learning, computers would never have become what they are today. After MIT became the first computer school in the world to allow the students unlimited access to the computers, this new pedagogy spread to all universities that were engaged in computer research, including the Swedish ones. No self-respecting university today bans their students from the computer rooms. They often have their own keys or keycards, and can come and go as they please. The Swedish primary and secondary schools have a lot to learn from the universities in this respect.

The fact is that the network hackers' mayhem in the university computers divide the computer staff into two camps: those who fly off the handle when they discover that someone has hacked their computer, and those who find it interesting and exciting if someone hacks their computer. The latter group, however, is not nearly as vocal as the first, which has led to the popular view that all computer professors or information officers hate hackers. This is far from the truth. The hacker is engaged in exploration. Not just of single computers, but also of computer systems, computer networks, the telephone network, or anything electronic. They condemn and/or ignore the authority that wants to prevent them from exploring. They are not motivated by theft. Period.

Mentality
What keeps hackers going from a psychological perspective is a sensitive subject. MIT's hackers could stay up and work a 30-hour shift, then crash for about 12 hours, only to get up and complete another 30-hour shift. Sometimes, hackers neglect everything but the computer, including nutrition, hygiene, and normal social interaction. We see this as unhealthy, although we may accept it among persons working on corporate boards, committees, or other professions with a high degree of responsibility. It should be made clear that virtually every hacker goes through such a period of intense concentration at some point in his/her career, and it would be hasty to condemn such behavior in general.

In some cases, the computer is actually a means of escape from an intolerable existence. A youth in the ages of 14 to 19 is subject to many harsh demands from his or her environment. It is demanded that they should be able to handle school, socialize with their friends, and (implicitly) connect with the opposite sex. At the same time, one should not forget that hacking is often conducted in a group environment, and it is based on a friendship that goes far beyond the limited area of computing (For the uninitiated: friendship is the phenomenon that makes someone get the idea of lending a room to someone else for a few days, copy a computer program, share knowledge, etc., without demanding payment).

The computer offers a convenient escape from the demands of growing up. In earlier stages of history, many men (and some women) have distanced themselves from difficult emotions by whole-heartedly dedicating themselves to some science, and becoming so totally wrapped up in their research that they "forget" their troublesome social "duties" such as friends, marriage, and all that the entail. Computing, in our time, is a largely unexplored territory. Everyone with access to a computer is instantly drawn into a world in which much is strange and unknown, but which at the same time possesses an underlying logic. A computer begs to be explored. In this way, the computer can almost become a drug that replaces a more "natural" urge to explore social behavior patterns. The excursions into the computer do not become a substitute for sexual relations; it becomes something that you occupy yourself with so you don't have to think about sexual relations. This is why so many so-called "nerds" spend most of their time with computers. Society has given them a thankless role from the beginning, and instead of playing along with it, they escape it.

Many hackers are fully aware of this escape. At the same time, they see the hard life, ruled by the laws of the jungle, lurking outside cyberspace, and they finally make a conscious decision to either change everything or stay where they are. Some old hackers have, through the years, developed an incredible cynicism because of this. They condemn the real world and are committed to creating a world in which they can rule for themselves, inside the computers. They observe technological advances in virtual reality and artificial intelligence with excitement, and tell themselves that one day ...

If they could go into the computer forever, they would. They already hate the "real" world in which they have to feel restrained by their physical or social disabilities, and where their fate as losers has already been determined. The human sexual identity consists of a social as well as physical side, and if you lack one or the other, you're destined to be a loser. It happens that hackers become aware of this, and instead say: "We don't want to be part of it", and then retreat to cyberspace. There is nothing we can do about this, except possibly tone down our social attitudes towards those who are different, if even that would help. Maybe it is undesirable to have hackers adjust to a "normal" life. Maybe we want them where they are, where they feed their brains with so many practical problems that they don't have to think about social dilemmas, so that we can keep track of them and keep them under control. They are contained in a subculture where the weird is normal. Their condition can, at worst, develop into mild or severe escapism, i. e. escaping from reality. This condition is usually called computer sickness.

In addition, we can observe that illegal hackers possess a somewhat different pattern of behavior compared to the subcultural hackers, depending on which way they have entered the culture. Some phreakers come from an environment consisting of party lines, amateur societies, etc. They are driven by a desire to communicate, rather than exploration through the formation of groups and internal competition. They are often considerably more arrogant and practice phreaking simply because they are bored, and have nothing better to do (it's the same motivational factor as for people who dial various party lines on 900-numbers). They don't take hacking to be a deadly serious business, and often make fun of hackers, since deep down they think the hackers are complete geeks.

Hackers, who would rather spend time with computers than with telephones, generally identify with their group and possess more group loyalty. A pure phreaker, of the kind I just discussed, would have no problem at all turning his/her friends in to the police if he/she got busted, while a real hacker would never turn in even his/her enemies.

Network hackers, as well as phreakers, virus hackers, and some crackers, suffer from a hopelessly negative self-image. They see themselves as mean, cruel, and dominant badasses. They have assumed a role in which they identify themselves with a desire for destruction, hate of society, anarchism and general mischief, mainly to feel a sense of belonging. For most, this is only a temporary stage. If they have assumed yippie ideals, however, it is not temporary.

The most dangerous hackers (from the perspective of society at large) are invariably bitter. They consider themselves misunderstood and misjudged by the educational system. They think that the schools have been unsuccessful in harnessing their intelligence and talent, and consider themselves to have a right to exact revenge on a society that shut them out of a world of knowledge, simply because they didn't act the right way, and lacked the proper social code. They have been forced into vocational schools by a grading system that has been unable to distinguish them among those who are truly suited towards higher education.

What makes matters worse is that they are right. With the hate of a society that couldn't or wouldn't appreciate their qualities, they return with computers and electronic equipment to saw through the pillars of the same society's entire socioeconomic system, often with a nearly psychopathic lust for destruction.

Carceres Ex Novum
"There was an alternative to normal life. I was sick of the normal, sick of always being last. I found friends that I never had to meet face-to-face, and so my teenage years passed, and I became an interesting person. When I started at university the gigantic Internet came to my room, and the world  was beamed to me. I had millions of people close by, without ever having to look them in the face. I sat there all the time, only pausing to eat and go to class. I didn't  meet anyone, no one knew me. And I was comfortable. Thanks to the attention of the anonymous people on the other side of the screen, I did not feel lonely. But time ran out, and the real world crept closer. Of course, I knew I could run away forever, but I would never be able to hide from them, the ones whose values transformed me into a lonely, asocial rat, who spent all of his time with the computer. And I hated them."

Certainly some of the activities engaged in by hackers are illegal, and certainly this is wrong from the viewpoint of society. Nevertheless, it would be to severely underestimate hackers to say that they commit these acts in a routine fashion, for "lack of something better to do", or for their own profit. There has been too much judgment and too little understanding in the hacker debate.

But now for something completely different.


1. I am here deeply indebted to Christer Ericson, who shared his knowledge of the Apple II movement in Sweden; this information had hitherto not been written down, and therefore difficult to retrieve.

2. Currently, even CD-ROMs are copied to a great extent. Especially MP3 (or MPEG Layer 3), a system for sound compression, has become popular as it provides a means for the mass distribution of music CDs (which I personally believed to be pure fantasy until about a year ago). This compact music format compresses a sound CD at a ratio of 1:12, and a normal pop song is transformed into a 3-4 Mb file, which can easily be transferred across the Internet. In five years, I'm sure videos will be distributed across the Net!

3. I'm sure you notice that I'm getting personal now.


Chapter 6
THE BLEEP CULTURE

The American Heritage College Dictionary defines electronic music as follows: "Music produced or altered by electronic means, as by a tape recorder or synthesizer."

Electronic music has long existed as a subculture within "real music", especially in Sweden. In 1948 (the same year that IBM started marketing the first commercial computer) a certain Pierre Schaeffer created the first electronic music composition, which he called Études aux Chemins de Fer (Etudes for Trains). Electronic music was born in his studio for Musique Concrète (Concrete Music) at Radio France. Concrete music is music that is not limited to pure tones, and incorporates sounds from everyday life, such as long, continually changing notes without tone quality, etc. In 1952-53, the musician Karlheinz Stockhausen worked with Schaeffer, and brought some of Schaeffer's ideas home to Germany. Since then, this form of music has spread and is on the curriculum at different public institutions as a very small branch of classical music. As opposed to Schaeffer, who preferred to work with taped recordings of real sounds such as those of trains or birds, Stockhausen focused on using only electronically created sounds. In Sweden, this music form was basically unknown until it was introduced in Harry Martinsson's science-fiction opera Aniara in 1959.

This chapter is not about classical electronic music - there are plenty of texts on the subject. Furthermore, this book is aimed at regular people who think that art should reflect something, i.e. that one should not constantly try to break out of existing concepts and conceptual systems to appear as incomprehensible as possible. Electronic music is a form in which the music has to be interpreted on more levels than the musical. In other words: this book will stick to a broader aspect of popular culture. This is not to say that the art of electronic music is not interesting; it is just not particularly interesting for the purpose of this book.

It is unnecessary to point out that the history of electronic music stretches farther back than the history of hacker culture. However, the phenomenon of electronic music has had a profound influence on hacker culture, and in its pop-culture manifestation in the forms of synth-pop, techno, acid, house, etc., it has played an important role for the generation that grew up with computers. One of its main uses has been to display the beautiful side of the computer. Electronic music was the first area in which computers were used to create art, and as opposed to other forms of electronic culture, electronic music has its roots in Europe.

The first time a computer played music was in 1957, at Bell Labs in the United States. The song was called Daisy, which is the same piece that the intelligent computer HAL (in Stanley Kubrick's film version of Arthur C. Clarke's science fiction novel 2001) starts humming as it is being disassembled. Naturally, this is not a coincidence, but rather the intention of the director to return the computer to its "childhood state" (in a double sense) as it loses its advanced electronic identity.

The world in the 70's and 80's: With the introduction of the first cheap Japanese synthesizers, regular people (who were not trained musicians) started using electronic instruments, and electronic pop music was born. The difference between, for example, the Hammond organ or Pink Floyd's monophonic synthesizers and the new generation of electronic instruments was that the latter could store rhythms and entire pieces of songs in their digital memory, which could later be modified. In particular, quantization (which adapts notes played to a given rhythm) was (and is) greatly criticized by "serious" musicians. They thought that simple and rhythmically perfect melodies were destructive to music, and they distanced themselves from it. Another factor that abhorred musicians of the old school was that music played by machines would not be limited by the dexterity of a given musician, which allowed the ability of the ear to perceive sound variations to set the limits for the music. A "groove" of several hundred beats a minute, or pieces with tone lengths of several hundredths of seconds - songs like those scare the living daylights out of musicians who are accustomed to being able to analyze the music they listen to.

For the new electronic musicians, the perfect quantization, the possibility of a high pace, and synthetic "sound images" constituted a measure of beauty. Among the pioneers, the most notable was the German band Kraftwerk, who built their own synthesizers and should be considered classics of the genre. Kraftwerk's importance for synth music can hardly be exaggerated. No single group has had as much influence on electronic pop music as these futurists - futurists in the sense that they saw the inherent beauty of the technology, rather than a tool for reproducing other ideals. They made contact with the previuosly named Karlehinz Stockhausen at an early stage, and drew lots of ideas and inspiration from classical electronic music.

Kraftwerk, and in particular its member Ralf Hütter, are also extremely politically aware and openly supports hackers. Sometimes, Ralf even refers to himself as a hacker. The mentality of these German gentlemen has thus influenced - and been influenced by - the digital underground culture around the world. Chaos Computer Club member Pengo, who was previously mentioned in connection with illegal hackers, was a Kraftwerk fan, and he listened to their records over and over while breaking into computers around the globe. He was not alone in this. Even though hackers in general have disparate musical tastes, from Bach to death metal, there are few who do not enjoy electronic music in some form or another.

While a "normal" educated musician perhaps sees the computer as a tool for producing compositions, musical arrangements, and nice-looking sheet music, a futuristic musician sees the computer as an instrument, something to be played by its own right, and which - like a saxophone or a harp - possesses an inner beauty. The futuristic musician can sit for hours and adjust different parameters to extract personal sounds from the machine, and he/she loves it as much as a guitarist loves to extrapolate his/her scales up and down in the search for a greater personal touch.

While a "normal" musician creates his or her profile through finding new techniques to manipulate his/her existing instrument, the electronic musician works with numeric parameters, spectrum analyzers, and one-handed play. Some don't know how to play an instrument at all, and stick to writing the music note by note in something like a "musical word processor". The method may be radically distinct from traditional music creation, but that doesn't mean that electro-pop has less 'soul".

Peter Samson, as one of the very first hackers at MIT (yes, we're back there again), had managed to get a PDP-1 computer to play Bach fugues solely based on numerical input. His program could be said to be the first sequencer made by an amateur. A sequencer is a computer program or a machine that remembers the notes to be played, and allows the user to change the notes, replay them, then store them again to replay them at some other time. Since that day, we have enjoyed a living, machine-made music culture. Many musicians of the old school react with outright xenophobia against this new way of working with music, rather than enjoy its benefits and try to understand what the point is.

Among Swedish electro-pioneers there was Page (which is still an active band). During the early 80's the group was one of the first (and for its genre, also one of the most successful) so-called synth-pop groups. Many jumped on the synth bandwagon, but have presently been forgotten. Who listens to groups like Trans-X, Ultravox, or Texas Instruments today? Not many, even if there are still quite a few synth-pop fans around the country. The genre has returned in the form of groups such as S.P.O.C.K. or newcomers Children Within, which are both very talented Swedish bands.

As a reaction against the frequently well-groomed and "nice" synth bands (read: Howard Jones, Depeche Mode, etc.) that flourished in the mid-80's, there came a new and incredibly heavy form of synth music: Electric Body Music, or simply EBM. Mostly, it was just referred to as "raw synth". The English band Cabaret Voltair had "invented" the style in 1978, but it was not until now that it reached popularity on the Continent and in America. Among others, Portion Control, Front 242 (who coined the term EBM), Skinny Puppy, and Invincible Spirit joined the trend. One can compare the arrival of heavy synth music to the introduction of grunge (personified by Nirvana) as a reaction to "poodle rock" - there were simply too much corny stuff out there. Less successful was perhaps the tendency of many heavy synth bands to flirt with nazi symbolism and clothing, and many groups (including Front 242) had to make public statements denying any connection to or support of neo-nazi movements.

In the 90's, many groups have grown weary of the EBM concept, since it started to become a bit trite. For example, Ministry, Die Krupps, and the Swedish band Pouppé Fabrikk had switched to Crossover, a type of music that mixes EBM and different types of metal, often in the style of the trash-metal pioneers Metallica.

Ambient
In 1978, the former Roxy Music keyboard player Brian Eno released a record named Music for Airports, using his own record company called Ambient. Ambient is originally an esoteric form of artistic music. The underlying idea is to produce a complete environment rather than just a musical "sound carpet" with rhythms and ordered notes. Naturally, it is advantageous to create a sound image from an unfamiliar and exciting environment if one is interested in making quality, penetrating ambient music. A simple method for creating ambient music is to just set up a couple of microphones in a steel mill, a suburban apartment, or whatever environment you want to incorporate.

Eno supposedly got the idea for making such music after being hospitalized following a car accident. He was confined to the bed with the stereo on, unable to get up to either turn it off or turn up the volume. The silent whisper of music combined with the sounds from the street below made him realize that this was actually a real music style. Peripheral music - like the music we listen to in supermarkets or airports - contains its own logic and does not at all resemble "regular" music. Ambient music is music that should be listened to while doing something else, concentrating on other sounds, yet it should be subconsciously enjoyable. In psychology, the phenomenon is classified as subliminal perception. The music creates a totality together with external sounds and does not place requirements on the listener's attention.

Eno didn't actually "invent" ambient music. The eccentric and ingenious composer Erik Satie made a few less-appreciated attempts at creating "furniture music" in the early 1900s, and in the 60's, the musical artist John Cage wrote Four Minutes, Thirty-three Seconds, a piece for silent piano, which is considered by many to be the ultimate ambient composition. The point was that the listener should concentrate on the sounds in his or her environment. To get the most out of the piece, one should perhaps read the score. Cage also worked with electronic music, where he introduced ideas from Zen philosophy about how the music should be organized but still display a chaotic nature. These ideas have, served as a basis for the study of improvisational techniques. They have also had a great influence on ambient music, and this is mentioned on the covers of Brian Eno's records.

Together with installation art, this music form says a great deal about ambitions within modern art: to create a total environment and place the beholder inside it1. The concept of Virtual Reality is considered to be the optimal combination of installation art and ambient music. An artificial, man-made environment of the type that writers for ages have been able to create using the reader's imagination - but tangible, detailed, and accurate. A world built on pure information.

Electronic music pioneers such as Tangerine Dream (which debuted with Electronic Meditation in 1969), and some symphonic rock groups like Hawkwind, experimented early on with creating alien, futuristic sound environments using early synthesizers and manipulating all types of electronic equipment (for example, guitar amplifiers) to produce strange sounds.

Brian Eno is still a prominent figure in ambient music. Before ambient music became well-known, it was often filed under labels such as New Age or Meditational. These terms are nowadays used for artists like Jean-Michel Jarre and Vangelis, who represent a sort of mood-charged elevator-style music, suitable for active as well as passive listening.

Modern DJ's such as Alex Paterson and Bill Drummond (The Orb/KLF) and Sven Väth, inspired by techno and industrial music, have succeeded in the art of making rhythmical pop music with elements of ambient music without ruining the basic concept. Especially The Orb's Adventures Beyond the Ultraworld and Väth's Accident in Paradise are considered important milestones in "modern" ambient

Electronic Film
The last subject I will touch upon in this chapter is not about music. Electronic film has existed basically since the introduction of the TV, but never developed into a genre of its own until the late 80's. We can compare electronic film to electronic music, and define it as film that is created only by electronic means. The first time anything of the kind was done was when a TV camera was aimed at a TV screen, and thus created a flowing feedback pattern. That type of effect has also been used in music, to spiff up a melody and add new dimensions; there's hardly a guitarist that does not know how to employ feedback in an electronic amplifier to create new sounds. For music, this form of manipulation came about as early as the mid-50's through Stockhausen. For TV and film, it was never a matter of making electronic film its own art form. Instead, technology was mostly used to create special effects. A shining example is the vignette for the English TV series Doctor Who, an illusion of a trip through a long, colorful tunnel, created solely with the help of feedback patterns.

The art of filmmaking has developed in many directions, but electronic film in particular seems to repel many filmmakers. In film, there is no tradition of creating pictures without people. Since its inception, film has been based on theater, and thus on dialogue. The mere thought of making a film without people is absurd to most directors (Translator's note: and then Star Wars: The Phantom Menace came along...). In music there is, to say the least, a much older tradition of making music without song. One could say that music, as opposed to theater and film, has more to do with directly generating emotions and moods than trying to reflect real events or psychological occurrences.

In animated pictures, there have been several attempts to take a step away from people and trying to create a symbolic universe. Mostly, however, it has only led to compromise. Virtually all animated films are fables, i. e. they describe things that actually occur in human society. Basically all events that are described in cartoons involve actors with certain human physical and psychological attributes that have been put in some human-like situation. The few attempts at creating animated film like modern art, through the use of symbols and patterns without "life", have almost exclusively produced incomprehensible results.

Also relevant is the fact that film, up until the 90's, was extremely expensive to produce and did not lend itself to frivolous experimentation. It was necessary to have an established market potential or government financing to afford to make a movie. Neither of these institutions is very receptive to experimental ideas. With the introduction of cheap video technology in the late 80's and early 90's, it became possible to experiment with film in an entirely new way.

The computer has also made an appearance in electronic film. Here, as in music, it is the general opinion that the computer should remain merely a tool, a means of creating completely normal commercial or artistic film. Among those involved with animation and computer graphics, ideas are radically different. One of the most distinct and beautiful examples of electronic film is a series of short movies created by George Lucas' PIXAR, a company that was founded by the film mogul for the sole purpose of developing computer technology for motion pictures. It goes under the collective name of Beyond the Mind's Eye, and is well appreciated among those who already have been involved with electronic culture. Somewhat paradoxically, in this case it was the commercial film industry that financed the development of one of the most alternative art forms there is. Some of PIXAR's movies are regular movies intended for a wide audience (like cartoons but more detailed), while others are very experimental2.

I refer to films containing only exploding geometric figures, camera pans over incomprehensible landscapes, fractal images, and psychedelic color patterns as ambient films, since the idea is about the same as with ambient music - to set a mood without a linear or coherent content. The style is related to so-called parametric film, in which the technique, especially camera positioning and panning, is and end in itself to lend the film a certain mood without resorting to traditional narrative methods.

Electronic film is very popular at rave parties, and also a given ingredient in many techno music videos, a music style which will be discussed in the next chapter.



1 To "expand the frames" is considered a general characteristic of postmodern art.

2 They've made a commercial breakthrough with the movie Toy Story.


Chapter 7
RAVE, TECHNO AND ACID

During the 80's, something strange occurred in Sweden. The DJ's that had grown up in the seventies (and were intended as replacements for the grossly expensive and uncontrollable live music) suddenly acquired artistic ambitions. Small companies in the form of a mix between record companies and DJ houses started appearing all over the Western world. They produced records containing music for one single purpose - to be played at discos and dance clubs. It should be as rhythmic as possible, and at a rate of about 120 beats per minute - a perfect pace for dancing. Swemix and Nordic Beats were companies that were typical of Sweden. Among the DJ's who became successes by combining dance and pop music were Robert Wåtz and Rasmus Lindvall, later known as Rob n' Raz, and they were most famous for adapting tracks from the rock group Electric Boys to the dance floor. Others preferred to stay less commercial and do their own thing.

During the middle and end of the 80's, and in Sweden in particular in 1987-88, the new dance culture emerged. It was careless and carefree dancing for its own sake, nothing well-organized and tidy that you subjected yourself to for social reasons at discos or in physical education classes, but rather wild, uninhibited dancing. It was the resurrection of the rhythmic, ritualistic dance that had for centuries remained repressed and subjugated by the West's religious and ethical values, and it returned in the form of acid house. Naturally, established society, with its politicians, musicians, and counselors, was outraged and terrified. And naturally, all the young people with enough brains to be rebellious bought acid house records to freak out their parents (including your author, who bought his first acid record, House Nation by MBO, in 1987).

Pure house was the most successful in the beginning, probably because it was based on funk, soul, and disco music a la George Clinton and James Brown rather than synthetic music. The synthetic parts were limited to some bass line, generated by a drum machine or stolen outright from some Kraftwerk record. The style was created in Chicago, and supposedly derived its name from the fact that dance parties were often held in warehouses (one of the first European house music clubs was thereafter named Warehouse, and was located in Köln, West Germany). Together with the contemporary Detroit-based techno genre (which was purely electronic), this new dance music came to be called acid house. Early house bands include The Royal House, the previously named MBO, and D-Mob. When the music gained in popularity, the two styles became mixed together, particularly in Europe where it was simply called acid, and no one really knew what music belonged to what style. The first really influential European house clubs appeared around Manchester, England.

Acid house was a special form of dance music which used samples (fragments of sounds) in specific ways. It was inspired by the cacophony of machine sounds employed by industrial music (as with Throbbing Gristle or Einstürzende Neubauten), William S. Burroughs' style of building larger texts from small text fragments (read more about him in the next chapter), and from the art of collage and mosaic. The acid musicians constructed a mosaic of sound phrases, and were almost exclusively DJ's who knew how to emphasize good dance rhythms. You could say that it was the first instance of concrete music (the brainchild of Pierre Schaeffer) reaching a wide audience. Sampling machines were first introduced among musicians engaged in making concrete music.

Musically speaking, acid house developed the already existing electro-pop trend of well-composed riffs, in the form of synthetically generated loops that set the mood and ambience of the song. "Acid" is unfortunately also a slang term for lysergic acid-25 (LSD). Acid house has, however, probably not derived its name from any such association. It has been said that the true originator of the term is the slang expression "burn acid", which was DJ jargon and referred to the sampling sounds from records. There are, of course, others who say that this is just a euphemistic lie, and that the term originated from a few English musicians who visited Detroit around 1986, buying anything with the word "acid" on it in the search for Grateful Dead and other "hippie" recordings, but instead ended up with a slew of strange synthesized music which turned out to be early techno and house. The name for the genre supposedly emerged from this event. Acid house also has a characteristic sound, a little heavier and faster than regular dance music, but milder than the "raw synth" mentioned earlier. Sounds from synthesizers and drum machines such as Roland 303, 707, 808, and 909 were especially popular (hence, for example, the house group 808 State).

Acid music gained popularity at the time of the golden age of personal computers. 1987-88-89 are considered the absolutely most intense years of the early history of personal computing culture, which is why many demos, pseudonyms, and group names among the subcultural hackers drew inspiration from acid house. The two cultures rest on the same cultural base of amateurs, and emerged thanks to the increased availability of low-cost computers and consumer electronics during the same period. Also note a vague influence of hacker culture on acid musicians: DJ's with names like Phuture or Phusion (if you observe the spelling) have obviously been inspired by hackers. Acid house also formed a kind of symbolism for youth rebellion during these years.

There has long existed a total conceptual confusion eith respect to dance music. Acid house grew explosively into a number of sub-categories; every larger city in England and Germany seemed to develop its own house genre, with the same trend taking place in the US. Many quickly tired of the eternal compromises between electronic dance music and the verse-refrain style of rock music, or rap (which was mandatory within hip-hop), and reverted to the original and purely electronic dance music: techno.

Techno
Techno sought to return to the roots of electronic pop music - the sounds and harmonies used in regular dance music had grown tiresome, and acid house had started sounding the same across the board. Acid was no longer breaking new ground, and it was time for something new. DJ's who were now full-fledged electronic musicians sat through their nights listening to Kraftwerk, Ultravox, D.A.F. (Deutsche-Amerikanische Freundschaft) and other early synth bands that had contributed to music culture, in an attempt to find the good stuff that had been left behind and at the same time try to create something new. And they succeeded, especially by using early synthesizers such as Prophet, Fairlight, and Roland brands. The reason for this return to yesterday's technology was supposedly that they couldn't really afford anything else.

Techno was, as noted earlier, born in Detroit. The origin of the entire genre can be traced to three DJ's named Magic (Juan Atkins), Reese (Kevin Saunderon), and Mayday (Derrik May). They claim to have been inspired especially by Kraftwerk and Parliament (George Clinton). Mayday toured England in 1987 and provided inspiration for the underground acid scene through his compositions. Most likely, this legendary DJ has lent his name to the enormous Mayday rave, which is held annually in Germany and has reached astronomical proportions.

Frankfurt had early on become inspired by Detroit techno and created its own version, eurotechno, by trashing their Japanese synthesizers and hunting down old relics from the seventies. SNAP invented the winning combination of a black rapper and a female vocalist, and LA Style made a loud and provocative song called James Brown is Dead, to signify the end of techno's affair with funk and R&B. Groups like 2 Unlimited, Pandora, Captain Hollywood Project, and Culture Beat fall under the collective term eurodance (in the US, this genre is called techno/rave).

These and other early eurotechno bands brought something new that many had long been waiting for. They abandoned the 120 bpm that had been the mark of beauty for acid house, and pushed the pace of their songs to a level that most closely resembled energetic punk. The tempo increased on dance floors around the world at the same time that MTV grew really large and further expanded the production of popular culture. We ended up with a new, wearied youth generation which was called Generation X, who walked out of movie theaters if nothing had happened by the first ten minutes of the film.
At the same time, the indefinable KLF (Kopyright Liberation Front) appeared from nowhere and toured the hit lists with only one album and an incredible amount of singles, only to later withdraw from the scene and, in their own words, "never again make music". The group consisted of Bill Drummond, the disillusioned former manager of (among others) Echo and the Bunnymen, and Jimmy Cauty, a former member of Killing Joke. They introduced a totally new element to popular music by combining the instrumentation and dance-oriented tempo of dance music with classical rock formulations. The result was music palatable to synth, techno and rock fans.

KLF were very aware of what they were doing. In the early stages of their career, they wrote a book titled The Manual, and promised a full refund to anyone who could not make it to England's hit list with the help of the book. Before they became KLF they called themselves The Timelords and The Justified Ancients of Mu Mu (a name which together with much of KLF's image is taken from the cult book Illuminatus!). In reality, you should probably consider KLF's commercial career as an example of modern art making a protest against the pop industry. At the end of their career, they actually hated this self-perpetuating machine that churned out the same garbage over and over again. Throughout their career, the group was characterized by a total lack of respect for money and established pop music, as well as a generally cynical view of life. The leader, Drummond, was highly inspired by Zen Buddhism, and provoked those who posed questions about the band by accusing them of being under the influence of the four mistresses of Lucifer: Why, What, Where, and When, which are questions that according to Zen cannot be answered by words. Early on, Drummond worked with Alex Paterson on The Orb, and the two together could be said to have invented the genre of ambient techno.

KLF also clearly shows the connection between attitudes in the underground dance culture and among hackers. As many other DJ's, they sampled extensively from other artists, and more or less held the opinion that music should not be patented. On one occasion they sampled ABBA and wrote (somewhat provocatively) on the back of the album that "KLF hereby declares all material on this record free of copyright", which eventually resulted in the entire issue being burned on a field somewhere in central Sweden. This took place after KLF failed to convince ABBA to withdraw their threat of legal action that they received from ABBA's Swedish representatives. On another occasion, Drummond began to "liberate" the group's equipment during a gig at a London club, which forced the club owners to intervene to stop the guests from taking the machines home with them.

In England, there is a whole array of strange musicians in addition to KLF: among others, the ambient music revolutionaries Black Dog Productions and an idiosyncratic group named The Prodigy, who invented their own style of music called breakbeat. These groups, like KLF, appeared in the late 80's in synch with various independent bands such as Pop Will Eat Itself. The explosive development of the music business in England was due to the very pop industry that KLF specifically protested.

A considerable proportion of people in England go to "in" clubs and listen to the latest music before it is released, and the top hits list is a creation based on lobbying, without any connection to reality whatsoever. In actuality, England's Top 40 is simply an institution of power that the pop industry employs to tell the public what they should buy. Since entries on the list go up and down at a violent rate, new music and new artists must be generated constantly (translator's note: At the time of this translation, a clear-cut example would be The Spice Girls). In this frenzy, hundreds of artists get their chance to show what they can do, for better or for worse. Originality is much more interesting than technical skill. In this manner, the pop industry sought out acid house music from the small suburban clubs, and the improbable event that this narrow genre made the hits list actually occurred. This phenomenon has turned England into the "engine" behind European popular music.

In Germany, Sven Väth and a myriad of other DJ's produced a mix of techno and ambient clearly influenced by the eighties' acid house: trance, which in England was combined with influences from the Indian vacation paradise Goa and labeled goa-techno. Some half-crazed Dutch guys who called themselves Rotterdam Termination Source made a piece of music using only drums and sound effects: Poing. In this manner they created a genre called hardcore techno, which has developed into a hybrid of techno and death metal, often using a tempo of 300-400 bpm. This hybrid has gotten some former metalheads into techno.

Electronic pop music is never static: there's always something new, and there's constant experimentation in small studios around the world. Crossover techno, in which techno is mixed with other music genres, springs up everywhere. It is often very commercial, with perhaps the exception of the hyper-experimental The Grid, who have for the first time in their career made a commercial success with Swamp Thing - a mix of techno and banjo pieces. Jungle is a genre which is both a predecessor to and a continuation of The Prodigy's breakbeat-techno - a mix of techno, rag and dub music which seems very promising and which is also not particularly commercialized. The most hardcore is gabber, which is a corrupted version of hardcore techno. God knows what's going to be invented next: gospel techno, perhaps?

Other musicians, such as Future Sound of London, Black Dog Productions and the Swedish Lucky People Center, have approached electronic music and make up a genre known as progressive house, i. e. house music which is going somewhere, and is always under development. These people want to escape the concept of genres by breaking all norms. Thanklessly, genre-breaking becomes a genre in itself; there is a similar phenomenon within jazz.

As soon as a genre becomes commercial, as when techno became eurodance through U96, the smaller clubs tend to invent some new variant and sneak back into the underground. Examples of this include Jungle, Goa-techno and Gabber. Jungle is, at the time of this writing, on its way out of the underground, and new styles are most certainly being created as we speak in some studio in Germany, England, Holland or Belgium. You can hold whatever opinion you want on this; in practice, the entire underground club culture is simply a concept factory for the pop industry. They find something new, polish it and water it down a bit, and then release it for a mass audience. If you believe in infinite artistic integrity and creative art, it's probably a horrible thing to witness. On the other hand, maybe we should be thankful that we're not listening to the same chewing-gum pop music of twenty years ago.

Clubs and Raves
Techno is mostly played in small private clubs, even though it is today possible to sell techno albums to people who are not DJ's. As a cultural manifestation, techno has strong ties to the dance floor, and the two could be said to constitute a unified whole.

Dance music has changed the music market. In the old days, you listened to the radio and checked out your friends' preferences, bought the records and listened to them at home. Nowadays, you go to a dance club or even a rave, and become influenced by the music you hear there - the type of music that's made for dancing. Later, you might by an album or two. Eurodance mix albums are especially strong sellers.

Techno is not designed for "easy listening" at home, and it can have a stressful effect if it is used as background music. In England, where the public traditionally is very open to new forms of music, heavy and uncompromising techno music has made a commercial breakthrough; likewise in Germany, which with its tradition of electronic music a la Kraftwerk welcomes any new innovations in that realm. Even in Southern Europe, really heavy techno tracks are played on pop radio.(1)

Raves are still very underground events in Sweden and Scandinavia, even if its interest base has grown explosively since 1988. Today, there are thousands of happy ravers in Sweden, who are often willing to travel far to attend a good rave. In Germany and Great Britain, raves are already accepted cultural events, which in some cases attract up to150,000 people, such as the well-known Mayday rave in Germany (which is sometimes described as the Woodstock of our time). Special raves are also arranged for different genres. Raves in Scandinavia are usually not announced in the daily press; the information is spread through the grapevine and through flyers that are available given the right contacts.

A type of rave that receives a lot of attention is the so-called bryt-rave (English: break-rave), which entails breaking into a warehouse, setting up a sound stage and starting to dance. It is reminiscent of a sort of house occupation, and if the number of attendees is large, the police stands powerless. This type of rave has been somewhat frequent in Hammarbyhamnen (Hammarby Harbor) in Stockholm. One could make a connection to the Prodigy track break & enter, in which sounds of glass braking and doors being pushed open accompany the music. The sense of revolt and insolence against society is complete.

The rave culture is primarily based on the Trance genre, which can keep a dance floor alive all through the night with its long songs in a perfect dance tempo. A rave is not an event to attend to get drunk or pick up someone. A rave is a place for dancing, listening to music, meeting and looking at other people. Whoever attends a rave with different intentions will invariably be disappointed.

Rave culture is claiming expansion - even futuristic dress and other methods of creating a homogeneous group identity have started to develop. The rave sites (mostly warehouses) have also started to receive futuristic interiors to give more of a "cyber-feeling" to the environment. The phenomenon has gained a Swedish face through Mikael Jägerbrand, editor-in-chief of the relatively new magazine NU NRG Update (pronounced "New Energy"), which has a run of about 1000 copies and has a layout that really screams "underground"; the page layout is reminiscent of American tabloid classifieds. It is of course a good move - ravers love being underground. Despite its small circulation, the magazine is not sectarian or single-minded, and it shows a certain sense of distance and social awareness.(2) There's also a few smaller fanzines, and naturally a few electronic bulletins and magazines.

Clubs, Trends, and Drugs
The (Swedish) debate around dance events such as acid parties and raves is severely inflamed by the narcotics debate. The underground dance culture is under no circumstances endorsing or approving of drug use. Unfortunately, sometimes people attending dance events can be total spacebrains(3) . The main purpose of dance parties was and remains dancing and music. Originally, acid parties were completely drug-free events.

As early as the late 80's, the discos on Ibiza (a Spanish island resort) hooked on to the acid house trend and created their own version, balearic beat, a mix between house, flamenco (!), and a few other styles mostly associated with the artist Paul Oakenfold. Ibiza is primarily visited by rich people, mostly from England, and it has drugs in abundance.
The reason for the popular connection between drugs and acid house/rave is thus that those who enjoyed partying all night before the introduction of the acid parties, brought their strange fashionable drugs when they went to visit one. Especially the "designer drug" Ecstasy, a mix between amphetamines and LSD, has figured heavily in the media. Ecstasy is originally a "yuppie-drug", which has become a sort of exclusive marijuana for the rich. In the beginning it was sold as a diet drug. The greatest culpability for the narcotic stamp on rave and acid culture falls on English upper-class youths. The drugs ruined the reputation of all the intense house-clubs around Manchester, and the stigma remains.

Nonetheless, Ecstasy, amphetamines, and cocaine are present at some rave-like events. As expected, it seems to occur more at purely commercial dances, to which the "in" crowd that want to stay abreast of the new culture is drawn. Enthusiasts at small techno clubs are mostly of the opinion that Ecstasy is a nuisance which ruins the reputation of techno culture. Unfortunately, since everything that is prohibited is also "rebellious", drugs have spread to several acid and techno clubs, including Swedish ones. The clueless middle-class rebel thinks, as usual, that you're a real rebel only when you do drugs. Independent thought is never popular among conformist groups. In short: ravers with brains stay away from drugs, and those who don't know anything naturally think drugs are really cool (no, it's true - people never learn).

Large clubs are frequent in major cities. They are kitschy, well decorated, with mean bouncers and a fairly long line regardless of whether it's full or not (to create demand, of course). They are not about supporting some subculture, even though many DJ's from the underground scene get a chance to make some money in these clubs. Drugs are consumed in the bathrooms.(4)

The terror in homes around the country is complete. The poor parents of these young people remember with horror those few years at the end of the 60's, when they themselves were swept up by the wind from San Francisco, smoked marijuana and hasch, and tried LSD. Not many are willing to admit to that today, but their fear of their kids doing the same thing today is genuine. The main theme then was protesting the Vietnam War and society, and the main theme today is dancing and having fun. Ravers don't need politics as an excuse to meet and enjoy themselves. Drugs are tangential, and not at all as prevalent as media would have it appear. Fear and misunderstanding often inflates the problem to bizarre proportions.

One thing that ravers do enjoy are so-called smart drinks - energy drinks that help rave dancers keep dancing a long, long time. Mostly it is a matter of substances that can be found in any pharmacy or herbal medicine store, but with different labels. There is no reason to suppose that this should be harmful - middle-aged Swedes have consumed the pills for decades without suffering harm. What is worse is the tendency to mix prescription drugs with the drinks, which is something that cyperpunks in particular do sometimes (more on this in the next chapter). Most of the "emergencies" reported about drugs on rave parties is due to journalists attending some event and seeing these sugar pills and sodas on the bar, frequently wrapped in some pastel-colored paper or foil, which naturally appear very ominous. If you interview young people who have been to a rave, they most likely will say yes to having taken Ecstasy, even if they've actually consumed a bunch of St. John's Wort. It happens, sometimes.

Some member of the debate has tried to submit the fact that the dancing itself is harmful. The statement that the capacity of ecstatic dance - which is imprinted in our genes since thousands of years - fails by virtue of its own stupidity. Such a statement is thus rather an expression of conservative cultural values or even xenophobia, which seems to be a characteristic of many "opiners". Obviously, the people that do not attend regular dance clubs and listen to Stairway to Heaven for the 18803rd time, while drinking themselves silly, and are not there just to try to get laid, must be suspect… cluelessness, in short.

Even in Sweden, frightened cops have broken up rave parties for no reason whatsoever in their total ignorance of how underground culture works. Some police raids against rave dances most closely resemble ethnic discrimination - of the same kind practiced by customs agents and retail security officers who target people of different pigmentation or dress. Some cops are apparently susceptible to excessive stereotypical categorization.

The cause of the cultural phenomenon of rave is that the actual dancing at the larger, commercial clubs has become secondary. The organizers are mostly interested in selling as much beer and liquor as possible, and the patrons are more oriented towards boozing and picking up someone than dancing. The inherent value of the dance has been abandoned.

It has occurred to me that it might actually be a good thing that rave suffers from a bad reputation. It prevents people with purely commercial interests from advertising gigantic rave parties, and thereby commercializing the vibrant underground technoculture. Sometimes it even seems that ravers are somewhat amused by having a "bad reputation", for identifying with the underground. In Sweden, this negative image has only had the effect of attracting more young people to the parties.

Music and Music Culture
In reference to electronic music, it generally seems as if every new generation of innovative musicians is scorned by the previous one: classical electronic musicians look with distaste on electronic pop music, synth pop fans despise heavy synth and techno musicians, techno musicians dislike hardcore techno musicians etc. etc. It might be redundant to mention that classical and rock musicians scorn all forms of electronic music.

This is probably a necessary state of affairs. It is the distancing from older norms that creates a new subcultural group within an accepted domain, and this is how culture grows and develops. The argument is applicable to literature, film, theater - in short, all types of art. Techno music and techno culture is, especially due to the influence of television, inextricably associated with the art of video and computing. That techno is inseparable from dance has already been illustrated. This development of popular culture has resulted in many artists that are more like some form of product than people. The music is created in a studio, performed by a group of photo models, etc. Popular music becomes more than music - it becomes part of a culture. You don't buy just a record, you buy a lifestyle. Fashion, dance, film - everything is included. It could be summarized and called "art". Popular art.

Art grows and develops when individuals, with a desire to create something new where not everything has been tried, go against the norms and create something new. Mostly the individuals are young, such as Sex Pistols, Grateful Dead, Bob Dylan or Jack Kerouac (well, they were young when they started). Sometimes it is some eccentric artistic soul like Marcel Proust, James Joyce, or Frank Zappa. When a young artist breaks out of the norms there arises, given the right circumstances, a new subculture, which under even more conducive circumstances creates a new spirit of a generation.

The smaller the Earth becomes, and the farther our mass media reach, the more subcultures develop, generations change faster, and society changes faster. This is a characteristic of the post-industrial society which I will later explore further. Let it be stated that the breaking of norms and creation of new ones is very important for these new styles of music. It also has a considerable importance for the more central points of this book.

We will now see how the pulsing rhythm in culture generated an entirely new literary genre, a new view of society, and - soon - a new ideology.



1. In Sweden, as of late 1996 no such breakthrough has taken place. Perhaps the Swedish public is simply too conservative. However, things are slowly moving forward. Kalle Dernulf, of P3 (part of Swedish national public radio), is probably the one who has dedicated himself the most to spreading Swedish and foreign techno in the ether.

2. Jägerbrand and the Swedish Rave Organization (SRO) are at the time of this writing organizing a "raverixdag" (English (loosely translated): Rave Congress) to coordinate Swedish rave organizers. Someone remarked sarcastically that "they seem to have to make everything political", but in light of the Nacka Police Department's dubious raids against Docklands (a rave site) during the Spring of 1996, the need for an organized resistance group is understandable.

3. Some have made the observation that it shouldn't be a great experience to attend a rave on a "downer" drug, such as hasch. I have personally observed that it appears fairly abundundantly at raves; why, I do not understand. Possibly it may be due to the hasch (THC) having a mildly psychedelic effect. In this context, I'd like to take the opportunity to mention that I'm personally neither for nor against drugs per se, which you might conclude from the strong formulation above. What I am against is the tendency to blame drug use on culture. On drugs in general I don't have a clear and expressed opinion, rather I reserve the privilege of ignoring that debate, which is sure to piss somebody off.

4. If someone interprets this to mean that I think that these "beer cafés"
are the pathetic hangouts of the "in" crowd, that someone has interpreted me correctly.


Chapter 8
CYBERPUNK

Cyberpunk is originally a literature- and film-oriented movement. We will begin with literature.

There are different science fiction genres (abbreviated: sci-fi ), and the definitions are somewhat arbitrary. Sci-fi bibliographies often range across such wide areas as fantasy and horror , but this book is not about science fiction literature in general. I will therefore proceed to the part of sci-fi that is called cyberpunk.

The definition of cyberpunk is usually that it is a book that resembles something written by William Gibson ; a type of futuristic account of society where advanced computer, nano-, and biotechnology as well as artificial intelligence is part of the ordinary. The world is rigidly segregated by a small, ruling elite of multinational corporations and a large, brutal mass of regular people. Governments have yielded to large conglomerates and mafias, which control the world. The action generally takes place in enormous metropolitan areas of a ghetto-like character. Drugs of all kinds are widely available, the pace is fast, and personal and environmental descriptions are superficial and often (in the case of Gibson) chock-full of trademarks and digital jargon. A typical cyberpunk story is set around the year 2020.

Cyberpunk is usually referred to as dystopian , as it describes something close to the opposite of a utopia . Most early science fiction novels were utopian, where disease was a thing of times past, a unified political system had replaced constant conflict, and the action usually centered around a group of scientists on a mission across the universe, or on space heroes such as Flash Gordon . The TV series Star Trek is a definitive utopia. It is not the case that a utopia has no problems; it is simply that "the good guys" are always win and never morally questionable. All utopian chronicles are optimistic visions of the society of the future.

In a dystopia, many problems remain in the world, the natural environment is almost completely ruined, and politics is (as usual) chaotic. The books are therefore much more plausible than classical sci-fi works, and has acquired a wide readership among people who normally do not read sci-fi. Earlier, some were of the opinion that it was unnecessary to descrabe realities that were worse than the one on Earth. Some dystopian authors, like Stephen King, therefore abandoned science fiction in favor of writing horror literature. Dystopias are, however, more auitable for social criticism than utopian works. Since many dystopias are satirical or comedic, cyberpunk constitutes a sharp contrast through its cold realism. Other notable dystopias are Karin Boyes' Kallocain and George Orwell's 1984 .

Just like most US science fiction, cyberpunk has its roots in so-called pulp fiction. Pulp is a rough cellulose material used to make paper, and pulp fiction derives its name from the rough, porous quality of the paper it was printed on. Since the film industry was still at an embryonic stage, people read much more books and magazines, and pulp was the "crude", cheap literature. Comics and TV series such as Flash Gordon are also called pulp, since they were inspired by stories and illustrations from these magazines. Pulp seems silly and incredibly far-fetched to the normal Swedish reader, but for sci-fi lovers across the world, pulp is the origin and source of all modern science fiction, and the cause of its own subculture.

Bruce Sterling , Gibson, and a few other sci-fi authors had their own pulp magazine called Cheap Truth . Although it wasn't produced in the 50's, it was run in and with the same spirit as the best early pulp magazines. They thought that no really good sci-fi was being written. They encouraged people to get their own word processors and write good, vivid, and readable science fiction. Not seldom did they come down on best-selling authors in the genre. An interesting detail about Cheap Truth was that it wasn't copyrighted, and that copying and distribution was encouraged.

Cyberpunk is a little more than this, but the literary genre is basically synonymous with a small group of American authors, of which William Gibson and Bruce Sterling were the most famous. A few 2000 AD comics, especially Judge Dredd , are also considered cyberpunk, since their world is somewhat similar to Gibson's dystopias. The term cyberpunk was supposedly coined by a gentleman named Gardner Dozois in a review of Gibson's first book, Neuromancer . Dozois is said to have, in turn, gotten that label from a short story by Bruce Bethke , which had been submitted for his review. (1)

The message of the cyberpunk novel is one of warning - the stories are nightmarish visions of a future society that we risk becoming subjects of, unless we take precautions. The word cyberpunk is derived from cybernetics = humans or society in the interaction with machines (from the greek kybeternetes = first mate or pilot), and punk = virtually lawless individual with a mildly anarchistic social view, cowboy style, living in the underground.


1.  This resulted in a considerable amount of controversy. Bethke considered it his right to define the term "cyberpunk", since he had invented it. Bethke's definition does not coincide with Dozois's


Chapter 9
AN ELECTRONIC INTEREST GROUP

The story of hackers, phreakers, telephone companies, and justice is told (from an American perspective) in Bruce Sterling's The Hacker Crackdown (1992). The reason this science-fiction author decided to write a history of hackers, is exactly what I have tried to illustrate with my arguments so far: that aspects of electronic cultures overlap. The whole thing started when the U.S. Secret Service tried to clip the wings off the underground hacker movement, and on some occasions strayed far outside the limits for law enforcement intervention.

They really wanted to nail the hackers, who had grown extremely powerful in just a few years, through a national crackdown (hence the title of the book), with the intent of teaching the hackers a lesson. This crackdown was named Operation Sundevil. The Secret Service busted into the homes of American teenagers, grabbing everything with wires coming out of it. The computer, the printer, the portable stereo, mom's and dad's computers, all of it. That wasn't enough: they also took manuals , or anything remotely resembling one: science-fiction novels and regular compact disc records, for example.

All of you can probably figure out what happens if you take all the hacker's machines away from him or her. He/she becomes totally powerless, with no means of keeping in contact with friends or communicate in open electronic discussions. The hackers not only had their wings clipped; they also had their mouths sewn shut. This is exactly what the Secret Service wanted, and probably no one would have been concerned - not even Bruce Sterling - if they had stayed content to just raid hackers. Many hackers arrested during the crackdown were given sentences that prohibited them from using computers for a certain period of time.

On March 1, 1990, the Secret Service committed a mistake: they went into the gaming company Steve Jackson Games , in Austin, TX, and confiscated all the computers that they could find, including one which had a completely new game stored on its hard drive: GURPS Cyberpunk (GURPS sands for Generic Universal Role Playing System, developed by Steve Jackson Games to make it easier to switch between roleplaying settings without having to switch gaming systems).

Steve Jackson Games, therefore, make role-playing games , and the game GURPS Cyberpunk was written by a hacker going by the pseudonym Mentor (his real name was Lloyd Blankenship ), and who worked as an author at the company. When the company demanded the return of its computer, or at least the files for GURPS Cyberpunk (which was just about to be marketed), their request was denied, with the justification that it was not a game but rather a manual for perpetrating computer crime. Mentor himself was a hacker, and had written an excellent and realistic game which focused on breaking into different computer systems. The game was considered dangerous.

Anyone who's seen a roleplaying game knows that it is a matter of a kind of books used as reference material for the games, in which the players try to create and enter a world of the imagination. GURPS Cyberpunk , therefore, was a BOOK , released by a publisher, with an ISBN number just like any other book. The fact that the U.S. Secret Service had tried to stop the publication of a book , simply because the contents were held to be too dangerous , was not well received by conscientious citizens of the U.S. The freedom of the press is constitutional in the U.S. (like in Sweden), and a fantasy-oriented role-playing game like GURPS Cyberpunk has the same official right to exist as The New York Times , whether it teaches computer crime techniques or not - as long as it doesn't advocate the perpetration of crimes.

After a period of fuss in regards to the Steve Jackson Games case, the Electronic Frontier Foundation was formed, led by (among others) the Grateful Dead lyricist John Perry Barlow .(1) They were financially supported by Mitch Kapor , who was one of the creators of the spreadsheet program Lotus 1-2-3 . The organization had supporters among the users of the electronic conferencing system The Well , created by the magazine The Whole Earth Review in San Francisco. WELL is short for Whole Earth 'Lectronic Link , and in principle functions as a gigantic BBS with connections to the Internet. (You could also view it as a metaphorical "well of knowledge".) Many users of The Well are old hippies and Grateful Dead fans, who dearly value their rights of free speech and assembly. Many are what I call university hackers, engineers, or programmers. The hippie-programmer combination is not unusual at The Well. (I mentioned earlier that the hippie culture originated at the universities in the Bay area. Consider Mitch Kapor, for example - before he started making business software, he was a meditation instructor.)

San Francisco is almost a chapter of its own. It is the Meccha of the electronic world. The universities Berkeley and Stanford are in the area, and close by is Silicon Valley. The majority of modern computer technology comes from San Francisco. It is where the first personal computer, the Altair, was built, and it is also the home of EFF, The Well, Whole Earth Review, Wired, and MONDO 2000. Virtually all forms of popular electronic culture have originated in San Francisco, and it is also where Virtual Reality was first marketed. At the same time, I would say that San Francisco's reputation is a little exaggerated. It has just as much to do with American attitudes and marketing as real knowledge, and the expertise that computer technology rests on has been researched and developed all across the world. However, it is a natural nexus for amateurs as well as the pros of the computer industry. Silicon Valley, in particular, has had great significance, with its thousands of bored upper-middle-class engineers waiting with anticipation for anything to happen on the electronic frontier. These people constitute the innermost core of EFF.

EFF has quality contacts inside the entire American software and hardware industries, and champion the electronic rights of human beings . The organization does not protect hackers, as is often said, but it protects the rights of hackers. EFF is therefore a civil rights organization . Like the cyberpunks, EFF is ideologically influenced by libertarianism, but on many issues (such as "intellectual property"), they are on a collision course with the libertarians. I will now try to illustrate how threats against civil rights and individual integrity are manifested in the information society.

The Right to Communicate
EFF stated (and states) that it is a violation of integrity to take someone's computer away from them. It is as violating as taking away the right for an individual to use pen and paper. A hacker is used to communicating with the world by computer, through BBSs, the Internet, etc. Taking the computer from the hacker is akin to taking the typewriter (word processor, pens, or paper) from the author. EFF sued the Secret Service for constitutional violations in connection with the raid on Steve Jackson Games - and they won. The organization now works towards a constitutional amendment protecting electronic expression.

In short: a computer criminal should not be prevented from using computers (everyone uses them nowadays), but from committing more computer crime. You don't prevent a counterfeiter from working at the mint - you teach him to stop printing fake currency. Properly used, the illegal hacker's knowledge is useful to society.

Integrity
EFF has grown since its inception, and currently sponsors a public debate about computers and humans in a future information society. It wants to protect the right of the individual not to be registered and controlled by authorities, simply because it is now possible thanks to the advent of the computer. The organization therefore advocates the use of the encryption program PGP, which I discussed earlier. Why? Well, SÄPO (the Swedish National Security Police) - or some other internal intelligence organization - should not be allowed to examine all postal transmissions in Sweden. They should not be able to read all electronic mail, either. But , they could (if they so wished) put a fast, efficient computer to the task of searching all electronic mail for certain keywords, in order to quickly trace new political groups. (It is astonishingly simple to construct such a program; I could even do it myself.) Let's say that every piece of electronic mail containing the words "REVOLUTION", "WEAPONS", or "SOCIETY", in any combination, would be copied and sent to an analyst. You would never know.

According to Philip Zimmerman (creator of PGP), it is precisely because of this that one should encrypt one's mail so that no third party could read it. Of course, in democratic Sweden, we would prevent internal organizations from doing such horrible things. Nevertheless, there might be good reasons to encrypt one's mail. Why?

First: there are people besides SÄPO and the local revenue office that might want to see if you're writing something inappropriate. Second: do you trust the authorities? If so, why not just send them a copy of your personal communications, so that they can check them and be sure that you're not sitting around conspiring? What do you, a conscientious citizen, have to hide? Why not let the police search your house for illegal weapons? You see where I'm going - encryption protects the privacy of the individual from governmental intrusion.(2)

All the chaos surrounding PGP started on April 10, 1991, when the U.S. Congress made a statement about encryption programs. It clearly stated that it expected everyone involved in the manufacture of encryption technology, of any kind, to incorporate back doors so that the government could read the encrypted information if necessary. The message was a frightening one: you may keep secrets - but keep no secrets from the government. Shortly after, Zimmerman's colleague, Kelly Goen, went around San Francisco and distributed PGP do different BBSs using pay phones. (!) He held that Congress was in violation of the Constitution, and performed this act in order to protect American society from totalitarian supervision. recently, the European Union sent a similar missive to the nations of Europe. (Americans are much more sensitive to these matters than Swedes - which is fortunate, I should say. Translator's note: Nevertheless, and ironically perhaps, the privacy rights of individuals in the U.S. are in much worse shape than in the Scandinavian countries - due to private record-keeping organizations such as the credit bureaus, which have become a sort of universal information source that sells all the information it has to anyone willing to pay for it).

Encryption, by the way, is not expressly an American thing. Us Swedes have been in the cipher game for at least as long. As early as WWII, we decrypted German communications going through Sweden. In 1984, the "expert" Ragnar Eriksson and his friends at SÄPO made an encryption system which, with the approval of the executive branch, they tried to sell together with other security "know-how". Alas, the system was worthless, since SÄPO has never had any encryption experts worth their name, and no one wanted to buy the system.(3)

Those who are professionally involved in encryption (thus not SÄPO, but the military and the universities) almost always encounter upstarts who think they've invented the world's best encryption system. Common to all these parvenus is that they want to keep their systems secret, as they consider themselves so bright that no other person has ever been on the same track. All the pros release their algorithms (encoding principles) and tell people how the system works; if it is good enough, nobody can break the cipher even though they know how it works. Some examples include DES (Data Encryption Standard), and IDEA (International Data Encryption Algorithm) - which is used in PGP. (SÄPO did not want to publish their algorithms...) Neither DES nor IDEA are impossible to crack - it's just that it would take a few million years for today's computers to do so, using current deciphering techniques.

As an illustrative example, I will mention a common beginner's crypto which entails adding a sequence of random numbers to a digitally stored text. It would be very hard to crack if the message was not any longer than the sequence of numbers, but with longer messages this randomness can be removed as easily as static can be filtered out of a radio signal.

Sweden Awakens
Today, Swedish police have already been guilty of questionable activities relating to the freedom of expression. They have confiscated BBSs, used as an exchange medium for private electronic mail, and probably also examined the private mail stored on these. This has been carried out on suspicions that the BBSs were used in the distribution of pirated software. It can be compared to sifting through all the mail in one of the Postal Service's boxes simply on the suspicion that somewhere in this box there is information about a crime. Would you want your mail read simply because it happened to end up in the same box as a letter from, say, a car theft ring? (I don't even know if the police have the right to do such a thing, but I don't like the thought of it.)

"Holy Christ", the police say, "those who use a BBS are despicable hackers! Thatdoesn't have anything to do with normal people's privacy, does it?"

It's great that they were hackers, and not Jews or immigrants , but simply regular, honest hackers, which we all know are terribly criminal. Hundreds of BBS users, regular Swedes with no criminal records, have had their right to privacy abridged simply because they fall under the fuzzy (to say the least) category of hackers ? And the police are upset because they have found encrypted material in these BBSs, which is hard or impossible to read. I really feel sorry for them.

Consider that today's BBSs will, in the future, be replaced by the Internet, through which you are expected to send all your mail. What will happen then? Are we going to have cops running around auditing the mail, seizing large quantities of mail when they suspect something illegal might be lurking inside the pile? But, but... the police follow the law, and according to the law, electronic documents or communications are not covered by the freedom of the press. Hopefully, they are protected under the freedom of speech, but not even this is certain. Everything is very fuzzy, and no one seems to know what the facts are. Legislation is in progress.

Considering all the threats against integrity, the observant citizen naturally wants protection against surveillance, and therefore acquires an encryption program. American intelligence agencies want you to use their "Clipper Chip" instead of your own crypto. The "Clipper Chip" is a very good encryption program which, according to themselves, only the Secret Service has a back door to. The European governments have something similar in the works, which has at the time of this writing not been formalized.

Another use for encryption (besides making your mail unreadable) is to put a seal on your messages - a kind of electronic check digit, which can mathematically prove that the sender is who he/she claims to be, and that the content has not been changed. This way, electronic bulletins can be mass-distributed without having to worry about somebody "cutting" them, at least not without being noticed. This method is used by, among others, SWIFT, which is an international bank transaction system.

Those interested in the underlying technology of encryption should pick up a book on the subject. American cryptographers (like Zimmerman) are monitored by military intelligence agencies. (I don't know if this is the case for Swedish crypto-scientists.) In some countries, e. g. France, all encryption by private individuals is prohibited.

Swedish Rights
What about civil rights in Sweden and the rest of Europe? Is an organization like EFF necessary on this side of the Atlantic as well> Maybe - especially since European police agencies learn about computer crime fighting by peeking at the USA. In Sweden, police have also confiscated computers and disks, but also magazines, T-shirts, and printers, in American fashion. The police in the U.S. didn't know what to do with all the stuff they seized - and the Swedish police doesn't know either. It's not a mystery why it takes a virtual eternity to sort out hacker crimes, considering the amount of junk that the investigators collect as evidence. When I did an inventory of my own collection of about 200 disks, it took me over a month, and I only made superficial notes of the contents of each file. A criminal investigator has to be a great deal more thorough for his evidence to stand up in court, and a well-organized hacker can, in worse cases, have thousands of disks.

The time span and delays for the prosecution of a hacker is worse than those for refugees, with the difference that these cases are eventually dismissed. To the extent that the hackers ever see their equipment again, it is most often outdated and without value. The police are still holding computers seized six years ago. In many cases, the hackers' computers are considered instruments of crime rather than communication channels. Even Swedish hackers' rights of free expression have been infringed during police raids - whether they have been criminals or not. Remember where Cervantes spent his time while writing Don Quixote . (In prison.) Should the pen and paper have been wrested from him simply because he was a criminal? In at least one case, the Swedish police has been charged with violating rights of free speech and freedom of information.

As early as 1984, Sweden's National Police Board determined that seizure of equipment could cause problems, and that this should only be done in exceptional cases. Today, it's more of the rule than the exception. If they had been able to follow their own directives, which said to copy the information and lend it to the victim, the situation would have been much more pleasant for both parties. In that case, the hackers would not have had to have their computers stored in police warehouses for decades.

We also have a law of criminal forfeiture, which means that equipment used in the commission of a crime can be considered forfeited, and subject to sale or destruction. This might be reasonable in the case of specialized equipment like lock picks, "blue boxes", or other directly criminal equipment, but computers ? If a typewriter is used for criminal purposes, it is thus forfeited? Can we have just an ounce of freedom of speech, too?

The information age has now caused some prosecutions against the distribution of specific, protected information to become completely unmanageable. Are you struck by the same thought as I? That this plays into the hands of the cyberpunks? If information really can be owned - can we in that case uphold its copyright in a rational manner? Or is our old society in about to change with regards to copyright? Relax, there is a cure for all this. Computers are very good at controlling large amounts of information, and quickly at that. The organization BSA ( Business Software Alliance , an association of companies in the software industry) is apparently prepared to have a program called Search II stand witness in cases against companies suspected of piracy. The program works by reading the contents of a computer's hard drive and registering which programs are installed. The reason for doing this as opposed to seizing equipment, is that corporations, as opposed to hackers, raise one hell of a racket if you take all their computers. So far, so good.

When companies and (sometimes) people are charged with piracy, the police rely on BSA and the Search II program for technical expertise. It is a bit strange that BSA, which represents the plaintiff, is also relied on to collect evidence. Strange, to say the least. Now, allow me to insert a small provocation, which might help you think along new lines:

     Q: Do we want computers to witness against corporations and individuals?

     Q: Why not leave the entire justice system to computers? Automated, powerful, cost-effective - comes in all colors - no difficult interrogations or delayed trials...

Personally, I don't think we should let computers stand witness until they're at least as intelligent as humans. But if a human can testify under oath as to the credibility of what the computer says, then OK. We have for many years allowed objects to act as witnessed, or evidence , as we call it. All evidence, however, has to be interpreted by one or more people before it becomes practically meaningful. What is relevant is that computers are evidence which has a hitherto unlimited potential for lying, since they can be manipulated in any way by anyone. I think we should stay clear of electronic justice for a long time - the risk of judicial corruption is obvious.

The question of computers keeping tabs on individuals is a little more sinister than it appears at first glance - information technology, if properly applied, can be used to prevent or totally eliminate certain types of crime. Do we really want this? Do we want an intelligent breathalyzer in our car, which tells us when we can't drive? Perhaps such supervision of driving habits will be legislated in the future. Do we want the recipient of a phone call to always be able to know who we are?

For example, there is a program called Net Nanny, which is a "baby-sitter" for the Internet. It can be set to supervise children communicating over the Internet, and will automatically shut down the connection if some "dirty old man" starts asking for a name or a phone number. Even if the purpose seems noble, one could ask what would happen if an extraordinarily benevolent government should apply such filters to all of its citizens' communications. I mean, why not pull the plug as soon as someone starts talking about certain kinds of explosives, or starts using to many violent words - just in case... (Note: irony.)

As opposed to a cop, the computer is everywhere , and basically free. Should we let our possibility to choose between obeying or ignoring the law be eliminated by computers? Should they become our collective, electronic conscience, and give us an electronically monitored utopia in which there is no crime, since no crimes can be committed? It is not as simple a question as you could think, if you consider it for a while... the EFF, and other organizations, are of the opinion that it is inhuman to take away the individual's right to disobey. So far, all social control has been based on self-control, a condition which is threatened by automation. There is a risk of principles being upheld for the sole reason that the computers have been programmed to uphold them. This is one of the things that Paul Verhouen 's cyberpunk film Robocop is about - mechanical beings who with never-ending efficiency chastise the citizen into obedience.

     B = Bob
     C = The Car

     B : Hi Car.
    
C : Hi Bob!
    
B ( jumping into the driver's seat ): Let's go...
     C : Just a moment, Bob, your voice is a little off... you haven't been drinking anything, have you?
     B : Oh no, of course not...
     C : You'd better blow before I'll let you drive anywhere.
     B : Is that really necessary?
     C : Yes.
     B : OK then... (brings out a plastic bag with a nozzle, and squeezes air from it into the mouthpiece on the dash)
     C : Come on, Bob, I wasn't born yesterday. That wasn't your breath. Would you like me to call a cab for you?
     B ( stomps away from the car in a huff )

Freedom of Expression
Well, what about the freedom of expression? Has an electronic book as much of a right to exist as one printed on paper? When the director of datainspektionen ( Translator's note: Datainspektionen is a Swedish governmental institution that regulates the permissible content and organization of computer databases - to my knowledge, no comparable institution exists in the United States) , Anitha Bondestam , stated that the somewhat childish text files found on certain BBSs, which describe how to make bombs and weapons, could be illegal - did we examine this statement as critically as we would if she had said that books describing similar contraptions could be illegal?

For your information, I can reveal that it is in no way illegal to write books on bomb construction - provided that you do not encourage the reader to apply this knowledge. (If you're in the military, and happen to write such a manual for internal use, you might even get promoted.) It may be morally questionable, especially considering that the readers are often teenagers, but it is definitely not prohibited. A parallel would be Hembränningsboken ("The Moonshine Manual"), which gives detailed instructions on how to make your own hard liquor. This book is not illegal. Datainspektionen makes a lot of funny statements which don't seem to have anything to do with their institutional purpose.

Datainspektionen does a lot of really good things. Above all, they protect freedom of information and individual privacy, and the right to know in which databases one is registered. The problem is that the institution sometimes assumes the role of pontificator, which is not its purpose.

From where will a Swedish EFF originate? I would bet on its birth somewhere among people that guard the freedoms of speech and the press. Föreningen Grävande Journalister ("The Investigative Journalists' Association"), with Anders R Olsson at the lead, has long had an agenda reminiscent of the ideas of EFF. As far as I can understand, this started with a book, written in 1985 by Anders Olsson, called Spelrum ("Playing Field"). In it, he describes the complicated structure of government, and its desire to control the individual, in a captivating and agitative manner. What William S. Burroughs says through his fictional accounts, Anders Olsson articulates through non-fiction, to put it simply. He doesn't construct his theories based on libertarian ideas about individual freedom, but rather on a description of the machine, which he calls Sweden, Inc., as a gigantic, dominating social mechanism built on bureaucracy and the wish to control the individual.

Anders has also advocated that journalists should enlist the help of hackers to enter, and examine, the proprietary computer systems of the government and other organizations. As described in the previous chapter, this took place in the case of the Ausgebombt BBS in Vänersborg. In his book Yttrandefrihet och Tryckfrihet ("Freedom of Speech and the Press"), he considers it fully justified to hack into computers owned by corporations, governmental institutions, and other organizations, in order to obtain information of public interest. He emphasizes that it is the purpose of the act, not the act in itself, that is most important. In his opinion, the constitutional (Swedish) protection of freedom of information, found in the articles on freedom of speech and the press, protects the hacker while looking for information with the intent of publicizing it.(4)


1. Remember the name John Perry Barlow - he is one of the greatest visionaries and contemporary philosophers that I have encountered. Like Jean Baudrillard, he belongs to the tiny number of people that have something sensible to say about information society.

2. This concept is normally called simply "privacy".

3. Perhaps they have acquired better "experts" now.

4. Anders has recently published another book about freedom of information: IT och det Fria Ordet - Myten om Storebror ("Information Technology and the Free Word - the Myth of Big Brother"), where he shoes that the fear of oversight can be used to conceal more than necessary; he defuses the paranoia surrounding large databases, and shows that it is quite difficult to "know everything about a person" through them. Instead, he points to another danger - giving confidential privilege to information that should be public, by maintaining that it is sensitive. He also defines four useful terms, which I interpret as follows:
Freedom of Speech and of the Press : The right to express one's opinion in the ether or in the media, without risking being silenced or prosecuted.
Privacy : The right to be free from intrusion into individual privacy by government or other institutions of power. (Computer databases, drug testing, etc.)
Freedom of Information : The right to stay informed of the internal structure of governments or other institutions of authority. (For example: the Freedom of Information Act). This right is especially important to journalists.


Chapter 10
COMPUTER CRIME: TERMINAL SLAVES,
CREDIT CARD FRAUD, AND CENSORSHIP

What really constitutes a computer crime? Where is the line between harmless exploration of a computer system and real crimes?

In the eyes of the law, computer crime is any type of crime involving a computer in some way. If I hit somebody over the head with a computer, it could theoretically be viewed as a computer crime. A more specific definition would be that computer crime is the act of transferring or damaging information in cyberspace without permission. This definition is accurate in most cases. In Sweden, the authorities mostly concerned with computer crime are: the Police, the National Security Police (SÄPO), Military Intelligence and Counter-espionage, the Crime Prevention Council (BRÅ), the Department of the Interior, and Datainspektionen (see the previous chapter for details on this authority).

Additionally, other involved parties include the security departments of the large corporations, a few non-profit organizations , informal networks, and (naturally) criminal organizations . It is not surprising that all these people view the problem in totally different ways.

The National Police Board classify computer crimes under the following categories:


    
1. Computers or software used in the commission of a crime
2. Computers or software subjected to criminal tampering
3. Software that has been illegally copied or modified
4. Illegal entry into, or use of, computers or computer networks



Most computer crimes committed have nothing to do with hackers. Mostly, it involves people at banks, the Postal Service, governmental insurance agencies, or private corporations in charge of billing and payments. Many succumb to temptation after seeing how easy it is to transfer money back and forth between accounts, grant themselves financial aid or welfare payments, falsifying invoices, etc. It is really only an "improvement" (exacerbation?) in the old ways of economic crime. An example is a Swedish social worker who gave himself 400,000 Swedish crowns (about $50,000) in welfare payments, and then went to Venezuela to bail out a friend that had been jailed for political activities. He was able to do this because he knew about some weakness in the disbursement system: welfare payments were only reported every fortnight. This is typical of the most extensive form of computer crime. Compared to this type of crime, hacking and phreaking are a drop in the ocean. The worst computer crimes are perpetrated by people in respectable positions, and are almost never exposed. But of course, you already knew this.

The reason that these crimes do not receive as much publicity as the hackers' pranks is that the former relates to a very sensitive relationship: integrity and loyalty within the company or the governmental institution is very important for protection against external threats. It is, however, much more difficult to ensure that one's employees are satisfied and loyal than blaming hackers working from the outside. This principle has been used by entire countries to avoid having to deal with internal problems. By shifting the blame to, for example, Jews, communists, or Muslims, they can create a clear picture of the threat and a target for aggression, while keeping attention away from one's own problems.

The average age of the average computer criminal is between 30 and 40 years. Half of the criminals have worked for more than 10 years within the company. 45% are women . Hackers? I don't think so. (Source: Nätvärlden #8, 1994, p. 36 [a Swedish computer networking magazine]).

So much for internal computer crime.

A more "hacker-like" crime is defrauding ATMs (cash machines) or credit card companies. During the early period of ATMs in Sweden (1960's), when the withdrawals were still logged on punchcards inside the machines, someone went around and withdrew around 900,000 crowns (about $120,000) over Easter holiday, using fake ATM cards. This is not as easy to do today. Perhaps. Many Swedish hackers have access to the machines used to read and imprint the magnetic strips on the cards. They have also ferreted out a lot of knowledge about the nature of the information stored on these strips, mostly of general interest to the system. It is, however, difficult to enter an ATM using a "back door". The banks have developed their own telecommunications network which is inaccessible by regular telephones, and it is through this system that ATM transactions take place.

As for myself, I am constantly fascinated by people's trust in magnetic cards. All cards with a magnetic strip, like ATM or credit cards, are standardized, and can be copied using appropriate equipment. A friend of mine amused himself by withdrawing money using his old credit card. He had simply copied the information from his ATM card to the credit card. I was also not in the least surprised to learn (in April 1995) that some youths in Helsingborg (a city in southern Sweden) had reproduced local public transit cards and sold them at half price. (Courtesy of the hacker named Wolf , mentioned in chapter 4). The telephone company's own phone cards are frightfully insecure; this is also true of the cards used for cellular phones and satellite decoders. Often, it is the case of a totally unprotected standard format.

Apropos cards: Credit cards are, unfortunately, very popular among hackers. Let us take a look at some statistics from 1989, when there was about six to seven million credit cards in Sweden. In this year, revenues from credit card transactions reached a total of around 20-30 billion crowns (about $300 million), divided into about 50 million transactions averaging about 400 crowns ($50) each. 18,000 fraud cases were reported that year, in which each report would cover about 50 instances of fraudulent use (i. e., somebody used someone else's card about 50 times before it was reported). The police would rather not investigate any cases involving less than 50,000 crowns ($6,000). I can't even begin to speculate about today's figures. It is, however, unlikely that those 18,000 crimes were committed solely by hackers.

It is often ridiculously simple to call for free or shop using someone else's credit card. Previously, before stricter verification measures, many hackers "carded" merchandise from abroad. Especially computer and other electronic equipment, of course. I have already discussed how card numbers are obtained through social engineering, dumpster diving, and other techniques. If a phreaker cleans out your credit card, you will most likely never find out. The credit card companies do not give out this information to their customers. The most common explanation is "a technical error".

With the exception of stealing credit card numbers and their associated codes, hackers do not consider themselves to be in the business of computer crime. A hacker considers computer crime to be one in which computers are used for the purpose of acquiring anything besides information. A criminal using hacker methods is therefore not a hacker, but a computer criminal. Traditional hacking is about curiosity, not greed.

Sabotage
Computer sabotage is a rare but venerable form of computer crime. The word sabotage is derived from the French word sabot , which means "wooden shoe". It originally refers to the time when French textile workers threw wooden shoes into automatic weaving machines, because they were upset that machines had stolen their jobs. An mechanized loom is in many ways similar to a computer, so you could say that sabotage originally was computer sabotage. This type of activity has been around since the English instigator Ned Ludd (and his luddists ) destroyed looms and Spinning Jennys in the mid-18th century.

Swedish anarchists have often threatened to sabotage computer centers. (Especially through the underground magazine Brand ["Fire"].) Like most anarchist threats, it's all talk. Swedish anarchists seem to have a hard time finding and accessing computer centers, so they stick to destroying Shell gas stations and other easily identified targets. The IRA, however, has bombed some computers in Northern Ireland. In the U.S., as early as 1969, a group of peace activists known as Beaver 55 entered a computer system in Michigan, erasing around 1,000 data tapes that supposedly contained blueprints for chemical weapons. This was carried out with the help of ordinary magnets.

There was also a French activist group called CLODO (Comité de Liberation ou de Detournement des Ordinateurs). Between 1979 and 1983, these activists destroyed a number of computers in the Toulouse region. They wanted to protest against a computer society in which (in their opinion) computers were used to control people - direct descendants of the original saboteurs , in good French tradition. Groups like this make up the militant branch of the civil rights movements to which EFF and Chaos Computer Club also belong.

The most frightening example of this type of activity is perhaps the Unabomber (Theodore Kaczynski), who carried out 16 bombings which, altogether, killed three people and injured 23. On Wednesday, August 2, 1995, the Washington Post and The New York Times published excerpts of a manifesto written by Kaczynski, and which turned out to be a well-written argument against the explosive growth of technology in modern society.

It is not only the hardware that can be subject to sabotage. Obviously, programs and other information that is stored on a computer can be tampered with. An editor at the Encyclopedia Brittanica , in Chicago, became so angry over being fired that he changed a great number of words in the encyclopedia. Among others, he changed Jesus to Allah . There are innumerable examples of employees exacting revenge on their employers in a similar manner. Another sabotage took place in Israel. By accessing an Israeli newspaper's computers, a 19-year-old hacker managed to publish a false article about his computer instructor being arrested and charged with drug-related crimes in the U.S. (A rather amusing hack , in my opinion, but still rather serious considering the importance of mass media in our society. Compare this to Captain Midnight , in chapter 4.)

Nazis
Distributing (like the phreakers did) stolen credit card numbers and codes, passwords for computer systems, and similar information, is - obviously - illegal. Some BBSs, like Ausgebombt , run classifieds for weapons, steroids, and items that might well be "hot". They can also contain hard-core child or violent pornography, or racist propaganda. Swedish nazis discovered technology at an early stage, and frequently communicate electronically. At least one organization that I know of, with ties to VAM ( Translator's Note: VAM = Vitt Ariskt Motstånd - "White Aryan Resistance", a Swedish white supremacist group, and a bunch of freaking psychos. I just noticed that the English initials for the organization would be "WAR"), have had guest speakers on computer-related topics.

To be a racist, however, is not illegal. However, incitement to violence and ethnic persecution are very illegal. I personally don't find this relevant to a discussion about hackers. Most hackers are not racists, nor in the least interested in steroids, stolen firearms, or child pornography. When it comes to BBSs, you should follow the same rules that apply to the rest of society: if you see something suspicious on a Swedish BBS, which could constitute a prosecutable offense - call the police. Also keep in mind that those heavily involved in a political movement like neo-nazism usually don't waste time and effort starting and running BBSs without good reason. Before letting your thoughts and actions be guided by hate and disgust, you should consider that these people have often thought long and hard about what they are doing. Have you?

Incitements to criminal action or spreading racist messages is equally illegal whether it is carried out through computers, magazines, or leaflets. On the Internet, most system administrators have enough of a sense of responsibility to remove such garbage when they come across it. If you find something suspicious on the Internet, it is usually simplest to find out who is responsible for the computer on which the information is stored, and inform them. Calling the Swedish police is usually pointless, since most of the Internet exists abroad (primarily in the U.S.). In some countries, it isn't even criminal to distribute racist information or similar stuff. In those cases, the Swedish government is virtually powerless.

The only methods for an authority to contain information stored in another country - with more lenient laws - are to either cut off the nation's computer systems(1) (which is neither easy nor desirable), or through international legislation by the UN. But there is another way! The Internet is built by people, for people, and functions through people. You can give your honest opinion to those responsible for distributing the information. In the worst cases, you can convince the person responsible for the computer on which the information is stored to remove it. Before resorting to such measures, however, you should think twice. Many view the Internet as a gigantic library, and if you come up with ideas about "censoring" this library, you should consider the fact that you are attacking free speech, and be prepared to take responsibility for that. In such a case, your actions are comparable to going into the nearest library, picking some books out of the shelves, taking them out on the street and burning them.

Information technology has thus brought global problems to your desk at home. How ironic. Now it is no longer possible to shut out world problems; you have to get involved . Dear God. Personally, I think this type of discussion is so useful to ordinary Swedish society that it outweighs any threat posed by this "dangerous" information. The problems of Sri Lanka and the Ivory Coast are suddenly our problems as well. As long as child porn is permitted somewhere in the world(2) , there will also be such material on our own Internet. Such matters are everyone 's problem, like environmental problems. The problem should be solved in its home court: the World. The UN, perhaps.(3)

The Police
The Swedish police - through the National police Board - have a computer crime expert, superintendent Hans Wranghult in Malmö. He took his studies, as did most European experts in this field, in California. His most prominent work is a report called Datorkriminalitet - Hackers, insiders, och datorstödd brottslighet ("Computer Crime - Hackers, Insiders, and Computer-Assisted Crime"), which seems to be an edited version of his class notes from the States, slightly adjusted to Swedish conditions. (I am holding my breath in anticipation of his future creations.) Despite this report being a very detailed treatment of computer crime and various perspectives relating to it, it relays a very simplified picture of hackers. Apparently, Hans has listened mostly to his teachers, and never asked any amateurs what they thought of hackers. His section on hackers begins as follows:

"Originally, the word hacker was a label for the person who was responsible for testing computer systems within the organization for which he worked. The method used was to subject the system to all kinds of attacks, in order to spot errors or weaknesses in the software or the security systems."  

This statement is not true, since the first hackers were students in charge of developing computer systems, and the statement is indicative of a basic view of hackers as always being busy testing or cracking security systems. If you have read this book from the beginning, you know that this is a fairly small aspect of hacking culture. Another possibility is that Wranghult is simplifying intentionally, in order to motivate his men. The police base their work on a dichotomous "us-against-them" style of thinking, and if he had started talking about good hackers as well as bad ones, the limits of the law's thinking (with regards to hackers) would perhaps have become a little fuzzy.

He is especially critical of the image of the hacker as a hero, which is blasphemy in his opinion. If he had known how journalists employ hackers, as when Chaos Computer Club hacked into information about the West German nuclear power program, or when the anonymous hacker exposed the Ausgebombt BBS, he would have been forced to reconsider his vilification of hacker activities. Apparently the police have thought twice about this, because in June of 1995, they announced that they would be happy to enlist the help of hackers to combat computer crime.

In regards to S Ä PO's interest in hackers and computer culture, there is not a lot of available information. This is not unusual, since it's how things work. Bengt Angerfelt and Roland Frenzell are in charge of computer security issues at SÄPO, and their work probably consists mostly of gathering information and knowledge about computer crimes, so that someone will know what to do if there is a threat to national security. Hopefully, they know more about computer security than anyone else in Sweden. Considering the fiasco with the encryption system, they should have improved their expertise by now.

Military intelligence is also interested (naturally) in computer security issues. I know even less about this - but the only thing I know for sure is well-known among hackers: military intelligence collects as much information as they can about system and data security. This information is then used to, among other things, improve their own security. No military person would ever have the urge to bring this knowledge to the state or the business world. There are some obvious reasons for this. Business in general, and especially the computer companies, are concerned with the security of their equipment. For example, if the American NSA (National Security Agency) informed a company that manufactured a certain operating system of their system's security gaps, these would immediately be fixed. Why is this not in the interest of military intelligence? Very simple, really: since the software systems are exported, the military can use the security weaknesses to attack foreign computer systems in case of war. The military (at least in the U.S.) has its own hackers and virus creators. I mean, why not? These weapons are hardly controversial, and not limited by international agreements. Of course, they're armed to the teeth with tools for electronic warfare. By being aware of security glitches, one can protect oneself and attack others. For the same reason, Swedish intelligence would never advise Ericsson about faults in the AXE systems.

A number of Sweden's best hackers have been hired as security experts by SÄPO as well as military intelligence and counter-espionage agencies.(4) Probably, this expertise is used in "bugging" electronic communications (which is not illegal, in contrast to telephone surveillance).

Big Brother Wants to See You
But what about the distribution of information that may be "dangerous to the public"? It is not as intuitive to propose that information such as The Terrorist's Handbook, drug recipes, bomb blueprints, or perhaps technical information about telephone cards should be illegal. A popular term for this is - strangely - sociopathic information . To be a sociopath means to exhibit aggressively antisocial behavior, and belonging to a group that does not accept current social norms

Therefore, hackers, ravers, anarchists, Freemasons, and other subgroups can be viewed as sociopathic. So can Rotary. Sociopathic information, therefore, is information that is written by socially maladjusted people. For example, spreading liberal ideas in a totalitarian communist country would have to be considered very sociopathic. It is not against the law to be socially maladjusted. It isn't even prohibited to distribute sociopathic information. However, there are a few authoritarian elements in our society that would like this to be so. During my research for this book, I have fortunately only found one example of this Big Brother attitude:

In a funky report from Institutet för Rättsinformatik ("The Institute for Legal Information"), attorney Anders Wallin tells us how he thinks the law views sociopathic information. In around 50 pages, he manages the feat of repeatedly condemning so-called sociopathic information, while failing to mention even once that this information is actually not illegal. Rather, he leans on a legal paradigm that views anything that threatens society as it is today as dangerous, by definition. Imposed on ideology, this would be called conservatism. Wallin mentions, among other things, that he hasn't been able to find the sociopathic The Anarchist's Cookbook in any Swedish library, and goes on to lament the fact that similar information is available on several Swedish databases. What he doesn't mention, however, is that this book has been cleared for publication. If you want to read a really sociopathic book, go find Jerry Rubin's Do It! , which is available at many Swedish libraries. It also happens to be published by the respectable publisher Pan/Nordstedts. The list can be made longer.

Apparently, sociopathic information is a term applied to books that normal people shouldn't read, because if they do, they will become corrupt. Alternatively: books that youth shouldn't read, or they will become corrupt. Or: books that not everyone should read, for their judgment cannot be trusted (as for myself, I am rather childishly fond of the freedom of the press). At the same time, I have to say that I don't think that everything in Wallin's report is bad. What I find erroneous is the implicit call for censorship that exists between the lines of this report. Wallin thinks it's horrible that young boys should be able to read hacker books and terrorism manuals. And I understand him - there are those who have managed to cause great damage using knowledge found in such material. Apparently, someone in the U.S. managed to blow up their little sister. I am not blind to such things. But Wallin has obviously read this material himself...

This drives cyberpunks up the wall, and is regarded - justifiably - as authoritarianism. The final responsibility for prohibiting teenagers from building bombs at home should be with the parents. And if the kids are old enough to have left the nest, I would consider them worthy of our trust. Actually, I believe they can handle reading these books, if they find it amusing. I happen to consider a person that manufactures a bomb at home to have more than one loose screw, and not at all a reason to abrogate the rights of normal people to free speech and press. I willingly confess: I own oogles of sociopathic information. Yep, it's true. I have, among other things, used them for research of this book. Almost all of the information I possess is in a digital form, and because I like to, I distribute it with abandon, which I consider not at all irresponsible.

Making Computer Viruses Illegal??
Prohibiting the manufacture of computer viruses is also questionable. Especially since there aren't any plans to criminalize possession of computer viruses - only their creation. Can I not produce a computer virus and infect my own computer if I feel like it? This seems strange, in my opinion. A relevant fact is that you could make a computer virus with paper and pencil, if you wanted to. It is not until it is fed into a computer and distributed that it can cause damage.(5)

Big Brother: What do you want to make viruses for? There's no good in that.    Don't do it. Don't do it, I tell you. Why are you writing poems? Where's the good     in that? Don't. Go to the factory instead, and do some work. Be of use, I tell you.

On the other hand, I agree that the intentional distribution of computer viruses should be criminal. The debate has been going on in the U.S., where, for example, the well-known virus fighter Alan Solomon (known as Dr Solomon ) has clearly stated that he would consider a ban on virus manufacturing as violating the rights and freedoms of the individual. Furthermore, a virus can not be accurately compared to a bomb, since an isolated computer with a virus on it poses no public threat. Especially if the user know what he or she is doing, which is usually the case when it comes to virus makers. Additionally, a virus does not consist of something tangible (like chemicals or metal), but only of pure information. A computer virus can be constructed through a series of commands written on a piece of paper; it is simply a case of the same information in different forms. Thus, a virus on paper would be legal since we have freedom of the press, while a virus in machine-readable form would be illegal since we do not have freedom of information? Aren't they the same thing?

Our modern Trojan horse, in the form of a computer virus, will most likely meet the same end as Karl Gerhard 's play Den ökända hästen från Troja ("The Notorious Trojan Horse), which was quickly and definitively banned as it criticized the Nazi infiltration of Sweden in the 1940's. Unwanted art should not be exhibited (in the interest of the State), and you do not at all know best what to do with your computer (sarcasm ;-).


"Datainspektionen" and Integrity
The vanguard of the computer crime-fighting forces in Sweden consists of Datainspektionen . This governmental agency's primary purpose is ensuring that state institutions and corporations follow Datalagen (the Swedish Data Code), which has been constructed specifically to protect the individual from a totalitarian information society. Datainspektionen was born in 1973 as a product of an international public debate with its origins in San Francisco. In connection with the Census of 1970, when for the first time all data was electronically registered, many had begun drawing parallels to George Orwell's 1984 , and this gave birth to a debate about data integrity. The insinuation was that government, to a certain extent, was collecting information that they had no legitimate use for, and which could be used to control citizens in every aspect.(6)

The former director of Datainspektionen, Jan Freese , who still seems to exert considerable influence on the agency, is an important philosopher in the field. In practice, it seems that much of what Jan writes or speaks is adopted by Datainspektionen without further discussion. This is not so bad, since the guy mostly displays common sense. He has made several sound propositions for information legislation, and prepared Swedish society for the information revolution to a great degree. Especially good is his proposition of a general integrity law , covering databases containing information on individuals and privacy violations, whether or not computers and electronics are involved. This law should, according to Freese, regulate (quoted from Datateknik #8/1995):

     * Access to and searches of private property
    * Physical searches of persons, medical check-ups, and psychological tests
    * Surveillance/espionage
    * Illegal photography/recordings
    * Electronic surveillance ("bugging")
    * Distribution of privileged information
    * Use of third parties' names, images, and similar information
    * Abuse of third parties' communications


And this is also basically the kind of record-keeping that the EFF, cypherpunks, and others are working against. The difference, in the case of cypherpunks, is that they are of the opinion that the regime (in the US) has totally failed to protect the integrity of the individual. They even suggest that the government cannot handle these matters without becoming totalitarian. Thus , the individual should protect him- or herself through cryptography, anonymity measures, etc. The libertarian heritage is apparent, based on the American pioneers, who had to protect their farms and land with their own arms since the legal system was not fully established. That time is so far back in Swedish history that it's become foreign to us. We are used to government taking care of everything.

 The reason that more and more people arm themselves with encryption is that the electronic parallel universe, cyberspace, is barbaric and uncivilized, and that even government employees appear to act instinctively and arbitrarily with regards to computers. If an integrity protection law like the one proposed by Freese had existed at an earlier stage, the problem would be absent. However, note the following: Datainspektionen is subordinate to the executive branch of the Swedish Congress. If the government gets the urge to register all political dissidents, Datainspektionen cannot do anything about it, despite it being written into law that the executive should consult Datainspektionen before creating any database on its own initiative. Datainspektionen is in no way a safeguard against a totalitarian society! Only those who blindly trust institutions and governments would dare to rely on Datainspektionen for this purpose.

From hacking to computer crime
Can hacking lead to crime? The answer is a clear YES. Hacker groups, like any other, have their share of psychopaths and deviant followers. Social engineering in itself must be considered a giant step away from social norms. It is dishonest to deceive other people, and viewing the person at the other end of the phone line as an object is frighteningly cold-blooded. Some phreakers have constructed blue boxes that they've sold for around $1500, and this activity is clearly not rooted in ideology.

Phreakers defend their criminal activity in the classical manner: first of all, only large corporations are victimized. Losses from credit card fraud against private individuals are usually absorbed by the issuing banks. At the same time, they nonchalantly ignore the fact that they create a hell of a hassle for the individuals who have to prove to the credit card companies that they didn't use their cards themselves. The elitist attitude often becomes an excuse to do whatever one feels like. At the same time, it should be noted that media as well as credit card companies exaggerate the consequences of being subject to credit card fraud. Even credit card company investigators can think, and generally understand that a well-educated father of two doesn't make repeated conference calls across half the world just for the hell of it. Many investigations are dismissed at an early stage.

Second, hackers often point to the fact that they don't derive any material gain from hacking. Hackers are known for breaking into phone companies and stealing only manuals. This, of course, confuses prosecutors. A hacker does not fit tour stereotype of a criminal who absconds with other people's property for their own gain. For an hacker hungry for information, the crime itself is the reward, which may seem a little odd.

Manufacturing a computer virus, or spraying graffiti on a concrete wall, does not offer much in the way of profit. Possibly it could be sabotage or vandalism, but it is not a matter of organized crime. Perhaps virus manufacturing is, like graffiti, best viewed as an unpopular form of art; a product of our time, in which everything artistic must be sanctioned, planned, and spontaneity virtually extinguished.

Hacking a network is more a matter of exploring the system than stealing system time. In some countries, like Canada, it is permitted to walk into another persons house, look around, and leave, as long as nothing is stolen or damaged. From an ethical perspective, it is a tricky problem. In the Netherlands it was, until 1987, completely legal to enter a computer as long as nothing was destroyed or modified.(7)

Third, they defend their acts on ideological grounds - by which society is described as generally corrupt, and the real crooks are the large corporations and currency traders, who manipulate all of humanity to run their errands through their speculation. The opposite is the beauty of established society, as Oscar Wilde once expressed it: It is better to live unjustly, than without justice.

In this view, it is permissible to speak and theorize about making society more just, while direct action must be regarded as illegal, from a social perspective. It is the same principle that covers all undemocratic actions - whether it concerns those of hackers, environmentalists, or peace activists. If you break the law, you commit a crime. Period. Personally, I think that any activists who break the law, be it hackers or cyberpunks as well as tree-huggers, peace activists, or anti-abortionists who blow up abortion clinics, should be sentenced and jailed if society deems it necessary. It is not the responsibility of society to decide which values serve to justify illegal acts. My opinion, on the other hand, is due to the fact that I firmly believe in humankind's ability to achieve results in a representative democracy.(8) Anarchists, on the other hand, conclude that there should be no laws at all. (Which I can't really agree with). It's a question of values, and in our present society, un-legitimized actions are considered criminal. If those actions victimize individuals, they're misdirected.

It's been submitted that hackers could form entire underground syndicates and cooperate with the Mafia. This is, so far, mere speculation. In my opinion, the hacker mentality is not really fit for organized crime. The hacker immediately retreats when he/she feels physically threatened, and removed from his/her protected existence behind the screen. This doesn't mean that he or she is chicken , but rather that the whole thing is "for fun".

Many hackers receive strange requests like "you who are so technically skilled, couldn't you build a pirate decoder... ", "couldn't you (whatever)" , The fact is that even though the hackers definitely can do this, they very seldom do. Hackers are anti-authoritarian and detest being bossed around. "Figure it out on your own!" is the most frequent answer. The hacker doesn't want some subordinate role as technical genius in some criminal organization. Why should he? He could make a lot more money in a low-paid computer job than any criminal organization could offer, with the possible exception of the Mafia or foreign intelligence agencies. However, they are often willing to give advice, tips, and ideas: "Are you stuck?", "Have you found anything interesting?" - but as far as economic motivation (not curiosity) is concerned - forget it.

I would go so far as to say that we should be grateful that the little annoying hackers discovered security glitches in the computer systems, rather than the big fish . During the golden age of phreakers (in the 70s), several large gambling syndicates used blue boxes, which they manufactured on a near-industrial scale and sold at usurious rates. You can hold any opinion you want about this, but no one can deny that the hackers' activities have been important to industry, if not always beneficial . (Otherwise they wouldn't have become such a popular topic). When Bob in Springfield makes his own phone cards and sells them for $20-$100, this is hardly to be considered industrial-scale production or even production for his own gain. Considering the simple equipment used in the process, and the time spent on constructing it, it would more closely resemble a total loss. It would, therefore, seem to exist an ideological reason for constructing the phone cards. Freedom of information? Anarchy?

Personally, I would have to say that the "hardware viruses" in the form of an electronic device called Big Red , found in some American and Australian banking computers, are much more frightening than anything any hacker has ever invented. This thing copies, encrypts, and hides important information on a computer's hard drive so that some informed people can easily access it. Big Red could very well be constructed by the Mafia or some international intelligence agency. These must have been deliberately installed from the inside of an organization, as opposed to the hacker's curiosity-driven exploits.

As of July 1995, an unusually sophisticated computer theft ring was still operating in Sweden. They entered offices and only stole computers, not monitors or keyboards (these were cut off). From some older models, only memory chips and hard drives were taken. In order to work undisturbed, the gang cut the telephone company's alarm cables by gong through access boxes on the street, in the way the hackers of the film Sneakers did it. The gang communicated via radio, and the police even succeeded in taping their communications. Still, they weren't caught.

There's no doubt as to the origin of these thieves. Some of them are definitely some type of hacker, others are more hardened techno-criminals. The similarity to Gibson's characters is striking: the only loot is information technology, memory is worth its weight in gold, and the criminals possess fantastic technical skills. I will not for one second deny that these offenders have learned many of their skills used in their ventures through different hacker magazines: Rolig Teknik, Phrack, any number of books from small, obscure publishers. (And certainly, from common textbooks). But this is actually not the problem.

The problem is us. The problem is that we watch movies like Sneakers, The Saint, Why Me? etc., in which we can identify with the romantic or comical criminal, despite the fact that we objectively judge such a person to be the enemy of society and scum deserving of all that is coming to them. We need the criminal, or in this case, the technologically advanced criminal , to know that it's still possible to circumvent all electronic security systems. Because - if we can't escape technological supervision, well, then we can't become lawless, and then being lawful is no longer a free choice. There is no longer any anti-career that we can look down upon in our eternal quest to jet upwards through the social hierarchy. There is no honor to preserve, because if no one can be dishonorable, one cannot know what it means to be honorable. Crime exists in the form of an engine that drives us to act straight, warns us if we approach the edge of propriety, and makes us feel content with our successful lives. We, of course, do not run around at night, cutting cables, and stealing computers, do we? We work during the days and sleep at night. Each day needs its night. Every society's glowing, law-abiding segment needs its photophobic underground movement.

We award our geniuses two types of careers. Either they go through twelve years of high school and four years of college to become engineers and continue their careers upwards or sideways in the chase for more status, more money, and more exciting work projects. (Imagine, I could be CEO one day... I'll have to read up on some finance too... make the right contacts, hold the right opinions...). But what if you don't like school? What if the awfully long education bores you, but your interest is still burning for electronic devices and computers? No problem. Society has something for you too: vocational education, no status, no money, and no exciting work projects like PLEX programming or control system construction. You will never go to the right schools, know the right people, or read the right books. You won't have the correct social heritage. This is despite the fact that you are perhaps intelligent and capable and would be more suitable for Ericsson's training programs than anyone else! The hiring practices at high-tech companies are tastefully oriented towards turning non-degreed applicants back to the slums they came from.

Remaining option: anti-career. Use your knowledge to break down society's security systems so that the poor citizens will know it's not invulnerable. Give them something to fight and live for. Give them an external threat so that they won't have to take a look in the mirror. Be an outlaw to set the parameters for the lawful. Don't think that crime doesn't pay - sometimes it does. Just as long as a few get caught now and then so that the good people will have something to abhor.

Your criminals are the devils that let you see the angels within yourselves. I'll be damned if they're any worse than you!(9)

Corporate Security Forces
One of the most unpleasant computer crimes I know of was committed (and perhaps is still being committed) by Telia . In April 1995, the electronic magazine Z Central (a subsidiary of Z-mag@zine) made public that Telia possessed its own net surveillance unit, which had as its mission to gather information about subscribers suspected of being phreakers or hackers. Using phone-switch computers, they could easily record who made what calls and where. It seems that Telia systematically traced and surveilled some hackers, which really is something that only the cops have a right to do. This information was further distributed to other companies which Telia suspected of having been infiltrated by these hackers. These procedures are illegal, according to the fourth section of the Data Code, which prohibits registering information concerning possible criminality without the prior permission of Datainspektionen. Permission is almost never granted - in order to prevent totalitarian social control.

It should be added that this discussion about Telia's phone usage registration is not a new one. As early as 1981, Telia had an electronic surveillance machine named TAL-T M80 , which permitted the logging of all usage on a particular line, and could send the log to a central computer for storage. Since then, Telia has introduced this type of surveillance to virtually any phone in Sweden, since this function is built into every AXE switch. In reality, anything you do using a phone is recorded by the AXE switch. If you pick up the phone and then dial one digit before hanging up, this action is registered as a time and a button-press in a computer. Telia is then able to retrieve a complete listing of all calls and non-calls performed - anything that has taken place on the line. The information, according to Telia, is used to assess and improve existing systems, and to resolve disputes with subscribers. The info is stored on computer tape for about six months.(10)

Anyone that has worked for a large corporation will understand why Telia can't resist registering and analyzing its business. However, distributing such information is against telecommunications as well as privacy laws. Telia, of course, acted in "good faith" in its attempt to "help" the victimized companies, but that doesn't excuse the breach of privacy involved. I've even seen indications that Telia use their databases for various purposes within the company. The information is ruthlessly consulted by Telia's security departments when they suspect hacker activity, in order to extract information from hackers about their possible transgressions. (In many cases, Telia's own computers suffer from inadequate security.(11) ) This takes place despite the fact that this information is not even supposed to be available to the police...

To facilitate computer crime-fighting, they've begun to investigate the possibility of constructing a so-called expert system , an artificially intelligent agent instructed to analyze the bands in which all Swedish phone calls are registered, in the search for behavior patterns that seem suspect. This involves checking out people that make long and frequent calls without interruptions, call a lot of toll-free numbers, etc., in order to compile a database of "suspicious" subscribers. Hopefully, Telia does not intend to use the system, since this would imply a completely illegal data-handling procedure. But what price is too high to maintain security?

Telia serves as an example for large corporations' views on computer crime. Of those crimes committed against Telia's technological installations, 87% consist of theft and vandalism, while computer intrusion and technical manipulation makes up about 10%. The latter category includes hackers' and phreakers' activities, but also a great deal of other activity that has nothing to do with those underground groups. ( But, since hackers have a definable culture and system of ethics, they're easier to point out and condemn). In addition, Telia is a company that suffers from an almost paranoid fear that someone will understand how their systems work. All communications companies feel this way. Since the technological safeguards at Telia's switches are inadequate, they rely on a psychological form of protection, which simply means that information is kept secret so that a possible attacker cannot know how the systems work. In the same manner, it protects its own organization, its own internal phone numbers, etc. Even within the organization, safeguards are in place. They are diligent about not giving any more information than necessary to operators. There is no comprehensive understanding of Telia's systems except among CEOs, high-level engineers, and system developers. The only road to those positions lies in internal advancement. Knowledge in regards to Telia's systems is therefore only supposed to exist within the organization, and no one outside Telia should know anything about how the switches really work. Hands-off , as opposed to "hands-on", that is. Just use the system. Don't ever try to figure out how it works, even if you're interested. Do not examine, do not rummage among the cables, just call, pay, and be happy!

The reason that Telia has its own security organization is that the police has neither the time nor the funding to investigate Telia's problems. (As I mentioned earlier, they are reluctant to investigate fraud amounting to less than $8000 or so). Telia has officially said that the company needs about 30 security managers plus about 10 or so specialists within the areas of physical security, system security, data processing, secrecy, and information security. The last category is the one that is supposed to make sure that I, among others, should not know the information contained in the previous sentence. (These figures, however, originate in the time when Telia was still called Televerket, and had to release information because of the freedom of information laws). Presumably, the information security officials now have a structured organization which ensures that potentially dangerous information does not leave the company or end up in public records.

Another thing, which should be completely made clear, is that large corporations like Telia cannot afford morals. Once they have discovered fraud affecting the company, they first have to decide whether it pays off to go after the criminals and improve security before taking any action. If improving security poses too much of an inconvenience for legitimate users, resulting in loss of customers, it is more cost-effective to let the hackers be. This has led to many hackers raising their eyebrows and wondering whether the communications companies are laid back, stupid, or just plain moronic. In reality, their only concern is money. That's why it's still so easy to call using fake credit card numbers - it is simply too expensive to effectively address the problem.

At this point, allow me to make a connection. When I spoke of cyberpunk, I mentioned that William Gibson et. al. chronicle a future in which all finance and development is handled by large corporations, with a strictly hierarchical organization and a ridiculously strenuous work ethic. In the R&D labs, new technological innovations are pushed out by bored engineers with their fingers constantly on the fast-forward button. Everything in the organization of these companies is designed to make the people inside the hierarchy feel as important as possible, so that they will work as effectively as possible and push their underlings to work even harder. The result is a frighteningly effective but psychopathic organization, which can push social development beyond any imaginable limits.

Those hackers that have been forced to enter Telia's regional offices in the capacity of informers, have - with awe - described the rigorous security procedures. They have passed many doors, all with flashing diodes and demanding access cards to prevent the wrong person from being in the wrong place at the wrong time. At the very top of the building, there are the offices of the highest executives, after a total of perhaps five doors that all require pass codes. The hierarchy demands that the offices gain size as they gain altitude. At the top, they are posh. This is the final goal of all the residents of the building. The denizens of the lower levels of this tower of power are not allowed to pass through as much as half the doors leading to the top level. In this manner, the eternal desire to climb to the top is preserved.

The hacker is called to this place. The man on the other side of the desk is not evil. He is not inhuman, psychopathic, or simply cruel. He is diligent. He believes in the ten stories of concrete through which the hacker has just been transported. He has been, for his entire life since leaving the university, a part of this hierarchy. Since he is a CEO, he has been among those displaying the greatest loyalty and faithfulness to the company and the entire social system which has enabled it to exist. He can not, for the life of him, imagine that any of this could be based on an incorrect assumption - that there could be anything wrong with the market economy system, a giant wheel in which he himself is but a tiny, tiny cog. Somewhere deep inside, he retains a small illusion of freedom and independence which he nurtures tenderly.

He has a lot of respect for the hacker. The 20-year-old on the other side of the table managed, after all, to breach all the walls he has built. And the hacker didn't accomplish this through violence, but through intelligence. He manipulated Telia's computers. He was one step ahead of Telia's own security teams. The boss is impressed. But at the same time he knows, based on his fundamental appreciation of the society which lets him live in a plush two-story house with a housewife, two kids, and two cars, that this kid is wrong. The boy is a criminal, and should be treated like one. He knows that he is dealing with a dangerous individual. He has completely swallowed the myth of the hacker as a cold-blooded, anarchistic antagonist. It his him , the Chief of Security, who is right. The concrete, the desk, the condo, the market, the school system... all of these back him up. Of course he's right. How else are things supposed to work?

Of course, he has to know how the kid did it. Since he knows that he's right, he feels entitled to use any means available. In the concrete chambers in Göteborg, Farsta, and Kalmar, his devoted servants stand at attention - IBM 3081 d, AS/9000, Sperry 1100/92 - computers that obey his every command. Even before the hacker was brought to the office, he had lists printed of all the calls that this individual had made during the last six months. An exhaustive list, with dates and times down to the second. So he called his girlfriend in the middle of the night after a two-hour call to a toll-free number in the States? Why? Is she involved as well? It'll be a long interrogation. The hacker on the other side of the desk doesn't know that the list that is about to be put in front of his nose by Telia's security chief is totally useless from a legal point of view. Nothing is witnessed or signed; only five calls have been traced. These calls constitute the only binding evidence.

The hacker, with his boring middle-class background, looks across the table and straight into the eyes of the impressive boss. He locks gazes with Gibson's psychopathic Tessier-Ashpool concern. He sees the enormous company's pulsating brain sitting in front of him, dressed in Lacoste pants and a white shirt. The question is whether he understands this.

The BBS that Vanished
Let's imagine that a group of cyberpunks, in the near future, create a BBS named Pheliks to spread information using a powerful personal computer with several telecommunications lines. Stored on this BBS is pirated software, drug recipes, anarchist pamphlets, in-depth descriptions of Telia's AXE switches, documentation for smart credit cards, and much more. The software industry, spearheaded by Microsoft, are pissed. The credit card companies, spearheaded by Visa and Mastercard, are pissed. The police, wishing to maintain order, knows that this is against the law and feels compelled to act. Unfortunately, the cyberpunks are aware of the possible countermeasures of the police and other authorities, and have implemented their own counter-countermeasures. When the authorities call up the BBS they are greeted by the following message:

Pheliks BBS - open 24 hours at 28.800 bps.

NOTE: Pheliks BBS is open to amateurs. Police, journalists, researchers, or other persons in an official capacity, as well as business persons or representatives of non-profit organizations, are NOT WELCOME. If you belong to any of these categories, we humbly but firmly ask you to terminate your connection to Pheliks BBS. Press ENTER to confirm that you do not belong to any of the above categories. Press +++ath0 to terminate the connection.

Through this messages, paragraph 21 of the data code is invoked, with the result that anyone not complying with the request is guilty of a computer crime. In this way, every form of electronic search is made impossible, and the BBS is not threatened by governmental agencies or research institutes, which are bound to stay within the law.  Journalists could in this case appeal to their moral right, as a third power of the State, to breach the data code in the public interest. The software companies, in the form of Business Software Alliance, would also (most likely) not give a shit about the data code and proceed despite the message. After a scoop in the papers, combined with repeated anonymous tips (read: lobbying) from the BSA, and combined with some sort of surveillance indicating that there might even be illegal drugs in the same location as the BBS, the police could raid the BBS after all.

However, the cyberpunks have predicted this scenario as well. When the cops bring the BBS computer to the station, they find that the part of the hard drive containing the BBS's information has been encrypted with the Securedrive program. This software uses 128-bit DES encryption, known to be uncrackable. To encrypt your hard drive is perfectly legal - businesses do it to protect confidential information from theft, and as opposed to everyday locks, encryption cannot be opened by force. At the same time the police turned the computer off, it became useless as evidence. For investigative reasons, of course, the cops could keep the computer for a century or so, and in this manner prevent the suspicious activity from recurring. Unfortunately, computers are not that expensive. Even before the investigation has begun, the well-organized cyberpunks have gotten a new computer and restored the entire BBS from tape backups stored in a totally separate location. Companies use the same method to protect valuable information from theft, fire, or hardware malfunction.

The police can then, given reasonable cause, install surveillance equipment and record the traffic to and from the BBS, record cyberpunks keystrokes, etc., in order to make a successful bust. But this is very expensive, and there has to be a good reason for such measures. It is also probably that the software companies resort to illegitimate measures. Perhaps they retain a samurai hacker, like the computer cowboy Case in Gibson's novels, to enter the BBS and crash it on the orders of the company. Perhaps some company manages to convince Telia to shut down the BBS's phone lines. In this way, established society can protect itself against the cyberpunks, and maintain the ideals that have been threatened.

The real danger occurs when too many groups like that appear, hiding from governments and companies, or form an organized, nationwide base. The worst thing that can happen is that the BBS moves to an unknown address on the Internet, possibly in Taiwan or Chile. If you can afford to rent space on a computer on the other side of the world (which probably is cheaper than having your own), there are no problems with maintaining such an operation from Sweden. This is when the cyberpunks can go from information syndicate to broad, underground, political movement. And this is the real threat to established society. It is not certain that it is a threat to society from a historical perspective. I will return to this question.(12)



1. German authorities took this approach in trying to shut down Radikal , an extreme-leftist magazine, which - intelligently enough - has stored their files on a computer in Holland. The endeavor became a fiasco: about thirty supporters copied the documents to their own computers, with the result that Germany would have to disconnect the entire world to get rid of Radikal .

2. Japan, for example, has a very liberal view of material that people in Sweden would most likely put in the category of child pornography.

3. I am not fond of international governmental organizations except as forums for discussion. As such, they excel. On the question of international retaliations and such, I am undecided.

4. I. e., computer crime sometimes pays - if you're the baddest.

5. Some may object to me defining this in my own terms. This is because there is no legal framework within which to discuss the issue.

6. I am greatly indebted to Anders R Olsson for many of the details regarding the origins of the Data Code and the inception of Datainspectionen.

7. This is probably the reason that Europe's largest hacking magazine, Hacktic , is based in Holland. The hackers later started an Internet company called XS4ALL, which is one of the largest and most controversial Dutch internet providers.

8. On the other hand, I don't think that this type of government is ideal, nor that it will last in the future.

9. In case you are wondering: yes, I've studied social psychology as well.

10. I have obtained this information from an anonymous technician at Telia. Ronnie Bjarnfält, at Telia National Security, claims that the logs are normally only kept for 24 hours. I have personally seen logs comprising three months of telephone traffic.

11. Anonymous hacker in october 1996: "I am inside Telia's firewall again... they installed a new one that was much better, but I got around it..."

12. All "fictional" events in this episode have occured in reality.


Chapter 11
ARTIFICIAL INTELLIGENCE

Discussions about artificial intelligence (AI) are frequent in many contexts, not least in those that are treated in this book. That's why I've given AI a chapter of its own.

AI is a multi-disciplinary science, encompassing electronics, computer science, psychology, sociology, philosophy, religion, medicine, and mathematics. This is by no means an exaggeration; creating AI entails knowing how "normal" intelligence works, which is easier said than done - since the only object we know with certainty to be intelligent is the human brain. AI ultimately concerns the study of behavioral sciences in order to build models based on natural science. Our intelligence, it has been discovered, is strongly connected to our way of knowing the world, or our perception.

AI research is a hot item at the universities, and not without reason: for the first time in history, there is money to be made in AI. Companies that are increasingly employing electronic means for communication and administration are in need of computer programs to handle routine tasks, like sorting electronic mail or maintaining inventory. So-called intelligent agents are marketed, customized for various standardized electronic tasks. From a cynical perspective, one could say that industry for the first time can replace thinking humans with machines in areas no one had thought could be automated. (I should add that it can hardly be called automation, since the truly intelligent programs actually think, as opposed to just acting according to a list of rules).

There is a number of approaches and orientations within AI. Among the most prominent there are: expert systems (large databases containing specific knowledge), genetic algorithms (simulated evolution of mathematical formulas, for example, to suit a certain purpose), and neural networks (imitation of the organizational structure of the brain, using independent, parallel-processing nerve cells). As information databases like those on the Internet become larger and more numerous, agents can work directly with the information without having to understand people. Why assign a person to do research when you might as well let an agent do it, more quickly and for less money? (Whoever has ever looked for information on the Internet will realize how useful a more intelligent search tool would be).

There is also research in the field of artificial life, which really are "living" organisms that live and reproduce in computer systems. Computer viruses constitute one form of artificial life, albeit somewhat unsophisticated and destructive. Artificial life has hitherto not achieved any substantial success. (Unless you want to view computer viruses and all the companies and consultants that make a living fighting them as a success - they have evidently boosted GNP). Research in the field of artificial life began with a program called Life, by John Conway, and was a mix between a computer game and calculated simulation. Bill Gosper, hacker at MIT, became virtually obsessed with this simulation. Later on, it was improved and renamed Core Wars, the idea being that many small computer programs would try to expand and fight over system memory (core memory), with the strongest ones surviving. The programs are exposed to various environmental factors similar to the demands put on real life: lonely or overcrowded individuals die, programs are exposed to mutation risks, system resources vary with time (daily rhythms), aging organisms die, etc. Tom Ray has been especially successful in the field with his Tierra program. His artificial life forms have, through simulated darwinistic evolution, managed to develop programming solutions to certain specific problems that were better than anything man-made.

I have already mentioned that hackers have a respect for artificial intelligence that is completely different from that of people in general. A person growing up constantly surrounded by computers does not see anything threatening in the fact that machines can think. He/she sees the denunciation of AI as a sort of racism directed towards a certain life form. If you criticize artificial intelligence, saying that it can never be the same, only humans can think, etc., then consider the fact that there is no scientific basis whatsoever for supposing that the human brain is anything but a machine, although it may be made of flesh.

These thoughts date back to Ada Lovelace and Charles Babbage, two of the progenitors of computers, who discuss the subject in a piece called Thinking Machines, published in the 19th century. However, these ideas did not become widely known until the 1960's, through films such as the horror movie Colossus - The Forbins Project (1969), in which intelligent military computers take over the world. This notion also figures in the Terminator films, with the only significant difference being that the computer's name is Skynet - thus, not much new under the sun in popular sci-fi. The fear of artificial intelligence actually dates all the way back to Mary Shelley's Frankenstein (1818), and perhaps even further back in history.

In the fiction of Frankenstein, the fear of AI is personified. This story, about a scientist who creates a lethal intelligence, has become one of the new symbols of the industrialized world, in the same class as early Greek mythology. There is a connection between the Bible and Frankenstein, in that the creation (mankind in the Book of Moses, the monster in Frankenstein) rebel against its creator (God and human, respectively). In Judaic mythology there is a corresponding myth about the clay-man Golem, who runs amok when its master forgets to control the creature. It has occurred to me how far ahead of its time this myth was: Golem was made of clay, and computers are made of silicone, which is made from sand. The maker of Golem, Rabbi Löw, feeds a piece of parchment with the name of God on it into the creature's mouth, in order to make it "run". This is comparable to the engineer "feeding" software into the computer. To stop the runaway Golem, the Rabbi removes the parchment from its mouth, whereupon the creature collapses into a pile of dried mud, robbed of its spark of life.

Thus, the fear that mankind - like God - will create intelligent life from dead matter is found as early as in the two 19th-century myths described above. This rather unfounded fear of rebellion against God makes up the foundation of much of the hostility directed towards AI research. The fear is based in the Biblical myth of Adam and Eve eating the forbidden fruit, and the possibility that another creation will follow in our footsteps. I will, however, overlook these myths, and instead focus the argument on the philosophy underlying AI-research: Pragmatism with its heritage of Fallibilism, Nihilism, and Zen-philosophy. (Don't let these strange word discourage you from reading on!)

One could ask why scientists promptly have to try to create artificial intelligence. After all, there are already people, so why attempt to create something new, better, something alien? Asking this question of a scientist in the field is akin to asking a young couple why they promptly want to have children. Why raise a new generation that will question everything you have constructed? The answer is that it's something that simply just happens, or is done: it is a challenge, a desire to create something that will live on, an instinct for evolution. This is perhaps also what partly motivates hackers to create computer viruses: the pleasure of seeing something grow and propagate.

Our entire society and our lives are so interlinked that they cannot be separated. Society, machines, and humanity - everything has to progress. Evolution doesn't allow any closed doors, and AI is, in my view, only another step on the path of evolution. I see this as something positive, while others are terrified. At the same time, one shouldn't forget to note the commercial interests underlying the expansion of AI. Computers reading forms, sorting information, and distributing it, is obviously simply another way for the market to "rationalize" people out of the production chain, automating clerical work, and making the secretary and the accountant obsolete. The board of directors of a corporation is, as usual, only interested in making money and accumulating capital. Wouldn't you? What is the hidden nature of this complex entity (or as I would refer to it, superentity) that we call "the market", and which constantly drives this process of development forward?

If you are interested in knowing more about AI and its philosophical aspects, it is to your advantage to read a book called The Intelligent Age of Machines, by Raymond Kurzweil (1990). To learn more about the inner workings of AI, read Douglas Hofstadter's Gödel, Escher, Bach: An Eternal Golden Braid, which is both an elevating and depressing work. In one respect, it is a scientific validation of Kafka's thesis: to correctly comprehend something and at the same time misunderstand it are not mutually exclusive, which is an observation that (fascinatingly enough) is akin to the paradoxes within Zen Buddhism, a religion that in some aspects border on pure philosophy. To explain some of AI's mechanisms, I need to explain some things about the part of Zen that is associated with philosophers like Mumon, and which has less to do with sitting around in a lotus position and meditating all day. Zen, in itself, is a philosophy that can be dissociated from Buddhism and viewed separately. Buddhism is based on respect for life, in all its forms, Zen, by itself, makes no such demands, being a non-normative, non-religious philosophy.

Zen, or the Art of Breaking Out of Formal Systems
Zen has also become one of the most influential "new age" philosophies in the West during the 80's and 90's. Books like Zen and the Art of Motorcycle Maintenance sell amazingly well. among other things, Zen Buddhism suggests that the entity that Western tradition calls God (and what the Buddhists call the Brahma of the Buddha) is in fact a sum of all the independent processes in the universe, and not a sentient force. Therefore, God is equally present in the souls of humans as in the circuits of a computer or the cylinder shafts of a motorcycle. Put simply, Zen is one long search for the connection between natural processes, in the cosmos or the microcosmos, and this search in itself constitutes a process that interfaces with the others. Zen Buddhism is the search in itself, the point being that Zen (an abstract term for "the answer") will never be found. Searching for Zen means that one continually come to a point where one answers a question with both yes and no. For example:

Q: Is the ball in the bottle?
A: In one way, yes, if the bottle's inside is its inside, and in one way, no, if the bottle's outside is its inside.

Zen constantly toys with our way of defining our environment, our method of labeling things as well as people. Zen teaches us to see through the inadequacies of out own language and assists us in dismantling fallacious systems, as in when, for example, we've gotten the idea that all criminals are swarthy (or that all hackers break into computer systems!). Zen is the thesis that no perfect formal systems exist, that there is no perfect way of perceiving reality. Kurt Gödel, the mathematician, proved that there are no perfect systems within the natural sciences, and the fact that there are no perfect systems within religion should be apparent to anyone who isn't a fundamentalist.

Zen could be said to be based on the following supposition: The only absolute truth is that there are no absolute truths. A paradox! - which is, naturally, a perfect starting point for the thesis that reality cannot be captured and all formal systems (like human language, mathematics, etc.) must contain errors. Even the proposition that reality is incomplete is incomplete! Truth cannot be fully expressed in words - hence the necessity of art and other forms of expression. I will end the discussion of Zen now, but hopefully you understand that many become confused and annoyed when one tries to explain Zen, given that the explanation is that there is no explanation. For example, note a quote by William S. Burroughs: "language is a virus from space", expressing his frustration with the limitations of human language. Even Nietzsche criticized language, finding it hopelessly limited, and feminist Dorothy Smith has a theory concerning the use of language to control the distribution of power in society.(1) In the Western philosophical tradition, the equivalent of Zen is called Fallibilism, a philosophy based on the theory that all knowledge is preliminary. This has subsequently been developed into a philosophical theory called pragmatism, which views all formal systems as fallible, and thus judges them based on function rather than construction. Gödel's Incompleteness Theorem is probably the most tangible indication that this conception of the world is correct.(2)

A lot of modern mathematical theory of so-called non-formal systems are associated with both Zen and Chaos theory. A non-formal system creates a formal system to solve a problem. In order to have a chance of understanding a (superficially) chaotic reality, we must first simplify it by creating formal systems on different levels of description, but also retain the capacity to break down these systems and create new ones. For example, we know that humans are made up of cells. We also know that we are made up of atoms, and as such, of pure energy. Nature invites to so many levels of description that we have to sift through them to find those that we need to complete the tasks we have selected. This is called intelligence.

There are also other philosophies that draw on parts of Zen: for example, Tao views contradictory pairs such as right/wrong or one/zero (the smallest building blocks of information) as holy entities, and focuses on finding the "golden mean" between them (the archetype is Yin and Yang, a kind of original contradictory pair). Our Western concept of thesis-antithesis-synthesis also belongs to this group. The strength - and weakness - in these approaches are that they instill in their followers a belief that moderation is always best, which can be both true and false according to Zen (depending on how you view it). All such attempts to force reality into formal systems are of course interesting, but definitely temporary and constantly subject to adaptation. Another philosophical system using this mode of thought was the pre-Christian Gnosticism, where the original opposites are God and Matter. These become intertwined within a sequence of Aeons (ages of time, imaginary worlds, or divine beings). Gnosticism probably originates (in turn) from an old Persian religion called Parsism, created by the well-known philosopher Zarathustra, who initially claimed that the world was based on such opposites.

Zen's way of thinking is partially a confirmation of the so-called nihilistic view of reality, in which objective truth does not exist, and partially a denial of it: it is simply a matter of point-of-view. Objective truth exists inside formal systems, whereas outside them, it does not. By breaking out of a formal system in which reality is described in terms of right and wrong, or intermediate terms such as more right than wrong, one finds a part of the core of intelligence. Being intelligent means being able to build an ordered system out of chaos, and thoroughly enough to be able to view one's own system from the inside and adjust one's own thoughts according to its rules. AI research has - in an amazing fashion - shown that this ability is completely vital to any intelligent operation whatsoever.

The difference between the real world and the one pictured inside the formal system of one's own creation has ruffled the feathers of such grandfathers of philosophy as Plato, Kant, and Schopenhauer. It has made them decide, after languishing analysis, that the real world is defective and incapable of approaching their own perfect, mathematical world of ideas. (Please note my mild insolence; as a 24-year-old layman I shouldn't be able to claim the right to even speak of these great philosophers. The alert reader would notice that I'm very busy questioning traditional authorities ;-). In science, this conflict is known as the subject-object controversy. Even in such "hard" sciences as physics this conflict has proved to be decisive, especially in Bell's Theorem (well-known among physicists), which has puzzled many a scientist. (I'm not going to go into the details of Bell's Theorem, but I'm employing it as a reference for those who are familiar with it).

When AI researchers sought the answer to the mystery of intelligence, they came into conflict with scientific paradigms. We need to use intelligence to understand intelligence. We need a blueprint for making blueprints; a theory of theoretical methods, a paradigm for building paradigms, etc. They found a paradox in which a formal system would be described in terms of another formal system. This is when they took Gödel's theorem to heart - a proof that all formal systems are paradoxical. The solution to the problem of creating a formal system for intelligence was self-reference, just like a neuron in the brain will change its way of processing information by - just that - processing information. The answer to intelligence wasn't tables, strict sets of rules, or mathematics. Intelligence wasn't mechanical. For intelligence to flourish, it would have to be partially unpredictable, contradictory, and flexible.

Many hackers and net-users are devoted Zen-philosophers, not least because many of the functions within computers and networks are fairly contradictory. The section of computer science concerned with AI is self-contradictory to the highest degree. Programming is also the art of creating order from an initially chaotic system of possible instructions, culminating in the finished product of a computer program. If this section has been hard to understand, please read it again; it is worth comprehending.

Humans as Machines - The Computer as a Divine Creation
Most hackers view people as advanced machinery, and there's really nothing wrong with this; it is simply a new way of looking at things, another point of view within the multi-facetted science of psychology. Hackers in general are futurists, and to them the machine (and thus the human) is something beautiful and vigorous. I'll willingly admit that to a certain extent I also view humans as machines, but I'd like to tone that statement down a bit by saying that we (like computers) are information processors - we are born with certain information coded in our genes, and in growing up we assimilate more and more information from our environment. The result is a complex mass of information that we refer to as an individual. The process by which information is handled and stored in the individual is known as intelligence. The individual also interacts with the environment by symbolically absorbing and emitting pieces of information, and thereby becomes a part of an even larger process, which is in itself intelligent. (If you're of a religious persuasion, this could be taken as an example of hubris) But what about the difference between computers and humans?

Two things: the computer knows who has created it, and human life is clearly time-limited. It has been proposed that the uniqueness of a human "soul" is a product of just these two factors, and that it's therefore only uncertainty and finitude that makes life "worth living". Of course, the theory could be challenged by proposing that its two premises are negotiable from a long-term perspective. Hereby the reader will have to draw his or her own metaphysical conclusions; the subject is virtually interminable, and the audience inexhaustible.

"I have seen things you humans can only dream of… Burning attack cruisers off the shoulder of Orion… I saw the C-rays glitter in the Tannhauser Gate… All these moments will now be lost in time, like tears in the rain."

(The android Roy Beatty in Ridley Scott's Blade Runner, understanding some of the meaning of life in his final moments)

By delving deep into psychology, the subject becomes simpler. An intelligent system, whether artificial or natural, must be checked against a surrounding system (what we might term a meta-system) in order to know the direction in which to develop itself. In an AI system designed to recognize characters, "rewards" and "punishments" are employed until the system learns how to correctly distinguish valid and invalid symbols. This requires two functions within the system: the ability to exchange information, and the ability to reflect on this exchange. In an AI system, this is a controlled, two-step sequence: first information is processed, then the process is reflected upon. In a person, the information processing (usually) takes place during the day, and the match against the "correct" pattern occurs at night, in the form of dreams in which the events are recollected and compared to our real motives (the subconscious). The similarity is striking.

Through this line of reasoning, we can draw the conclusion that people have an internal system for judging correct action against incorrect action. As if this wasn't enough, we also know that we can alter the plans by which we act - i.e., we are not forced to follow a specific path. In this sense, humans are just as paradoxical as any informal system, since we have the ability to break out of the system and re-evaluate our objectives. However, the great philosophers of psychology, Sigmund Freud and Carl Jung, found that there was a set of symbols and motives that were not subject to modification, but rather common to all persons. Freud spoke of the overriding drives, mainly the sexual and survival drives. Jung expanded the argument to encompass several archetypes, which referred to certain fundamental notions of what is good and what is evil.(3) These archetypal drives, which seem to exist in all animals, appears to be the engine that propels humans into the effort of exploring and trying to understand their environment.

This is the most fundamental difference between persons and machines. There is nothing that says that we should have to let intelligent machines be driven by the same urges as we are. Instead, we can equip them with a drive to solve the problems for which they were constructed. When the machine evaluates its own actions, it is then constantly driven towards doing our bidding. Isaac Asimov, the science-fiction writer, suggested such things in his robot novels through the concept of the laws of robotics, by which robots were driven by an almost pathological desire to please their human masters. This relationship is also found in the modern film Robocop, in which an android policeman is driven by his will to indiscriminately uphold the law.

Towards an Artificial Age - AI and Society
Aspects of AI is mirrored by the media of our time - Blade Runner is about the difference between man and machine, AI figures heavily in cyberpunk novels, music and film, and in 1995 the movie Frankenstein makes a comeback in the theaters. Coincidence? Hardly. An exciting example of this trend is Arnold Schwarzenegger's role as the robot in Terminator 2. In the film, the artificial intelligence holds human characteristics, as a result of being programmed by a human rebel instead of a brutal military force. It also touches upon aspects of the consequences of carelessly handling technology (as when Rabbi Löw lost control of his Golem). Of particular interest is the scene in which the robot, being machine, simply follows its programmed instructions to obliterate people standing in its way as opposed to finding peaceful solutions. The lead character, John (which incidentally happens to be a skilled hacker), discovers a dangerous "programming bug" in the robot's instruction set, which he corrects. The message of the film is that technology and AI are good things - if used properly and supervised by human agents. The real danger is people's ignorant nonchalance.

The Swedish movie Femte Generationen ("The Fifth Generation") again deserves being mentioned in this context. Fifth-generation computer systems are simply another name for artificially intelligent systems.

Lars Gustavsson makes a strong impression with his beautiful sci-fi novel, Det Sällsamma Djuret Från Norr ("The Strange Beast from the North"), which treats the metaphysical aspects of AI in a thorough and entertaining manner. His thoughts on decentralized intelligence are especially exciting, which suggest that a society of ants could be considered intelligent, whereas a single ant could not - and in this manner, all of humanity could be viewed as one cohesive, intelligent organism. This view is taken from sociology, which has become very important to AI research.

Flows of information are an indication of intelligence. This is confirmed in the model of society as a unitary sentient force. The intelligence of individuals and societies are undoubtedly related; the ability to store and process information through the construction and dissolution of formal systems is a sign of intelligence. Society is an organism, but at the same time it is not (yes, this is very Zen). These ideas go all the way back to the founder of sociology, Auguste Comte. I have myself coined the term superindividuals as a label for these macro-intelligences known as corporations, the market, the state, the capital, and so on. I will return to this subject further ahead.

Again, it is possible to emphasize the relatedness of chaos research and intelligence; intelligence can be seen on many different levels, each constituting a formal system in itself. One system is akin to another, and they form as strangely coherent pattern. Our intelligence seems to be united with our ability to enforce chaos.

Alan Turing and the Turing Test
Alan Turing was one of the very first people concerned with making machines intelligent. He proposed a test that could decide whether or not a system was intelligent - the so-called Turing Test. It consisted of placing a person in a room with a terminal that was either connected to a terminal controlled by another person, or to a computer that pretended to be a person. If the test subjects couldn't tell the difference between man and machine, i. e. that they couldn't make a correct judgment in half of the cases, the computer could be said to be intelligent.

This test was rather quickly subject to criticism by way of a theory called The Chinese Room. This entailed running the Turing Test in Chinese, with a Chinese-speaking person at one terminal and a person that didn't speak Chinese at the other. For the non-Chinese person to have a chance to answer the questions posed by the Chinese-speaker, he/she was to be presented with set of rules consisting of symbols, grammar, etc., through which sensible answers could be formulated without the subject knowing an ounce of Chinese. By simply performing lookups in tables and books it would seem like the person in fact spoke Chinese and was intelligent, although he or she was just following a set of rules. The little slave running back and forth, interpreting the Chinese-speaker's questions without knowing anything, was compared to the hardware of the computer, the machine. The books and the rules for responding constituted the software, or the computer program. In this way, it was argued that the computer couldn't be intelligent, but rather only capable of following given instructions.

However, it turned out that this objection was false. The one that the Chinese-speaker is communicating with is not solely the person sitting at the other end, but the entire system, including the terminal, books, rule sets, etc., that the poor stressed-out fellow in the other room used to formulate answers. Even if the person sitting at the other end of the line was not intelligent, the system as a whole was intelligent. The same goes for a computer: even if the machine or the program is intelligent in itself, the entire system of machine + program very well could be. The case is the same for a human - a single neuron in the brain is not intelligent. Not even entire parts of the brain, or the brain itself, are intelligent, since they cannot communicate. The system of a person with both a body and a brain, however, can be intelligent!(4)

From this follows the slightly unpleasant realization that every intelligent system must constantly process information in order to stay intelligent. We have to accept sensory input and in some way respond to it to properly be called intelligent. A human without the ability to receive or express information is therefore not intelligent! A flow of information is an indication of the presence of intelligence. From this stems the concept of brain deat - a human without intelligence is not a human.

We might finish this chapter by defining what intelligence really is (according to Walleij): Intelligence is the ability to create, within a seemingly chaotic flow of information, systems for the purpose of sorting and evaluating this flow, and at the same time incessantly revise and break down these systems in order to create new ones. (Note that this definition is paradoxical, since it describes the very process by which the author was able to formulate it. You can't win… :)


1. Probably a form of structuralism.

2. "Correct" is always a vague term in the field of philosophy. Don't take it too literally, and keep in mind that this is popular science...

3. Theories which are now out of favor with the established authorities. Oh well. Enimvero di no quasi pilas homines habent.

4. Or maybe not. It is impossible for a person to become intelligent without the society that surrounds her, and therefore it is the system of human + society that is intelligent… etc. etc


Chapter 12
VIRTUAL REALITY

I will now talk about something that is horribly overestimated, but inevitably influential when it comes to the future - at least when viewed as a phenomenon. I hesitated for a long time before deciding to include virtual reality (VR) in this book, but I realized that it obviously belonged to the subject of electronic culture. The reason for my hesitancy is that this area of research has been so hyped up and misunderstood that it has assumed almost religious proportions.

Virtual reality was originally a term that meant imagined reality. It's the same sort of reality that role-playing enthusiasts occupy when they navigate an imaginary world. In its original form, this artificial environment requires a considerable degree of imagination and patience. VR has progressed from traditional pen-and-paper role-playing games to interactive role-playing games on the Internet, so-called MUDs (Multi-User Dungeons), and not until the 90's did the term become synonymous with the technology that allows the creation of realities using computer-generated sound and graphics. In a MUD, a certaain protocol is established in order to communicate directly with other people, which uses a language that is an extension of the written word. It is possible to state which way one wishes to communicate with a fellow player. For example, one can make clear the one wishes an utterance to be taken ironically, coldly, or erotically. One could write: "Say 'hiya!' in a humorous manner to X", by which X receives a message like this: "Y says 'hiya!' to you in a humorous manner". It is also possible to strike poses, and to emote feelings. You might receive a message such as: "Y smiles an ironic smile".

This mode of communication over the Internet has had a decisive influence on the language that is used in written debate in the electronic universe. The most well-known conventions include the sign for humor, :-) (a smiley-face, sideways), and the sign for irony, ;-) (a winking smiley-face), as well as writing in ALL CAPITALS to indicate shouting. In addition to these, a slew of more or less commonly accepted symbols has arisen. This is the first step towards network-based transmission of symbols with another meaning than the purely linguistic. It creates the first possibility of using "tone of voice" and body language in artificial worlds.

IRC (Internet Relay Chat) is an extension of MUDs. It is possible to do pretty much the same things in IRC as on a MUD, except it's a little closer to reality. Some set up private IRC conferences and chat within an exclusive group, while others spend their time on some of the many open groups, such as #Sweden, which works sort of like a text version of phone chat, for Swedish speakers. Today, about 1,000 Swedes use IRC on a regular basis.(1) IRC has a rigid technocratic hierarchy in which those who know more about the system have more power, and can push other people around about as much as they please. Democracy doesn't exist: on every channel there's a number of "royalty" (so-called chan-ops, or channel operators) who sometimes "fight" for control over the channel. In IRC there is also the possibility of conducting information trading, which entails trading information using one simple command: /dcc send nick file. IRC has already developed into a subculture, with its own values and pecking orders. A surprising number of women use IRC.

This technology is just the first step of a progression that will take us to infinitely more sophisticated forms of communication than we know today. In experimental facilities, the imaginary environments become more and more real, so much that many have started to question the difference between real and imaginary reality, concluding that it is mostly a matter of definition. But let's start at the beginning.

No single person has been more important to virtual reality as Jaron Lanier. Jaron moved to California in 1981, with the intention of living as a hippie and playing the flute on the streets. Instead, he stumbled into a job as computer game programmer. After some time in the field, he started a company called VPL (Visual Programming Languages) with his own money and started a non-profit project which involved developing a programming language. Programming languages are the languages that people use to communicate with computers and tell them what to do, Examples of common programming languages include BASIC (Beginners All-purpose Symbolic Instruction Code), Pascal (after the mathematician of the same name), and C (named by someone who thought the naming conventions for programming languages had gotten out of hand).

Now, Jaron didn't want to write any old programming language, but THE programming language. He thought programming was one of the most fun things he knew, but it was reserved for an all-too-small group of people. He thought everyone should be able to program. Instead of just allowing a tiny elite of programmers to build mathematical and symbolic models of reality, he wanted to place this tool in the hands of the common man, with a minimal amount of prerequisite knowledge. The language was finally named Mandala.

Many people that try using a computer for the first time thinks the whole thing is too abstract and contains too many theoretical concepts. A computer student I had once said:

"You can tell me that this here is a command, and that it has this and that property and works in such and such a way. It's like telling me that this is a hammer, and it works like so. I'll never understand unless I get to hold the hammer."

He hit the nail on the head. If people won't adapt to computers, then computers would have to adapt to people. If Mohammed won't come to the mountain, the mountain will have to come to Mohammed. That was Jaron's idea: make the computing environment as real as possible, remove that keyboard if it causes so much frustration, and take away that two-dimensional screen if flat symbols are so hard to understand. Create an entire reality around the user so that he or she feels at home. The concept of virtual reality was born. Of course, this idea was not entirely new. The first time the concept of VR came up was supposedly in 1965, through Ivan Sutherland at Utah university. But Jaron was the first one to try to realize these ideas, and make money off them.

VPL was founded in 1985. Since then, nothing's been the same. In 1991, us regular people made our first acquaintance with VR as W Industries released its computer game Virtuality everywhere. Newspapers, radio, TV - everyone told the story about this new and fantastic invention. It was also at thaat time that people started making comparisons to William Gibson's novel, Neuromancer, and discovered obvious similarities between the way the lead character, Case, connected his brain to a computer to enter cyberspace, and the gols of VR. That was when people seriously started questioning the direction our society was heading, and it is also among the reasons that William Gibson is such an important writer.

All of it is not as strange as it is sometimes presented. By applying sensors to the body that register all its movements, the computer can sense how you move about and then generate sound and visual impressions that agree with the way we're used to perceiving reality. The sound is created by a quadrophonic sound system that allows us to place sound spatially, and images are displayed three-dimensinally since the computer draws an image for each eye. This is VR today; no more, no less. Objects can be perceived as three-dimensional and sounds can be generated as to make us think they came from the object in question. Nothing strange there, just normal manipulation of our sensory capacities, just like a computer screen or a loudspeaker, only more sophisticated and refined. Machine-generated hallucinations or tangible dreams are other possible terms for the technique.

Jaron, then, envisioned VR as a form of programming language, primarily intended for creating models to facilitate research and education, and to make the capacities of the computer more accessible. This is not exactly how it turned out. Some inventions have the ability to shock their inventors by turning out to have applications far wider in scope than the inventor could ever dream about. Nuclear power is probably the most frightening example of this. VR was transformed from a programming language into a medium.

We have a handful of media in our society. We have various sorts of literature. We have theater and film. We have radio and television. We also have multimedia, like computer games and hypertext, which is a kind of improved text that allows us to read textlike a database instead of like a book. And now we have VR, and that too is a form of medium. More specifically, it is the most powerful medium that humankind has ever created. VR envelops you in all dimensions and commands your complete attention, just as if it was your real life that was involved. You can run, but you cannot possibly hide from it. (Imagine what a fascinating medium for commercials: Depends diapers chase you into a corner and suffocate you to death.)

When Jaron was well underway with his project, he realized that he needed help to complete it. He enlisted the aid of the MIT media lab, which had already helped in enlightening the world through the graphical interface. (An interface is the set of things that exist as a bridge between the computer and the user, like the screen and the mouse). This was later to be used by Xerox, Macintosh, and Microsoft (in that order), and we nowadays know it under such product names as System 7 and Windows. The military got into the action, as usual. They had already experimented with flight simulators to train pilots before sending them into action. VR was viewed as a possibility of improving the simulators, and even to develop very accurate systems for remote presence, in which a pilot might be able to steer a plane into enemy territory while physically being located in a bunker back home in HQ. Such a system would be an economical way of maintaining pilot ranks, as well as permitting them to build planes that could stand physical stress way beyond the tolerance of any human pilot. Like RC planes, but cooler (and much more dangerous). Therefore, the military blew a huge load of money on VR research. War, as always, has a way of making technological research move by quantum leaps and bounds.

It's difficult to say what importance VR will have in the future, In a way , it changes nothing - we all experience VR every night, in dreaming. The difference is that in VR we can control the content, and employ highly tangible dreams for our own purposes. One of the greatest areas of VR application is therefore in psychology, since dreams has a primary importance in the study of the human mind. It is quite reasonable to expect VR to be used in very sophisticated therapy. Or brainwashing, if that's what's desired. Brainwashing is not always a negative thing; in inpatient psychiatric care, rapists and killers are treated with a very advanced form of brainwashing to cure pathological behaviors. Such care can certainly be improved and become more effective with VR. Conversely, VR can be abused.

As a medium, VR holds enormous potential. When we communicate across electronic links, we don't feel as if we actually meet someone. The anonymity that goes with a telephone receiver allows us to spit out the most daring utterances, since we don't feel physically intimidated. When we speak on the phone, we are constantly distracted by other events in our surroundings. When we communicate via Internet, it is impossible to use any form of real body language or tone of voice. The only way to communicate feelings in an electronic conference is by writing lightning-quick and misspelled sentences to express upset, or using typographical conventions to communicate states of mind.

In VR, we can use as much body language as we want to. We can make the encounter totally similar to reality, as if we were meeting in the same room. We can make it more than real - we can inflate ourselves to twice our size if we want. We can disguise ourselves as anyone, and decide exactly what the room should look like. I can experience it as if we're at your place, and you could feel as if you were at my place. We can actually be in two places at once, so that both of us feel at home! (Translator's note: the old line that goes "your place or mine" would become obsolete.). I could be at a steel mill, with the noise in the background, and you can be in the forest listening to the birds singing. I think you're sitting on a treestump, and you think I'm sitting on an anvil. Anything's possible.

In sociology, the science that studies the relations between humans, the concept of symbols is used to denote that exchange of information between people that goes deeper than language. As opposed to language, such symbolisms cannot at present be stored or synthesized. This is one reason for inventing written languages. A language that can be stored enables a cultural heritage that spans generations, and gives humanity a so-called collective consciousness. The concept of a symbol includes, in addition to spoken and written language, body language such as glances and involuntary movements (in linguistics, gestures and such are called paralinguistics).

Symbolic language between people consists of genetic as well as learned components. Animals that cannot speak or write communicate exclusively through "primitive" symbolisms of the sort I just mentioned. Symbols can be thought of as the bonds that tie people together in groups, societies, and entire systems of societies. Not unexpectedly, symbols figure heavily in AI research; most AI researchers view all of a person's consciousness as the construct of a flow of symbols in one form or another, and intelligence itself as one great information-processing system. (But I've already talked about that…)

The goal of virtual reality is that all symbols should be able to be stored and synthesized. It's supposed to become the perfect medium of communication between people - even better than reality. And this is perhaps what makes it so frightening. The computer offers the possibility of twisting symbolic language. If you control the computer, you could use it to appear as great and conceited as possible, and your own picture of reality would be distorted so that other people appeared as dorks. The line between illusion and reality could become fuzzy indeed.

It is completely impossible to predict what this would do to our way of perceiving the world, and other persons in particular; the only thing that's certain is that it will change. Sometimes, people speak of the cultural or sociological atomic bomb, where VR is a threat that could destroy all our norms or even our entire perception of reality. Any prediction in this field at present must be considered pure speculation, since no one communicates by VR to any great degree.

However, sci-fi authors already warn us of the dangers of VR. One of the first examples is Philip K. Dick's short story called Wholesale Memories, later made into the movie Total Recall, and other examples include the Illuminatus!(2) trilogy, our beloved X-Files, and the movie Videodrome (1982). All of these are based on the horrific scenario of not knowing what is real and what is imagined(3) - in other words, paranoia based on reality. I have myself written a short story in this vein, and begun another which I never completed:

"Sometime that year, a group of eager scientists inserted the first Carcer chip into the skull of a deaf-dumb and quadraplegic test subject. When the affluent layers of society gradually migrated towards a better, artificial world, these slaves, people whose will would never make itself known due to the iron grip of the Carcer chip, would be left behind to run the power plants, the farms, the food processing plants, and all the other necessary societal institutions.

Many free persons understood that the Carcer project was inhumane fromk beginning to end, that the people in the bonds of the chip no longer had a will of their own. Yet they were reluctant to leave the material well-being that they had built for years in a world that didn't exist. Their brains were connected to the machines by electrodes, and their peripheral nervous systems with its arms, legs, and eyes, were disconnected. Physically, they lived out their days suspended in a tank filled with isolating liquid kept at body temperature.

The freedom of a number of less privileged individuals was worth sacrificing for the free men and women that now lived in invulnerable bodies made of data, and who mentally controlled political events. (…bla bla bla)"

But - to be honest - don't worry. People are rather sensible beings, all things considered. There is no reason to suspect that we wouldn't be able to exploit this new resource in a reasonable fashion. However, virtual reality in combination with AI gives us a new picture of the importance of human beings vs. society, which is the subject of chapter 15.
    


1. This number is constantly rocketing upwards.

2. Fredric Jameson has claimed that the entire cyberpunk/tech noir genre is simply a reformulation of the theme illustrated in Illuminatus!, which is a global network of interwoven organizations and informal circles (which actually exist in some form) described as a metaphor inside the computer - the electonic network. The incomprehensible electronic organism becomes a model for the incomprehensible power. I don't agree. The computer is fascinating in itself, and one is not a symbol for the other. Possibly, you could view the two as an important concept-pair.

3. One philosopher who's written a great deal about the dissolution of reality in a kind of "virtual reality" or "hyperreality" goes by the name Jean Baudrillard.
 


Chapter 13
NET-ATTITUDES, TECHNOCRACY, AND DEMOCRACY

Selling and owning information is a profession today. Journalists, PR professionals, consultants, and lobbyists base a large portion of their professional pride on the ownership of information. Naturally, they don't want to share their information unless they get something in exchange, and the things we give them in exchange are decent salaries and social status. Their professions are at risk of being fundamentally changed by information technology, and many of them are aware of this. How?

At MIT, the first hackers left their programs (in the form of long strips of paper with holes in them) lying in a box next to the computer. They did this partly so that whoever wanted to could examine them, but also so that whoever felt like it would be able to improve and expand the programs. This open-hearted attitude is an example of typical "hacker mentality", and has since then characterized almost all research and program development that has taken place over the Internet. This falls under Rule 1 in the chapter about cyberpunk: the hands-on imperative.

There are lots of programs that have been developed according to a principle called Stone Soup. This is one of the oldest - if not the oldest - methods in software development. The first hackers at MIT, in the 60'd, worked according to this principle. Today it works like this: a programmer manufactures the core of the project, a working program that provides the foundation for the end product (the stone in the soup). The programmer then puts the program on the Internet and tells all the amateur programmers out there: "Here's the program - if you find any faults and know how to fix them, then please do so. Then send the changes back to me."

The original programmer then assumes the role of editor, accepting suggestions and constantly adding to and modifying the program. The end product is then distributed for free. The PC programs Fractint and Pretty Good Privacy (PGP) are just two of the great mass of programs that have been created in this manner. Even if an amateur may not be able to accomplish a lot by him- or herself, he or she is still often an expert at something.

One of the first stone soup programs that was really successful was Tiny BASIC, a competitor of Bill Gates' Altair BASIC, which managed to stand out by being much better than Gates' BASIC, and free. (Guess if that was a thorn in the side to some people). Among modern stone soup products there are entire operating systems such as Linux (a project started by Linus Torvalds at Helsinki University, referred to by many as the most successful hacking project of all time), X-Windows, and the EMACS text editor, used in making countless textbooks and college essays. All of these programs are free.

The communications protocol stack called TCP/IP (Transfer Control Protocol/Internet Protocol), which is about to conquer the entire market for network communications, is also stone soup. (It is used to make computers "understand" each other when "talking" over a network - TCP/IP is to a computer as a telephone receiver and a dial is to a person). This protocol stack is judged by those who develop the Internet, and is constantly revised and improved as the "editors" send out RFCs (Request for Comments). TCP/IP is completely free, and no one has made money from its invention. It has (without any marketing whatsoever) become so huge simply because no one is fighting over copyrights or trying to keep "commercial secrets" to themselves. On the other hand, it's not hard to make lots of money from the knowledge of how TCP/IP works. The knowledge about the product is therefore of greater value to the market than the product itself. This is why some of the people who know TCP/IP are very secretive about their knowledge, in order to maintain a demand for consulting services.

The companies that are marketing their own communications protocols are naturally displeased about this. That's why they gladly disseminate lies which claim that TCP/IP is of poor quality - even that it's bad and worthless. The most common argument is "the more cooks, the worse the soup" - which means that a lot useless junk supposedly makes it into the programs. This is patently false. The discussion groups evaluate every proposed change before it is incorporated. It's a shame that such rumors are sometimes published in major newspapers and magazines (none mentioned, none forgotten). I prefer to listen to experts like Peter Schaeffer who know what they're talking about.

At the front of the defenders of this fundamental technological principle there are people like Richard Stallman, a former MIT hacker who referred to himself for a while as the last real hacker. He established the foundation for GNU as well as EMACS, and his point of view is that software shouldn't be subject to ownership. He is also an influential force behind the Free Software Foundation, which is an organization that primarily concerns itself with the promotion of free software. He has had many software companies up in arms over his method of copying ideas without copying program code, which is known as reverse engineering or simply deconstruction. It involves analyzing a program on an object (machine-code) level, noting its functions, and then creating a program that performs the same tasks. Stallman's productivity in this respect is so legendary that he is referred to as perhaps the greatest and most motivated hacker ever, and fully capable of doing the job of an entire development team on his own. He has also had an influential role in the organization League for Programming Freedom, which has as its mission the liberation of software from patents.

Stone soup software also has the advantage of being easily modified or analyzed in order to find out exactly how it works, since all documentation is accessible to whoever wants it. This is in contrast to software that's been manufactured by corporations, which lock source code and documentation in a vault and charge exorbitant prices to share their knowledge when a problem occurs. The intention is that the user should think that the program is so incredibly fantastic that only the in-house programmers (which are presented as some kind of wizards) are able to understand and improve the program. Talk about a monopoly on information.

Well.

Imagine the stone soup principle being applied to a piece of text, like the one you're reading now. If I had access to an Internet server, I could put this document in hypertext form (which is a kind of text invented by Tim Berners-Lee subsequent to an idea put forth by Ted Nelson, in which consistent subjects or general keywords are electronically linked in order to allow the reader to quickly jump to different points in the text) and put something like this at the end:

"All of you who are reading this - send in revisions and addenda to me, and I'll put them in the text."

It's all free. Anyone could get the document off the Internet. I don't profit from it except for gaining knowledge, and no one else does either. If my document became popular and reached a wide audience, a few experts would (with some luck) contact me with corrections and additions. Not much, but just enough to cover the subject on which that person is an expert. Then, I could assume the role of editor and collate all of this information, put new links in the hypertext and facilitate searching and notices of updates to the text. I would feel that I was doing something useful, but I wouldn't be able to earn a living doing it. After a few years, my document would become an entire database covering almost every aspect of computer culture, more comprehensive, editable, and thorough than any national encyclopaedia, and furthermore it would be written at the grassroots level by people who love what they do.

 So why don't I?

Answer: first of all, I don't have the time or energy.(1) Second, it is not a matter of solving a technical problem like those in a computer program; this text is multi-faceted and highly subjective. It bears the mark of my own values and judgments, and I want it to remain as such in the future. Every word is written by myself and no one else. Call it pride. Further, it has a beginning and an end, and it is possible to critique it as something coherent and static, not as something that is constantly morphing. It is possible to form a clear view of the text that lasts a few days, and this is the advantage of the statically fixed text versus the ever-changing one.

If this were a practical problem of a technical character within any of the natural sciences or medicine, the situation would be radically different. Such hypertext documents are created around the world as we speak. They grow together, forming a world of information, accessible to anyone, anywhere, who has access to the Internet. It's known as the World Wide Web (WWW). By extension, the human hypertextual heritage will grow into a mass of information of such mammoth proportion that it will be impossible to get one's mind around it. It will be like a library of memories for all of humankind. Hypertext is also changing more and more into program code, which erodes the distinction between regular, literary text and computer programs. The professions of author and programmer blend together. This is what multimedia is. The tools used to create multimedia products are not called computer languages, they're called authoring programs.

Some authors of fiction have adopted the idea of publishing their creations for a wide audience, on the Internet. Since fictional writers generally want their works to be read and only incidentally to make money, this is a natural step. The first well-established author to put some of his work on the Internet was Stephen King, on September 19, 1993. Many other authors thought this was a great idea, and published some of their older books on the Web. In Sweden, Lars Fimmerstad was the pioneer in this aspect, with his novel Välkommen Hem ("Welcome Home"), and shortly thereafter Ola Larsmo followed in his footsteps with his short story, Stumheten ("The Speechlessness"). The more established an author is, the more conservatively he or she approaches electronic publication. To a certain extent they live off their book sales, and feel threatened by a form of publication through which they cannot yet get paid.

This progress within media is in step with the trends in organizations, which are being transformed into networks - loosely connected associations without staff or representatives, established for the purpose of answering one single question or solving one specific and well-defined problem (making stone soup), and that have so far stayed connected through mail correspondence and phone calls (exchanges of information). Do not confuse a "network" with a "computer network", even if many "networks" employ "computer networks". Your local bridge club is a "network", and the Internet is a "computer network". A common denominator of all networks is that they distribute information of some kind. (Confusing?) Mnemonic device: bridge club = a network of people, the Internet = a network of computers.

So what's the point of all this?

Well, it is that network documents will quickly become so numerous that it will be impossible to get an overview of them. Therefore, it is (as always) necessary to go through a long and hard learning process, or hire a consultant, to access a specific piece of knowledge. A typical consultant is a watch group that cover some specific area of interest, which we usually refer to as the technical press, only in this context it's electronic. The need for specialized journalism therefore exists in the information society as well. At the time of this writing, such journals cannot get paid for their information services, but a system is under development. That means that you will be able to buy information about anything using your own computer. Naturally, you don't pay with cash, but with numbers.

These technical journalists will basically become the first people to earn their living solely by processing information; they'll be the first ones to enter into the total information economy. The other papers will follow, one by one. Some newspapers, such as Aftonbladet/Kultur (a major Swedish evening paper) have anticipated this, and are preparing themselves for the entry into the information economy by experimenting with electronic editions. Other papers remain content with simply publishing electronic complements to their printed material. (In the experimental stage, all of this is free! Grab the chance now that you have it, because it won't come back). In addition to this, and as a natural consequence of it, we'll get a huge number of electronic fanzines(2), due to the amazing simplicity and cheapness of making an electronic publication. (The hacker culture has spawned hundreds or maybe even thousands of such magazines.) No printing costs, no contracts, no advertisers, just information and motivation. Culture without biznizz.

Cynically speaking, journalists are experts at information trading. It's probably the only profession that even before the time of computers made a living solely by producing and processing information. Journalists do not think that information, and therefore knowledge, should be free and universally accessible. On the contrary, each journalist (at least each specialized journalist) jealously guard "their" information sources, not revealing them without very good reason. The journalist is just as conservative and stingy as the elitist and sectarian hacker groups. For the public good is one thing - but even journalists have to eat. It's about protecting one's intellectual property. The truth is that the fourth state, just like the government and the corporate world, also consists of personal contact networks and hierarchies in which string-pulling ability is very important. Even journalists are totally ignorant of hacker ethics, which to a high degree influences their reporting when it comes to hackers.
The guidelines surrounding electronic publishing indicate the emergence of two new types of media. One will be stored on CD-ROM disks and will contain huge stores of knowledge, such as a database or a searchable encyclopaedia. Interface magazine was first in Sweden to try this. The other type is Online Services, which provide news and information updated daily, hourly, or even more frequently. The
first Swedish online service was probably Text-TV. The first Swedish online magazine on the Internet was Datateknik.(3) At the moment, it is not possible to charge for online services, but that capacity is on its way.

In the long term, CD-ROMs will run into problems. It will soon be very easy to copy the disks, so why should I buy the paper, the encyclopaedia, the dictionary, or whatever, when I can copy it off my
neighbor? Once you try to protect the information from being copied, you can bet your ass that some hackers will come around and crack the protection and copy it anyway. Online services don't really suffer from this problem.(4) Some prophecy the total disappearance of disks in favor of online services, but this is unlikely to happen soon. The need to own the physical form of something, like a compact disk or a print magazine is still strong in our generation.

Others say that mass media will disappear. That depends on how you look at it. Mass media as it is today will certainly go away, but we will also equally certainly get a new definition of mass media. Print publications will most likely remain until we find a way to make electronic information as portable, but that day will come.

The magazine called The Whole Earth Review has aroused public interest in electronic media in the USA. The popular magazine Wired, which I mentioned earlier, is one of the publications that have received a boost from the progress at the electronic frontier. This paper has become extremely popular, not least due to its youthful layout. It has paved the way for several similar magazines across the world, such as Sweden's Z Mag@zine and Hallå, which have apparently gotten their whole business idea from magazines like Wired. They write about the Internet, BBSs, everything falling into the category of media and information technology, and fashion and trends. Both publications have (intentionally) refused to acknowledge the existence of the other. Both are currently out of print, but Hallå is restarting soon.

Other American magazines that seem to be great sources of inspiration for this type of media are RayGun and Gray Areas. MONDO 2000 is a tad too provocative for the more distinguished circles, as it has a rather conspicuous air of hippie and yippie philosophy. Some people are irritated by these magazines, since they write mostly about each other (media writing about other media, journalists about other journalists, etc.) Seeking a cause for this, one would most likely conclude that media products are changing due to the entrance of information technology. Text and images are becoming easier to edit and distribute, and the purpose of journalists is under re-evaluation, etc. It's also not surprising that journalism is of interest to journalists. With the role of media as the "fourth state", critiquing itself is probably necessary function. To spice it up, the subjects are often things that are exciting in real life. Preferably hacking, of course. They're the ultra-hyped spearhead of the "information revolution".

The hackers don't think these magazines are anything special (as the publications seem to think themselves sometimes), but rather refer to them bluntly as hacker-wannabes - trying to write as if they're something they're not. Sweden, for example, is full of Schyffert-wannabes, Guillou-wannabes, and Bildt-wannabes. (As for myself, I'm a Visionary-wannabe ;). The frequent use of trite terms like cyber, powerful, IT, and (insert latest catch-phrase here) is a common denominator for hacker-wannabes, plus that they use Macintosh computers. (Translator's note: HEY! What the hell do you think I started translating this text on?).

The tendency of aggressive competition among hackers is similar to the brutal reality of everyday journalism, and this is probably the reason that these magazines inherit hacker culture and ideals. Few of these journalists seem to understand the friendly, non-American part of hacker culture, which is not as interesting since it's not as illegal, contains much less confrontation, and built more on friendship than competition. This is of course not so strange, since journalists love conflict and in many cases spur it on. (Conflicts inspire great headlines, and attract readers.)

Technocracy
The Internet is often referred to as "anarchistic". This is a gross exaggeration. The Internet is fundamentally technocratic and decentralized. As it was first built, by the university hackers, they wove some of their open-minded attitudes into the web of the Internet. Remember Rule #3 of hacker ethics: Distrust authority - promote decentralization. That is: if I help you, you help me, and nowhere in the core structure of the Internet was there a function for charging each other for the use of communication channels. There were no locked doors, since it was held that everyone should be able to access anything and share their information. (Rule #2: All information should be free.) Just jack in and go. The only things to pay for were the constant phone line connections on which the information flowed, and then you could communicate as much as you wanted.

The entire network has been built using the stone soup principle. Every problem that occurs is posted on discussion groups, after which anyone who wants to may suggest a solution. The users are very eager to help, and usually there are a number of proposed solutions. The proposals are evaluated in the discussion group, and the one that's considered to be the best wins. The result is documented and then distributed as a de facto standard. This technocratic method of problem-solving is radically different from the market model. In a market economy, companies compete for the best solution. Each company has an R&D division that develop a solution, which is then marketed. After that, consumers judge the products by buying the one that suits them the most. The "bad" solutions are thrown out as the companies that fail to get enough market share discontinue their productmaking and buy patents from the successful companies, or, at worst, go bankrupt. In this manner it is suggested that the best product always survives.(5) (Translator's note: it's also highly circular, as the "market" judges the "marketing and marketability" of a "marketed" product).

The problem is that the winning solutions in a market economy aren't always technically superior. They might as well be the best marketed or cheapest products. For example, reflect on how the VHS video system beat the technically superior Betamax system. (According to legend, this was ultimately due to the fact that the VHS format was marketed by the adult video industry…. hmmm.)(6) (Translator's note: How about Windows...). This would never happen in a technocracy like the Internet. A technocracy doesn't allow marketing or arbitrariness to send a good idea into the wastebasket of history. It's pretty typical for the universities to build a technocratic network, since their main goal is always technological progress.

In a market economy, it is the carrot of personal gain and wealth that drive the businesspeople to develop better and better products. In a technocracy, it's personal commitment, fellowship, and the desire to advance knowledge that drives the developers. With the Internet, this attitude towards research and product development has spread across the world, and sometimes it generates solutions that completely beat out those of the market economy. It's not a planned economy, since there's no single authority that finances and evaluates the products. It's a technocracy, based upon individuals in voluntary cooperation.

In addition to the university researchers, who thanks to secure personal finances are able to dedicate themselves to solving Internet problems at work, many people employed at regular market-driven companies have started developing solutions to different technical problems on their own private time. The desire to show one's competence in a technical field, and to be accepted as a skilled developer among others on the Net, has been enough to motivate these people to develop technical solutions. Call it the joy of working or professional pride. (Yes, these still exist even in our time).

Whether technocracy is a threat or a complement to a market economy is hard to predict. Perhaps we're entering a form of knowledge economy. It is, however, clear that with internationalization and the ability to work in small interest groups across great distances, we have found a so-called "nonprofit" force that enables us to perform practical work and have fun at the same time. Group fellowship is the same as that among the hackers, who have long been exchanging experience through letters, BBSs, copy parties, and the Internet. The only difference is that one form is more "respectable" than the other.

As I suggested earlier, it's possible to detect an anarchistic ideological heritage within technocracy. Peter Krapotkin thought that society should be run through the cooperative efforts of independent groups. As opposed to Charles Darwin, who thought that races (and by extension, society) evolved through competition, Kropotkin emphasized the important role of cooperation in the building of a society. The Internet technocracy is in some ways proof that free groups independently set up cooperative relationships without governmental influence. The virtual society is anarchistic, in this way. At the same time, there is an aspect of Darwinism, in that only the best solutions survive. The difference is that this happens as a result of mutual agreement and doesn't affect any people or companies in a negative manner.

A Few Examples
I once (in my foolish youth) wrote an opinion piece and sent it to Datateknik magazine (a Swedish computer publication). In this piece, I lamented the poor availability of digitized (machine-readable, stored in a computer or on disks) literature, and the fact that our cultural heritage wasn't properly electronically stored. I suggested that publishers should be forced to make non-copyrighted material available to the public, every time they re-printed older literary works. I received a well-motivated and angry reply by Lars Aronsson, project leader for Projekt Runeberg, which electronically publishes Swedish literature. In my naïve excitement, I'd simply been thinking practically, and overlooked the market aspects of the whole thing.

Digitized text is of course a competitive advantage during re-printing, and my proposal could hurt the competitive power of a certain company. Another company could (if my system was applied) steal the text directly from the publisher and publish the same book as a new edition, which would lead to a loss for the first company which had paid to have someone enter the text in a word processor.
The fact remains that it is a waste of human resources to let several people carry out the monotonous task of re-entering the same text over and over, instead of storing it in a central location and making it accessible to everyone - companies as well as individuals. This is one of the disadvantages of the market economy, which technocracy is trying to address: the market economy sometimes demands wasting natural resources and duplicating work efforts. You could make an analogy with the development of the mobile phone networks, where several small, incompatible networks are being built instead of one large, stable, and widely adaptable network. Call it greed or competition - but it's not cost-effective.

Naturally, this wastefulness is actually a good thing according to our classical yardstick of the public good. GNP increases, and people get something to do (work). One should, however, ask if people fare well from this. We're living in a time in which the quality of life is measured by socioeconomic number-juggling. Is it a good idea to create problems to make jobs for problem-solvers? To provoke crime in order to employ crime attorneys and investigators?

The technocrats on the Internet, spearheaded by League for Programming Freedom, hold the view that good knowledge should not be subject to patent. The companies, however, do. There's already been open conflict between idealists and profit-hungry corporate people. I've already touched upon the negative rumors spread about "stone soup software". Another example is the fighting over a compression method known as LZW, which is simply a modification of a public-domain method called LZ2, which originated at Jerusalem University. Basically, companies can possess so much chutzpah that they take out patents on methods, developed by idealists, which were originally intended to be public domain. Companies also have the time and money to sue…

Another direct example of the difference between market-driven and idealistic thinking is the way various commercial firms are fighting over email services through the Internet. Swedish Telia has had a taste of technocracy. The background is as follows: Telia has no problem getting access to the Internet. The problem is that Telia wants to decide how certain Internet addresses should appear. It's always a good thing to be able to butter up your customers with a custom, easily memorized number (Like Swedish Railways' 020-75 75 75) Sadly, Telia is not in charge of these things on the Internet. The principle is that all commercial domains on the Internet should have the -COM suffix, as in COMmercial. Instead, Telia wants to give companies the 400NET prefix, which happens to be the name of their commercial electronic mail system.

Bernt Allonen at Telia says this in Z-mag@zine, 1/95: "It's time for the Internet to leave the sandboxthe Internet is in need of strict rules and operators that guarantee performance." With this he's probably tried to say that the Internet should be market-driven, like a company - as opposed to the reality of its current operational mode, namely non-profit/academic - with all its implications, like rigid bureaucracy, market planning, and little hierarchies in which the golden rule is: kick downwards, kiss upwards.(7) Mostly, he would like to see Telia assuming total control of Internet distribution in Sweden, so that things could become orderly. This is not the case, and hopefully never will be. Who really cares what Bernt Allonen thinks? He only represents the expansionist interests of a single large corporation.

The people who hold the most power over the Internet in Sweden are Björn Eriksen and Peter Löthberg. Both are representatives of the open, technocratic attitude, and Björn decides which domains (Internet names or addresses) can be created on the Swedish part of the Internet. To the great chagrin of Telia, their market plans have no effect whatsoever on these academicians. The Internet cannot be bought! May Heaven have mercy. The academicians are not at all concerned about "orderliness" on the Internet. In their eyes, the Internet primarily exists to be useful, not marketable. Is it a good idea to tell Telia that all these idealists and academicians have actually succeeded in building the world's largest computer network completely without competition, market analysis, and commercial ad campaigns? Now that Telia's X.400-network hasn't been as successful as the Internet, what is Telia to do? Well, of course they want the rights to the Internet. Normally, a giant corporation like Telia can indiscriminately purchase and take over their competitors.

Thinking people, however, are much harder to purchase. Telia represents the philosophy of the old market theory, which states that people that cannot be bought for money can be bought for more money. Internet-users, with the technical universities at the base, have a completely different way of thinking. If there had been anything else than market tactics behind Telia's demands, they might have listened. Fortunately, they prefer to continue thinking. Thanks to this view, no one has a monopoly on the Internet in Sweden. Hundreds of companies are currently fighting to provide Internet access. The competition has pushed prices down to an incredibly low level. An Internet connection is today very affordable for a normal person, and everyone who has decent knowledge of the process can buy some computers and modems and start their own Internet node. Variety as opposed to monopoly. From this point of view, the Internet promotes small operators and resists the efforts of giant corporations. Again, refer to Rule #3 of hacker ethics: decentralization.

Rule #3 is also one of the reasons that cyberpunks and others work against Microsoft, and especially its operating system, Windows. When hundreds of hackers were arrested during Operation Sundevil, it was because law enforcement thought that hackers were behind the collapse in the American telephone system on January 15, 1990. Now, it turned out that hackers had nothing to do with it. Instead, the collapse was due to an error in the computer program that controlled the switches. The problem was exacerbated by the fact that the program was used everywhere, and the switches "brought each other down". The only switches that worked fine were those that used another, older program.

Microsoft's Windows is also a program, and more specifically, an operating system, which means that it's a program that is used to enable the user to run other programs. Today, it is installed on virtually every PC computer that is sold in Sweden. Most programs today require Windows in order to function. Therefore, Windows is used by innumerable private companies and governmental organizations, including Swedish Railways and the Swedish national defense. Recently, a new version of Windows, called Windows 95, was released. (8) This will, among other things, be used to provide easy connections between several computers, over the Internet and other networks.

Now, what if there was an error similar to that in the American telephone system's switch software - but inside Windows 95? In that case, every computer that used Windows 95 would crash. There is no way to prove empirically that a computer program is free of such errors. It's thus entirely possible -and it's happened before. Such risks exist with other, nearly monopolizing products, such as Netscape. A few moronic computer folks might think that it's impossible, but so was Chernobyl and Three Mile Island, so I don't buy that. And by the way, I also know what I'm talking about. (Pardon the conceited and provocative comment).

If something like that happened, large parts of Swedish society would be knocked out. We have a parallel case with the virus that in the fall of 1988 crippled the Internet by putting 6,000 computers out of commission. It was an error in the Berkely-UNIX (BSD) operating system that allowed this virus to be created. Some computers were unaffected by the virus - by virtue of using another "dialect", i.e. another version of UNIX, like NeXT or AIX (there's about 11 different versions of UNIX). UNIX basically works in the same way as Windows(9), but there's only one "dialect" of Windows! If all computers had used the same UNIX in the fall of 1988, well, all of the Internet would have been brought down! I'm stating that this could happen even to Windows 95, or one of its successors. If this happened, all Windows 95 systems could crash, if they were networked. It would be a catastrophe of unpredictable consequences to society.

This is where it's important to emulate nature. Variety, in which many different programs work side by side, is preferable. Hackers have always proposed variety and decentralization. In the long term, software monopolies are harmful, and lead to problems in computer systems that resemble those that occur with the inbreeding of living creatures. The only ones able to compete with Microsoft today is IBM, with its OS/2 operating system, and Apple, with MacOS. Personally, I look forward to more competition. Variety, decentralization, and small companies instead of giants and institutionalism is the only thing that's sustainable in the long term. Microsoft cannot be allowed to dominate the operating system market. Chaos is fun. And healthy.

The arrests of hackers after the Jan. 1, 1990 incident was a distraction to obscure the inbreeding within the telephone system and the incompetence of large companies by blaming hackers for what was really a structural problem. What are they to be blamed for next?

There are oodles of examples of how the market's been beaten by home-made solutions. Some computer nerds therefore want to stop this spreading disease by trying to stop the publicly financed distribution channels. One such channel is ftp.sunet.se, an Uppsala computer system which stores thousands of quality, free-of-charge programs. This computer is publicly funded and anyone can connect through the Internet and retrieve any of these programs. This is actually a good thing, since all of Sweden's (and the world's) computer enthusiasts gain access to free programs, but it's naturally a thorn in the side to those who promote a dogmatic, capitalist system as a way if life.

"The greatest problem with ftp.sunet.se is that it effectively undercuts all attempts to start domestically based software companies… Software is the industry of the future, one that we Swedes would have been able to exploit because of our well-educated populace, if it hadn't been for ftp.sunet.se… But how are such companies' products supposed to compete with programs that are 'free' because they have been subsidized by tax revenues?"

(Bertil Jonell, Z-mag@zine #6, 1995)

Here, we have an obvious conflict with another part of the hacker ethic: Mistrust authority. The answer from the established software industry becomes mistrust hackers, which is probably justified in the cases that Bertil mentions above. It is, however, hard to justify this mistrust in the case of mission-critical software such as those in airplanes or medical equipment, since it's impossible to find any such programs written by amateurs. The companies that make such equipment are concerned with their reputation, and don't hire just any hobby-hacker for just that reason. Instead, they get their programmers from the more status-filled university education programs.

We shouldn't pay too much attention to what one person has said on one single occasion. We'll instead treat it as an illustrative example. There is a whole set of values that we think is God-given, but that is actually not self-evident at all. It is not an obvious truth that the well-educated engineer is a better builder of electronics than the kid around the corner who's been a radio amateur since he could walk. More accurately, it's a complete untruth. Granted, some enthusiasts migrate to the finer universities and technical schools, but some of them don't like the formal and strict environment they encounter at all. They prefer to stay at home in their garages and study and experiment on their own. That kind of motivation beats most university education by lengths, when it comes to direct practical knowledge.

Of course, the at-home hacker is usually an individual that isn't very socially adaptable, and who also has a penchant for certain suspicious subcultures. That is most likely the true reason that these skilled hackers aren't hired for positions where they could do the most good. Instead, they sit at home and put together freeware for any and all. (I've talked about what happens in the worst cases in chapter 4 and 10, about underground hackers and computer crime). A university degree is not only a certificate of competence - it also indicates that its possessor is socially adept and has the ability for discipline and obedience that is required at large corporations. A programmer should have the ability to carry out a project without questioning it. No large company is interested in employees that think too independently and develop alternative solutions without permission. Instead, every project is controlled from a high position within the hierarchy. In short: a university degree means, in addition to competence, that the bearer has accepted the authority and power structures that exist within companies as well as educational institutions.

Stone soups cooked by enthusiasts, with many rival solutions to one problem, can beat monolithic corporations in competition. It is obvious that this way of working and looking at the role of the economy in society is part of the foundation of cyberpunk ideology. But here the respectable university hackers enter the picture: people who live normal, family lives, but who grew up with - and created - the first computers during the 70's, and who are now at forefront of the explosive growth in computer development. Their message is the same: Freedom of information! The rational world of computing seems to influence its users in the same vein: towards efficiency, decentralization, cooperation, and exchange of information, and away from bickering, bureaucracy, and monotony. I say that this is good. What do you think?

The World of Science
To understand how people can work their asses off without making a lot of money, one must understand how the scientific virtual community works. The scientific community is a society within society, with its own norms and ideals. Inside, prestige and knowledge counts the most, not how many stocks you own or how big your Mercedes is. Researchers, doctoral students, and other scientists pay to have their creations evaluated by other scientists, simply for the joy of sharing and promoting science.

The view that information and knowledge is public property is so inherent in this community that it isn't even questioned. All this information is published in a few thousand scientific journals across the world, with an extremely small distribution, created by scientists for scientists. Nowadays, more and more of these journals are starting to partly or completely employ electronic publication as a cheaper alternative to print - even within the "soft" sciences, such as Sociology and Psychology. The scientific community has been created to free research and science from the social power apparatus. The only way to do this is by building a culture with its own framework and values, which the hackers also discovered a long time ago.

As you see, the scientific virtual community share significant aspects with the hackers' sub-cultural Scene. They exchange information freely among each other, and ignore the market economy completely.(10) Of course, this throws a monkey wrench into the theories of most economists, since they'd rather see everyone acting according to a rational market model, but the scientific community won't submit to commercialization, no matter how much the rest of society wants it to. The icing on the cake is that the rest of society is dependent on the scientific community. Without science, little progress is made, and the schooling of new CEOs, engineers, psychologists, etc. is completely at the mercy of scientific realms. Therefore, society at large is forced to financially support these scientists. Graciously, the scientists in turn support hackers and some other subcultures by offering free access to computers.

Why do the scientists help the hackers? Simple. They depend on them. The hackers yield many of the ideas for new inventions and research areas. Additionally, many of them work at the universities and technical schools. Some work at the companies that sell information services, and some are even to be found in the IT departments of the largest corporations. It is actually the case that the rest of society is dependent on both the scientific community and the Scene of the hackers. The conflicts that emerge are products of the fact that the technocratic society, led by scientists and hackers, is growing in power over the regular market-based society.

The reason that the establishment wants to control the funding for the Internet is, beneath the surface, a very old one: it is concerned about its POWER!

The Market Paradigm
We have to try to understand the origins of this conflict. Our society, as it exists today, is moving towards increasing levels of specialization. Our entire economic market model is built on it, or rather, on a constantly increasing degree of specialization. Productivity levels in this system must perpetually grow, in order to give a number of anonymous stock owners returns on their investments, so that they can buy and own even more.

If I want to develop software, I need an idea. Then I have to start a company, hire as many programmers as I need, and find some suitable investors. If I can't find anyone to finance my venture, my idea must be a poor one, or I've been looking in the wrong places. When the product is sold, I employ special services for the replication, distribution, and marketing of the software. Any CEO at any software company views the process in this manner.

The problem with this view is that there's no room for creative spirit among the programmers themselves. As a boss, I have to rigidly command them onto the right track. I must never lose control over the end product, and if the programmers come up with their own ideas, I'm of course free to listen to them, but it is still my responsibility as a project leader to decide whether these ideas will be part of the end product. There is no place for the free action of the individual in the market-oriented way of thinking. Only the project leader should know what really goes on with the product, while the individual programmers should only be concerned with the little piece they're working on. There is always an inherent hierarchy built into this form of organization.

Market-economy thinking is also built on a hidden method for hiding knowledge. It would be unfortunate for the project leader if the programmers realized how little influence they really have on the creative process. The same goes for all hierarchically organized companies. The only people that have any idea of what's actually occurring within a company is supposed to be the leadership. If the workers are to have any information, it is transmitted through carefully designed yellow sheets that are dumped in the employees' pigeonholes, in which chosen parts of the company's activities are exposed in order to increase motivation.

We're dealing with a power structure that is anything but democratic. This is the skewed balance of power that is the reason that companies work better than governments. The absence of democracy is very efficient. It's not a secret that the democratic offensive into the Swedish business world, in the form of MBL ("the law of shared decisions") etc., has decreased corporate efficiency. The workers should act under the orders of management, not by its own will. Corporate management has therefore invented ingenious mechanisms to limit democratic control of their companies despite these new laws. These include, for example, constant reorganization in order to hide the mechanisms of authority and give the workers a sense of being in control of their own responsibilities.

The hacker ethic, cyberpunk ideology, and technocracy stand in sharp contrast. All of these views expect programmers to be creative, inventive, and skeptical. The market economy assumes that comprehensive plans are not questioned before they are completed. That's why companies go to great lengths to hire only engineers from universities and technical schools, who have by virtue of their degree been through the social indoctrination to not question.(11) Those individuals who question are sent into other parts of the machine of society: research, politics, and the criminal industry, to produce information of a kind that is important to society in other ways.(12)


1. Of course, as of today I've already submitted this text to the public one time.

2. Which has in fact become the case. I must be psychic.

3. Nowadays, virtually all magazines have an online version. My personal favorite is "Syber-Starlet" (Translator's note: a magazine very similar to Seventeen).

4. Maybe just a little bit. Passwords and other things that the users pay for are often crack and tossed to the four winds…

5. This is a generalized view that presupposes an infinite number of companies, a great number of different products in the same category, and that the "market" is an independent filter that is never deceived by propaganda. This stands in very poor resemblance to reality.

6. Then again, it's probably just a myth.

7. At the moment Telia is undergoing a reorganization which, as everyone who's studied introductory management knows, is aimed at destroying the social networks that have formed in the workplace in order to strengthen the upper echelons' grip on the company.

8. And now Windows NT is the hot thing. And then it'll be Nashville. Hum-de-hum.

9. I know that the know-it-alls are being driven up the walls by statements such as this. If it bothers you, write your own book for those who get hung up on details.

10. Pierre Bourdieu introduces the concept of "cultural capital" in order to try to explain this trend.

11. A slightly mean (and simplified) statement.

12. Svante Tidholm remarked that I have an ability to sometimes reduce the individual to a simple puppet for the powers that be. I understand his view, but I'm not smart enough to get around the way the question is posed. My respect for the capacity of the individual is very great, and I also take the side of the individual in this rigged game. An expansion of my views is found in Chapter 15 as well as the Appendix.


Chapter 14
FEMALE HACKERS?

Within computer culture, and especially hacker culture, women are rare. Among the phreakers, there were (and perhaps still are) a few women, maybe because telephony is normally considered a female profession. (most switchboard operators and such are women). Rave culture is a little more equal, with about a third of the audience being female. Among the hobby hackers and the criminal hackers, there's only the occasional female enthusiast. Fortunately (I think), more and more women, especially at the universities, have discovered computers through the Internet. Often, someone starts out using the computer as a typewriter, then she hears of online discussion groups and forums for her major, and once she's tried communication over the Net, she's bitten.

The most famous female hacker went under the pseudonym Susan Thunder. (Allow me to jump back and forth a bit between the themes of the book). Susan was a textbook example of a maladjusted girl. She'd been mistreated as a kid, but was of the survivor kind. She became a prostitute as early as her teens, and earned her living working LA brothels. On her time off, she was a groupie, fraternizing with various rock bands. She discovered how easy it was to get backstage passes for concerts just by calling up the right people and pretending to be, for example, a secretary at a record company. She became an active phreaker at the very end of the 70's, and was naturally an expert at social engineering.

Soon, she hooked up with a couple of guys named Ron and Kevin Mitnick, both notorious hackers, later to be arrested for breaking into the computers of various large corporations. Susan's specialty was attacking military computer systems, which gave her a sense of power. To reach her objectives, she could employ methods that would be unthinkable for male hackers: she sought out various military personnel and went to bed with them. Later, while they were sleeping, she could go through their clothes for usernames and passwords. (Many people kept these written down on pieces of paper in order to remember them). Susan therefore hacked so that she could feel a sense of power or influence in this world, despite her hopeless social predicament. For her, hacking was a way to increase her self-esteem.

She was determined to learn the art of hacking down to the finest details. When her hacker friend, Ron, didn't take her completely seriously, she became angry and did everything she could to get him busted. Another reason for her anger was, supposedly, that she had had short relationship with him but he had chosen another, more socially acceptable girlfriend over her. It was probably Susan who broke into U.S. Leasing's systems and deleted all the information off one computer, filling it with messages such as "FUCK YOU FUCK YOU FUCK YOU", and programming the printers to continuously spit out similar insults. Among all the profanities, she wrote the names Kevin and Ron. The incident led to the first conviction of the legendary Kevin.

When Ron and Kevin were arrested, Susan was given immunity from prosecution in return for witnessing against them. Later, she referred to herself as a security expert, and conspicuously demonstrated how easily she could break into military computers. It is beyond all doubt that Susan really had enormous capabilities, and that she really could access top-secret information in military systems. It is less certain that she could fire nuclear missiles. It is clear that she couldn't do it using only a computer. Possibly, with her access to secret phone numbers, personal information, and security codes, she might have been able to trick the personnel at a silo into firing a missile. I really hope that she couldn't. Stories about hackers like Susan provided the basic idea for the movie War Games. Susan has currently abandoned hacking in favor of professional poker playing, which she engages in with great success.

However, Susan is more of the exception that confirms the rule when it comes to hacking as a male endeavor. This phenomenon has lots of candidate explanations, ranging from moronic propositions that computers are unfeminine because they were invented by men (like the sowing machine, the coffee maker, and the telephone), to suggestions that women are somehow alien to the internal competition for status and arrogance that characterizes hackers. All of this is naturally bullshit.

The real reason to the inequality within the computing world is probably that many women are raised to fulfill passive roles. While men learn to passionately engage themselves in discussion over, for example, things on the TV screen, women learn to passively observe and act as social complements on the sidelines. Passion, assertiveness, and arrogance, all typical characteristics of hackers, are seldom encouraged. Women are taught a superficially passive demeanor, in which their only possibility for action is by entrusting it to the hands of men. All exploration of new territory apparently has to be done by men. (Preferably young men). As an example, look at our traditional way of handling emotional and sexual relations, where the general trend is still that men take the initiative and women should provide the passive, nurturing factor. Another factor is that men are more solitary than women. It's an open subject as to why this is, but it is obvious that it is incredibly difficult to break this pattern.

Since hackers are normally of an age in which it is very important to externally display one's gender identity, many women distance themselves from computers out of fear of seeming "unfeminine". This act, which is perceived as an autonomous decision by the individual, is actually part of the social indoctrination of traditional gender roles. Parents and relatives add to this by giving computers almost exclusively to boys, and almost never to girls. Among the home computer hackers during the period of 1980-89, about 0.3 % were female, according to rough estimates. In the U.S., there was a female Apple II cracker who managed to liberate around 800 games from their copy protection. In Europe, the most famous female hackers were part of the TBB (The Beautiful Blondes) group, which specialized in C64 and consisted of four women under the pseudonyms of BBR, BBL, BBD, and TBB, of which BBR and TBB were programmers. They became known on the Scene through a number of demos toward the end of the 80's. Cynically enough, both BBR and TBB died in 1993, not even reaching the age of 20. Among today's Amiga and PC enthusiasts, the proportion of women is a little higher, somewhere around 1% (Source: The Mistress in Skyhigh "17, 1995).

At MIT, the cradle of hacker culture, there weren't any women at all. There were female programmers who used the machines, and even really good ones, but they never developed the obsession found among the young men at MIT. These hackers thought it had to be a matter of genetic differences that caused the women to not fall into this obsession. This is a dangerous opinion and absolutely untrue. According to statistics, most boys who become intensively engaged in computing are around 14-15 years old. The same preoccupation occurs in women too, but usually about two years earlier, since their biological clock dictates it. Most people know what 12-year-old girls can get caught up in with such intense interest that they forget social duties and just concern themselves with the hobby for its own sake. The women's (or, rather, the girls') equivalent of the rather fickle but enchanting object known as the computer, is another object with similar characteristics - a four-legged one, which we usually call a horse. In many cases the similarities are striking, even though it is difficult to prove that the same mechanisms lie behind it. Programming a computer is really not that different from teaching a horse to jump fences. It includes the same measure of competition, control, and ceremony. With the boys in front of the computer, there's an almost empathic passion, just like it is with the girls in the stables.

It's completely obvious that if this trend continues, men will acquire the power in a future society largely built on computer technology. It would be a good thing if more women used computers. Even hackers are generally positively of a positive attitude towards seeing more women in their male-dominated fields. The few women that exist on the Scene have been very successful, and received lots of attention as "exotic" phenomena. The respect for female hackers is very great. Supposedly, there are also female hackers who have hidden their gender and are assumed to be male by their hacker friends. The thrill of playing out such a role isn't hard to understand. For the first time in history, it's been possible to assume a gender opposite of one's own without great difficulty, and for a woman to really be treated like a man.

The German police sometimes use this respect for female hackers to bust hackers and software pirates. By publishing posts and ads on BBSs and in computer magazines, using female names, they attract the attention of their targets. It is a matter of argument whether it's ethically correct to exploit people's emotions in this manner in order to fight crime, and it obviously does no service to equality. It becomes even more difficult for women to break into a sub-culture where they might be suspected of being law enforcement moles.

Pornography, etc.
One cannot fail to note the preponderance of male chauvinism on the Internet and in the home-computing world. Basically, it all started with the game Softporn for the Apple II, by the Sierra On-Line computer company, and the even more successful sequel for the IBM PC: Leisure Suit Larry. The object of the two games is the same: getting women into bed. The fact that the Internet is crawling with soft- and hardcore pornography doesn't help things either. Whether or not this is a sign of a screaming need for sexual stimulation among male computer users is hard to say. (In any case, there's no shortage of pictures of naked men). Naturally, it's less embarrassing to download pictures to your computer than going out and buying porn mags - since no one can see what you're doing. (As far as you know, at least).

A large part of the pictures available on the Internet are marketing tools for different pay-BBSs, from which you can retrieve even more pictures - if you pay… As usual there is, in the porn industry, a ruthless commercial interest in the Internet. Sex sells, and the Net is used as bait in a new and lucrative market. I'm going to emphasize that this is mostly a trend in the U.S. I have yet to hear of a Swedish BBS that works this way - instead, in Sweden it's free to download the pictures, which the users engage in with abandon. A few porn magazines have opened their own Internet zones which users have to pay to gain access to.

Some PC enthusiasts have gotten a bug for collecting porn pictures, and collect them in the same manner as others collect stamps or trading cards. Actually, this hobby isn't anything strange. During the early years of hacking, many collected thousands of computer games just to have them. It was forbidden, since the manufacturers claimed that copying the games was prohibited. Pornography is both taboo and copyright-protected, since they are almost always scanned from porn magazines. It should be added that the porn industry is less than pleased with this type of distribution.

Censoring these pictures on the network is virtually impossible, and not necessarily desirable. The Internet is based on the supposition that you search for the information that you're interested in, and that you thereby bypass information that you find irrelevant, and this is the philosophy that colors the attitude of those who maintain the network. Whoever publishes the information holds the responsibility, and the middleman cannot be blamed for anything. It would be just as consistent to accuse Telia or the postal service of being accessories in crime for not conducting enough surveillance and letter-scanning. Communication should be free.

SUNET (Swedish University NETwork), under the command of Björn Eriksen, distributes the Internet in Sweden. They have so far consistently refused to interfere with the flow of information. (And I hope they never will). Individual universities, however, have (following public awareness) started to block certain discussion groups with themes such as piracy, sex, suicide, and drugs. Blocking pictures in general, however, is much more tricky, not to say impossible. If someone encrypts the pictures, it becomes completely impossible to stop them. The only thing you can do is monitor the pictures stored on the computers inside your own organization, which has led to public intervention against pornography at the Lund and Umeå universities, among others.

If you really wanted to crush the market for the porn industry, you could simply remove its entitlement to copyrights for its products. This would immediately ruin the market for the established industry, and force the companies to go bankrupt in just a couple of years. I will, for the sake of clarity, add that most women who are actively involved with BBSs and the Internet take the whole thing in good stride. If someone insults them with profanities, they usually respond with the text version of a pat on the head - "There, there, calm down now", or something similar.

Even if cyberspace is male-dominated, we can comfort ourselves with the fact that the world's first programmer, George Byron's daughter Ada Lovelace, was a woman. Ada was a real hacker, by the classic definition. She was the product of a failed marriage between Byron and Annabella Milbanke. Just like many contemporary hackers, she escaped painful emotions by dedicating herself to the natural sciences together with her friend Charles Babbage, and completely immersed herself in the quest to construct the analytical machine.


Chapter 15
THE CYBERNETIC SOCIETY

I will now try to summarize what I've written so far, and synthesize this with a number of modern philosophical ideas about people and our society. A cybernetic society is a society of people who live in symbiosis with machines. To understand a society, I employ a simplified concept of an individual, in which he or she is viewed as a construct of information, communicating with the environment by means of symbols.


In the figure, memory stands for the stored patterns in the brain's neurons, thought is the reflections and dreams (daydreams included) that we all have, and the symbols are those chunks of information we exchange with the environment, which can be single individuals as well as the entire family or society that we live in. Such symbols can be human language, but also other conventions that we don't think about much, such as pieces of paper with numbers on them perceived as possessing value, or a certain type of clothing perceived as indicating a certain status. For natural reasons, science uses well-defined symbols called paradigms, which define:

1.      What to observe

2.      What questions to ask

3.      How the questions should be asked

  1. How the answers should be interpreted

(I'll take the opportunity to state that I interpret the sociological-scientific concept of a symbol, as well as the concept of a paradigm, in a very pragmatic and personal manner - raise a hand, whoever cares. This is high-level hermeneutics. Pardon the ten-dollar words).

It is these concepts that the hackers, with Zen and Gödel behind them, contest in their motto number 4: Hackers should be judged for their hacking, not according to suspicious criteria such as academic performance, age, race, or social status, and in 3: Distrust authority. It's an attempt to break out of a system that is perceived as wrong. Marvin (the guy with the telephone cards) spoke in a radio interview of his dissatisfaction with companies hiring people with degrees instead of caring about their real skills and in this way pointed out the shortcomings in our formal social system. Burroughs thought that society would try to increasingly control the thoughts of its citizens, whether its public servants wanted to or not. It is said that an enlightened individual must have the ability to exit the system to see the real patterns behind it, which can't be described using words, paper, or clothing. At the same time, the symbols are vital to our communication as well as our society as a whole. An intelligent individual can, using symbols, detect intelligence in him- or herself as well as in other individuals. We can now view society from a similar perspective:


But what's this? It looks just the same! That's right. In this case, memory is the collective memory in the form of books, films, CDs, or computer programs, stored in libraries or in our homes. Thought is the same as culture, the ongoing process that continuously affects our living conditions. Note also that the symbols, in this case our relationship towards other societies or aggregations, is not the same as our culture. Sociologists often refer to this model as the collective consciousness. As for myself, I've nailed together the concept of superindividual for this model.

The symbols show only those parts of our thoughts, culture, that we want to show. As is well known, this is also how an individual works. An intelligent society detects intelligence in other societies and individuals. The individuals that make up society can very well endeavor to analyze the thoughts that society thinks, but the task is virtually insurmountable, like if the individual neurons in our brains were to try to understand the thoughts of the entire brain. (These arguments originate in research of artificial intelligence in non-formal systems and sociological science). This model is not limited to describing societies and individuals as intelligent organisms, but can also be applied to corporations, military organizations, and others. It is this formal system, the complex society, which sociologists study as scientists, William Burroughs criticizes as an author, and Zen debunks as a philosophy

Now that we've agreed on a common view of individuals and societies, we can start defining cybernetics. I said earlier that cybernetics means people or society in symbiosis with machines. To illustrate, here's a practical example:


We see two individuals, A and B, communicating by way of symbols. So far there's no problem. If we, for
example, suppose that these individuals communicate by sending letters to each other, a problem could occur if one of them has a slight vision problem.

Since people are so ingenious, they naturally find a way around this problem. They attempt to improve their natural conditions. I will illustrate this with an invention that was created around 1290 AD:

We have here one of the very first cybernetic innovations. Reality has been improved by a small opto-mechanical construction that we take for granted in today's society. All people that wear glasses are therefore cyborgs, people who live out their days on Earth in harmony with machines. We're so used to this that we hardly ever think about it. If you're a little more vain, you can get contact lenses, and then you invite the machine into your own body. Glasses constitute one of the modifications that are meant to improve our ability to communicate with the rest of the world. Other cybernetic modifications are aimed at making life more comfortable and bearable for the individual: the wheelchair, the cane, etc. Some are vital, like the pacemaker. Of course, now I've just listed inventions that "correct" human disabilities. Naturally, you can "improve" regular people too, with the aid of binoculars, electronic devices for night vision, etc. The telephone, for example, improves us so as to allow us to communicate over enormous distances. We can also establish hyper-communication.

 

One such medium is hypertext, which is better than normal text. We can also improve our possibilities as a society to exchange and distribute information with the help of transaction systems, satellite TV, etc. Yet another improvement of our perception - and the most revolutionary - will be Virtual Reality. There are, however, a few uncanny aspects of this society. Like, for example, the previously mentioned NetNanny, or when Aftonbladet on July 15, 1995, reassuringly announced that TV sets can now be fitted with a chip that is programmable by parents who don't want their children to watch excessively violent, pornographic, or otherwise unsuitable programs. When the kids try to tune in to a blocked program, the screen turns blue. Fantastic. The question is just who is being programmed: the chip or the children? One of the parents interviewed by Aftonbladet wants to prevent the kids from watching, among other things, SOS - På Liv och Död (cf. the American TV show Rescue 911), which is a program that shows films of real accidents and rescue efforts. What's next? Isn't it just as well to turn off those terrible news, so that you can raise your children in a protective bubble, as far removed from the world as the Russians ever were under Stalin? The risk of abuse of this, and similar, invention is terrible and great.

And this was only an example of what a relatively stupid chip can accomplish. We are already forced to note that our society is no longer formed solely by people, and that not even people are formed solely by other people. When almost every store has electronic anti-theft systems on every product, there's no longer a need for honesty as a virtue, because it becomes impossible to act dishonestly - and thus, moral limits are turned into real, physical limits with the help of technology. We are so singularly obsessed with the public good provided by these machines that we don't question what is happening. A store alarm is nothing to complain about, since it only concerns itself with thieves… One fine day, we'll be hanging around with machines that automatically inject sedatives into all individuals with violent tendencies, naturally only to prevent them from committing violent crimes. That's no concern of yours, is it? You're not a violent criminal. Or?

Just to give an example from a few years ago: in 1984,(1) the computer at Värnpliktsverket (the Swedish national military conscription administration) experienced problems with the result that orders to report for rehearsal training were not sent to all personnel that were obliged to do so. These people received phone calls from authoritarian military officers that interrogated them as to why they hadn't reported for duty. The authorities had received information from a computer, presumed to be reliable, that orders to report had in fact been sent. What's interesting here is not so much that a computer could experience an error, but that it could really control a large military organization. Some of our most respectable military institutions therefore have names that could be used as product labels for various computer brands.

Then, there's artificial intelligence. When intelligent agents enter the picture, complexity increases. We may be forced to ask ourselves if it's perhaps the case that we interact with digital individuals, seemingly possessing their own free wills. A digital individual is created when a computer system becomes so complex that it gains a consciousness, similar to that of humans. This probably hasn't happened yet at the time you read this. The most disturbing example I can think of is a program from Hectare Ltd, which can generate trashy novels for women, i. e. stuff similar to Barbera Cartland's, in a never-ending stream. If you ever suspected that a computer could generate mainstream fiction, your fears have been realized. The program really works, and it's not even very large and comprehensive. Similar programs can reformulate pre-written passages to infuse them with a certain style of writing.

One of the most dangerous power factors with AI is that it can easily produce an endless flow of seemingly intelligent bull, which diverts attention from real problems. To coin a conspiracy theory, I'll propose that there are already publications whose content is wholly or partially computer-generated. Those who wrote the programs are probably mostly concerned with making money and don't care whatsoever about the moral aspects. Wouldn't you? The public doesn't notice. They think they see a human, but it's really a robot. But then again - what's the difference? Curtains.

This is just one of the many possible applications of artificial intelligence. It is the case, however, that the digital individual will one day become so intelligent that it can produce a dialog without any input from one of the persons speaking. The established authorities can then control the individual in any manner they choose. Imagine calling the utility company about having no hot water. You think you're speaking with a human, but you're actually talking to a computer. Everything you say is turned into statistics, with no need for the responsible parties to react to any criticism. The powers that be can filter out your complaints in order to make independent, emotionally neutral decisions… and right about here the argument becomes so fuzzy that I might as well leave it to the reader to finish. (I'm not really a philosopher, just a dabbler in the art). It is at least an amusing thought experiment.

Cybernetic Society vs. Copyright
It is obvious that the cybernetic social model entails changes in our way of viewing information and its role in society. Some things that we now take for granted may become fundamentally altered. An example: copyright. Copyright is the right to own information, or in the case of a patent, the right to own knowledge and make money from it. In jargon, it's called intellectual property. Copyright was created in conjunction with the art of printing, since before that time it wasn't very important to know who owned information and the right to publish it. All knowledge and ideas were in those days considered public domain, and not property. Information was free. Th possibility of owning information is inseparable from the presence of machines like the printing press, fax machines, or computers. Without these, the book, painting, etc., become unique works of art as opposed to a mass of reproducible information. Thus, copyright is an attribute of the early cybernetic society that associates information and knowledge with economy. This applies to all information, printed text or photographs, film or software.

We can then trace the origin of copyright to the emergence of the printed symbol. To emphasize the importance of this development (in order to strengthen the argument), I will summarize the development of modern symbols below:

Symbol

Population

Cultural Basis

Time Period

Primitive symbols

Animals

Genetic culture 

Prehistoric

Speech

People

Oral culture 

40,000 B.C.

Text

Civilization

Written culture

3,000 B.C.

Print

Industrial society

Distributed mass-culture

1,500 A.D.

Hypersymbols

Information society

Information culture

2,000 A.D

The dates indicate the origin of the respective symbol, rather than the date it became widely used. Normally, the transition from oral to written culture is considered to have taken place around 500 B.C., and printed material wasn't very widespread before the Enlightenment (1700s and 1800s). The first date is very hard to ascertain. This is really not that important: the question is not one of dates, but of the history of symbols. It is clear that information technology is causing a change in society which effects are comparable to that of the printing press (at least!).

Symbols change with time. What we consider valuable today can become worthless tomorrow. For example, most people think gold is valuable. If, let's say, a small planet made of gold collided with the Earth, making gold the most common metal on the planet, our view would instantly change to where gold was worth less than iron. By the same token, we would gladly trade all of our gold for food if we were starving, since we also have certain physical needs. You could even say that we have psychological needs, which are (in our modern society) largely generated by advertising, making us willing to trade our economic means, in monetary form, for stereos, sodas, etc. We thus have a conception of the value of things that is based on supply and demand. Supply and demand are controlled partly by nature, and partly by other people. This is what makes us consumers. These concepts are found in all major ideologies.

When other people want to influence our consumption, they use symbols to do so. This can be done by, for example, establishing a certain brand of clothing as synonymous with the symbol called status, or a brand of soda as synonymous with freshness and youthfulness. But this is only the most conspicuous part of the top of the iceberg. In reality, our entire societal system is built by symbols. This is what sociologists cal symbolic interactionism, which is a scientific theory usually associate with a guy named George Herbert Mead - something of a genius of a philosopher, who unfortunately didn't directly write anything, but had a great influence on the field of sociology. Mead defined many of the symbols I've mentioned in this chapter. Mead also touched upon the concepts that will be found later on; among other things, he suggested that the French Revolution was a turning point in modern history, where people for the first time realized that they had a right to change or correct society, and that the state wasn't based on some divine principle. Philosophically speaking, he was a pragmatist who thought that ideas and theories should be checked against reality before being awarded any value or authority. Mead for sure was a supporter of the hands-on imperative. (The pragmatic school of thought is an extension of fallibilism, which is basically the same as Zen).

Ok, fine. What about copyright, then? That's the point I'm supposed to get to. We, as the people of the Earth, have reached an agreement that says that we should view information and knowledge as property. This concept of property, or ownership, is a symbol that we endorse. With the introduction of the information society, the morality created by these symbols becomes fuzzy, to say the least. Morality, or ethics, tells you that you shouldn't trespass on the territory of others, not to harm, not to steal someone else's property. These are commonly accepted moral imperatives when it comes to material property. But when it comes to intellectual property, protected by copyright and patents, we've reached a breaking point. IT forces us to re-examine these principles: it is immoral to enter certain commands in a certain order from your keyboard. Other command sequences are fully acceptable. I can program my own computer, but not someone else's over a network. I am permitted to copy some programs as much as I want to, some not at all, and some with conditions. We become uncertain of what to think, and some succumb to dogmatic condemnation of software piracy, in order to be certain.

Since legislation isn't the same thing as corporate policy, I get mixed signals, like when the gaming company Nintendo asserted that it was forbidden to engage in second-hand sales of computer games. Of course Nintendo is of this opinion, since if people can only buy new games, that lets Nintendo sell more of them and make more money. Under Swedish law, Nintendo doesn't have a leg to stand on. We are faced with conflicting messages from the government and established industry, with the result that we start thinking on our own. Since corporations share economic power with governments, we view both as authorities. We start questioning these authorities - we start thinking independently, and make our own decisions in the absence of clear directives from society. Remember, once again, Rule #3: Distrust authority. The hackers' ethic leads the way through turbulent times.

The hackers discovered severe injustice with regards to information. On the Scene, the 13-14-year-old hackers couldn't for their life understand why only the youths with rich parents should have access to all the fun software. Among the phreakers, there was total disbelief over why only companies and institutions should be allowed free communications - since this was a way to grow! Why accept this? Granted, one could call this lack of respect and lack of understanding of the workings of society, etc. However, no one lowered himself or herself to discussing the issue. The message that the hackers received from the establishment was: "You are criminals. Period." What amazing hypocrisy!

I conclude that the more cybernetic a society becomes, the more difficult it becomes to define private domains of knowledge. The more computers and the more refined technology we get, the more meaningless the concept of intellectual property becomes. This is especially the case with software, for which patents are granted for methods that didn't require any large investment in research and equipment, but only perhaps one or two nights of intensive hacking. The ideas didn't cost anything - it's mostly a case of "early bird gets the worm", and it gets the only worm. It is no longer possible to defend intellectual injustice with material analogies.

This forces us to pose the question: where is the line between freedom of expression and property? What may I copy and what may I not copy? When does knowledge cease to be public property and change into private property? What is happening is that technology is de-boning our entire social systems, holding up its skeleton for all to view. We can see how large areas of cyberspace has arbitrarily been sold out to the profit-hungry gold diggers of the information industry.

Software is an extension of the human mind: of the ability to create, understand, and generalize knowledge. To reserve such a powerful tool only for those who can afford to burn hundreds of dollars on it is not sustainable in the long term. I'm not saying that parasites like the Chinese Triads or other piracy syndicates should be allowed to take the right of ownership from the large companies. What I am saying is that it shouldn't be prohibited for private individuals to freely distribute software and help each other use it. This doesn't exclude competition from established companies, as long as they can provide something that the local hacker can't: printed manuals, 24-hour service, instructional resources, etc. Who knows these things better than the one who created the software? Software is a product that lacks inherent value. It is not the ownership of software that drives society forward, it is the ability to use it, and to teach others to use it. What we should buy and sell in the information society isn't software, but applications and advice - in one word: Support.

As necessary as copyright was in the industrial society, as meaningless it is in the information society. The problem is not separating printed information from electronic information. The problem is that it's no longer possible to separate information from knowledge, and owned knowledge from public knowledge. The line between an idea and the application of the same is being erased as people communicate more and more using machines that have been constructed for that very purpose. By extension, the line between thought and action is also threatened by the development of virtual reality.

Let the software companies fight syndicates, mafias, and criminal groups that make a killing off piracy - this doesn't bother me at all. But, for God's sake, don't condemn the private copying of software between friends with no profit interests involved! This distribution is not immoral, but simply a way of transmitting knowledge. It is wrong if such copying is illegal, and it should be permitted for private individuals to copy as much as they want. It is the dirty money that should be removed from the software business, not the burning interest and enthusiasm of the amateurs! The moral limit is not drawn over the right to copy programs or not, but the right to make money from a program or not! This is the right that should be reserved for the author, if he or she so wishes.

In Sweden, today, I can go into any public library, retrieve any book that I want, go to the copy machine and copy as many pages as I want. Some legislator, in a moment of clarity, realized that preventing this would be an infringement on the freedom of the individual and the possibility of personal development *Code 1993:1007). Information gives birth to intelligence! There is no reason that this freedom should be limited to printed matter. Films, CDs, computer programs… it's only a matter of definition. All of this is information, and nourishment for human intelligence. It is not healthy for the individual to be prevented from copying information. It is sick. SICK!

Patenting a certain sequence of characters - strings of information - sound waves and videograms - insanity. If the people who first invented words for human language thought in those terms, we would have never learned to read or write. Whistling a patented song on the town square one sunny afternoon is a "public broadcast", and royalties should be paid for it. When you're not engaged in making a profit off information - which is by extension to increase your power - when you're simply out to spread joy and knowledge, then information should be free. Period.

There's no point in dragging out an argument about it, and legislate left and right. Sooner or later, we'll reach the jaywalking criteria (Translator's note: in Sweden, it's only illegal to jaywalk if you end up actually interfering with traffic): this is when a crime becomes so common and widespread that it's pointless to fight it, like jaywalking or copying music CDs to tape. Rather, governments and legislators should concern themselves with their own integrity.(2)

Conceptual Breakdown (Copyright Does Not Exist!)
With the decreased clarity of our symbols, what should we expect to happen? To have something to build on, I will with impunity borrow an idea from Thomas Kuhn. Kuhn is a philosopher of science, who has exciting ideas about the way science grows and changes over time. Kuhn's theories are reminiscent of ideas of social development, the emergence of various ideologies, and how we humans grow and change our environment in general. In short: the man describes what happens when people use their intelligence. The most thrilling part about Kuhns theories is that they are very reminiscent of Gödel's theory of formal systems. The basic premise is the following: you have a clear picture of the world, a paradigm(3), such as:

You know that information can be owned, because otherwise this and that company would go bankrupt, and that means this or that to you, which is not good, and therefore you should accept that information can be owned.

Or:

You know that money is valuable since it's based on the country's productivity and quality compared to other countries, and therefore you should accept that a note with some numbers on it is worth money, so that the government (and other governments) doesn't suffer a crisis of public confidence, because then your standard of living is threatened. (Note: slight sarcasm here. Other people might say this in complete seriousness, though ;)

Kuhn thought that paradigms changed over time like this:

Paradigm -> normal conditions -> Inconsistencies -> Crisis -> Revolution -> New Paradigm

With the premise that people generally develop norms (rules for action, bases for judgment) in the same way that scientists form paradigms (models, bases for judgment), I'm applying this system to our society. (Norms and paradigms are kind of the same - both are grounded in human intelligence, and are oriented towards bringing order out of chaos by erecting philosophical systems). These conceptual systems live around us while we don't think about them. For example, there's no law of nature that says we have to divide the day into 24 hours - we would do just as well with 10 or 50. No one forced us to separate musical tones into 12 per octave, because 8 or 16 would work fine too. We define our environment in common terms to avoid conceptual confusion. Sometimes we reflect on these concepts so rarely that we take them for granted, as a natural order, and for that reason we consider people who come up with new conceptual systems delusional. William S. Burroughs expresses this more conspiratorially and ruthlessly:

"There is no true or real 'reality' - 'Reality' is simply a more or less constant interpretive pattern - the pattern that we accept as 'reality' has been forced upon us by the authorities of this planet, a system of power that primarily seeks total control."

(From Nova Express)

When Erik Satie, the poor genius, played his furniture music which broke with traditional patterns of musical creation, he got booed out. When Picasso broke with classical art concepts, many considered him to be an idiot. Cross your heart - how many of you has not at some point complained about art which "you can't see what it's supposed to be"? Gödel went so far as to prove that even something like time is subjectively perceived, philosopher or not. With hackers, we find this rebelliousness in, for example, the B1FF language, where our pre-established notions of the functions of signs are given a serious twist. Many BBS and Internet users write flaming posts when they see someone write a sentence like: y0YO!#%$!! wH4+zZ h4pP3n1n' 4r0uN '3r3 +H3zZ3 d4yZzZ?#$!%??. The question repeats itself: how groundbreakingly creative are you allowed to be? And at which points in time?

From the start, after some turbulent times we've established a closed conceptual system that we have accepted, we live in a stable condition where production and consumption live in harmony with an established societal system, with all that it brings of class divisions and territorial thinking. Now, when the information society brings things to a head, internal inconsistencies emerge inside the system. Is money really based on production? What are the production forces, in that case? Can knowledge be owned or not? This is the period in which our society currently finds itself, and will remain in for quite some time. This is the turbulent era of the post-industrial society. We are breaking out of the complete, near-mathematical system that our society has been stuck in, almost like Gödel broke out of mathematical systems and Zen debunks philosophical theories with direct answers. The Patriarchy, which the feminists want to break down, is another system whose foundations are cracking. (Within sociological science, this condition is called anomie, which means that there is a lack of functioning norms in society, like in today's post-Soviet Russia). This phase is also characterized by mushrooming subcultures and a reinforcement in religious sects, both of which are a result of an anxious search for definite norms not found in ordinary society. Eventually, there will be a crisis that precedes the real information revolution. This is when the most comprehensive societal changes will take place. (We are talking about a social revolution, no necessarily a bloody one). After this revolution, we form a new set of assumptions about how society should function, and it is only then that we have achieved the real information society. Many micro- and macroeconomic equations (or axioms, to be scientifically nit-picky) that are valid in the industrial society will become totally worthless in the information society.

In order for the changes to occur at all, someone has to push them through, committed to partially tearing down old norms to make room for new ones, albeit with some respect for the old society. These are Nietzsche's disciples, or in our case, the most militant cyberpunks with the hackers at the front, who dare to stand for their ideals in a new age. To quote Nietzsche himself: "I'm not closed-minded enough to stick to only one system, not even my own!" It's about tearing down the norms of industrial society to make way for the ones that will put information society on track. It doesn't have to occur outside the established system; what Nietzsche (and others) says is that it may.

Since the 50's and 60's, the younger generation has assumed the role as pattern-breakers, questioning old systems and building new ones. In Nietzsche's time, students and intellectuals were the most rebellious. There's been a shift to where radical ideas are associated with youth, and conservative ideas with age. This is one of the worst pathologies of our system of roles - many young people actually dislike the role as revolutionaries, and become, like in Tom Petty's partially self-biographical song Into The Great Wide Open, rebels without a clue. The pressure to revolt can in some cases become the straw that breaks the camel's back, pushing youngsters into crime and drug abuse. Many acts of rebellion are unfounded and arbitrary, aimed solely at provoking more conservative older folks - but there are some acts that are justified. The revolt against the informational dictatorship of corporations and governments is not unreasonable. It is an ideologically grounded revolution, which deserves being taken seriously.

Tolerance for new concepts and points of view is one factor that determines how closed or streamlined a society is. Nietzsche, in his time, appreciated the majestic music of Richard Wagner, which was another attempt to break out of a degenerating musical paradigm. Even though Hitler later admired both Wagner and Nietzsche, nazism was an ideology that condemned any effort to create new systems of concepts. Towards the end of the 30'', they organized an exposition in Berlin for "ugly" art, mostly modern, which they considered sick or twisted. That's the nature of fascism: after a shining ascension, it loses all interest in creativity and strives only to preserve itself. Can a society like ours, with corporations large enough to intimidate governments, accept an orderly and reasonable debate about the existence of copyright? Or will the system violently seize the power to decide what is public and private property, bypassing pesky democratic channels through lobbying and executive decrees with no debate whatsoever?

Dear readers: I suppose that on your journey through this book, you've discovered how close we really are to the information society.

It's my honest and upright opinion that such a society will either be free of copyright and software patents as they exist today, or it will be an informational dictatorship run by either governments, corporations, or mafias. The latter is the society William Gibson warns us of in his cyberpunk novels. Let's avoid it. I have do not know exactly how this change will occur, nor what the final result will be, just that it will take place.

Cybernetic Society vs. Class Perspectives - The Mechanisms of Power
The British sociologist Basil Bernstein(4) viewed the mechanisms of society like this:

In this system, we can see society divided into a production sphere and a sociocultural reproduction sphere. In the production sphere (corporations, organizations, legislature, executive branch, and counties), power is created, economic, political, and public. The socio-cultural reproduction sphere (parts of the media, entertainment industry, educational system, etc.) exists to justify and perpetuate the patterns suitable to the production sphere.

At the bottom of the picture, we find the nexus of these relationships. The Code is our language, in all its forms. It's actually every social symbol used to exchange information between people and society. The Code is pure information. It is the foundation for the entire hierarchy and social order. Through the linguistic code, society is constantly structured and reinforced in the same ways, which is why Zen, Nietzsche and Burroughs criticized language - they felt subordinated to a social and cognitive system which never changed in any substantial manner. Additionally, language has more levels than the spoken or written. There is pictorial language, music, and all kinds of symbols to use. Basically, all vessels for the transfer and storage of information could be said to be part of this code.

Many believe that the information society will naturally generate the same kind of structure, just because it's always happened before. There is no evidence suggesting that this would be the case - rather, evidence suggests the opposite. The information society inherently elevates public consciousness of society itself to a level which bares its mechanisms. What's actually happening is that the basic units of society become aware of their own role in this gigantic information system, which in turn leads to their desire to improve it. Social progress can thus be further accelerated, like always (you with me?).

Let's employ an illustrative example: a current controversy on the Internet concerns (as I mentioned in Chapter 8) the Church of Scientology and its questionable copyright on the religious documents it produces. According to believers, the documents contain material describing the movement's so-called clearing technology, which is a quasi-science demanding comprehensive and very expensive courses. The Church thinks that only members of the movement have a right to this information. Roughly, you could say that clearing technology consists of hypnosis and science fiction.

The Church of Scientology is a sect, and as such, a society within society. It provides all the functions a society normally provides for a human being. It affords her opinions, morality, social orientation, and so on. The only reason for a member to venture outside the limits of the sect, is to earn his or her own living and thereby nourishing the sect also. Sects, among which I also place the Plymouth Rock people, Jehova's Witnesses, and Livets Ord (a Swedish religious sect), live like parasites on our social system. Almost every clear-headed individual is aware of this. One way of seeing how hermetically closed a sect is, is to apply Bernstein's model on it. Any reader with some imagination shouldn't have much trouble doing this.

Now, participate in a thought experiment that is taboo. Imagine that society is a sect, and that your thought patterns are externally controlled. Imagine that copyright and freedom-of-expression legislation exists to limit your awareness and maintain the social hierarchy, just like a sect's leadership rules its members. Imagine that, despite all of our freedoms, we might be blinded by the delusion that our society is free! Members of a sect are completely convinced that they have made an independent choice to join it, and that they are free individuals. All sect members are convinced that the sect's account of things is the one true account, and all renegades are vehicles of, for example, Satan. Suppose that all members of society are convinced that society's account of reality is the true one, and that criminals, hackers, and other non-conformists are painted in a bad light because it suits its purposes. No sect leaders force their members to obey and serve out of sheer lust for power, but because they actually believe in what they're doing. No politician or CEO forces citizens and employees to do their bidding out of sheer malice, because they also believe in what they're doing. Do you understand Burroughs a little more?

Look society and power in the eye. Why is the Church of Scientology one of the first authorities to cry for law and order, wanting control of information? Why is society not so far behind? Why do we want to keep tabs on the information that spreads through subcultures? Suppose that there are truths you never dreamt of, outside the universe of society. Isn't it the case that behind this jovial façade of the social community a force is concealed, which wants to replace organic sympathy with mechanical obedience?

So what is this superior power? I've already shown what it is: supervisory intelligent entities, thinking units consisting of constructs of people: Corporations, Governments, Nations, Counties, Concerns, Mafias…. they consist of individuals, but they don't think like individuals. They are intelligent, but their intelligence is not human. They can benefit us, but they can also do us harm. They are superindividuals, individuals made out of individuals, united through the control of information, or to put it in another way: power. The problem is that we, as humans, have a horrible time seeing the forest for the trees.

Too many myths are flourishing around people and their society. One of the most despicable ones is the delusion that society is "free". Every society is founded on the lack of freedom - giving up some of your freedom in exchange for security. What every individual should know is that unless you apply anarchistic principles, you have to go through life constantly sacrificing parts of your freedom to superior forces. These can consist of the kinds I enumerated above, and others. The basic obligation a superindividual has to an individual is to inform the individual that "this is what I claim of your freedom, and this is what you get in exchange." Symbiosis, not domination. The nastiest of these superindividuals are those that operate behind the scenes, intentionally controlling and influencing individuals without their knowledge. These are often referred to under a collective term: the "Illuminati", the glowing ones, the "good" people, the circle of initiates.

Look at a new world with open eyes. Break out of the system. Only after doing so, can you understand what you can do for society. (And don't forget to ask yourself if I am, in fact, just a nutty conspiracy theorist trying to see something where nothing exists. That possibility exists, you know.)


1. Wasn't it an exquisite coincidence for this incident to happen in 1984?

2. Here's a present for the libertarians: if the right of ownership is sacred, why do people not respect it when it comes to music CDs, etc.? Would you? Why is the market unable to solve this problem, if the legislature is really so powerless? Say, are there any problems that can't be solved either by the market or the state?

3. This word is one of those that have escaped down from the esoteric, academic levels into normal language. Be careful if you use it around people with scientific training, since the keyword of science is precision - paradigm means one specific thing, not a category. Using the word outside the philosophy of science could be viewed as a vulgar, though common, practice. The opposite of scientific language is found in New Age culture, where it's important to be as fuzzy and imprecise as possible. Popular culture, of which this book is an example, must attempt a balancing act between these two extremes.

4. Bernstein, who was originally a linguist, belongs to some structuralist or post-structuralist school of thought, which isn't really too important in this context.


Chapter 16
THE FUTURE

This book's coming to an end soon, and I should make some predictions of what we can expect on the electronic front in the days to come. If you want a nightmarish vision, then you could read my futuristic novel-in-progress called Digitala Dagar ("Digital Days")(1), but this is science fiction. However, the book is relevant to what follows - which is my personal predictions, not pure fact. Everything I write from this point on is speculation, and since the future is always in motion, I might reconsider the points I'm about to put forth.

The electronic universe is actually a new world, which we call cyberspace. It is a place where small communities of information have been allowed to exist in the state of a sort of loosely organized anarchy. Cyberspace is in the process of becoming civilized as it grows. Within a decade or so, everyone in this country will have access to the Internet and be part of the electronic community, and just like all other communities it suffers from crime and internal conflicts.At the same time, the human factor is always present. Cyberspace is a place occupied by people, and wherever you find people, you find politics and culture. As a tool, the computer is unbeatable; it can construct and visualize with a unique precision. Electronic art is not a fad, but something we will see more and more. The musicians and painters of the future will leave traditional methods and migrate to virtual reality and instruments that don't exist as of yet. Motor skills and rhythm won't be required to make music. The ability to mix colors and execute pen strokes won't be required to make art. The only prerequisites will be imagination and the ability to use technology - which becomes easier and easier to use. Artists who only work with artificial worlds, spacemakers, will basically be able to act as gods in the artificial realities - for better and worse. (Nietzsche's statement that God is dead is frighteningly tangible in a virtual reality). Perhaps professional artists will go away in favor of a large number of amateurs following the introduction of advanced technology into the mainstream.

In early computer art, such as demos, the computer was used like a musical instrument. Just as a guitarist finds hidden attributes in his or her instrument when he/she finds out it's possible to play flageolets, or notes affected by the physical characteristics of the string, early computer artists found hidden potential in their machines. This was particularly the case with the C64 and Atari ST. Modern computer art is more a matter of constraint - in virtual reality, everything is possible: it's the nightmare of the canvas. It's easy to overdo it and become totally incoherent.

Like I said before, the digital universe is just a mirror image of the "real" one. The only thing that's really strange about cyberspace is the sudden proximity of information and other people, and the breathtaking boost in cultural and social evolution that this proximity causes. We hate it for its distorted image of ourselves, reflected as if by a twisted mirror. The behavior patterns of people are ever so obvious within the framework of a computer. Soon, our society will be so interlinked and complex that it will become as dependent on computers as our bodies are on a circulatory system. There is (unfortunately?) absolutely no return. Not even now, today, can we turn back. Our last chance to guide society away from computerization came and went with the 50's. It's not a question of computers or not - it's a question of how to use them.

The new communication channels will fundamentally change the way public opinion is formed. There will be more responsibility on the part of the individual for sorting information. If Swedish youth would suddenly start showing a great interest in certain suspect publications, many people would probably react strongly to this. There would be a public debate of the publications' agenda and opinions.We have no control over electronic publication. No one knows the distribution size, how many copies exist, and when a reader has viewed the paper, it's erased from the computer's memory, leaving nothing - except new ideas, thoughts, and opinions in the brain of the reader. The only way to find out what a person reads electronically, is by monitoring him or her at all times. The responsibility for forming public opinion will wholly or partially shift from society and established media to the individual. Media will have a hard time keeping track of all the interest groups that will arise. All people will be forced to think on their own, whether they want to or not.

The possibility of having an opinion without having to stand up for it is considerable. If political discussions to a greater extent are held electronically, on the Internet and on BBSs, it becomes virtually impossible to resort to personal attacks on people with different views, since every modern conferencing system contains the often-used option of remaining anonymous (under a pseudonym). The rhetoric of public debate will certainly also change in accordance with Rule #3: distrust authority. By extension: distrust the entire social hierarchy. Power always corrupts; the fourth state - the media - is no exception.

The chronicling of history won't be as geographically centered as before. It won't be possible to say that "this idea emerged in Chicago, USA, around 1997". Maybe not even what people were involved. Ideas and social perspectives will spread globally almost instantly. Opinions, ideologies, and innovations of all kinds will be created in the discussion groups on the networks, and they'll be created on a global level and by people from totally different walks of life. Some will be CEOs, some will be thieves, some 70 years old and some 14. The most important thing will be the ability to articulate oneself. No one cares what you look like, where you're from, or how you dress. Perhaps there will be a distinction between ideas that have originated in cyberspace and those that haven't. Debates will be held between those who are interested and seek out the discussion by themselves, not by "pundits". The distance between debaters will become purely intellectual.

Social self-censorship (which means that, for example, publications which defend the use of drugs don't get press subsidies and are consistently resisted) doesn't exist on the networks. Instead, it's up to the individual to decide what's right and wrong. Instead of hiding behind an editor-in-chief, you have to stand for what you write. This tendency is notable in the daily press, where it's become more of a rule to sign articles.

Putting an interactive terminal in the hands of a normal person means considerable change. At first, it's not terribly exciting. You discover the Internet through the World Wide Web, which isn't much more captivating than a library or a TV program. It is one-way information for the individual, and not very interactive. Today, the big companies and institutions largely control the World Wide Web, even though there are brilliant exceptions. It's not too surprising that the small amount of material that isn't commercial has been produced either by public institutions or hackers.

But then, you hopefully discover Usenet, where you can discuss anything between heaven and Earth without being spoon-fed ready-made solutions by experts. You might discover IRC, where you can hold real-time conversations with other people from anywhere in the world. And then you discover that you have many equals, and even that you're an expert on many things, and that your own knowledge is valuable. Then, things start to happen in the homes around the country. Swedes are transformed from passive consumers to interactive world citizens, and this is the real digital revolution. If no market forces (Telia, Microsoft, etc.) succeed in stopping, commercializing, or obscuring it before it has a chance to grow…

It's the case that this planet we inhabit, Spaceship Earth, is starting to become so internationalized that all the people aboard are starting to develop certain common values. It's a rough, uphill ride, but it's happening everywhere. Information technology, especially the two-way kind, will be the decidedly most important link in a society that can stand united in Sweden and Australia as well as in Japan and on Madagascar. This demands communication free from monopoly, and freedom of information. I am convinced that we will find a compromise.

A few years ago, many politicians and sci-fi authors cautioned us about the risk that information technology would be used to control people everywhere. (The examples used included Ira Levin's One Fine Day, Karin Boyes' Kallocain, and George Orwell's 1984.) This is what organizations like the EFF want to stop at all costs. The encryption program PGP was created just for this purpose, and this gift should be considered a social good deed. The encryption expert, Zimmerman, is maybe deserving of the Nobel Peace Prize for his service to the protection of "healthy disobedience".

When I was younger, I had a diary with a small lock on it. Many adults have one too. Now I don't need to lock my computer, because encryption is enough. It's in any case much more effective than physical locks for protecting information. The problem is that criminal investigators, for example, may very well consider my diary part of the investigation material. I don't think so. My thoughts belong only to me, and I'm not going to abandon them to anyone. The desire to read other people's diaries is, in my view, just a step on the way to the desire to read other people's thoughts. Diaries are an improvement of one's memory, an extension of the intellect. Where is the person? In the body, or in the diary, or both? Some diary-keeping people discover details of their past that their brains have forgotten… "My actions occur in my body, but parts of my mind are on the bookshelf". Yes, we're information-processing individuals, all right. And information technology is so many times better than a library ever was at storing and processing information.

If you want to write anything hidden from the mafia, the government, or your family, you should use encryption. The possibility to erect a "firewall" against the oversight of authorities is vital to any democracy. PGP, in one swoop, puts humanity's collected mathematical science between you and the superior powers. Zimmerman's crypto also allows you to set up "bug-free" communication channels.(2) Encryption is a fact, and I suggest that anyone who wants a bit of personal freedom and privacy use it. I'm not going to deny that well-applied encryption will make it impossible to stop nazi propaganda, child pornography, violent movies, and that it can partially protect criminal syndicates. I'm split on this issue, but I ultimately think that it's worth the price to protect the private lives of individuals from governmental, corporate, and organizational control. Furthermore, there's already crypto around the homes of the country. As for me, I got my copy of PGP on a CD supplied with the magazine Mikrodatorn (a Swedish home computing magazine), and which can be found in any well-stocked library. No authority in the world has the possibility to decrypt information that's been encrypted, using today's technology. Prometheus has already stolen fire from the gods, and no one can call it back.

I observe the changes in society with excitement: encryption can perhaps end the Pepto-bismol policies that, for example, in the case of child pornography, treat the symptoms instead of the disease. For we all have to conclude that it's not pornography in itself which is the problem, but rather that there is demand for it. This, however, is a harder problem to address…

It wouldn't surprise me at all if there was soon another debate about prohibition in our stuck-up Swedish media. A debate such as the one in 1980, which started when Kulturarbetarnas Socialdemokratiska Förening (the Social Democratic Association of Culture Workers) wanted to prohibit TV satellite dishes in order to prevent Swedish residents from watching unsuitable television programs. (Which, in retrospect, looks pretty absurd). Of course - attack technology, there's never anything wrong with people.

The debate will naturally be caused by something that upsets the average family: drugs, pornography, political or religious extremists. All of this is now available on the Internet, mostly in the form of text or pictures. Tomorrow, it'll be there in the form of sound and motion pictures. In the future, it might be some form of virtual reality. The U.S. Congress has tried to prohibit effective crypto, and the European Union has issued directives banning un-crackable encryption. Naturally, nothing will come of either one, at least nothing that will be respected any more than the prohibition of, say, jaywalking. Human nature includes an ability to resist every form of thought control. (Or should we call it information control?)

If people have any sense (and they do), they'll realize that we're dealing with international problems. Mom and apple pie are disintegrating, and the problems of the world are approaching from every direction. At some point, perhaps we'll realize the need of even more international cooperation, and of course it's just as difficult to keep international problems outside the EU as it is to keep them out of Sweden. The information society grows towards internationalization by its own force. All of this thanks to some hackers who created ARPAnet, later to become Internet, and which interconnected the whole world, for better or for worse. The change has just begun. It is without doubt the most beautiful, magnificent hack ever executed. The university hackers hacked down barriers between educational institutes, then between countries, economic interests - and yes, between people. Maybe I'm being a bit dramatic, but you know what I mean.

Rave culture and electronic pop music aren't fads - we'll get more and more of them, more genres, and we'll educate professional musicians who've never played anything but techno music, even at public institutions. The joy and vitality of rave culture's futuristic shows yields optimism and a belief in the future. With luck, rave culture will become for today's youth what 60's rock was for the baby-boomers; a symbol of rebellion, identity, and creative thinking. And in contrast to dystopic cyberpunk and many other modern trends, it is happy and optimistic, not regressive or doomsaying. The same goes for many other forms of electronic culture, including electronic film as well as multimedia and online culture.

The most prominent danger to democracy in conjunction with new technology is the risk that not everyone will have access to it. In the US, almost every well-to-do middle-class family has a computer, and even a modem. In the ghettos and industrial suburbs, it's a pipedream. In Sweden, where the gap between classes is not as wide as in the States, there's a marked risk that the gap will increase if not everyone has access to computer technology. If not, information will be available only to those who can afford it. Remember the second rule of hacker ethics: All information should be free. Internet and public computers at all the schools and libraries around the country, even grade schools and community colleges, is a given. A computer for each student is desirable. State subsidies for computer equipment is a valid issue.

I'm fully aware that I express political opinions now, and I'm placing myself squarely against those who think that technology, high-level jobs, etc. should be reserved for the elite. Neither do I look up to hackers that are just out to show off and don't care about anyone else. Following political and economic democracy, we're now approaching a democracy of information. Information for the people, perhaps. It's my hope that information technology will provide the foundation for a more democratic society than we have today.

You should think before judging a hacker. A hacker is generally a middle-class youth who have acquired possibilities that normally only the richest upper-class kids can revel in, using computer technology. They've done this simply by going out there and grabbing everything possible. Isn't this really what our whole modern, class-based society's rules of the game are all about - that the privileged should be able to pick and choose, but the less privileged get long sentences if they try to get some of the goodies?

To categorically state that hackers, phreakers, virus makers, or crackers are public enemies is bullshit. It's simply pointing to superficial factors and appealing to authority. Saying that a phreaker, taking some phone time in a fiber cable to talk to his buddies in the States, is a thief because the law says so, is placing 100% trust in the makers of the law. It's reducing the problem to legal text. It's a senseless oversimplification. Every law is constantly in motion - that's how it actually works. You're one of the people that are obligated to change the law if you realize that it is wrong.

Isn't the real crime of the hacker that of challenging values and power structures that seek to distribute influence and property unequally? For his or her own gain in the beginning, certainly, but still. The true crime of the hacker is perhaps that he or she has "cracked" human software, the social protocol that's been programmed into out minds since birth.

And the university hackers - without them, we wouldn't have any of the computer technology we have today. All new ideas of any worth have emerged at MIT, Stanford, or Berkeley, by kids who've worked passionately for minimal pay and under uncertain employment terms. And most of them haven't earned a dime of profit from their inventions. Instead, IBM, Microsoft, and the other giants have raked in the profits. And the hackers are not at all upset! They think that technology - information - should belong to everyone. They never had any commercial interests. They thought it was fun!

On the pinball games at the autonomous rave and anarchist club Wapiti in Lund, Sweden, the text OBEY AUTHORITY is sarcastically displayed on the kitschy LED screens. Man has assumed control of the machine.


1. And I'm damned if I know if I'll ever work on that project again.

2. Currently limited to electronic mail, but a telephone version is under development.


Chapter 17
A CYBERNETIC UTOPIA

In an ideological utopia, one can discern a decentralized community with the perfect technology for creating virtual reality, in which really only technology, communication, the legal system, and food production has to be state regulated. (Everything else can be synthesized in artificial reality). What the individual engages in in his or her virtual reality - like electronic dreams - should be protected from all governmental control. Perversions and aggressions can be realized without putting other people in danger. Therefore, it is suggested that people would become more harmonious creatures, with a mind free from the oppressive norms of society, finding their way back to the real values. (Whatever they may be). It's about disconnecting the individual consciousness from the collective consciousness - for better and for worse.

In such a cyber-utopia, the real reality and nature have lost their meaning, since you can experience an artificial one that's much better. In a cyber-utopia, people are driven by group fellowship to explore the world. Small interest groups can research their areas and communicate over the networks. All boring, dangerous and monotonous work is conducted by robots. "Humankind should concern itself with love, science, and art", to cite a famous Swedish rock band.

In a cyber-utopia, you can meet people all over the world and still be at home, physically speaking. Humanity is just a keystroke away. This utopia (like all others) naturally has obvious drawbacks, but this is the way it is. (Myself, I think it's horrible). For example, one could debate the wisdom of letting pedophiles, for example, live out their dreams in a virtual reality. Totally new political issues are raised in such a community: should we regulate people's actions, or is it - terrible thought - actually their thoughts that we want to regulate?

The cyberpunks want you to be able to think and enact anything without harming others, and technology might give us this possibility - but do we really want everyone to be able to realize their fantasies, even if it doesn't harm anyone? Several philosophers have pointed out the risk of living in a society without stable norms. Is the repression of thought necessary to protect humankind? Can technology aid us in finding those functions that connect our individual consciousnesses with the collective by giving us the opportunity to "disconnect"? Can today's outsiders find their way into society with the assistance of technology?

People who like monotonous work, who think that intellectual exercises are boring, or who would rather engage in sports or hunting, wouldn't have a place in a cybernetic society. On the other hand - if you had grown up in such a society - what's suggesting that you would put any value on such trivial matters? A lot of our current society would seem inhuman and despicable to a person originating in the 1700s.

And as for the artificial intelligence that has to exist in order to create this partially artificial world we already live in - does it have any rights? Do we really have the right to use artificial intelligences as slaves, as we currently use social hierarchies to make other people work for us? Machines are actually already part of the collective consciousness I call superindividuals - they're already thinking along with us. The information age focuses on these new ethical issues and forces us to consider them.

If you're frightened by cyberpunk and the information revolution, I'm afraid I'll have to say that they're not so easy to stop. What you can do is learning more and helping to control the development of society towards a desirable state. If you're passive, you leave decision making up to others. Begin by understanding that which you criticize, and only then can you start influencing things. Reprimands and threats have very little effect on my generation. If someone complains enough to bother us, we just switch the channel. (Zap!). Don't think that we're not interested in your views, however. We listen - if you know what you're talking about. The suggested literature section at the end of this book is a good start if you want to learn more.

One thing that radically distinguished the information revolution from the industrial revolution is that many people have been prepared and have had time to become learned in the ways of technology. The development of society is questioned in broad circles, and isn't left up to politicians and corporations. People in general, and especially young people, question and critique. Hackers, cyberpunks, ravers, and others are the most questioning - they want to be part of creating their own future, and refuse to passively meld into the pattern. They have optimism and a belief in the future, and they rush to meet it. This youth movement is sometimes referred to as the New Edge. These children of the information age don't see only threats, but possibilities.

I'm not a doomsayer, and this is not a dark book. As wise as I am, I've saved the most important point for last. There's been a lot of complaining lately. Many contemporary philosophers have suggested that humankind has locked itself into a pattern of progression, in which consumption has to constantly increase until people just can't consume anymore. This is probably true. We will consume more. Further, they think that this will lead to environmental decay and global segregation, which will eradicate all of humanity. This, however, probably isn't true. It's not true because those who speak in these pessimistic terms have been incapable of noticing a very important contemporary detail: the entrance of the information society. More precisely, the mistake has been to presume that a constantly increased level of consumption necessarily requires an increased consumption of natural resources. There is no such relationship in the information society. (I might add that I'm perhaps a little too optimistic in reference to the connection between information society and environmental concerns; environmental problems won't go away, but the continuing damage will decrease).

On the day I'm writing this, Microsoft's new operating system, Windows 95, has been released with much fanfare at the Globe in Stockholm. I have previously expressed my negative attitude toward this company. Still, it makes me happy to see that national media are reporting this massive marketing effort of a product that ten years ago no one could even imagine would be sold through galas at the Globe and on TV commercials. It would have been ridiculous. Windows 95 is software, a pure information product. Granted, you get some disks and a book when you buy the program, but those are not the actual product. It's perfectly possible to buy Windows 95 without the books or the disks if you buy a new computer where the program is pre-installed on the hard drive.

Thus, a product is being sold which, compared to a car, required almost no natural resources to produce, even though it cost thousands of hours of work to develop, and will cost billions of hours to consume. When I sit down with this software at home, wrestle with it, create with it and try to make it do my bidding - during this time, I'm not driving a car. I don't consume anything, save for a little electricity and maybe some coffee. I don't eat potato chips, because I don't want the computer to get greasy. (Translator's note: Habits vary. I drink beer, smoke cigarettes, and eat pizza in front of my computer. The main difference is that I probably have to switch keyboards more often.) I don't buy a lot of useless items from the shopping channels on TV that I later just throw away. I basically consume nothing but information. Not even a book is more environmentally friendly. The same phenomenon occurs in most of the rest of the information society - TV: an electronically transmitted product with low demands on natural resources, Multimedia: also primarily an information product, Telephony: an electrical signal from one place to another. Using virtual reality, we can even consume everything we usually do, offroad a four-wheel Jeep, and pilot a spaceship, with no notable wear on nature. There is hope. There is a hell of a lot of hope, even though it's combined with new dangers.

You can note that many of today's products satisfy artificial needs. You could ask whether we ever needed an operating system like Windows 95. Probably not. In a few years, however, we do. This is really not that important - more needs than we think are ultimately artificial. It's sort of like a premise for a market economy. Your mind reels at the thought of security companies that hire a team of hackers to build security systems for their customers, and then, at night, make sure that the same hackers "maintain market image". Or virus hackers that work half the time on creating virus killing software, and the other half on creating new viruses to create demand for the antivirus tools. Wouldn't you? Of course you would. So what? The gears are spinning, GNP goes up, everyone's happy. In the same way, we've created a dependency on criminal activity, administrative tasks, etc. to no end in this society. There are many such processes, whose only purpose is self-perpetuation and self-justification. Does it matter? No, probably not. It depends on whether or not you think humanity has a "purpose"; whether there is something we should strive towards. But that's philosophy.

We have moved from material bartering, with merchandise for merchandise, to an economy in which we trade money for goods and goods for money. Now, we're starting an infonomy, trading information for information without intermediary material transactions. The danger that still lurks behind the scenes of our system is a desire for power, in individuals at all levels: corporations, governments, and organizations. They're after power over you. Make sure you don't give up any of your freedom without first knowing what you get in exchange.

I've reached the slightly shocking conclusion that the mechanisms I previously identified as superindividuals, i. e. superior intelligent entities, have no need to produce material products or artifacts in order to control other intelligent entities. Instead, they simply employ exchanges of symbolic information, chunks of info transmitted through cables. Every such superindividual is characterized by the creation of internal chinks of information, secret documents, transmitted inside the individual outside the reach of the public or other superindividuals. That's why corporations, governments, and other organizations are paranoid about someone else reading their secrets, whether important or not. With information technology, the possibility of creating such structures is amplified by a factor of hundreds, and the exchange of information, the thoughts of the superindividual, its intelligence, is expanding at the speed of light. I've also discovered that the information-processing machines are part of these superindividuals, not some accessory of people to assist in their work. Somewhere around this point is where you have to start thinking for yourself.

If you have read this book on a computer, without printing it out on paper, you've consumed something. Or have you? Do I have to charge for this book before it can be called consumption? I'll leave that as an open question. I've certainly not made a dime from you reading this book, but maybe I've accomplished something that can't be measured in terms of money - maybe I've taught you to question the mechanisms of power. (Hmm… if this book ever goes into print, I'll have to modify the above paragraph).

Let me finish with a timeless quote, from a man who belonged at the frontline of his generation:

    "Come mothers and fathers throughout the land
    and don't criticize what ya can't understand
    your sons and your daughters are beyond your command
    your old road is rapidly aging
    please get out of the new one if ya can't lend your hand
    for the times they are a-changin'"

    
Bob Dylan, September 1963.

We are all part of the inevitable.

Linus Walleij
, Lund, Sweden, September 5, 1995.
Binary sculptor, harmless hobby hacker.

Translation by Daniel Arnrup, Bergen, Norway, October 30, 1999.

Thanks to: The libraries of Ljungby and Svalöv, the university libraries of Lund and Linköping, Microbus i Ljungby AB, Gunnar Kålbäck, Christian Lüddeckens, Motley, Tranziie, Mikael Jägerbrand, Ulf Härnhammar, Marie Fredriksson, Christer Sturmark, Hans Roos, Erica Larsson, Daniel Hellsson, Jucke, Chorus, Stellan Andersson, Anders Hellquist, Anders R Olsson, Jesper Jansson, David Malmborg, Daniel Näslund, Mikael Winterkvist, Per Jacobsson, Fredrik Schön and all the members of the Triad and Fairlight hacking groups, without whose help this wouldn't have been possible. Now I'm gonna sit down and finish my cyberpunk novel. Maybe.

And I refuse to say whether the Dylan quote above was meant seriously or ironically.

Literature:
Scientific literature tends to consist of 70% of cross-references to other works and other authors, which makes the whole thing difficult and slow to read for an uninitiated reader. This is not a scientific text. Possibly, it's popular science. Most of this text is written on the fly, based on my own experience and knowledge. For those who would like to read more, I'm listing a few books, publications, and such which have served as a factual basis for the book.

Barlow, John Perry:Selling Wine Without Bottles

An article published in Wired about information and "intellectual property". So initiating and well considered that I've referred to it as a "paradigm".

Burroughs, William Seward: The Naked Lunch

Burroughs' breakthrough, unfortunately not as articulate a social critique as the subsequent Nova Express. Counted as a milepost within the literary tradition of cut-up.

Burroughs, William Seward: Nova Express

Run for your lives! The Nova Mafia has sent agents to the Earth to enslave human thought patterns through language, drugs and sex. Luckily, the Nova Police have sent out counteragents, including Burroughs himself, to stop the invasion. In this cut-up sci-fi novel, Burroughs develops the ideas form The Naked Lunch to an astronomical perspective. By affording the reader a solid sense of paranoia, he makes you question your surrounding reality. There's also a hint of ironic humor underneath it all.

Cornwall, Hugo: Datatheft

Heinemann Professional Publishing Ltd, England, 1987.
ISBN 0-7493-0217-8

One of the most in-depth books ever written about computer security. Cornwall brings up many common security flaws in computers and security systems in a general and broad perspective. Hackers are only mentioned occasionally, and the book is heavy and rather strictly scientific.

Cornwall, Hugo: Hacker's Handbook III

This is a handbook for network hackers. Nobody's learned to be a hacker by reading this book, but despite this it's quite interesting, and a given best-seller among people who think that the network hacking thing is the coolest thing around (i. e., wannabes). Additionally, the title seems "forbidden". However, it is a well-written book that points out the most common security holes in certain systems.

Datormagazin

Yearly issues 1986-94

Dick, Philip K.: Do Androids Dream of Electric Sheep?

Forrester, Tom & Morrison, Perry: Computer Ethics

Basil Blackwell Ltd, England, 1990
ISBN 0-631-17242-4

One of the most interesting books written about computers and computing society. Many examples are based on English conditions, and uninteresting for Swedish readers. The purely ethical issues around hacking, artificial intelligence, databases etc. are fascinatingly treated.

Gibson, William: Neuromancer

Harper Collins Science Fiction & Fantasy, 1993
ISBN 0-586-06645-4

If you're going to read any cyberpunk literature at all, read this one. It's a classic which defines the literary term of cyberpunk.

Green, Jesper 69 & Johansson, Sune: Cyberworld

Alfabeta Bokförlag AB 1994
ISBN 91-7712-389-1

Many reviewers trashed this book when it came out. In some respects it was deserving of this, in others, not. All examples from the book are drawn from a Danish perspective, which may make it less interesting. On the other hand, the delusional predictions of the future of the cyberpunk author, Green, is something not to miss. There are many quotes from the Danish network hacker, Netrunner, and the Kraftwerk member Ralf Hütter, which elevate the book.

Hafner, Katie & Markoff, John: Cyberpunk - Outlaws and Hackers on the Computer Frontier

Corgi Books, England 1994
ISBN 0-552-13963-7

This book contains biographies of the most famous network hackers: Kevin Mitnick, Pengo, and Robert Tappan Morris. It's written in a typically American fashion, with many irrelevant details, and has the advantage of being relatively easy to read. You get a good view of the hacker's life and mind.

Harry, M: The Computer Underground

Loompanics Unlimited, Port Townsend 1985
ISBN 0-915179-31-8

One of the first books about underground computer culture. Loompanics is one of those publishers that print just about anything and doesn't censor content for being politically incorrect. Among other things, they have wide range of Timothy Leary's books.

Hofstadter, Douglas R: Gödel, Escher, Bach: An Eternal Golden Braid

Timeless classic and cult book among all computer science students. A thick, heavy book which explains why math is fun, and why the innermost essence of intelligence can be captured in a machine. To top it off, it's written with a good dose of distance and humor, with simple, easy-to-understand examples. People who have recently read the book for the first time often speak of it in an almost religious manner.

Illegal (edited by Jeff Smart)

"22 - "37
Germany, 1987-89

Probably the only significant European cracking zine. It's from this zine that cracking culture spread across Europe, primarily Germany, and then to the rest of the world, and it possibly for the first time defined the concept of "elite" among European home computer enthusiasts.

In Medias Res (edited by Zike), #1

Eskilstuna, Sweden, 1992

One of those surprisingly well done and thorough little zines which many refer to, but was never printed in a large run. And it's not in the national archives, either. But I have a copy…

Kuhn, Thomas S: The Structure of Scientific Revolutions

Phoenix Books, USA1962

Kurzweil, Raymond: The Age of Intelligent Machines

This is an anthology of thoughts around artificial intelligence. If you want to know what AI is, and consider social and philosophical problems, then read this book. If you want to know how AI works, then read Hofstadter's Gödel Escher Bach: An Eternal Golden Braid (see above) instead. Hofstadter and Sherry Turkle are also contributing writers in this book.

Landreth, Bill: Out of the Inner Circle

This is a classic among network hackers. It's written by a renegade from the Inner Circle hacking group, and it's pretty well-done. It has, however, lost some of its immediacy.

Leary, Timothy: Flashbacks - A Personal and Cultural History of an Era

Tarcher / Putnam Books, New York 1990
ISBN 0-87477-497-7

Tells of large parts of 60's hippie history that has later been covered up or stigmatized. Leary was feeling pretty good about life and society and himself when he wrote this self-biography, and you get the impression that he is an incurable optimist. He is a man of the arts, and well-read… obviously a dangerous enemy to his opponents. Leary died in 1996, and ironically, the Harvard LSD experiments that started his career have been resumed.

Levy, Steven: Hackers - Heroes of the Computer Revolution

Penguin books, England 1994 (first printed 1984)
ISBN 0-14-023269-9

This is the best book ever written about hackers. It concerns the first hackers at MIT in the 60's, the home computer builder of the Altair, and the programmers at the Sierra On-Line gaming company. The first two parts are the most interesting. Read it.

Nietzsche, Friedrich: Thus Spake Zarathustra

It takes some courage to read Nietzsche. If you expect to find a fascistic manifesto, you're reading in vain. Those who can't get around Nietzsche's thinking will think that the book is "strange", and won't understand what Zarathustra is talking about. Zarathustra was a Persian philosopher, and Nietzsche resurrects him in this book to "revise" the earlier teachings of good and evil.

Petiska, Eduard: Golem


Martin publishing house, 1991
ISBN 80-900129-2-2

This is the myth of Rabbi Löw's Golem, created to protect the Jewish ghetto in Prague. I read it as part of the research on the section about artificial intelligence, and it doesn't have very much to do with the information society.

Pondsmith, Mike (ed.): Cyberpunk - The Roleplaying Game of the Dark Future (Version 2.0.2.0)

R. Talsorian Games Incorporated, California 1993
ISBN 0-937-279-13-7

If you're not used to reading role-playing games, this book will probably confuse you. Role-playing game books contain little or no fictional material. At first glance it looks like an encyclopaedia full of facts - except everything is made-up. A role-playing game book contains descriptions of organizations, people, machines, weapons, and everything between Heaven and Earth to assist the players' imaginations. When you've read the book, the idea is to get together and develop the story using the book as a reference for the world. The result is something like a mix of authoring, theater, and boardgames.

Rubin, Jerry: Do It!

An instruction manual on how to become a yippie. A very sociopathic book by one of the leaders of the American yippie movement. On the cover page it says "Read this book high", and that's about as good as it gets. If your tastes are a bit morbid, you could see it as humor. Otherwise it's just plain horrible.

Shea, Robert & Wilson, Robert Anton: Illuminatus!

Consists of three novels: The Eye in the Pyramid, The Golden Apple and Leviathan.
Dell Publishing, New York 1988 (1975)
ISBN 0-440-53981-1

This book is mentioned in several places of my text, among others in connection with the hacker Karl Koch and the techno band KLF. It's also recommended as a suitable read for hackers at the end of The Jargon File (see below). The books are conspiracy theories about ourselves and our society, primarily inspired by William S. Burroughs and Timothy Leary. They're cult books in the US as well as Canada and the UK, and there's no good reason why they haven't been translated into Swedish. Actually, there's one: they're painfully politically incorrect. The narrative technique of these novels has been adopted by Douglas Adams, among others.

Sterling, Bruce: The Hacker Crackdown

Bantam Books, USA 1992
ISBN 0-553-08058-1

A book about hackers written by a complete outsider. Sterling normally writes cyberpunk novels. The book is available at no charge as a text file on the Internet via EFF. The most exciting and creative chapters are those about the American Secret Service and their fight against hacking and phreaking, and the story of how EFF was created.

Stoll, Clifford: The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

A much-discussed book in which Stoll, with passion, recounts how he traced the hacker (Mattias Hess) who broke into his computer system and used it as a springboard to search for military secrets for the Warsaw Pact (the Russians, Reds or whatever you want to call them).

Turkle, Sherry: The Second Self: Computers and the Human Spirit

Sherry touches upon sociological and psychological aspects of the interplay between humans and computers. She interviews children and hackers as well as computer scientists, and draws conclusions about the computer community from a sociological standpoint. Towards the end of the book she also ventures into artificial intelligence.

Yourgrau, Palle: The Disappearance of Time - Kurt Gödel and the Idealistic Tradition in Philosophy

Cambridge university press 1991
ISBN 0-521-41012-6

 

Electronic Documents and Magazines:

40hex
# 1-12

Phalcon / SKISM

Pretty well-written, treats most things related to virus manufacture and virus culture.

Bausson, Stephane: What You Need to Know About Electronic Telecards

V. 1.12. Last Revised 05/18/95

Described the inner workings of Telia's phone cards. Very embarrassing for Telia, since they thought this information was secret when I called and asked them. It's not.

Brent, Doug: Oral knowledge, Typographic knowledge, Electronic knowledge: Speculations on the history of ownership

(Article in EJournal #3 Vol 1, ISSN 1054-1055)

This is a very important article which I used as a basis for the section on cybernetic society vs. copyright. Brent is active at Calgary university, and shows with all clarity why it's more difficult to own information in an information society.

Drummond, Bill & Cauty, Jimmy: The Manual - How to Have a Number One the Easy Way

KLF Communications 1988

In case you were wondering: it works. Everything in this book is completely true. Among those who have tried Drummond and Cauty's recipes for hit singles, we find the Austrian group Edelweis plus a hundred or so other artists who don't dare reveal that they've just followed the instructions in this book. Even Swedish talents like Denniz Pop or Pat Reiniz have, consciously or subconsciously, managed to follow this manual point for point. If you want to know how it's done, read this book. You need a certain distance to be able to grasp the contents - it's a thorn in the side to the entire pop industry. Copies of this book, and bootlegs of the same, are circulated under much hush-hush among the amateurs of the music world. This is unnecessary, since someone's "liberated" the text and put it on the Internet. KLF themselves presumably don't care one whit about this.

Gunzenbomz Pyro-Technologies / Chaos Industries: The Terrorists Handbook

Probably one or more printed books from the beginning. This very text file created a great deal of press attention when a couple of 15-year-olds got it off a BBS and showed it to Expressen (a Swedish daily). Too bad Expressen didn't review the book, because it has some comic value. I can't judge how useful or dangerous the descriptions in the book are, but it's obvious that you have to be a little crazy to even attempt to use the bomb recipes. And that's the problem: many parents apparently think that their 15-year-old sons are completely mad.

Jammer, the & Jack the Ripper (pseud.): The Official Phreaker's Manual V1.1

Last revised in 1987

Describes most of the technique and history of phreaking. Contains, among other things, the articles written by Ron Rosenbaum about the phreakers John draper (Cap'n Crunch) and Joe Engrassia in Esquire in 1971.

Raymond, Eric S: The Jargon File 3.2.0

Last revised on 03/21/95

This is the same as The Hacker's Dictionary, only free an in electronic form. Unfortunately, the text gives a somewhat disparaging view of anyone who is not a "real" hacker, i.e. the intellectual elite at universities like MIT. This file is regularly updates, and attempts to include international hacker culture, which it hasn't been terribly successful with so far. The content is heavily adapted to American phenomena.

Reid, Elizabeth: Cultural Forms in Text-Based Realities

Cultural studies program ,Department of English, University of Melbourne, January 1994

Brotherhood of Warez # 1-4

One of the most entertaining phreaker publications, it is published by the Brotherhood of Warez (BoW) group. It's a constant mix of humor and seriousness, where it's hard to discern real statements from sarcastic lies written by bored pirates. If you like Generation X-humor, you'll probably like BoW. The leader of the group, U4EA, was sentenced to jail after driving the Gray Areas magazine crazy withrage. (I think - it could have been a sarcastic lie).

Phrack #1-48

Infamous hacker/phreaker magazine which plays a large role in Bruce Sterling's The Hacker Crackdown (see above). Offers sensible as well as really sick opinions of the world and telephony. Has had a string of editors throughout the years. The article The Conscience of a Hacker in issue #7 is especially important. I've written an article about Swedish hackers that was published in issue #48 of this publication.

Skyhigh # 17

Camelot Productions 1995

An interesting article by The Mistress/Angry regarding women and hackers.

Surfpunk # 103 and 105

Cyberpunk magazine, full of excerpts from Usenet newsgroups and various publications. Behind the paper is a more militant group than the EFF, but with similar views on society. They distribute heavily cyber-slanted opinions.

Swedish Hackers Association (SHA) (ed.): Annual Year Protocol #3 & #4

Our favorite hackers' own paper, SHA's insolent and somewhat arrogant "protocol" is a refreshing breeze compared to the government's and the media's condemning attitude towards the group. In these protocols, the SHA account for their activities, and why and how they do what they do. Guest writers include Knight Lightning from Legion of Doom, who was also one of the men behind Phrack (see above). The English is of mixed quality - it is obvious that Swedes wrote these "protocols". It's a required read for anyone who wants to know what both sides have to say about the issues.

All electronic documents are available from me directly, if not elsewhere.


Appendix
White Knight vs Otto Sync

On September 2, 1992, 25-year old Otto Sync (ficticious name) was arrested and charged with unauthorized use of the Datapak computer network. The infractions had taken place during November 1992, at the expense of Televerket. At the time, Televerket was a state-owned company with a monopoly on telecommunications in Sweden. The person who traced and ordered the arrest of Otto was Televerket's own "white knight" Pege Gustafsson, a zealous 38-year old security expert climbing the career ladder.

From December 1991 to February 1993, Otto was doing non-combat service in the French army, "Volontaire Service National en Enterprises", as an engineer working with PLC (computerized process controllers) at a French telecommunications company in Flen, Sweden. After having passed rigorous military tests, and with the help of a master's degree in engineering with credits in applied mathematics and computer science, he was offered the opportunity to perform his civil service in the French company's Swedish branch.

Being a lonely young Frenchman in Flen wasn't much fun; Otto tells us that the town was full of political refugees and the public mood wasn't the best -- the Swedish youths in Flen kept to themselves and saw him as yet another immigrant, and none of the other immigrants were French, but rather Iraquis, Kurds, Somalians and so forth. Additionally, Otto was unfamiliar with a small-town environment, as he had come straight from Lyon -- "Imagine my surprise when I arrived there alone mid December 1991... I've only lived in big cities before, and there is this place, without any bars, pubs or computer shops"(1) . As a result Otto spent most of his time alone in his apartment or in company office. "Flen is so boring I practically lived in the office building -- what else can you do there apart from hacking really?", as he says.

For the above reasons, Otto spent his time engaging in his favorite hobby: hacking. Otto was already a skilled hacker when he arrived in Flen, and as time passed he became even better. He became a regular at Swedens best hacker-BBS at the time: Synchron City. He explored every system he could reach: Televerket's public phone network, AT&T, Internet, and so on. However, none of this is very exciting to an experienced hacker in the long run: the phone network is very easy to trick, and the Internet was mostly full of regular people. Real hackers went for BBS:es on the X.25 network. As Otto wished to stay in touch with his hacker friends, he wanted to access the biggest hacker conference system at the time - QSD . QSD was only accessible through the international X.25 network. In trying to access QSD, he made a fatal mistake: exploring Televerket's Datapak network.

X.25 and Datapak

Datapak is a network which is structurally reminiscent of the Internet -- a packet-switched network, where the users share a few dedicated lines, and pay charges based on the amount of data transmitted on those lines (i.e., per packet). In general, it works in such a way that, using a modem, you call up Datapak through a so-called PAD connected to a 020-number (Swedish 800-number), then dial a number to a computer permanently connected to Datapak. All computers on the Datapak network have datapak numbers in the same way that phones in the public network have phone numbers.

Of course you can also connect straight through Datapak in case you can afford a permanent connection for your computer, a method primarily used by large companies to connect their computer systems. That way, two computers can be permanently connected through Datapak (which would have been very expensive using regular modems) and thus you only have to pay charges for the information actually transmitted. Of course you can also connect through the computer network Datex, which is used by (among other things) ATMs, and it works like any other phone network, except that it's designed for computers.

Datapak is built around the X.25 standard , which describes how computers in the network are to "talk" to each other. Besides X.25, there are many other standards on the network, such as X.28 and X.75 , but as X.25 is the most common standard, the kind of network that Datapak belongs to is generally called an "X.25 network". The international X.25 network is thus made up of a number of interconnected computer networks, e g Datapak, Tymnet (which also manufactured the equipment used in the Swedish Datapak network), SPRINTnet, and so forth. Almost every big phone company in the industrialized world has their own X.25 network.

The international X.25 network has been running since the mid- and late 80's, but the Swedish Datpak network has never been very big. The reason for this is that X.25 was not targeted by the consumer market; X.25 is, as opposed to the common telephone networks, not designed for individuals. X.25 was from the beginning a network for corporations. The large consumer market that was conquered by the academic Internet system, which is based on multiple service providers and competition (as opposed to the X.25 market, which consists of oligopolies and only a few providers), is so fundamentally different that X.25 does not have a chance in this respect. X.25 is today mainly used for establishing logical links between private networks. X.25 is even used for some Internet links.

So, what Otto Sync didn't know, or didn't think of, when he ordered his Datapak subscription, was that Datapak was a small system in a small country, and that a person who tried to manipulate it would immediately be detected by the monitoring systems. The public phone network is quite safe to explore because of all the odd and random calls people make to strange places. A few cases of manipulation instantly disappear in the vast amount of calls, but Datapak was the backyard of a few subscribers. To enter the system was equal to walking around wearing emergency flashers on your head -- your presence was not very discreet. When Otto began scanning Datapak numbers, he finally drew Televerket's attention.

It is worth mentioning that Televerket had increased the monitoring of the Datapak network due to an enormous attack by the British hacker group 8LGM (8-Legged Groovin' Machine, a name taken from an 80's pop group) who had scanned 22,000 datapak number entries and accessed 380 computers all over the country about two years earlier.(2) Otto describes them as "a group of top-notch hackers who released 'exploits' advisories between 1991 and 1994". (Exploits are ready-to-use scripts that were used to get higher privileges, usually root-access, on Unix systems.) A consequence of 8LGM's scans was that all activity on Datapak was now logged and analyzed.

Otto didn't subscribe to Datapak in order to use it -- as a matter of fact, he only subscribed in order to access the technical documentation given to every subscriber, so he could find out how the system worked. That way he learned that you connected to Datapak by dialing 020-910037 and submit your network user identity (NUI). After this you could call as much as you pleased using Datapak, and be charged per sent/recieved information packet at the end of the month . In the Datapak network the NUI is used for customer identification, as opposed to the common phone network where you are identified by your own wall socket and phone number.

But the Datapak manual from Televerket also contained some other interesting things, e. g. this example from page 4:

To connect with a user number, call 020-910037 using a modem. When the modem has answered, you write three dots followed by carriage return: ...<CR> (CR = carriage return, enter). Then write: N123456XYZ123-024037131270<CR>. N tells the computer that user identity and password follow, 123456 is the user number you got when you signed up for the subscription, XYZ123 is your secret password, and the figures after the dash is the host computer adress. (i. e., the computer you want to connect to.)

Further on in the manual, it illustrates how user 123456 changes password from BERTIL to CAESAR. User identity (NUI) 123456 is clearly used as an example.

When Otto considered different ways of accessing Datapak, he came up with the idea of writing a so-called "scanner", which would test different combinations of usernames and passwords.

Scanning is a technique originally developed for the public phone network, and works by systematically calling every possible number in some order, e g 111111, 111112, 111113 and so forth until you get an answer. When a computer answers the call, you make a note of the number and move on to the next. Afterwards you can pick systems from this list of accessible computers and see if you can hack them. Of course you don't do scanning by hand. Just like in the movie War Games, you write a program to test all numbers one by one. Scanning in itself is not illegal -- part of the point of having a telephone is that you have the right to place as many calls as you like, to whomever you like.

Otto's scanner was a bit different. It was not supposed to call any numbers, just scan for user identities and passwords that granted access to the Datapak PAD. Usually a X.25-PAD will only allow you three tries to enter username and password before the line is disconnected, but Otto found out that by connecting to the Datapak password-database you could try three passwords at a time without having the line disconnected. Otto's scanner was a computer program that could test three passwords at a time, get thrown out of the database (without being disconnected from the PAD), reconnect to the database, test three more passwords and so forth. To disconnect / reconnect the phone line would take a lot of time and result in a slow scan, but with the scanner using the password database it was lightning-fast!

When Otto wrote his scanner he needed some number to test the program. By pure chance he entered the obviously stupid combination of user identity 123456 and password 654321, and it worked! (Does anybody besides me come to think of the movie "Spaceballs"? -- only an idiot would use that code on his suitcase.)

User identity 123456 was one of Televerkets own lines, a test line which purpose is yet unknown. It is perfectly possible that user 123456 was simply "left over" by mistake by Televerket.

Otto began using identity 123456 for regular calls to the conference system QSD, which functionally resembles the now very popular IRC, Internet Relay Chat. Apart from the conferences there are also mailboxes for the users. Among the most frequent participants were, for example, SCSI, who has hacked into every X.25 network in the entire world (no overstatement), Sentinel from ex-Yugoslavia, the female hacker Venix from Greece, Seven Up, the sysop at SECTEC (Sector Tectonics, another X.25-bulletin board), and Raol from Italy -- the master of VAX-hacking who was recently arrested for computer intrusion at the Bank of Italia.

This chatting kept going until he, on the night of the 7th of November, was called (on the chat system QSD) by another hacker from Sweden.

The "White Knight "

The hacker that called Otto named himself White Night. The duality of the name is a conscious misspelling of the kind that hackers love. The first conversation between Otto Sync and White Night went thus:(3)

White Night : Hi! Hej! [Hej is Swedish for Hi]
Otto Sync : Hi! Hej! Sorry I'm not Swedish I'm French. Calling from Flen, a #$&% city 120 km from Stockholm.
WN : I see. What are you doing there?
OS : Working as an automation engineer at a French company. And you?
WN : I'm working at Volvo.
OS : Where? I worked at their factory in Olofström some months ago.
WN : DA-verken in Göteborg. [Gothenburg]

Then they began talking tecnicalities, as all hackers do. Otto asks White Night how he manages to handle Swedish characters and they discuss the pros and cons of different terminal programs. White Night then turns the discussion to how he has managed to call QSD -- "Do you know how much it costs?". Otto suggests that they should swap "outdials" -- access codes to computers on public access networks such as Internet, with connected modems allowing you to dial out for free from that computer by accessing it's modem. He also tells the stranger that he often calls Synchron City, and that a lot of "H/P/A" (Hacking, Phreaking, Anarchy -- perfectly legal textfiles describing hacking techniques) can be found there. Strangely, White Night has never heard of Synchron City, and is immediately curious.

For some weeks Otto calls QSD on a regular basis. So on the night of November 29th, the white knight appears again, but he doesn't recognize Otto, as Otto is using another alias this time. Otto has already forgotten about White Night and doesn't recognize him either when he is called. However he can see that White Night is also using identity 123456, and gets a bit suspicious, as he has revealed that identity only to a single other hacker, which we will call Phred. A bit hesitatingly, he starts chatting with the stranger:

WN : Hi.
OS : Phred?
WN : No, but I know him!
OS : I guess so... I know you?
WN : Fun, do I know U?
OS : Maybe, I'm usually Otto Sync here...
WN : Hi Otto, hm hm hm.
OS : Hey, could you tell me who you are... cool!
WN : U speak Swedish?
OS : Very badly. But can't you tell me who u are??? As for me, I'm the one who found the NUI you're using.
WN : Why do U think I use the NUI "you" found?
OS : You can ask Phred if you don't believe me.
WN : Why should I ask Phred?
OS : Because he was the first one to whom I gave the NUI. We talk voice sometimes.
WN : What NUI?
OS : The very obvious one with the very obvious password. And the second one that I see on QSD.
WN : Wow, I haven't spoken to Phred 4 a long time!

The misunderstandings between Otto Sync and White Night is of course due to the fact that White Night is not a hacker. As a matter of fact, he is using Televerket's test line, 123456, from inside Televerket. When Otto claims that he found it, White Night first gets a bit sulky, but then realizes he has to play the game:

OS : The previous [NUI I used] was 159800. Are you from Sweden by the way?
WN : Sweden what.
OS : Just wondering... If you don't want to chat, then why go on QSD?
WN : Of course I want 2 chat. I'm Swede! R U?
OS : Nope I'm French. But I like Televerket, except when they send me bills :)
WN : Do they? Why?
OS : I asked for a NUI some weeks ago to get the technical doc about the PAD... But I won't pay!

When Otto has made these statements, White Night disconnects the line and picks up the papers with the print-out of the conversation from the printer. These papers, most of which contents are cited above, are then used as part of the evidence in the trial against Otto Sync at the Katrineholm Court of Law.

What Otto didn't know when this conversation took place, was that Televerket was busy tracing him. From November 28th to December 1st, the day before the arrest, Televerket registered all telephone traffic from Ottos office at the French telecom company. In order to do this, they had taken some extraordinary measures.

Flen's telephone station was at that time not equipped with the new electronic switching system AXE (Automatic Cross-connection Equipment). Istead, an old electro-mechanical exchange was in use. (It has now been replaced.) If the telephone station had been equipped with AXE, the monitoring would have been a lot easier, since it would simply have been a matter of requesting information from Televerket's information system (IS), which can monitor a number automatically for unlimited time. Present-day Telia (a private corporation which has replaced Televerket after deregulation) even investigated the possibility of having computers examine all calls automatically in order to classify which subscribers that showed "fraudulent patterns" -- but these investigations didn't bear fruit .

When Televerket, under the command of Pege Gustafsson, had traced the "fraudulent" calls to the Datapak number 020-910037, they found that they came from a group number belonging to the company Otto worked for. A group number works by letting a company with an internal exchange connecting some number of telephones, say 500, share a suitably large number of outgoing lines (perhaps 10--20 of them) so that they can minimize the subscription charges. By tracing the group number, nothing was proven, as anyone at the company could have called using the group number. The calls could not be tied to a physical person, which is the kind of evidence required for this type of case.

To make further tracing possible, Telverket installed a reader on the exchange of the company Otto worked for(4) . With the reader, every outgoing call from any extension at the company was registered and printed. This list could then be compared by corresponding list for connections to the Datapak PAD at 020-910037. In this manner, Televerket's technicians found that Otto had called for 41 hours and 20 minutes through Datapak during the week the tracing was carried out, and during that time transmitted information packets for about 4000 Swedish crowns' worth [roughly $570]. (You can call this the total "postage fee" for the information packets.) The low cost thus depended upon the fact that you only pay for the data actually transmitted, not for online time, as in the case of common telephone calls.

All of this tracing was supervised by Pege Gustafsson.

A Night at the Hotel

Otto himself tells us what happened on the morning of December 2:

"They came to arrest me at work. Imagine the embarrassement. First I see these guys coming in my room and think 'oh shit, some more customers who want a demo on some product', but then they showed me their police ID and my heart stopped. They searched my office, took all notes and computer stuff. Then they took me out and had me open my apartment, and did a search there as well."

He was then brought to Katrineholm police station (the police authority closest to Flen) for interrogation. On his way there all sorts of thoughts ran through his head: "What to tell? I thought it was a BBS? I thought it was a free line? Reverse-charging?"

The interrogation begins without the representatives of Televerket as well as Otto's counsel present, but as Otto doesn't understand all the Swedish words (though he knew some, as the company sent him to evening Swedish language classes), the interrogation is postponed until a French interpreter arrives.

When the interpreter arrives, Otto asks for a counsel but agrees to continue the interrogation without the defense present. Neither does he find it necessary to talk to the French embassy. He tells the interrogators that he is in non-combat military service duty at the company in Flen, and that he has considered working for them even after the service is finished. The police and Otto simply get to know each other.

At 14.25 Otto experiences the luckiest moment of his life so far. That is when his counsel arrives, and who by a remarkable coincidence happens to be an extremely professional lawyer with his own firm, who thought the hacker case looked interesting at first glance, and thus took upon himself to defend Otto. This lawyer primarily deals in industrial corporate disputes. Otto tells us about his lawyer that "he was a real pro (I know, as this was the third time I went to court), a very nice man, well educated, and interested in French wines".

The remainder of the interrogation session mostly consists of technical discussions between Pege and Otto Sync. The other people present soon have trouble understanding what is being said. Otto claims that he has been searching for a "reverse charge" number (the X.25 counterpart to a 800-number which are actually quite common) and that he thought NUI 123456 that he got from Televerket's manual to be a "test line" of some kind. He says he is very curious and that is his reason for exploring Televerket's systems. Pege Gustafsson produces his printouts from the chat sessions where he acts as White Night, and confronts Otto with parts of these printouts (the same that are partly reproduced above). Otto, who for the first time gets to know who White Night actually is, reminds the others that anyone can have used his alias on QSD. Pege asks if he has passed around the NUI 123456 to others. "No", he answers.

Today Otto tells us that "Pege tried to have me say that I knew what I was doing and that I hacked the NUI etc. All the way I denied it and said I thought it was public line to be used in reverse-charging mode, and kept that line all the way. Of course Pege could see it was bullshit, he knew pretty well what I was up to. And he was right."

When the interrogation ended at 6 p.m. he was brought to a cell, as it was too late to go to court that day. Otto was instantly impressed by the Swedish custody standard: "In France it's dirty, you get to sleep with drunkards, no food, rough treatment etc. In Katrineholm it was like being at a hotel, I had my own little bed in a neat room. In the morning I was given a breakfast as good as the ones you get on planes -- fantastic! Slept really well there."

The next day he was brought to Katrineholm court, which decided not to keep him in custody. Instead he was given a travel ban, which meant he had to leave his passport and had to report to the Flen police office before noon every day until the start of the trial.

"Dangerous International Terrorist"

What initiated the chain of events that culminated in Televerket finding Otto Sync was the scanning of the Datapak PAD. When Pege found out that someone was scanning the Datapak PAD for user identities, he must have been shocked. This was exactly the thing that had happened two years earlier, and that time they had suspected that this was an act of international terrorism. In reality it proved to be the brothers Pad and Gandalf from 8LGM, two perfectly normal, curious hackers without any connection to international terrorists whatsoever.

As all other computer security officials in Sweden, Pege Gustafsson had read the book The Cuckoo's Egg by Clifford Stoll. In the book Stoll describes how he, using imagination and endless nights of unpaid work, managed to trace a hacker that had entered his system at Berkeley and started searching for military secrets throughout the American part of Internet. The hacker doing this was on mission from the KGB, receiving instructions through the circle around hackers like Pengo and Hagbard in West Berlin -- a bunch of freaked-out, coke-snorting, fuzzy leftist hackers who probably never caused any serious harm. Those last facts are never mentioned in the book, but it is closer to the truth than the image of international computer spies that Stoll conjures up.

So as Otto started scanning the Swedish Datapak network, Pege hit the sirens. The incident was probably associated with other, similar incidents, and was therefore interpreted not as the sum total of some small hacking adventures using simple scanners, but as a systematic pattern of intrusion attempts by some foreign power. Simply pure paranoia.

After closing a ring round Otto in Flen and after conducting a series of tracings, there was also "confirmation" of the suspicions: Otto made several calls to Thailand -- which were interpreted as communications with his mission providers, which could be anyone ranging from the KGB to the IRA. Actually, these calls were made to a long-time friend, and he had the company's permission in calling Thailand every now and then. Every hacker gets to know lots of people around the planet, as the "global village" is their home district.

So what the police and Televerket expected to find, as they turned up at Otto's office on the 2nd of December 1992, was a dangerous international terrorist. They found a 25-year-old socially maladjusted, and bored engineer, who had been amusing himself by exploring the Swedish Datapak network for the lack of anything better to do. Otto describes the situation as \"Pege thought he was the good guy trying to catch the bad guy. He told me himself that he was a fan of Clifford Stoll and that he met him at some security conference some years ago." During the interrogation with Otto, Pege drew maps showing which countries Otto's X.25-connections had accessed -- maps that according to Otto himself looked like "maps from your average international terrorist handbook".

Even though this was clearly stated in the following investigation -- which didn't even mention the suspicion of espionage -- these suspicions about Otto stuck to him long after he left Sweden. When the computer programs that were to control starting lists, time measures and result lists during the Olympic Games in Lillehammer 1994 were stolen from a military storage in the autumn of 1993, the Norweigan police (for some reason) believed that Otto was involved. Expressen (a major Swedish evening paper) called him "the hacker leader", and took the opportunity to draw suspicions to Otto as well as to the company he had worked for in Flen. In between the lines, they hinted that this was a way in which the French military sent spies to Sweden(5) . Personally, he tells us that "I was in Thailand, and at that time didn't have job nor a computer." Thailand is quite far away from Lillehammer.

He is also backed up by SÄPO (Swedish counter-espionage) who through director Jörgen Almblad said that the French volunteer workers in Sweden in general, and Otto Sync in particular, did not pose a security risk. "If they are Frenchmen or Russians doesn't matter, as far as being security risks" he told Expressen. SÄPO are ultimately responsible for the national security and should be well-informed. If they publicly deny any suspicions, you can be certain that they are telling the truth. If they had even the slightest suspicions, they would rather not comment. So much for that terrorist.

Even Pege himself realized that Otto was not what he first thought him to be. In private he told Otto, that if he had known what a small-timer he actually was, he wouldn't have carried the case this far. He even "said he'd like to have a beer with me when all this was over." Today, Otto is doubtful about Pege's competence as a security officer: "I remember he told me he was involved in concerts security as well (rock concerts). Although he was the security officer there, he didn't know too much about Unix security or hacking techniques. In fact he seemed to be ignorant of some basic things about Datapak such as reverse-charging".

Good versus Evil

It appears as though Pege was carried away by the idea of defending Sweden from imaginary terrorists. Just as American counter-espionage was completely disinterested in the practically harmless hacker hunted by Clifford Stoll, SÄPO was as disinterested in the equally harmless hacker hunted by Pege. Otto wasn't even looking for military secrets -- he was considered a threat just because he was so curious.

So, on the 18th of December the, "white knight" from Televerket drags the French dragon to a Swedish court with the help of district prosecutor Christer Pettersson. The trial itself is a farce -- soon it turns out that of all the people present, only Pege and Otto have the technical knowledge required to understand the summons from Televerket. Then the first thing Otto's counsel does as the trial begins, is to throw Pege out of the court room, as no reasons have been given for his presence. The only time that Pege is allowed in the room, is when he is cross-examined by the court. Suddenly Otto himself is the only one that understands what the prosecution is actually about. None of the members of the court have any kind of practical technical knowledge.

"The trial was real fun because no one really knew the subject. Some of the documents I produced during the trial were a bit dodgy, like this e-mail from some guy telling me how to use reverse-charge on Televerket. I also produced a valid list of all Swedish BBS:es, telling the judge that they were 'free access computer systems'. Of course no one had a clue about the difference between a BBS running on a 386SX in a 17-year-old teenager's room and a nationwide X.25 data network."

Otto doesn't think he is guilty of any crime, and is wise enough to use simple descriptions which the court can understand. He doesn't deny using Datapak exactly as much as Televerket claims, and is prepared to pay for it. But he think it's unreasonable that he shall pay the costs of tracing and investigation by Televerket.

Pege is called in only to describe how the tracing of Otto was performed. In all other questions they must refer to the preliminary investigation protocol, a horrible pile of papers containing almost exclusively technical desciptions and different lists of tracings carried out by Pege. Among the "evidence" is Ottos own notes, some of them completely harmless, with detailed technical information about phone numbers etc. to different computer systems all over the world. Without further explanation of what kind of information this is, these cryptic notes are called "hacker notes". There are also a bunch of print-outs of files found on Ottos hard disk.

This material has apparently only been included in the protcol in order to make Otto look "obscure". The print-outs could just as well have been xerox copies of "unsuitable books" from his bookshelf. The only purpose of including this material must have been to throw suspicions on Otto for belonging to a certain subculture.

At some point the court must have grown bored with the fact that Televerket had not been able to present an understandable prosecution. Regardless of whom had lied or told the truth, Ottos claim that he had believed that the calls were for free seemed probable to the court. As the prosecutor could not prove the opposite, the court found for the defendant. Televerket's claim for damages, and the claim that Otto should be forced to leave the country, was also dismissed. Televerket had to pay their own costs for the trial. In short, Televerket lost, and Otto Sync won. This decision was made December 18th 1992, but wasn't made public until January 8th.

Lookin back he says that "although I was guilty like hell and went to court, Televerket lost the case."

All's well that..

Televerket, now named Telia, appealed the sentence in the court of appeals on January 15. As Otto would only be present in Sweden until April 1st, they asked the court of appeals to review the case before then, which was of course a hopeless request.

In September, Otto was back in France, still hacking. Then, one night "White Night" turns up at QSD again. "I started chatting with Pege, who was expecting me show up at appeals court in October", Otto says. The court of appeals probably couldn't have him extradited to Sweden, and in any case he had already booked a ticket to Bangkok for October 4.

The court of appeals considered the case at a hearing October 25th. As Televerket hadn't added something new to their application of summons, and as Otto wasn't available, the court of appeals decided to dismiss the case. Televerket and Pege lost again.

Note: Otto Sync recently left his job as an engineer at a huge, multi-national enterprise in Bangkok. He is currently busy setting up his own Internet-service company. Pege Gustafsson still handles security issues at Telia.


1. All quotes are lifted from e-mail communication with Otto Sync.

2. Ledell, Göran  (ed)  Dataolyckor -- Har det verkligen hänt någon gång?  INFOSEC, Lund 1992

3. Quotes from the conversation are drawn from the court documents.

4. To be technically precise: a DNR -- Dialled Number Recorder.

5. Expressen , Friday February 4th 1994, page 11.