Dissecting the 'Hacker Manifesto'
Total Page:16
File Type:pdf, Size:1020Kb
Dissecting the ‘Hacker Manifesto’ S.M.Furnell, P.Dowland and P.W.Sanders Network Research Group School of Electronic, Communication and Electrical Engineering University of Plymouth Plymouth United Kingdom e-mail : [email protected] Abstract Twelve years ago, a text was written within the hacking community which is widely referred to as the ‘Hacker Manifesto’. This text, and the opinions that it offers, have since been widely embraced by the hacker community and the document is referenced from numerous sites on the Internet. This paper sets out to examine the content of the Manifesto and considers the validity of many of the messages that it imparts. The Manifesto is considered to present an undoubtedly pro-hacker message, without acknowledging other perspectives or the wider implications of the activities that it is advocating. The paper explores some of these issues, examining both the consequences of the Manifesto’s dissemination and ways in which security professionals and society at large should respond. It is concluded that whilst the Manifesto obviously cannot bear the sole responsibility for promoting and encouraging hacker activity, it at best sends out an incomplete message that should be balanced with appropriate counter-argument. Keywords : Hackers, Computer Abuse, Information Society. Introduction The definition of the term ‘hacker’ has changed considerably over the last 30 years. In the 1960s, hackers were the dedicated software and hardware gurus, and the term largely referred to persons capable of implementing elegant / technically advanced solutions to technologically complex problems. In the 1990s, however, the moniker implies something rather different and is commonly used to refer to persons dedicated to entering systems by identifying and exploiting security weaknesses. At the extreme are a subset (often distinguished by the term ‘crackers’) who perform openly malicious actions upon the systems they enter, such as deleting files, modifying data and stealing information. Such activities would be frowned upon by the traditional hackers from the 60s. Modern-day hackers are one part of a so-called Computing Underground (Mizrach, 1997). This is something of a catch-all term, which encompasses a number of sub- groups that would generally be classed as undesirable by society at large. These include the aforementioned crackers, phreakers (who actively explore and/or control the telecommunications networks), virus writers and software pirates. This paper considers the principles from which many hackers operate and the justifications that are often presented for their actions. Significant reference is made to the so-called ‘Hacker Manifesto’, which encapsulates many of their beliefs and is widely available within the hacker community. The Hacker Manifesto A popular element of hacker culture is a brief text entitled “The Conscience of a Hacker”, which is more widely known and referred to as the ‘Hacker Manifesto’. This was written in 1986 by a hacker who operated under the pseudonym of ‘The Mentor’ and who was a member of the notorious hacking group the Legion of Doom (Sterling, 1992). The full text is reproduced in figure 1. The Conscience of a Hacker by +++The Mentor+++ Written on January 8, 1986 Another one got caught today, it's all over the papers. "Teenager arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or thinks I'm a smart ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. +++The Mentor+++ Figure 1 : The ‘Hacker Manifesto’ The Manifesto is still widely accessible, some twelve years after it was originally written. Ordinarily, this could be considered no great feat for a piece of literature. However, it is possibly more significant in the context of the technology field, where the pace of change frequently renders once leading edge thoughts obsolete after a few years. In fact, the Manifesto probably has wider exposure now than it did at the time that it was written. A search on the WWW yields numerous links to sites reproducing the text. Indeed, a search for the term “hacker” followed by “manifesto” yielded more hits than a search for “orange book” followed by “security” (560 versus 173 hits1). For the uninitiated, the Orange Book is the name commonly used to refer to the US Department of Defence Trusted Computer Systems Evaluation Criteria, a significant publication in the IT security field which was published at roughly the same time as the Manifesto (DOD, 1985). This crude example suggests that the hacker perspective is more widely available than specific security guidelines. In addition, the Manifesto has found its way into other forms of media outside the WWW. For example, segments from it have been quoted in the 1995 film “Hackers” (MGM, 1997). As such, the text cannot be easily dismissed as being merely the thoughts of one person and the material is worthy of further examination. Dissecting the Manifesto When reading the text of the Manifesto, the first thing that is clear is that it is not using the term ‘hacker’ in its original, 1960s sense, i.e. the system and coding gurus as described, for example, by Levy (1984). The perspective is instead that of persons gaining unauthorised access to computer systems (i.e., the modern, mass media definition). That said, however, the Manifesto only presents a restricted view of a hacker – as largely a curious explorer, pursuing knowledge and/or intellectual challenge. Fundamentally, however, even unauthorised exploration of a system is equivalent to trespassing and may still result in a breach of commercial confidentiality or personal privacy. Parallels are frequently drawn between cyberspace and the physical world (e.g. discussion of concepts such as 'community' occur in both contexts). If such comparisons are applied to notions such as property and privacy, it is clear that the incursions that some hackers would argue to be acceptable online would not be so easily justified in the real-world equivalent. For example, we could draw a parallel between an individual's web site and his/her home, or between a 1 Results from Infoseek search conducted on 31 August 1998 using the search terms specified. company's site and its high-street office or showroom. The hacker ethic would state that unauthorised entry into the system running such a WWW server would be acceptable as long as no damage is done. However, no one would be likely to be very tolerant of an intruder offering such excuses if found exploring in their home or office. Regardless of whether you agree with its sentiments, the views laid out in the Manifesto contradict the law in many countries. It would, for example, breach the section of the UK Computer Misuse Act relating to “Unauthorised access to computer programs and data” (HMSO, 1990).