WHAT
IS HACKTIVISM by The Hacktivist.Com
Hacktivism is the fusion of hacking and activism; a merger in which
technically proficient hackers engage in electronic direct action
in order to bring pressure on institutions engaged in unethical
or criminal actions, particularly in relation to the Internet and
computer technology. Hacktivism is the expression of hacker skills
in the form of electronic direct action. Neither the tactics nor
the objectives of hacktivism are static. Rather, hacktivism is a
continually evolving recombinant and open form of activism\protest
combined with a willingness to creatively solve the problem being
addressed.
Background:
Since hacktivism is a recombinant initiative comprised of two divergent
communities (hackers and activists) it is necessary to understand
their respective backgrounds in order to analyze this historic merger
and to examine its challenges and future capabilities. This may
explain how hacktivism may or may not overcome both “hacker
intolerance for the technologically impaired, and activist intolerance
for those who are not politically correct”1 in order to become
a secure network operating for social and political change worldwide.
Hackers:
The term hacker “seems to have been first adopted as a badge
in the 1960s by the hacker culture surrounding TMRC and the MIT
AI Lab.” 2 It is a term that represents a deep understanding
of computer systems and networks and the ability to invent, modify,
and refine such systems. It is a recombinant attitude through which
promotes problem solving and creative instinct for it does not limit
one's options to the possible. Moreover, it involves belief in “freedom
and voluntary mutual help”.3 The hacker ethic formulated by
Steven Levy in his 1984 book “Hackers: Heroes of the Computer
Revolution” outlines the hacker tenets:
1. Access to computers should be unlimited and total.
2. All information should be free.
3. Mistrust authority - promote decentralization.
4. Hackers should be judged by their hacking not bogus criteria
such as degrees, age, race, or position.
5. You create art and beauty on a computer.
6. Computers can change your life for the better.4
[ Top ]
These principles combined with technological skill have endowed
hackers with the capability to create solutions and solve problems
in a truly amazing way. Eric Raymond explains the successes and
technological advancements created by hackers, creative solutions
that benefit society:
There is a community, a shared culture, of expert programmers and
networking wizards that traces its history back through decades
to the first time-sharing minicomputers and the earliest ARPAnet
experiments. The members of this culture originated the term `hacker'.
Hackers built the Internet. Hackers made the Unix operating system
what it is today. Hackers run Usenet. Hackers make the World Wide
Web work. If you are part of this culture, if you have contributed
to it and other people in it know who you are and call you a hacker,
you're a hacker.5
However, these developments coincided with the practice of “short-cuts”
that extended to the use of unauthorized computer access. Bruce
Sterling suggests that “Some off-the-cuff experience at computer
intrusion was to be in the informal resume of most "hackers"
and many future industry giants.” 6 Indeed a culture of computer
intrusion developed along side the understanding that such intrusions
would not involve malicious damage to the affected systems.
The anti-authoritarian and anti-bureaucratic sentiments have led
hackers to believe that information should be freely accessible.
Moreover, hackers abhor censorship especially when it is combined
with mistrust of restrictive legislation that encroaches on free
access to information and cherished electronic privacy. Thus a natural
aversion to restrictive governments and predatory private institutions
has developed. In Phrack magazine Dr. Crash explains that computer
technology is being misused not by hackers but by governments and
corporations:
The wonderful device meant to enrich life has become a weapon which
dehumanizes people. To the government and large businesses, people
are no more than disk space, and the government doesn't use computers
to arrange aid for the poor, but to control nuclear death weapons.7
This sentiment is not an isolated rant. There is definitely a trend
within hacker culture that not only focuses on technical aspects
of computing but political aspects as well. In the “Hacker's
Manifesto” the ment0r explains:
We make use of a service already existing without paying for what
could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals.
We seek after knowledge... and you call us criminals. We exist without
skin color, without nationality, without religious bias... and you
call us criminals. You build atomic bombs, you wage wars, you murder,
cheat, and lie to us and try to make us believe it's for our own
good, yet we're the criminals.8
Whereas “In the 1960s, definitions of 'property' and 'privacy'
had not yet been extended to cyberspace” the information economy
of the 1990's has thrust hackers into an environment where cyberspace
is increasingly becoming “privately-owned unreal-estate”
subject to severe restrictions.9 Hackers faced serious questions
and allegations of criminal behavior regarding computer intrusions.
In fact, both the word “hacker” and hackers themselves
have become nearly synonymous with computer criminality - however
misguided it may be. As a result, there is now an array of words
intended to highlight the difference between hackers and computer
criminals. Persons who use hacker technology with the primary purpose
of breaking into secured systems are known as “crackers”.
But, Bruce Sterling explains that there is still plenty of confusion
surrounded the term because “'hacker' is what computer intruders
choose to call themselves.”10 The hacker\cracker debate aside,
there has been antagonism between government\corporate restrictions
and domination of computer technology and the hackers who want to
ensure free access to information and prevent monopoly control and
censorship of that technology.
[ Top ]
Activists:
The integration of activism and computer\Internet technology has
been easily accomplished. The new technology plays a complementary
and beneficial role and seems to fit perfectly with existing activist
networks. In fact, “Many non-governmental groups now depend
on the Web and e-mail to motivate, activate and communicate their
uncensored messages.”11 From its inception the Internet, and
its predecessor ARPANET were designed to facilitate communications
transfers. Although its initial function was linked to the military
Bruce Sterling explains that “ARPANET's users had warped the
computer-sharing network into a dedicated, high-speed, federally
subsidized electronic post- office.”12 The dominant network
traffic was “news and personal messages” and there was
a proliferation of newsgroups.13 “There are no official censors,
no bosses, no board of directors, no stockholders”14 and it
is not unimaginable why activists saw this as a golden opportunity.
Stephen Wray points out that “The origins of computerized
activism extend back in pre-Web history to the mid 1980s.”15
Wray notes that the creation of PeaceNet, a text-based newsgroup
service, in 1986 allowed “political activists to communicate
with one another across international borders with relative ease
and speed.”16
As the growth of the Internet skyrocketed in the early 1990s technology,
such as the graphical web browser, was developed in order to allow
the less technically proficient access to the Internet.17 This has
allowed activists with little or no technical skills to utilise
the benefits of digital communications. With the previous methods
“telephone, fax or mail it was prohibitively expensive to
share information or build links between different organisations.”18(The
Economist Dec 11 1999 p 21) The organisational component revolves
primarily around the use of email, which is essentially free. Email,
and now instant messaging systems, allow for speedy interaction
and exchange of information. The BBS system and real time chat also
allow for online debates and discussions in which relevant data
can be hyper-linked and accessed by the participants in no time
at all. The convergence of meetings, debates, and research in one
convenient and fast medium greatly enhances not only the organisational
capabilities but also the ability of non-violent activists to react
to a constantly changing world in a timely manner. In order to educate
the public and promote causes and campaigns activist organisations
have adopted the use of the web page. This allows the group to have
an accessible, updateable, interactive, and international presence
that was previously difficult if not nearly impossible to maintain.
Hacktivism:
Hacktivism is the fusion of the evolution of computer activism with
the politicization of the hackers. The evolutionary progress of
both communities has put them in a position where they can compliment
each other because they increasingly face the same institutions.
The fusion has emboldened each community and provides a conduit
for electronic activism. Oxblood Ruffin of the cDc explains:
Hacktivism forges conscience with technology and girds us against
the disagreeable nature of conflict. It allows us to mount better
arguments, rally unseen allies, and take on any tyranny.19
The methodology of hacktivism is being developed and thus subject
to change. Hacktivism could be as simple as posting banned or censored
material on the Internet. However, the media rarely reports such
events and hacktivists have taken to “bending” the law
in order to attract attention to particular causes. Indeed, there
is a strong relationship between hacktivism and civil disobedience
since both thrive on the edge of legality - some would indeed say
illegality. This dichotomy is well articulated by CountZero of L0pht
& cDc:
"Hacktivism" is the evolution of activism in a wired,
global community. Using hacking "techniques" to achieve
activist goals. And like "real world" activism, sometimes
"hacktivism" involves breaking the law.....spraypainting
slogans on a public wall vs. altering a website...both are the same
level, in my mind. Also, what some people call "hacktivism"
is, in my mind, really "information warfare." InfoWar
is about nuking your enemy..stifling their expression...and that's
something that "hacktivism" definitely is NOT.20
The debate surrounding the tactics of hacktivism (especially in
the media) have focused on web site defacements. (In addition to
attrition.org's defaced web page mirror there is a website that
catalogues politically motivated defacements.) Additionally, the
use of email bombs, viruses, worms, and denial of service methods
have been included by some as hacktivist tactics.
[ Top ]
The actualization of politicized hacking continues to occur primarily
in the form of web site defacement - although this would more properly
be labelled as “cracking” since it involves illegal
computer access and the alteration of data. While there is major
objection to and contestation of the motivation and methodology
of such activities some major events are:
• X-Ploit hacked Mexico's finance ministry Website, replacing
it with the face of revolutionary hero Emiliano Zapata, in sympathy
with the Zapatista rebellion in the Chiapas region in southern Mexico.
• The Portuguese group Kaotik Team hacked 45 Indonesian government
Websites, altering Web pages to include messages calling for full
autonomy for East Timor.
• The New York Times had its Website replaced with a long
screed calling for the release of jailed hacker Kevin Mitnick
• Political activists took over an Indian government Website
and posted messages and photos calling attention to alleged government-sponsored
repression and human rights violations in the contested northern
Indian state of Kashmir.
• Nike.com was "hijacked" and visitors were redirected
to an Australian labour rights site.
• Milw0rm hacked the Web site of India's Bhabha Atomic Research
Center (BARC) to protest nuclear weapons testing
These are some of the often quoted and publicized cases cited as
examples of hacktivism. Since unauthorized access can be sensationalized
cases like these seem to be prominent in the media.
Hacktivism gives expression to electronic civil disobedience through
the capability to actualize both blockade and trespass, conducted
in a manner that reflects traditional street based civil disobedience.
There have been two major electronic civil disobedience campaigns
organized on the basis of denial of service techniques along with
mass public participation. They are the FloodNet campaign by the
Electronic Disturbance Theatre and the “virtual sit-in”
organized by the electrohippies to coincide with street based demonstrations
occurring in Seattle at against the World Trade Organization meeting.
Critiques of Hacktivism:
Some veteran hackers believe that hacktivism just provides “more
ammunition for anti-hacker hysterics to demand get-tough measures,
with little to show for the sacrifice.”21 Brian Martin of
Attrition.org is quoted as saying, “Do these kids think that
by defacing some Web sites, it's going to make the country change?
I understand what they are doing, but they are deluding themselves
if they think it is going to help.”22 Indeed, “Most
infiltration into cyberspace has either been playful vandalism,
politically misguided espionage, or personal revenge against a particular
source of authority.”23 Furthermore many hackers denounce
the denial of service strategy used in ECD campaigns and suggest
better strategies. Oxblood Ruffin argues that “One does not
make a better point in a public forum by shouting down one's opponent.”24
The debate surrounding hacktivism is quite vibrant and diverse.
From the activist perspective, hacktivists are considered to be
“shadowy” and acting from behind the cover of anonminity.25
Some feel that it actually detracts from the activists cause. For
example, when kkk.com was domain-jacked and visitors were redirected
to HateWatch.org the director of HateWatch David Goldman objected,
“This type of action, hacktivism, is not only [against] the
First Amendment but it also takes away one of the greatest civil
rights tools we have -- using the words of bigots against them”.26
In contrast others have spoken out on behalf of tactics such as
web page defacement. Alex Fowler of the Electronic Frontier Foundation
is quoted as saying, “Graffiti is about a space for the disenfranchised
to cry out and inform those around them, even when anonymity has
been forced upon them”27 in seemingly direct support of such
tactics. Others, such as ZDNet's Kevin Poulsen distinguish between
vandalism and hacktivism:
Vandalism is malicious destruction or damage, not artful and subversive
tampering. The proof for protest is in the quality of the work,
the clarity of the message, and the motives behind it.28
The discussion and critiques of hacktivism abound, but that is one
of its strengths rater than a weakness. By widening the range of
debate and possibilities the impossible becomes possible and solutions
are created. This recombinant concept, hacktivism, is being defined
and redefined and practice and theory evolve with actualization.
[ Top ]
Hacktivism vs activism
Hacktivism is not strictly the importation of activist techniques
into the digital realm. Rather it is the expression of hacker skills
in the form of electronic direct action. It acknowledges that neither
the tactics nor the objectives of hacktivism are static. Rather,
they must continually evolve in order to be effective. Thus a distinction
is made between hackers engaged in activism and activists attempting
utilize the technical aspects of hacking to mimic and rationalize
traditional forms of activism. This sentiment is summed up by Oxblood
Ruffin of the cDc:
Hacktivism is about using more eloquent arguments - whether of code
or words - to construct a more perfect system. One does not become
a hacktivist merely by inserting an "h" in front of the
word activist or by looking backward to paradigms associated with
industrial organization.29
Disruption (whether by computer break-ins on denial of service),
in this regard, is no longer a viable option. Instead, it is argued
that the focus of hacktivism should be shifted from electronic disruption
to problem solution. Oxblood Ruffin explains:
Hacktivism is an open-source implosion. It takes the best of hacking
culture, and the imperatives of the quantum community, and fuses
a solution.30
Indeed, the evolution of technology and the development of political
theory have clearly shown that effectiveness requires the ability
to look to the future. To remain confined in the comfortable static
bunkers is to renounce the ability to adapt for the better. That
is, through creative thinking, practical solutions and applications,
new and possibly more effective methods of Hacktivism\ECD can be
developed.
An example the actualization of this line of thought is the work
of the Cult of the Dead cow and the Hong Kong Blondes in trying
to assist democracy activists in China. In addition the cDc is organizing
a project called hacktivismo. "The specifics are still secret,
but the group will reportedly write applications to defeat government
content filters in totalitarian countries."31 A solution-oriented
project like this will require a lot of time an effort but hacktivismo
organizer Oxblood Ruffin assures that "hackers have a lot of
stamina for harsh bug fixes when they believe in the program."32
The Future:
Although in its relative infancy, hacktivism has emerged as a vibrant,
new mechanism to achieve social and political change, specifically
by applying pressure to institutions engaged in unethical or criminal
behavior and by drawing attention to specific cause and thus widening
the range of debate surrounding relevant issues. However, in order
to reach a higher level of effectiveness the bugs must be worked
out of both hacktivist theory and methodology. This needs to be
done in a open manner in which criticism is positive and constructive
not malicious and destructive. Furthermore, the debate needs to
extend beyond legitimization and protest but to focusing on problem
solving through creative and critical thinking. Through this process,
perhaps, the hacker\activist schism can be overcome thus creating
a secure a stable hacktivist network.
|