<br />RHIZOME DIGEST: June 28, 2002<br /><br />Content:<br /><br />+editor's note+<br />1. Rachel Greene: new <a rel="nofollow" href="http://rhizome.org">http://rhizome.org</a><br /><br />+opportunity+<br />2. Ann Le Pore: Open Call for Eyebeam MID Production Artists<br />Applications<br />3. you: Now open to Entries; Art on the Net 2002 – "9.11"<br /><br />+work+<br />4. marty@1010.co.uk: ap0202.01 release<br /><br />+feature+<br />5. RSG: How We Made Our Own Carnivore<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />1.<br /><br />Date: 6.27.02<br />From: Rachel Greene (rachel@rhizome.org)<br />Subject: new <a rel="nofollow" href="http://rhizome.org">http://rhizome.org</a><br /><br />We all know a rhizome is not fixed or constant, and so we happily<br />announce Rhizome.org's facelift and informational and technical<br />realignment! Please check out <a rel="nofollow" href="http://www.rhizome.org">http://www.rhizome.org</a>, and try posting to<br />the Raw list via the web site, or reading Raw in real time in the Art +<br />Text section (go to Fresh Texts). New features include a calendar of new<br />media art events, an opportunities list, and a community directory.<br /><br />Rhizomers can now have more input to rhizome.org, like designating what<br />should be archived (and how), and deciding which texts merit placement<br />on the homepage. If interested in playing an active role with Rhizome's<br />archive of texts about new media art (which is to say helping to create<br />a history of new media art), email me at rachel@rhizome.org with<br />Superuser in the subject line.<br /><br />Post your thoughts about the revamped site (via the web site or email to<br />list@rhizome.org). And thank you Alex Galloway for building it!<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />2.<br /><br />Date: 6.25.02<br />From: Ann Le Pore (aelepore@yahoo.com)<br />Subject: Open Call for Eyebeam MID Production Artists Applications<br /> <br />Open Call for Eyebeam MID Production Artists Applications<br /><br />Eyebeam's Moving Image Division announces an open call for applications<br />to its annual 2002 - 2003 Production Artists Workshop. PAW provides<br />vital production experience to recent graduates from film, video and<br />computer art programs. Production Artists are provided with a salary,<br />health benefits and unlimited access to the MID Studio during their<br />one-year term. During their stay, these artists benefit from instruction<br />from technical experts, critiques, and interaction with graphic<br />specialists from MID's Advisory Council. They split their time between<br />developing their own moving image work, and interacting with senior<br />artists on larger projects, creating work for commissions and for the<br />MID Studio Co-op. Production Artist work is presented publicly at the<br />end of their one-year term. The division hires four artists each year<br />for the program, concentrating in four different areas: technical<br />direction, compositing/texture/lighting, modeling, and animation.<br />To apply, please send a completed application form (link address), your<br />resume, and a copy of your VHS or DVD portfolio reel by July 5th to:<br /><br />Melanie Crean<br />Director of Moving Image<br />45 Main St. 12th floor<br />Brooklyn, NY 11201<br /><br />Prospective hires will interviewed in July for a late August or early<br />September start date. Pease address any questions to<br />information@mid.eyebeam.org.<br /> <br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />+ad+<br /><br />Limited-time offer! Subscribe to Leonardo Electronic Almanac (LEA),the<br />leading electronic newsletter in its field, for $35 for 2002 and receive<br />as a bonus free electronic access to the on-line versions of Leonardo<br />and the Leonardo Music Journal. Subscribe now at:<br /><a rel="nofollow" href="http://mitpress2.mit.edu/e-journals/LEA/INFORMATION/subscribe.html">http://mitpress2.mit.edu/e-journals/LEA/INFORMATION/subscribe.html</a>.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />3.<br /><br />Date: 6.26.02<br />From: you (automony@ss.iij4u.or.jp)<br />Subject: Now open to Entries; Art on the Net 2002 – "9.11"<br /><br />Art on the Net 2002<br />"9.11"<br />Now Open to Entries<br /><br />Since 1995, Machida City Museum of Graphic Arts, Tokyo (MCMOGATK), has<br />been sponsoring the world's first Internet art and web contents open<br />competition, "Art on the Net," exploring the potentials of the Internet<br />as a medium of art. Twenty countries were represented in the "Art on the<br />Net 2001 – Post-Cagian Interactive Sounds," and the prizes went to<br />Estonian and Netherlandish artists. In the past seven years since its<br />first show, "Art on the Net 1995," over 600 entries have been submitted<br />and artists from 40 countries have participated. Net art entries in each<br />show reflected the cutting-edge technology of that time. We believe it<br />has been presenting a completely new status of art created at the the<br />crossroads of art history, technology and the society.<br /><br />The theme of the 8th "Art on the Net 2002" is "9.11." We again are open<br />to any entries that are experimental, that have power to turn around the<br />conventional concepts of art. This year, we'll take the system of<br />election by mutual vote — for further details, please read our<br />"introductions" on our website.<br /><br />Acceptance of the entries, jurying, and exibition are all done on the<br />Internet. The deadline for the entry is September 20, 2002. For further<br />information and application procedure, please visit our website:<br /><a rel="nofollow" href="http://art.by.arena.ne.jp/">http://art.by.arena.ne.jp/</a><br /><br />We look forward to your entries.<br /><br />you minowa<br />Curator, MCMOGATK<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />+ad+<br /><br />**MUTE MAGAZINE NO. 24 OUT NOW** 'Knocking Holes in Fortress Europe',<br />Florian Schneider on no-border activism in the EU; Brian Holmes on<br />resistance to networked individualism; Alvaro de los Angeles on<br />e-Valencia.org and Andrew Goffey on the politics of immunology. More @<br /><a rel="nofollow" href="http://www.metamute.com">http://www.metamute.com</a><br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />4.<br /><br />Date: 6.21.02<br />From: marty@1010.co.uk (marty@1010.co.uk)<br />Subject: ap0202.01 release<br /><br />ap0202.01 release<br /><br />longest day marks the release of glorious ap0202.01 beta . networked<br />virtual machine application for self-enacting code [artificial paradise<br />project ap01-02-03]<br /><br /><a rel="nofollow" href="http://www.1010.co.uk/app.html">http://www.1010.co.uk/app.html</a><br /><br /><a rel="nofollow" href="http://1010.v2.nl">http://1010.v2.nl</a><br /><br />server:: <a rel="nofollow" href="http://62.137.138.95/new.html">http://62.137.138.95/new.html</a><br /><br />ap0202.01 presents environment/code options for specialised access to<br />filesystems, local and global network data, midi data, video and audio<br />device input, as well as the range of unix devices. both vector and<br />pixel output are provided under SDL [using aalib, svga, fb or x] + full<br />range of available devices (eg. /dev/speech).<br /><br />ap0202.01 compiles and runs under gnu/linux and is available under a GPL<br />license. both a core cellular vm app and cellspace viewer can be<br />downloaded.<br /><br />ap0202.01 is involved in the evolution of the ap performance system and<br />ap.os.<br /><br />ap is concerned with the liberation of data encoding and generation from<br />any given model or architecture (any fixed operating system in its<br />widest sense)<br /><br />ap02 presents a promiscuous model of data generation and self-display,<br />making use of a virtual machine architecture to develop and execute self<br />modifying instruction sets across networked nodes. Reconfigurable code<br />is interwoven with and determined by network and environmental data.<br />Nodes expand virally through diverse machine environments as they<br />actively seek for data across any network. The body of the work is code<br />(material) and in work this code is made evident, visible. The only<br />functionality of ap02 is in self display; showing its own changing,<br />performative code as it runs. ap02 is expressed within two interwoven<br />projects; as physical self display devices and as a freely available,<br />distributed networked application.<br /><br />ap0202 makes use of current de-centralized p2p (peer to peer)<br />inter-networking technologies to implement multiple self display devices<br />virtually on any networked machine. The environment for the changing<br />code is both the network and the machine on which the software is<br />running. Cells of code promiscuously modify and are modified by data<br />available to the machine; audio input and output, video, stored<br />information and visual display. Code cells communicate, split and join<br />with other code cells both locally and across the global network,<br />working through a vast memory environment composed of both data and<br />code. ap0202 explores new models of cellular coding of great use for<br />future work, implementing flexible new instruction sets and questioning<br />the separation of data and environment from code.<br /><br />ap0202 was developed as part of emare residency at v2_lab rotterdam with<br />the assistance of artem baguinski, stock and anne nigten. details of<br />ap0202 physical self-display devices can also be found at:<br /><br /><a rel="nofollow" href="http://www.1010.co.uk/devices.html">http://www.1010.co.uk/devices.html</a><br /><br />[please note ap0202.01 is a highly beta release. comments/ feedback and<br />bugs –> here pls]<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />5.<br /><br />Date: 6.20.02<br />From: RSG (rsg@rhizome.org)<br />Subject: How We Made Our Own Carnivore<br /><br />"Disobedience to authority is one of the most natural and healthy acts."<br />-Empire, Hardt & Negri<br /><br />Ethernet was invented at the University of Hawaii. Scientists there in<br />the early 1970s faced a unique problem: How to network different<br />campuses, each on different islands separated by water.[1] The solution<br />was to use the free airwaves, to transmit data through the air, or<br />"ether," using radio. There were no wires. Like a radio station, each<br />node sent messages broadly over the sea to other islands. A protocol was<br />developed to avoid collision between simultaneous communications. Ever<br />since, Ethernet has been based on an open transmission model. The<br />protocol translated well to wire-based networks too, and is now the most<br />widely used local networking protocol in the world.<br /><br />Since Ethernet is based on an open broadcast model, it is trivial for<br />listeners to make themselves "promiscuous" and eavesdrop on all<br />communications, not simply those specifically addressed to them. This<br />technique is called packet-sniffing and has been used by systems<br />administrators and hackers alike for decades. Ethernet, sniffers, and<br />hacking are at the heart of a public domain surveillance suite called<br />Carnivore (<a rel="nofollow" href="http://rhizome.org/carnivore">http://rhizome.org/carnivore</a>) developed by RSG and now used<br />in a civilian context by many artists and scientists around the world.<br /><br />Hacking<br /><br />Today there are generally two things said about hackers. They are either<br />terrorists or libertarians. Historically the word meant an amateur<br />tinkerer, an autodictat who might try a dozen solutions to a problem<br />before eking out success.[2] Aptitude and perseverance have always<br />eclipsed rote knowledge in the hacking community. Hackers are the type<br />of technophiles you like to have around in a pinch, for given enough<br />time they generally can crack any problem (or at least find a suitable<br />kludge). Thus, as Bruce Sterling writes, the term hacker "can signify<br />the free-wheeling intellectual exploration of the highest and deepest<br />potential of computer systems."[3] Or as the glowing Steven Levy<br />reminisces of the original MIT hackers of the early sixties, "they were<br />such fascinating people. […] Beneath their often unimposing exteriors,<br />they were adventurers, visionaries, risk-takers, artists…and the ones<br />who most clearly saw why the computer was a truly revolutionary<br />tool."[4] These types of hackers are freedom fighters, living by the<br />dictum that data wants to be free.[5] Information should not be owned,<br />and even if it is, non-invasive browsing of such information hurts no<br />one. After all, hackers merely exploit preexisting holes made by<br />clumsily constructed code.[6] And wouldn't the revelation of such holes<br />actually improve data security for everyone involved?<br /><br />Yet after a combination of public technophobia and aggressive government<br />legislation, the identity of the hacker changed in the US in the mid to<br />late eighties from do-it-yourself hobbyist to digital outlaw.[7] Such<br />legislation includes the Computer Fraud and Abuse Act of 1986 which made<br />it a felony to break into federal computers. "On March 5, 1986,"<br />reported Knight Lightning of Phrack magazine, "the following seven<br />phreaks were arrested in what has come to be known as the first computer<br />crime `sting' operation. Captain Hacker \ Doctor Bob \ Lasertech \ The<br />Adventurer [\] The Highwayman \ The Punisher \ The Warden."[8] "[O]n<br />Tuesday, July 21, 1987," Knight Lightning continued, "[a]mong 30-40<br />others, Bill From RNOC, Eric NYC, Solid State, Oryan QUEST, Mark<br />Gerardo, The Rebel, and Delta-Master have been busted by the United<br />States Secret Service."[9] Many of these hackers were targeted due to<br />their "elite" reputations, a status granted only to top hackers. Hackers<br />were deeply discouraged by their newfound identity as outlaws, as<br />exemplified in the famous 1986 hacker manifesto written by someone<br />calling himself[10] The Mentor: "We explore… and you call us<br />criminals. We seek after knowledge… and you call us criminals."[11]<br />Because of this semantic transformation, hackers today are commonly<br />referred to as terrorists, nary-do-wells who break into computers for<br />personal gain. So by the turn of the millennium, the term hacker had<br />lost all of its original meaning. Now when people say hacker, they mean<br />terrorist.<br /><br />Thus, the current debate on hackers is helplessly throttled by the<br />discourse on contemporary liberalism: should we respect data as private<br />property, or should we cultivate individual freedom and leave computer<br />users well enough alone? Hacking is more sophisticated than that. It<br />suggests a future type of cultural production, one that RSG seeks to<br />embody in Carnivore.<br /><br />Collaboration<br /><br />Bruce Sterling writes that the late Twentieth Century is a moment of<br />transformation from a modern control paradigm based on centralization<br />and hierarchy to a postmodern one based on flexibility and<br />horizontalization:<br /><br />"For years now, economists and management theorists have speculated that<br />the tidal wave of the information revolution would destroy rigid,<br />pyramidal bureaucracies, where everything is top-down and centrally<br />controlled. Highly trained "employees" would take on greater autonomy,<br />being self-starting and self- motivating, moving from place to place,<br />task to task, with great speed and fluidity. "Ad-hocracy" would rule,<br />with groups of people spontaneously knitting together across<br />organizational lines, tackling the problem at hand, applying intense<br />computer- aided expertise to it, and then vanishing whence they<br />came."[12]<br /><br />>From Manuel Castells to Hakim Bey to Tom Peters this rhetoric has become<br />commonplace. Sterling continues by claiming that both hacker groups and<br />the law enforcement officials that track hackers follow this new<br />paradigm: "they all look and act like `tiger teams' or `users' groups.'<br />They are all electronic ad-hocracies leaping up spontaneously to attempt<br />to meet a need."[13] By "tiger teams" Sterling refers to the employee<br />groups assembled by computer companies trying to test the security of<br />their computer systems. Tiger teams, in essence, simulate potential<br />hacker attacks, hoping to find and repair security holes. RSG is a type<br />of tiger team.<br /><br />The term also alludes to the management style known as Toyotism<br />originating in Japanese automotive production facilities. Within<br />Toyotism, small pods of workers mass together to solve a specific<br />problem. The pods are not linear and fixed like the more traditional<br />assembly line, but rather are flexible and reconfigurable depending on<br />whatever problem might be posed to them.<br /><br />Management expert Tom Peters notes that the most successful contemporary<br />corporations use these types of tiger teams, eliminating traditional<br />hierarchy within the organizational structure. Documenting the<br />management consulting agency McKinsey & Company, Peters writes:<br />"McKinsey is a huge company. Customers respect it. […] But there is no<br />traditional hierarchy. There are no organizational charts. No job<br />descriptions. No policy manuals. No rules about managing client<br />engagements. […] And yet all these things are well understood-make no<br />mistake, McKinsey is not out of control! […] McKinsey works. It's<br />worked for over half a century."[14]<br /><br />As Sterling suggests, the hacker community also follows this<br />organizational style. Hackers are autonomous agents that can mass<br />together in small groups to attack specific problems. As the influential<br />hacker magazine Phrack was keen to point out, "ANYONE can write for<br />Phrack Inc. […] we do not discriminate against anyone for any<br />reason."[15] Flexible and versatile, the hacker pod will often dissolve<br />itself as quickly as it formed and disappear into the network. Thus,<br />what Sterling and others are arguing is that whereby older resistive<br />forces were engaged with "rigid, pyramidal bureaucracies," hackers<br />embody a different organizational management style (one that might be<br />called "protocological"). In this sense, while resistance during the<br />modern age forms around rigid hierarchies and bureaucratic power<br />structures, resistance during the postmodern age forms around the<br />protocological control forces existent in networks.<br /><br />Coding<br /><br />In 1967 the artist Sol LeWitt outlined his definition of conceptual art:<br /><br />"In conceptual art the idea or concept is the most important aspect of<br />the work. When an artist uses a conceptual form of art, it means that<br />all of the planning and decisions are made beforehand and the execution<br />is a perfunctory affair. The idea becomes a machine that makes the<br />art."[16]<br /><br />LeWitt's perspective on conceptual art has important implications for<br />code, for in his estimation conceptual art is nothing but a type of code<br />for artmaking. LeWitt's art is an algorithmic process. The algorithm is<br />prepared in advance, and then later executed by the artist (or another<br />artist, for that matter). Code thus purports to be multidimensional.<br />Code draws a line between what is material and what is active, in<br />essence saying that writing (hardware) cannot do anything, but must be<br />transformed into code (software) to be affective. Northrop Frye says a<br />very similar thing about language when he writes that the process of<br />literary critique essentially creates a meta text, outside of the<br />original source material, that contains the critic's interpretations of<br />that text.[17] In fact Kittler defines software itself as precisely that<br />"logical abstraction" that exists in the negative space between people<br />and the hardware they use.[18]<br /><br />How can code be so different than mere writing? The answer to this lies<br />in the unique nature of computer code. It lies not in the fact that code<br />is sub-linguistic, but rather that it is hyper-linguistic. Code is a<br />language, but a very special kind of language. Code is the only language<br />that is executable. As Kittler has pointed out, "[t]here exists no word<br />in any ordinary language which does what it says. No description of a<br />machine sets the machine into motion."[19] So code is the first language<br />that actually does what it says-it is a machine for converting meaning<br />into action.[20] Code has a semantic meaning, but it also has an<br />enactment of meaning. Thus, while natural languages such as English or<br />Latin only have a legible state, code has both a legible state and an<br />executable state. In this way, code is the summation of language plus an<br />executable meta-layer that encapsulates that language.<br /><br />Dreaming<br /><br />Fredric Jameson said somewhere that one of the most difficult things to<br />do under contemporary capitalism is to envision utopia. This is<br />precisely why dreaming is important. Deciding (and often struggling) for<br />what is possible is the first step for a utopian vision based in our<br />desires, based in what we want.<br /><br />Pierre Lévy is one writer who has been able to articulate eloquently the<br />possibility of utopia in the cyberspace of digital computers.[21]<br />"Cyberspace," he writes, "brings with it methods of perception, feeling,<br />remembering, working, of playing and being together. […] The<br />development of cyberspace […] is one of the principle aesthetic and<br />political challenges of the coming century."[22] Lévy's visionary tone<br />is exactly what Jameson warns is lacking in much contemporary discourse.<br />The relationship between utopia and possibility is a close one. It is<br />necessary to know what one wants, to know what is possible to want,<br />before a true utopia may be envisioned.<br /><br />Once of the most important signs of this utopian instinct is the hacking<br />community's anti-commercial bent. Software products have long been<br />developed and released into the public domain, with seemingly no profit<br />motive on the side of the authors, simply for the higher glory of the<br />code itself. "Spacewar was not sold," Steven Levy writes, referring to<br />the early video game developed by several early computer enthusiasts at<br />MIT. "Like any other program, it was placed in the drawer for anyone to<br />access, look at, and rewrite as they saw fit."[23] The limits of<br />personal behavior become the limits of possibility to the hacker. Thus,<br />it is obvious to the hacker that one's personal investment in a specific<br />piece of code can do nothing but hinder that code's overall development.<br />"Sharing of software […] is as old as computers," writes free software<br />guru Richard Stallman, "just as sharing of recipes is as old as<br />cooking."[24] Code does not reach its apotheosis for people, but exists<br />within its own dimension of perfection. The hacker feels obligated to<br />remove all impediments, all inefficiencies that might stunt this quasi-<br />aesthetic growth. "In its basic assembly structure," writes Andrew Ross,<br />"information technology involves processing, copying, replication, and<br />simulation, and therefore does not recognize the concept of private<br />information property."[25] Commercial ownership of software is the<br />primary impediment hated by all hackers because it means that code is<br />limited-limited by intellectual property laws, limited by the profit<br />motive, limited by corporate "lamers."<br /><br />However, greater than this anti-commercialism is a pro-protocolism.<br />Protocol, by definition, is "open source," the term given to a<br />technology that makes public the source code used in its creation. That<br />is to say, protocol is nothing but an elaborate instruction list of how<br />a given technology should work, from the inside out, from the top to the<br />bottom, as exemplified in the RFCs, or "Request For Comments" documents.<br />While many closed source technologies may appear to be protocological<br />due to their often monopolistic position in the market place, a true<br />protocol cannot be closed or proprietary. It must be paraded into full<br />view before all, and agreed to by all. It benefits over time through its<br />own technological development in the public sphere. It must exist as<br />pure, transparent code (or a pure description of how to fashion code).<br />If technology is proprietary it ceases to be protocological.<br /><br />This brings us back to Carnivore, and the desire to release a public<br />domain version of a notorious surveillance tool thus far only available<br />to government operatives. The RSG Carnivore levels the playing field,<br />recasting art and culture as a scene of multilateral conflict rather<br />than unilateral domination. It opens the system up for collaboration<br />within and between client artists. It uses code to engulf and modify the<br />original FBI apparatus.<br /><br />Carnivore Personal Edition<br /><br />On October 1, 2001, three weeks after the 9/11 attacks in the US, the<br />Radical Software Group (RSG) announced the release of Carnivore, a<br />public domain riff on the notorious FBI software called DCS1000 (which<br />is commonly referred to by its nickname "Carnivore"). While the FBI<br />software had already been in existence for some time, and likewise RSG<br />had been developing it's version of the software since January 2001,<br />9/11 brought on a crush of new surveillance activity. Rumors surfaced<br />that the FBI was installing Carnivore willy-nilly on broad civilian<br />networks like Hotmail and AOL with the expressed purpose of intercepting<br />terror-related communication. As Wired News reported on September 12,<br />2001, "An administrator at one major network service provider said that<br />FBI agents showed up at his workplace on [September 11] `with a couple<br />of Carnivores, requesting permission to place them in our core.'"<br />Officials at Hotmail were reported to have been "cooperating" with FBI<br />monitoring requests. Inspired by this activity, the RSG's Carnivore<br />sought to pick up where the FBI left off, to bring this technology into<br />the hands of the general public for greater surveillance saturation<br />within culture. The first RSG Carnivore ran on Linux. An open source<br />schematic was posted on the net for others to build their own boxes. New<br />functionality was added to improve on the FBI-developed technology<br />(which in reality was a dumbed-down version of tools systems<br />administrators had been using for years). An initial core (Alex<br />Galloway, Mark Napier, Mark Daggett, Joshua Davis, and others) began to<br />build interpretive interfaces. A testing venue was selected: the private<br />offices of Rhizome.org at 115 Mercer Street in New York City, only 30<br />blocks from Ground Zero. This space was out-of-bounds to the FBI, but<br />open to RSG.<br /><br />The initial testing proved successful and led to more field-testing at<br />the Princeton Art Museum (where Carnivore was quarantined like a virus<br />into its own subnet) and the New Museum in New York. During the weekend<br />of February 1st 2002, Carnivore was used at Eyebeam to supervise the<br />hacktivists protesting the gathering of the World Economic Forum.<br /><br />Sensing the market limitations of a Linux-only software product, RSG<br />released Carnivore Personal Edition (PE) for Windows on April 6, 2002.<br />CarnivorePE brought a new distributed architecture to the Carnivore<br />initiative by giving any PC user the ability to analyze and diagnose the<br />traffic from his or her own network. Any artist or scientist could now<br />use CarnivorePE as a surveillance engine to power his or her own<br />interpretive "Client." Soon Carnivore Clients were converting network<br />traffic to sound, animation, and even 3D worlds, distributing the<br />technology across the network.<br /><br />The prospect of reverse-engineering the original FBI software was<br />uninteresting to RSG. Crippled by legal and ethical limitations, the FBI<br />software needed improvement not emulation. Thus CarnivorePE features<br />exciting new functionality including artist-made diagnosic clients,<br />remote access, full subject targetting, full data targetting, volume<br />buffering, transport protocol filtering, and an open source software<br />license. Reverse-engineering is not necessarily a simple mimetic<br />process, but a mental upgrade as well. RSG has no desire to copy the FBI<br />software and its many shortcomings. Instead, RSG longs to inject<br />progressive politics back into a fundamentally destabilizing and<br />transformative technology, packet sniffing. Our goal is to invent a new<br />use for data surveillance that breaks out of the hero/terrorist dilemma<br />and instead dreams about a future use for networked data.<br /><br /><a rel="nofollow" href="http://rhizome.org/carnivore">http://rhizome.org/carnivore</a><br /><a rel="nofollow" href="http://rhizome.org/RSG">http://rhizome.org/RSG</a><br /><br />———————————————————–<br /><br />[1] The system at the University of Hawaii was called ALOHAnet and was<br />created by Norman Abramson. Later the technology was further developed<br />by Robert Metcalfe at Xerox PARC and dubbed "Ethernet."<br /><br />[2] Robert Graham traces the etymology of the term to the sport of golf:<br />"The word `hacker' started out in the 14th century to mean somebody who<br />was inexperienced or unskilled at a particular activity (such as a golf<br />hacker). In the 1970s, the word `hacker' was used by computer<br />enthusiasts to refer to themselves. This reflected the way enthusiasts<br />approach computers: they eschew formal education and play around with<br />the computer until they can get it to work. (In much the same way, a<br />golf hacker keeps hacking at the golf ball until they get it in the<br />hole)" (<a rel="nofollow" href="http://www.robertgraham.com/pubs/hacking-dict.html">http://www.robertgraham.com/pubs/hacking-dict.html</a>).<br /><br />[3] Bruce Sterling The Hacker Crackdown (New York: Bantam, 1992), p. 51.<br />See also Hugo Cornwall's Hacker's Handbook (London: Century, 1988),<br />which characterizes the hacker as a benign explorer. Cornwall's position<br />highlights the differing attitudes between the US and Europe, where<br />hacking is much less criminalized and in many cases prima facie legal.<br /><br />[4] Steven Levy, Hackers: Heroes of the Computer Revolution (New York:<br />Anchor Press/Doubleday, 1984), p. ix.<br /><br />[5] This slogan is attributed to Stewart Brand, who wrote that "[o]n the<br />one hand information wants to be expensive, because it's so valuable.<br />The right information in the right place just changes your life. On the<br />other hand, information wants to be free, because the cost of getting it<br />out is getting lower and lower all the time. So you have these two<br />fighting against each other." See Whole Earth Review, May 1985, p. 49.<br /><br />[6] Many hackers believe that commercial software products are less<br />carefully crafted and therefore more prone to exploits. Perhaps the most<br />infamous example of such an exploit, one which critiques software's<br />growing commercialization, is the "BackOrifice" software application<br />created by the hacker group Cult of the Dead Cow. A satire of<br />Microsoft's "Back Office" software suite, BackOrifice acts as a Trojan<br />Horse to allow remote access to personal computers running Microsoft's<br />Windows operating system.<br /><br />[7] For an excellent historical analysis of this transformation see<br />Sterling's The Hacker Crackdown. Andrew Ross explains this<br />transformation by citing, as do Sterling and others, the increase of<br />computer viruses in the late eighties, especially "the viral attack<br />engineered in November 1988 by Cornell University hacker Robert Morris<br />on the national network system Internet. [.] While it caused little in<br />the way of data damage [.], the ramifications of the Internet virus have<br />helped to generate a moral panic that has all but transformed everyday<br />`computer culture.'" See Andrew Ross, Strange Weather: Culture, Science,<br />and Technology in the Age of Limits (New York: Verso, 1991), p. 75.<br /><br />[8] Knight Lightning, "Shadows Of A Future Past," Phrack, vol. 2, no.<br />21, file 3.<br /><br />[9] Knight Lightning, "The Judas Contract," Phrack, vol. 2, no. 22, file<br />3.<br /><br />[10] While many hackers use gender neutral pseudonyms, the online<br />magazine Phrack, with which The Mentor was associated, was characterized<br />by its distinctly male staff and readership. For a sociological<br />explanation of the gender imbalance within the hacking community, see<br />Paul Taylor, Hackers: Crime in the digital sublime (New York: Routledge,<br />1999), pp. 32-42.<br /><br />[11] The Mentor, "The Conscience of a Hacker," Phrack, vol. 1, no. 7,<br />file 3. <a rel="nofollow" href="http://www.iit.edu/~beberg/manifesto.html">http://www.iit.edu/~beberg/manifesto.html</a><br /><br />[12] Sterling, The Hacker Crackdown, p. 184.<br /><br />[13] Ibid.<br /><br />[14] Tom Peters, Liberation Management: Necessary Disorganization for<br />the Nanosecond Nineties (New York: Knopf, 1992), pp. 143-144. An older,<br />more decentralized (rather than distributed) style of organizational<br />management is epitomized by Peter Drucker's classic analysis of General<br />Motors in the thirties and forties. He writes that "General Motors<br />considers decentralization a basic and universally valid concept of<br />order." See Peter Drucker, The Concept of the Corporation (New<br />Brunswick: Transaction, 1993), p. 47.<br /><br />[15] "Introduction," Phrack, v. 1, no. 9, phile [sic] 1.<br /><br />[16] Sol LeWitt, "Paragraphs on Conceptual Art," in Alberro, et al.,<br />eds., Conceptual Art: A Critical Anthology (Cambridge: MIT Press, 1999),<br />p. 12. Thanks to Mark Tribe for bring this passage to my attention.<br /><br />[17] See Northrop Frye, Anatomy of Criticism (Princeton: Princeton UP,<br />1957). See also Fredric Jameson's engagement with this same subject in<br />"From Metaphor to Allegory" in Cynthia Davidson, Ed., Anything<br />(Cambridge: MIT Press, 2001).<br /><br />[18] Friedrich Kittler, "On the Implementation of Knowledge-Toward a<br />Theory of Hardware," nettime<br />(<a rel="nofollow" href="http://www.nettime.org/nettime.w3archive/199902/msg00038.html">http://www.nettime.org/nettime.w3archive/199902/msg00038.html</a>).<br /><br />[19] Kittler, "On the Implementation of Knowledge."<br /><br />[20] For an interesting commentary on the aesthetic dimensions of this<br />fact see Geoff Cox, Alex McLean and Adrian Ward's "The Aesthetics of<br />Generative Code" (<a rel="nofollow" href="http://sidestream.org/papers/aesthetics/">http://sidestream.org/papers/aesthetics/</a>).<br /><br />[21] Another is the delightfully schizophrenic Ted Nelson, inventor of<br />hypertext. See Computer Lib/Dream Machines (Redmond, WA:<br />Tempus/Microsoft, 1987).<br /><br />[22] Pierre Lévy, L'intelligence collective: Pour une anthropologie du<br />cyberspace (Paris: Éditions la Découverte, 1994), p. 120, translation<br />mine.<br /><br />[23] Levy, Hackers, p. 53. In his 1972 Rolling Stone article on the<br />game, Steward Brand went so far as to publish Alan Kay's source code for<br />Spacewar right along side his own article, a practice rarely seen in<br />popular publications. See Brand, "SPACEWAR," p. 58.<br /><br />[24] Richard Stallman, "The GNU Project," available online at<br /><a rel="nofollow" href="http://www.gnu.org/gnu/thegnuproject.html">http://www.gnu.org/gnu/thegnuproject.html</a> and in Chris Dibona (Editor),<br />et al, Open Sources: Voices from the Open Source Revolution (Sebastopol,<br />CA: O'Reilly, 1999).<br /><br />[25] Ross, Strange Weather, p. 80.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />Rhizome.org is a 501©(3) nonprofit organization. If you value this<br />free publication, please consider making a contribution within your<br />means.<br /><br />We accept online credit card contributions at<br /><a rel="nofollow" href="http://rhizome.org/support">http://rhizome.org/support</a>. Checks may be sent to Rhizome.org, 115<br />Mercer Street, New York, NY 10012. Or call us at +1.212.625.3191.<br /><br />Contributors are gratefully acknowledged on our web site at<br /><a rel="nofollow" href="http://rhizome.org/info/10.php3">http://rhizome.org/info/10.php3</a>.<br /><br />Rhizome Digest is supported by grants from The Charles Engelhard<br />Foundation, The Rockefeller Foundation, The Andy Warhol Foundation for<br />the Visual Arts, and with public funds from the New York State Council<br />on the Arts, a state agency.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />Rhizome Digest is filtered by Rachel Greene (rachel@rhizome.org).<br />ISSN: 1525-9110. Volume 7, number 26. Article submissions to<br />list@rhizome.org are encouraged. Submissions should relate to the theme<br />of new media art and be less than 1500 words. For information on<br />advertising in Rhizome Digest, please contact info@rhizome.org.<br /><br />To unsubscribe from this list, visit <a rel="nofollow" href="http://rhizome.org/subscribe.rhiz">http://rhizome.org/subscribe.rhiz</a>.<br /><br />Subscribers to Rhizome Digest are subject to the terms set out in the<br />Member Agreement available online at <a rel="nofollow" href="http://rhizome.org/info/29.php3">http://rhizome.org/info/29.php3</a>.<br />