hacker in Bodo 2015


es one can type a query in5.
Meanwhile there are plenty of physical spaces which offer good coffee, an AC plug, comfortable chairs
and low levels of noise to meet, read and study from local cafes via hacker- and maker spaces, to coworking offices. Many library competitors have access to resources (human, financial, technological and
legal) way beyond the possibilities of even the richest libraries. In ad


hacker in Bodo 2016


e (second) enclosure
(Boyle 2003) of the public domain. Those handful who decide to publicly defend
their actions, speak in the same voice, and tell very similar stories. Aaron
Swartz was an American hacker willing to break both laws and locks in his
quest for free access. In his 2008 “Guerilla Open Access Manifesto” (Swartz
2008), he forcefully argued for the unilateral liberation of scholarly
knowl


hacker in Constant 2015


he various working practices at Constant
Variable. Between 2011 and 2014, Variable housed studios
for Artists, Designers, Techno Inventors, Data Activists,
Cyber Feminists, Interactive Geeks, Textile Hackers, Video
Makers, Sound Lovers, Beat Makers and other digital creators who were interested in using F/LOS software for
their creative experiments.

Why do you think people should use and or practice
Ope


he city’. In three interviews that took place in
Brussels and Paris within a period of one and a half years,
we spoke about the collaborative powers of the GMLstandard, about contact points between hacker and graffiti
cultures and the granularity of gesture.
Based on conversations between Evan Roth (ER), Femke
Snelting (FS), Peter Westenberg (PW), Michele Walther
(MW), Stéphanie Villayphiou (SV), John


to archive graffiti. So this
is like taking a gesture and trying to boil it down to a set of coordinate
points that people can either upload or download. It is a sort of midpoint
between writers and hackers. Graffiti writers can download the software
and have how-to guides for how to do this, they can digitize their tags
ER

2
3

4
5
6
7

Theo Watson http://www.theowatson.com
In its simplest form, L.A.S


rts to be like
a surveillance camera. What happens when someone is caught with a
laptop with all this data?
FS

Your desire to archive, is it also about producing new work?

I see graffiti writers as hackers. They use the city in the same way
as hackers are using computer systems. They are finding ways of using
a system to make it do things that it wasn’t intended to do. I am not
sure graffiti writers see it this way, but I am in this position where I have
friends that are hackers, playing around with digital structures online.
Other friends are into graffiti writing and to me those two camps are
doing the most interesting things right now, but these are two communities that h


d to keep the momentum.
Friends and colleagues send me ideas and ask me to look at things, but
people I don’t know are hard to follow; I don’t think they are publishing
their progress. There is a hackerspace in Porto that has been working on
it, so I see on their blog and Twitter that they are having meetings about
this and are working on it.
Don’t you think having only one prize produces a kind of



ER

Do you think a standard can be subversive? You chose XML because it
is accessible to amateur programmers. But it is also a very formal standard,
and so the interface between graffiti writers and hackers is written in the
language of bureaucracy.
FS

ER (laughs) I thought that there was something funny with that. People
that know XML and the web, they get the joke that something so rigid
and standard


n 300
worth of equipment on him or herself.

I was trying to think of how the challenge could be gamed ... I did not
want to get into a situation where we were getting stressed out because some
smart hacker found a hole in the brief, and bought a next generation iPhone
that somehow just worked. I didn’t want to force people to buy expensive
equipment. This line was more about covering our own ass.
ER


ing, the whole idea of turning a playback
device into a musical instrument, the idea of touching the record: all of
these things are hacks. We could go into a million examples of how graffiti
is like hacker culture.
In terms of that handshake moment between the two communities, I think
that is about realizing that its not about the code and in some sense its not
about the spraypaint. There’s this empow


instead of claiming
some kind of ‘super-user’ status for artists, might provide
a platform for open access and Free Culture not imaginable elsewhere. I’ve admired Cornelia’s contributions to
hacker culture for long. She pioneered as a cyberfeminist
in the 1990s with the hilarious and intelligent net-art piece
Female Extension 2 , co-founded Old Boys Network 3 and
developed seminal projects such


hacker in Constant 2018


in hands-on exercises and
experiments that you now can try at home. This Guide to Techno-Galactic
Software Observation offers methods developed in and inspired by the
context of software production, hacker culture, software studies,
computer science research, Free Software communities, privacy activism,
and artistic practice. It invites you to experiment with ways to stay
with the trouble of software.



presented with the situation that the use of SWOA is condoned when it is
down by researchers and pen testers (e.g., they were hired) and shunned
when done by others (often subject to name calling as hackers or
attackers).]{.when .descriptor} [What: Deep philosophical moment: most
software has a recursive observatory ambition (it wants to be observed
in its execution, output etc.). Debuggers, logs, dashb


hacker in Dean, Dockray, Ludovico, Broekman, Thoburn & Vilensky 2013


e thrills of the rising global ‘telematic’
networks in 1993, reflecting an interest in intertwining culture and technology
with publishing (either cyberpunk science fiction, internet artworks, or hacker
technologies and practices) in both print and digital media. So, printing a
magazine about digital art and culture in that historical moment meant to
be surrounded by stimuli that pushed beyond the us


readers’ eyes and drawing them into a new visual dimension for a while.
And finally, politically: in issue #18 we published a hacktivist fake, a double
page of fake stickers created by the Italian hacker laboratories’ network.
These fake stickers sarcastically simulated the real ones that are mandatory
on any book or CD/DVD sold in Italy, because of the strict law supporting the
168

New Formations


hacker in Dekker & Barok 2017


2013 he introduced me to Kenneth Goldsmith. We are in steady contact, especially through
public events hosted by various cultural centres and galleries.
The first large one was held at Ljubljana’s hackerspace Kiberpipa in 2012. Later came the conferences and workshops
organized by Kuda at a youth centre in Novi Sad (2013), by
the Institute of Network Cultures at WORM, Rotterdam (2014),
WKV and Akademi


or more information see,
The leitmotif of all these events was the digital library
https://monoskop.org/
Digital_libraries#
and their atmosphere can be described as the spirit of
Workshops_and_
early
hacker culture that eventually left the walls of a
conferences.
Accessed 28 May 2016.
computer lab. Only rarely there have been professional
librarians, archivists, and publishers among the speakers, even th


hacker in Graziano 2018


an government. Yet another example would be the increasing number of municipal decrees that make it a crime to offer food, money or shelter to the homeless in many cities in North America and Europe.
Hacker Ethics

This scenario reminds us of the tragic story of Antigone and the age-old question of what to do when the relationship between what the law says and one what feels it is just becomes fraught wi


f ‘pirate care’ becomes apparent as it points to the way in which a number of initiatives have been responding to the current crisis by mobilizing tactics and ethics as first developed within the hacker movement.

As described by Steven Levy in Hackers, the general principles of a hacker ethic include sharing, openness, decentralization, free access to knowledge and tools, and an effort of contributing to society’s democratic wellbeing. To which we could add, following Richard Stall


e rest of society — education, science, government — and eventually, to pervade almost every aspect of everyday life.”
The forceps and the speculum

And thus, in resonance with the tradition of hacker ethics, a number of ‘pirate care’ practices are intervening in reshaping what looking after our collective health will look like in the future. CADUS, for example, is a Berlin based NGO which has


hacker in Hamerman 2015


collaborative knowledge-sharing device.

In contrast, the pirate library actualizes a gift economy based on qualitative
and communal rather than monetized exchange. As Mackenzie Wark writes in _A
Hacker Manifesto_ (2004), “The gift is marginal, but nevertheless plays a
vital role in cementing reciprocal and communal relations among people who
otherwise can only confront each other as buyers and sel


hacker in Mars & Medak 2019


Artificial
Intelligence lab. It was at the MIT Museum that the “Hall of Hacks”
was set up to proudly display the roots of hacking culture. Hacking
culture at MIT takes many shapes and forms. MIT hackers famously
put a fire truck (2006) and a campus police car (1994) onto the
roof of the Great Dome of the campus’s Building 10; they landed
(and then exploded) a weather balloon onto the pitch of Harv


hacker in Mars, Medak & Sekulic 2016


n from what was an unjust,
discriminating and exploitative to a better society, and later guarantee that these
gains would not be dismantled or rescinded. That reminder is, however, more than a

mere hacker pastime, just as the reactions
of the corporations are not easy-going at
all: in mid-2015, Reed Elsevier initiated
a court case against Library Genesis and
Science Hub and by the end of 2015 the
court


hacker in Mattern 2014


econceived as hubs for
civic engagement, where communities can discuss local issues, create media,
and archive community history? 20 Should they incorporate media production
studios, maker-spaces and hacker labs, repositioning themselves in an evolving
ecology of information and educational infrastructures?

These new social functions — which may require new physical infrastructures to
support them —


radient of
knowledge production. Today there’s a lot of talk about — [and action
around](http://www.infodocket.com/2013/12/16/results-of-makerspaces-in-
libraries-study-released/) — integrating hacker labs and maker-spaces. 24 As
Anne Balsamo explains, these sites offer opportunities — embodied, often
inter-generational learning experiences that are integral to the development
of a “technologic


hacker in Mars & Medak 2017


tiated GNU GPL publishing label EGOBOO.bits (2000) (Monoskop,
2016a), meetings of technical enthusiasts Skill sharing (Net.culture club MaMa,
2016b) and various events and gatherings in the fields of hackerism, digital
cultures, and new media art. Marcell regularly talks and runs workshops about
hacking, free software philosophy, digital cultures, social software, semantic web
etc. In 2011–2012 Marcell


lav is an active contributor to the Croatian Right to the City movement
(Pravo na grad, 2016). He interpreted to numerous books into Croatian language,
including Multitude (Hardt & Negri, 2009) and A Hacker Manifesto (Wark,
2006c). He is an author and performer with the internationally acclaimed Zagrebbased performance collective BADco (BADco, 2016). Tomislav writes and talks
about politics of technologi


ce! The Multimedia Institute was an active
part of that history, so it is hardly a surprise that the Public Library project took a
similar path of development and contextualization.
However, European hacker communities were rarely hanging out with critical
digital culture crowds. This is not the place to extensively present the historic
trajectory of different hacker communities, but risking a gross simplification here
is a very short genealogy. The earliest European hacker association was the
German Chaos Computer Club (CCC) founded in 1981. Already in the early
1980s, CCC started to publicly reveal (security) weaknesses of corporate and
governmental computer systems. H


shaping
public discussions, and influencing a wide range of public actors from digital rights
advocacy to political parties (such as Greens and Pirate Party). However, unlike the
Italian and Spanish hackers, CCC did not merge paths with other social and/or
political movements. Italian and Spanish hackers, for instance, were much more
integral to autonomist/anarchist, political and social movements, and they have
kept this tradition until the present day.
PJ & AK: Can you expand this analysis to Eastern Europe, and ex-Yugoslavia
in particular? What were the distinct features of (the development of) hacker
culture in these areas?
MM & TM: Continuing to risk a gross simplification in the genealogy, Eastern
European hacker communities formed rather late – probably because of the
turbulent economic and political changes that Eastern Europe went through after
1989.
In MaMa, we used to run the programme g33koskop (2006


ere a large number of
people develop software collaboratively over the Internet without the exclusion by
property (Benkler, 2006).
There was a period when it seemed that cultural workers, artists and hackers
would follow the successful model of the Free Software Movement and build a
universal commons-based platform for peer produced, shared and distributed
culture, art, science and knowledge – that was


ee Software Movement
and the radically capitalist Silicon Valley start-up culture, and place it into the
larger context of political economy of software development. What are its
consequences for the hacker movement?
MM & TM: Before the 2008 economic crash, in the course of only few years,
most of those start-ups and services had been sold out to few business people who
were able to monetize their platfo


sm and the belief that entrepreneurial spirit,
fostered either by an individual genius or by collective (a.k.a. crowd) endeavour,
could save the world. During that period, unsurprisingly, the idea of hacker
labs/spaces exploded.
Fabulous (self)replicating rapid prototypes, 3D printers, do-it-yourself, the
Internet of Things started to resonate with (young) makers all around the world.
Unfortunately, GNU


the good citizen,’ many
software components would get its source code published on GitHub – which is a
prime example of that game of enclosure in its own right. Such developments
transformed the hacker movement from a genuine political challenge to the
property regime into a science fiction fantasy that sharing knowledge while
keeping hackers’ meritocracy regime intact could fix all world’s problems – if only
we, the hackers, are left alone to play, optimize, innovate and make that amazing
technology!
THE SOCIAL LIFE OF DIGITAL TECHNOLOGIES

PJ & AK: This brings about the old debate between technological determinism
and social determinism, which never seems to go out of fashion. What is your take,
253

CHAPTER 12

as active hackers and social activists, on this debate? What is the role of
(information) technologies in social development?
MM & TM: Any discussion of information technologies and social
development requires the fol


Movement. In the spectacular chain of recent events, where the
revelations of sweeping control and surveillance of electronic communications
brought about new heroes (Manning, Assange, Snowden), the hacker is again
reduced to the heroic cypherpunk outlaw. This firmly lies within the old Cold War
paradigm of us (the good guys) vs. them (the bad guys). However, only rare and
talented people are able to ma


l imaginary can be gained
from that venturing aspect of contemporary art. Having said that, art does not need
to be political in order to be relevant and strong.

261

CHAPTER 12

THE DOUBLE LIFE OF HACKER CULTURE

PJ & AK: The Public Library project (Memory of the World, 2016a) is essentially
pedagogical. When everyone is a librarian, and all books are free, living in the
world transforms into living w


so The Public Library project is also
essentially anti-capitalist. This brings us to the intersections between critical
pedagogy of Paulo Freire, Peter McLaren, Henry Giroux, and others – and the
hacker culture of Richard Stallman, Linus Torvalds, Steven Lévy, and others. In
spite of various similarities, however, critical pedagogy and hacker culture disagree
on some important points.
With its deep roots in Marxism, critical theory always insists on class analysis.
Yet, imbued in the Californian ideology (Barbrook and Cameron, 1996), the hacker
culture is predominantly individualist. How do you go about the tension between
individualism and collectivism in The Public Library project? How do you balance
these forces in your overall work?
MM & TM: Hacker culture has always lived a double life. Personal computers
and the Internet have set up a perfect projection screen for a mind-set which
understands autonomy as a pursuit for personal self-realisation


f limitless and unconditional freedom, and easily melds
with entrepreneurial culture of the Silicon Valley. Therefore, it is hardly a surprise
that individualism has become the hegemonic narrative of hacker culture.
However, not all hacker culture is individualist and libertarian. Since the 1990s, the
hacker culture is heavily divided between radical individualism and radical
mutualism. Fred Turner (2006), Richard Barbrook and Andy Cameron (1996) have
famously shown that radical individualism was built on


ons, and create openings where technologies and
infrastructures can be re-claimed for radically collective and redistributive
endeavours. In that context, we are critical of recent attempts to narrow hacker
culture down to issues of surveillance, privacy and cryptography. While these
issues are clearly important, they (again) reframe the hacker community through
the individualist dichotomy of freedom and privacy, and, more broadly, through
the hegemonic discourse of the post-historical age of liberal capitalism. In this
way, the essential building blocks of the hacker culture – relations of production,
relations of property, and issues of redistribution – are being drowned out, and
262

KNOWLEDGE COMMONS AND ACTIVIST PEDAGOGIES

collective and massive endeavou


rld remains a weird hybrid where knowledge is produced in both
academic and non-academic settings, through academic curricula – but also
through fairs, informal gatherings, homebrew computer clubs, hacker communities
and the like. Without the enthusiasm and the experiments with ways how
knowledge can be transferred and circulated between peers, we would have
probably never arrived to the Personal Compu


ut falling under the same
umbrella, and they bring together people of varying levels of skill – who bring in
various types of knowledge, and who arrive from various social backgrounds.
Working with hackers, we favour hands-on approach. For a number of years
Marcell has organized weekly Skill Sharing program (Net.culture club MaMa,
2016b) that has started from very basic skills. The bar was incrementally raised to
today’s level of the highly specialized meritocratic community of 1337 hackers. As
267

CHAPTER 12

the required skill level got too demanding, some original members left the group –
yet, the community continues to accommodate geeks and freaks. At the other end,
we maintain


hacker in Medak, Mars & WHW 2015


a
but there’s added metadata, or data about data, enabling its movement.
Needless to say the old culture industries went
into something of a panic about all this. As I wrote
over ten years ago in A Hacker Manifesto, “information wants to be free but is everywhere in chains.”
It is one of the qualities of information that it is indifferent to the medium that carries it and readily
escapes being boun


actions to our initiatives. In this sense the autonomists are right, only
it was not so much the actions of the working class
to which the ruling class had to respond in this case,
as what I call the hacker class. They had to recuperate a whole social movement, and they did. So our
tactics have to change.
In the past we were acting like data-punks. Not
so much “here’s three chords, now form your band


hacker in Medak, Sekulic & Mertens 2014


a somewhat less automated yet distributed scanning
process than highly automated and sophisticated scanner hacks developed at various hacklabs. A
brief overview of one such scanner, developed at the Hacker Space Bruxelles, is also included in
this manual.
The Public Library scanning process proceeds thus in following discrete steps:

1. creating digital images of pages of a book,
2. manual transfer of


nge to the
naming convention of your cameras, and recompile by running the following command in your
terminal: "gcc scanflow.c -o scanflow -ludev `pkg-config --cflags --libs gtk+-2.0`"
In the case of Hacker Space Bruxelles scanner, this is handled by the same script that operates the cameras that can be
downloaded from: http://git.constantvzw.org/?
p=algolit.git;a=tree;f=scanbot_brussel;h=81facf5cb106a8e


complete the OCR
- save the file

REFERENCES
For more information on the book scanning process in general and making your own book scanner
please visit:
DIY Book Scanner: http://diybookscannnner.org
Hacker Space Bruxelles scanner: http://hackerspace.be/ScanBot
Public Library scanner: http://www.memoryoftheworld.org/blog/2012/10/28/our-belovedbookscanner/
Other scanner builds: http://wiki.diybookscanner.


r.sourceforge.net/
gscan2pdf: http://sourceforge.net/projects/gscan2pdf/
Canon Hack Development Kit firmware: http://chdk.wikia.com
Tesseract: http://code.google.com/p/tesseract-ocr/
Python script of Hacker Space Bruxelles scanner: http://git.constantvzw.org/?
p=algolit.git;a=tree;f=scanbot_brussel;h=81facf5cb106a8e4c2a76c048694a3043b158d62;hb=HEA
D



hacker in Sekulic 2015


Eurozine

[PDF/PRINT](https://www.eurozine.com/legal-hacking-and-space/?pdf)



e've
started to become a kind of society of people who give up their responsibility
to participate by handing it over to some charismatic leaders, experts of [a]
different type" (2013). Free software hackers, in order to understand and take
part in a constant negotiation that takes place on a legal level between the
market that seeks to cloister the code and hackers who want to keep it free,
had to become literate in an arcane legal language. Gabriella Coleman notes in
_Coding Freedom_ that hacker forums sometimes tend to produce legal analysis
that is just as serious as one would expect to find in a law office. Like the
occupants of Teatro Valle, free software hackers understand the importance of
devoting time and energy to understand constraints and to find ways to
structurally divert them.

This type of knowledge is not shared and created in isolation, but in
socialization, in discussions in physical or cyber spaces (such as #irc chat
rooms, forums, mailing lists…), the same way free software hackers share their
knowledge about code. Through this process of socializing knowledge, "the
community is formed, developed, and reproduced through practices focused on
common space. To generalize this prin


hacker in Sollfrank 2018


raries and collections are part of the
Guerilla Open Access movement (GOA) and thus practical manifestations of Aaron
Swartz’s “Guerilla Open Access Manifesto”.25 In this manifesto the American
hacker and activist pointed out the flaws of open access politics and aimed at
recruiting supporters for the idea of “radical” open access. Radical in this
context means to completely ignore copyright an


hacker in Sollfrank & Kleiner 2012


ommodity form of culture.

[14:11]
Copyleft

[14:15]
C.S.: Could you please explain what copyleft is, where it comes from.

[14:20]
Copyleft comes out of the software community, the hacker community. It doesn’t
come out of artistic practice per se. And it comes out of the need to share
software. [14:30] Famously, Richard Stallman and the Free Software Foundation
started this project c


d of, very
famous and important project. [14:44] And they publish the license called the
GPL, which sort of defined the copyleft idea. And copyleft is a very clever
kind of a hack, as they say in the hacker community. [14:53] What it does is
that it asserts copyright, full copyright, in order to provide a public
license, a free license. And it requires that any derivative work also carries
the same licen


of capitalism and because of the economic logic of the market, with
centralised communication platforms like Twitter and Facebook. [38:40] And
despite that, within the free software community and the hacker community,
there's the opposite myth, just like the copyright myth. There's this idea
that we are moving towards decentralised software. [38:54] You see people like
Eben Moglen making this point a lot


hacker in Sollfrank & Mars 2013


like a router. [07:56] You can do that
also if you have control of your router, or what we usually call modem, so the
device which you use to get to the Internet. But that is quite hard to hack,
just hackers know how to do that. [08:13] So I just made a server on the
Internet which you can use with one click, and it just routes the traffic
between you, if you’re a librarian, and your users, readers. S


e books, in order to download and
make your catalogue, is Library Genesis. It’s around 900,000 books. It’s
libgen.info, libgen.org. And it’s a great project. [10:33] It’s done by some
Russian hackers, who also allow anyone to download all of that. It’s 9
Terabytes of books, quite some chunk of hard disks which you need for that.
[10:47] And you can also download PHP, the back end of the website


hacker in Stalder 2018


uch else, this situation began to change in the 1960s. Mass
media and information-processing technologies began to attract
criticism, even though all of the involved subcultures, media activists,
and hackers continued to act independently from one another until the
1990s. The freedom-oriented social movements of the 1960s began to view
the mass media as part of the political system against which they wer


cal activity.[^77[]{#Page_47 type="pagebreak"
title="47"}^](#c1-note-0077){#c1-note-0077a}

This difference was dissolved entirely by a new generation of
politically motivated artists, activists, and hackers, who transferred
the tactics of civil disobedience -- blockading a building with a
sit-in, for instance -- to the
internet.[^78^](#c1-note-0078){#c1-note-0078a} When, in 1994, the
Zapatista Army of N


kan Soltani,
"NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden
Documents Say," *Washington Post* (October 30, 2013), online.

[11](#c3-note-0011a){#c3-note-0011}  Initiated by hackers and activists,
the Mailpile project raised more than \$160,000 in September 2013 (the
fundraising goal had been just \$100,000). In July 2014, the rather
business-oriented project ProtonMail raised \


hacker in Weinmayr 2019




Chan, Sewell (1 July 2009) ‘Judge Rules for J. D. Salinger in “Catcher”
Copyright Suit’, New York Times,


Coleman, Gabriella (2014) Hacker, Hoaxer, Whistleblower, Spy: The Many Faces
of Anonymous (London and New York: Verso).

Corbett, Rachel (14 November 2012) New York Supreme Court Judge Dismisses Marc
Jancou’s Lawsuit Against Sotheb


st anonymously. ‘The posts on 4chan have no names or
any identifiable markers attached to them. The only thing you are able to
judge a post by is its content and nothing else.’ Gabriella Coleman, Hacker,
Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (London and New York:
Verso, 2014), p. 47.

[118](ch11.xhtml#footnote-408-backlink) I thank Susan Kelly for making this
point while reviewing


hacker in WHW 2016


launched by Marcell Mars and
Tomislav Medak in 2012, is an ongoing media and social project based on
ideas from the open-source software movement, while Autonomy Cube, by
artist Trevor Paglen and the hacker and computer security researcher Jacob Appelbaum, centres on anonymized internet usage in the post–Edward
*
1
2
3
4
5

David Harvey, Rebel Cities: From the Right to the City to the Urban Revolution,


nd constructivist praxis is present in the work
Autonomy Cube, which was developed through the combined expertise of
artist and geographer Trevor Paglen and internet security researcher, activist and hacker Jacob Appelbaum. This work, too, we presented in the
Reina Sofia exhibition Really Useful Knowledge, along with Public Library
and other projects that offered a range of strategies and methodologies
t

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.