hacker in Bodo 2015


s. Textbooks can be
rented, e-books can be lent, a number of new startups and major sellers offer flat rate access to huge
collections. Expertise that helps navigate the domains of knowledge is abundant, there are multiple
authoritative sources of information and meta-information online. The search box of the library catalog is
only one, and not even the most usable of all the different search boxes one can type a query in5.
Meanwhile there are plenty of physical spaces which offer good coffee, an AC plug, comfortable chairs
and low levels of noise to meet, read and study from local cafes via hacker- and maker spaces, to coworking offices. Many library competitors have access to resources (human, financial, technological and
legal) way beyond the possibilities of even the richest libraries. In addition, publishers control the
copyrights in digital copies which, absent of well fortified statutory limitations and exceptions, prevent
libraries keeping up with the changes in user habits and with the competing commercial services.
Libraries definitely feel the pressure. “Libraries’ offers of materials […] compete with many other offers
that aim to attract the attention of the public. [


hacker in Bodo 2016


collective memory, the Internet becomes the latest
in a long series of tools that clandestine information networks use to build
alternative publics through the illegal sharing of outlawed texts.

In that sense, the pirate library is a utopian project and something more.
Pirate librarians regard their libraries as a legitimate form of resistance
against the commercialization of public resources, the (second) enclosure
(Boyle 2003) of the public domain. Those handful who decide to publicly defend
their actions, speak in the same voice, and tell very similar stories. Aaron
Swartz was an American hacker willing to break both laws and locks in his
quest for free access. In his 2008 “Guerilla Open Access Manifesto” (Swartz
2008), he forcefully argued for the unilateral liberation of scholarly
knowledge from behind paywalls to provide universal access to a common human
heritage. A few years later he tried to put his ideas into action by
downloading millions of journal articles from the JSTOR database without
authorization. Alexandra Elbakyan is a 27-year-old neurotechnology researcher
from Kazakhstan and the founder of Sci-hub, a piratical collection of tens of
millions of journal articles t


hacker in Constant 2015


ve a green
bar to tell where the binding is. However when you do a lot of folds, you
usually want to do a staple. But if you are stapling and there is not an actual
fold there, than you are screwed.

83

The following statements were recorded by Urantsetseg
Ulziikhuu (Urana) in 2014. She studied communication in
Istanbul and Leuven and joined Constant for a few months
to document the various working practices at Constant
Variable. Between 2011 and 2014, Variable housed studios
for Artists, Designers, Techno Inventors, Data Activists,
Cyber Feminists, Interactive Geeks, Textile Hackers, Video
Makers, Sound Lovers, Beat Makers and other digital creators who were interested in using F/LOS software for
their creative experiments.

Why do you think people should use and or practice
Open Source software? What is in it for you?
Urantsetseg Ulziikhuu

The knitting machine that I am using normally has a
computer from the eighties. Some have these scanners that are really old
and usually do not work anymore. They became obsolete. If it wasn’t for
Open Source, we couldn’t use these technologies anymore. Open Source
developers decided that they should do something about these mach


he summer of 2010, Constant commissioned artist and
researcher Evan Roth to develop a work of his choice, and
to make the development process available in some way.
He decided to use a part of his fee as prize-money for
The GML-Recorder Challenge, inviting makers to propose an Open Source device ‘that can unobtrusively record
graffiti motion data during a graffiti writer’s normal practice in the city’. In three interviews that took place in
Brussels and Paris within a period of one and a half years,
we spoke about the collaborative powers of the GMLstandard, about contact points between hacker and graffiti
cultures and the granularity of gesture.
Based on conversations between Evan Roth (ER), Femke
Snelting (FS), Peter Westenberg (PW), Michele Walther
(MW), Stéphanie Villayphiou (SV), John Haltiwanger (JH)
and momo3010.
Brussels, July 2010
ER
FS

So what should we talk about?

Can you explain what GML stands for?

GML stands for Graffiti Markup Language 1 . It is a very simple fileformat designed for amateur programmers. It is a way to store graffiti
motion data. I started working with graffiti writers, combining graffiti
and technology back in New York, in 2003. In graduate school


es
you have: is it one stroke or two strokes or three strokes.
The main idea is: How do you archive the motion of graffiti and not just
the way graffiti looks. There are a lot of people photographing graffiti,
making documentaries etc. but there hasn’t been a way to archive graffiti
in ways of code yet.
FS

What do you mean, ‘archive in terms of code’?

There hasn’t been a programmatic way to archive graffiti. So this
is like taking a gesture and trying to boil it down to a set of coordinate
points that people can either upload or download. It is a sort of midpoint
between writers and hackers. Graffiti writers can download the software
and have how-to guides for how to do this, they can digitize their tags
ER

2
3

4
5
6
7

Theo Watson http://www.theowatson.com
In its simplest form, L.A.S.E.R. Tag is a camera and laptop setup, tracking a green laser
point across the face of a building and generating graphics based on the laser’s position which
then get projected back onto the same building with a high power projector.
http://graffitiresearchlab.com/projects/laser-tag
Graffiti Analysis is a digital graffiti blackbook designed for documenting more than just ink.
http://graffitiana


racters. Another group is interested in it, because
it is a sport and more of a performance art. For this type of interest, it
is more important to know exactly where and when it happened because
it is different on a rooftop in New York to a studio in the basement of
someones house. But if someone realizes this data resulted from an illegal
action, and wanted to tie it back to someone, than it starts to be like
a surveillance camera. What happens when someone is caught with a
laptop with all this data?
FS

Your desire to archive, is it also about producing new work?

I see graffiti writers as hackers. They use the city in the same way
as hackers are using computer systems. They are finding ways of using
a system to make it do things that it wasn’t intended to do. I am not
sure graffiti writers see it this way, but I am in this position where I have
friends that are hackers, playing around with digital structures online.
Other friends are into graffiti writing and to me those two camps are
doing the most interesting things right now, but these are two communities that hardly overlap. One of the interests I have is making these
two groups of people hang out more. I was physically the person bridging these two groups; I was the nerd person meeting the graffiti writers
talking to them about software and having this database.
Now it is not about my personal collection anymore, it is making a handshake between two communities; making them run off with each other
and


Makezine http://makezine.com/pub/au/Phillip_Torrone

225

Tying the story to data

kudo’s from the community, but if you solved one of my projects, you
don’t really get kudo’s from my community, do you?
Having the money associated makes it this big thing. At Ars Electronica
and so on, it got people talking about it and so it is out there. That
part worked. Beyond that it has been a bit hard to keep the momentum.
Friends and colleagues send me ideas and ask me to look at things, but
people I don’t know are hard to follow; I don’t think they are publishing
their progress. There is a hackerspace in Porto that has been working on
it, so I see on their blog and Twitter that they are having meetings about
this and are working on it.
Don’t you think having only one prize produces a kind of exclusivity? It
seems logical not to publish your notes?
FS

ER Maybe. Kyle 19 has been thinking up ways to do it and I know he
wanted to use an optical mouse, and then this a friend Michael 20 has been
using sensors, and he ran into a software problem but had the hardware
problem more or less solved. And then Kyle, a software expert, has been
running into hardware problems and so I kind of intro


es. I wanted to work with who’s tag was on my mailbox, who’s
tag do I see a million times when I walk down the street. Since then
a lot has happened, like with more popular projects such as L.A.S.E.R.
Tag, and it goes almost always further away from graffiti. Maybe that is
a function of technology. Technology, or the way it is now, will always
drift towards entertainment uses, commercial uses.
ER

Do you think a standard can be subversive? You chose XML because it
is accessible to amateur programmers. But it is also a very formal standard,
and so the interface between graffiti writers and hackers is written in the
language of bureaucracy.
FS

ER (laughs) I thought that there was something funny with that. People
that know XML and the web, they get the joke that something so rigid
and standardized is connected to writing your name on the wall. But to
be honest, it was really just a pragmatic choice.

It reminds me of an interview 28 with François Chastanet who wrote a
book 29 about tagging in Los Angeles. He explains that the Gothic lettering
is inspired by administrative papers!
SV

I am wondering whether you’re thinking about the standard itself as
a space for hacking?
FS

Graffit


it so small
that the design would be impossible.

ER

30

GML-recorder challenge as published on:
http://www.graffitimarkuplanguage.com/challenges

237

.

Tying the story to data



Computers and equipment outside of the 300

can be used

for non-field activities (such as downloading and manipulating data captured in-field), but at the time of
capture a graffiti writer should have no more than 300
worth of equipment on him or herself.

I was trying to think of how the challenge could be gamed ... I did not
want to get into a situation where we were getting stressed out because some
smart hacker found a hole in the brief, and bought a next generation iPhone
that somehow just worked. I didn’t want to force people to buy expensive
equipment. This line was more about covering our own ass.
ER



The graffiti writer must be able to activate the recording function alone (i.e., without assistance from anyone else).
FS

Are you going to be out of work soon?

Thinking selfishly, I screw up on documentation a lot because I have
too many hats. When I’m going out doing this, I am carrying a laptop, a
calibration set up, I also have one video-camera on me that is just documenting, I have an


nts might
there be? Do you see any similarities and differences?

For me, even beyond technology and beyond graffiti it all boils down to
this idea of the hack that is really a phenomenon that has been going on
forever. It’s taking this system that has some sort of rigidity and repeating
elements and flipping it into doing something else. I see this in Hip Hop,
of course. The whole idea of sampling, the whole idea of turning a playback
device into a musical instrument, the idea of touching the record: all of
these things are hacks. We could go into a million examples of how graffiti
is like hacker culture.
In terms of that handshake moment between the two communities, I think
that is about realizing that its not about the code and in some sense its not
about the spraypaint. There’s this empowering idea of individual small actors
assuming control over systems that are bigger than themselves. To me, that’s
the connection point, whether its Hip Hop or rap or programming.
The similarities are there. I think there are huge differences in those communities too. One of them is this idea of the hustler from Hip Hop: the
idea of hustling doesn’t have anything to do with the economy of gift


north of
Germany to meet with artist Cornelia Sollfrank. It was
right after the Libre Graphics Meeting, and the impressions from the event were still very fresh. Cornelia had
asked me for a video interview as part of Giving what you
don’t have, 1 a series of conversations about what she refers
to as ‘complex copyright-critical practices’. She was interested in forms of appropriation art that instead of claiming
some kind of ‘super-user’ status for artists, might provide
a platform for open access and Free Culture not imaginable elsewhere. I’ve admired Cornelia’s contributions to
hacker culture for long. She pioneered as a cyberfeminist
in the 1990s with the hilarious and intelligent net-art piece
Female Extension 2 , co-founded Old Boys Network 3 and
developed seminal projects such as the Net Art Generator.
The opportunity to spend two sunny spring days with her
intelligence, humour and cyberfeminist wisdom could not
have come at a better moment.
What is Libre Graphics?

Libre Graphics is quite a large ecosystem of software tools; of people, people
that develop these tools but also people that use these tools; practices, like
how do you work with them, not just how do you ma


hacker in Constant 2018


play.

We adopted the term techno-galactic to match the advertised capability
of \"scaling up to the universe\" that comes in contemporary paradigms
of computation, and to address different scales of software communities
and related political economies that involve and require observation.

Drawing on theories of software and computation developed in academia
and elsewhere, we grounded our methods in hands-on exercises and
experiments that you now can try at home. This Guide to Techno-Galactic
Software Observation offers methods developed in and inspired by the
context of software production, hacker culture, software studies,
computer science research, Free Software communities, privacy activism,
and artistic practice. It invites you to experiment with ways to stay
with the trouble of software.

The Techno-Galactic Software Observatory
----------------------------------------

In the summer of 2017, around thirty people gathered in Brussels to
explore practices of proximate critique with and of software in the
context of a worksession entitled \"Techno-Galactic Software
Observatory\".^[2](#bcaacdcf)^ The worksession called for
software-curious people of all kinds to ask questions about so


go and conceptual framework of choice etc. This type of observation
may be turned into a service (See also: Something in the Middle Maybe
(SitMM)).]{.how .descriptor} [When: Ideally, SWOA can be used everywhere
and in every situation. In reality, institutions, laws and
administrators like to limit the use of SWOA on infrastructures to
people who are also administering these networks. Hence, we are
presented with the situation that the use of SWOA is condoned when it is
down by researchers and pen testers (e.g., they were hired) and shunned
when done by others (often subject to name calling as hackers or
attackers).]{.when .descriptor} [What: Deep philosophical moment: most
software has a recursive observatory ambition (it wants to be observed
in its execution, output etc.). Debuggers, logs, dashboards are all
instances of software with observatory ambitions and can not be
separated from software itself. Continuous integration is the act of
folding the whole software development process into one big feedback
loop. So, what separates SWOA from software itself? Is it the intention
of observing software with a critical, agonistic or adversarial
perspective vs one focused on productivity and e


hacker in Dean, Dockray, Ludovico, Broekman, Thoburn & Vilensky 2013


a central place in the media projects we’re discussing. Alessandro, you
make that point, above, that Neural has ‘always experimented with publishing
in various ways’. Can you describe particular examples? It would be very
interesting to hear from you about Neural in this regard, but also about your
art projects ‘Amazon Noir’ and ‘Face to Facebook’.
AL Neural started surrounded by the thrills of the rising global ‘telematic’
networks in 1993, reflecting an interest in intertwining culture and technology
with publishing (either cyberpunk science fiction, internet artworks, or hacker
technologies and practices) in both print and digital media. So, printing a
magazine about digital art and culture in that historical moment meant to
be surrounded by stimuli that pushed beyond the usual structural design
forms and conceptual paradigms of publishing. After almost two decades we
can recognise also that that time was the beginning of the most important
mutation of publishing, through its new networked, screen-based and real
time dimensions. And the printed page started also to have a different role
in the late 2000s, but this role is still to be extensively defined.
At that time


was
strictly in binary numbers, just zeros and ones, even if the printer started to
complain that this was driving him crazy. But also sensorially: we referred
to optical art, publishing large ‘optical’ artworks in the centrefold; and we
published ‘stereograms’ apparently rude black and white images, that when
viewed from a different angle revealed a three-dimensional picture, tricking
the readers’ eyes and drawing them into a new visual dimension for a while.
And finally, politically: in issue #18 we published a hacktivist fake, a double
page of fake stickers created by the Italian hacker laboratories’ network.
These fake stickers sarcastically simulated the real ones that are mandatory
on any book or CD/DVD sold in Italy, because of the strict law supporting the
168

New Formations

national Authors’ and Musicians’ Society (SIAE). On the ones we published the
‘Unauthorized Duplication Prohibited’ sentence was replaced by: ‘Suggested
Duplication on any Media’.
As another example, in issue #30 we delivered ‘Notepad’ to all our
subscribers - an artwork by the S.W.A.M.P. duo. It was an apparently ordinary
yellow legal pad, but each ruled line, when magnified, re


hacker in Dekker & Barok 2017


its repository of highlighted publications
Monoskop Log in 2009, and the broadening of its focus to
also include the whole of the twentieth and twenty-first
century situates it more firmly in the context of online
archives, and especially digital libraries.
I only got to know others in this milieu later. I approached
Sean Dockray in 2010, Marcell Mars approached me the
following year, and then in 2013 he introduced me to Kenneth Goldsmith. We are in steady contact, especially through
public events hosted by various cultural centres and galleries.
The first large one was held at Ljubljana’s hackerspace Kiberpipa in 2012. Later came the conferences and workshops
organized by Kuda at a youth centre in Novi Sad (2013), by
the Institute of Network Cultures at WORM, Rotterdam (2014),
WKV and Akademie Schloss Solitude in Stuttgart (2014),
Mama & Nova Gallery in Zagreb (2015), ECC at Mundaneum,
Mons (2015), and most recently by the Media Department
8
of the University of Malmo (2016).8
For more information see,
The leitmotif of all these events was the digital library
https://monoskop.org/
Digital_libraries#
and their atmosphere can be described as the spirit of
Workshops_and_
early
hacker culture that eventually left the walls of a
conferences.
Accessed 28 May 2016.
computer lab. Only rarely there have been professional
librarians, archivists, and publishers among the speakers, even though the voices represented were quite diverse.
To name just the more frequent participants... Marcell
and Tom Medak (Memory of the World) advocate universal
access to knowledge informed by the positions of the Yugoslav

219

COPYING AS A WAY TO START SOMETHING NEW

Marxist school Praxis; Sean’s work is critical of the militarization and commercialization of the university (in the
context of wh


hacker in Graziano 2018


date on the part of the Home Office and a threat to public health, given that it effectively discouraged patients to seek help for fear of retaliations. Another sadly famous example of this trend of pushing many acts of care towards illegality would the straitjacketing and criminalization of migrant rescuing NGOs in the Mediterranean on the part of various European countries, a policy led by Italian government. Yet another example would be the increasing number of municipal decrees that make it a crime to offer food, money or shelter to the homeless in many cities in North America and Europe.
Hacker Ethics

This scenario reminds us of the tragic story of Antigone and the age-old question of what to do when the relationship between what the law says and one what feels it is just becomes fraught with tensions and contradictions. Here, the second meaning of ‘pirate care’ becomes apparent as it points to the way in which a number of initiatives have been responding to the current crisis by mobilizing tactics and ethics as first developed within the hacker movement.

As described by Steven Levy in Hackers, the general principles of a hacker ethic include sharing, openness, decentralization, free access to knowledge and tools, and an effort of contributing to society’s democratic wellbeing. To which we could add, following Richard Stallman, founder of the free software movement, that “bureaucracy should not be allowed to get in the way of doing anything useful.” While here Stallman was reflecting on the experience of the M.I.T. AI Lab in 1971, his critique of bureaucracy captures well a specific trait of the techno-political nexus that is also shaping the present moment: as more technologies come to mediate everyday interact


the solution, Graeber’s study highlights how historically all so-called “free markets” have actually been made possible through the strict enforcement of state regulations. Since the birth of the modern corporation in 19th century America, “bureaucratic techniques (performance reviews, focus groups, time allocation surveys …) developed in financial and corporate circles came to invade the rest of society — education, science, government — and eventually, to pervade almost every aspect of everyday life.”
The forceps and the speculum

And thus, in resonance with the tradition of hacker ethics, a number of ‘pirate care’ practices are intervening in reshaping what looking after our collective health will look like in the future. CADUS, for example, is a Berlin based NGO which has recently set up a Crisis Response Makerspace to build open and affordable medical equipment specifically designed to bring assistance in extreme crisis zones where not many other organizations would venture, such as Syria and Northern Iraq. After donating their first mobile hospital to the Kurdish Red Crescent last year, CADUS is now working to develop a second version, in a container this time, a


hacker in Hamerman 2015


uilders by uploading
often-copyrighted content to shared networks.

Within the so-called “ _[sharing
economy](https://en.wikipedia.org/wiki/Sharing_economy)_ ,” users essentially
lease e-book content from information corporations such as Amazon, which
markets both the Kindle as platform. This centralization of intellectual
property has dire impacts on the openness of the digital book as a
collaborative knowledge-sharing device.

In contrast, the pirate library actualizes a gift economy based on qualitative
and communal rather than monetized exchange. As Mackenzie Wark writes in _A
Hacker Manifesto_ (2004), “The gift is marginal, but nevertheless plays a
vital role in cementing reciprocal and communal relations among people who
otherwise can only confront each other as buyers and sellers of commodities.”

From theorizing new media art to building solidarity against repressive
regimes, such communal information networks can crucially articulate shared
bodies of political and aesthetic desire and meaning. According to author
Matthew Stadler, literature is by nature communal. “Literature is not owned,”
he writes. “It is, by definition, a space of mutually negotiated


hacker in Mars & Medak 2019


rsal access to knowledge
central to social development, some universities stand out more
than the others. Consider, for example, the Massachusetts Institute
of Technology (MIT). The Free Culture and Open Access movements
have never hidden their origins, inspiration, and model in the
success of the Free Software Movement, which was founded in
1984 by Richard Stallman while he was working at the MIT Artificial
Intelligence lab. It was at the MIT Museum that the “Hall of Hacks”
was set up to proudly display the roots of hacking culture. Hacking
culture at MIT takes many shapes and forms. MIT hackers famously
put a fire truck (2006) and a campus police car (1994) onto the
roof of the Great Dome of the campus’s Building 10; they landed
(and then exploded) a weather balloon onto the pitch of Harvard
Stadium during a Harvard–­Yale football game; turned the quote
that “getting an education from MIT is like taking a drink from a Fire
Hose” into a literal fire hydrant serving as a drinking fountain in
front of the largest lecture hall on campus; and many, many other
“hacks” (Peterson 2011).
The World Wide Web Consortium was founded at MIT in 1993.
Presently its mission states as it


hacker in Mars, Medak & Sekulic 2016


cess to books, journals and digitised knowledge to all who find themselves
outside the rich academic institutions of the
West and who do not have the privilege of
institutional access.
These shadow public libraries bravely remind society of all the watershed moments in the struggles and negotiations
that have resulted in the establishment
of social institutions, so as to first enable
the transition from what was an unjust,
discriminating and exploitative to a better society, and later guarantee that these
gains would not be dismantled or rescinded. That reminder is, however, more than a

mere hacker pastime, just as the reactions
of the corporations are not easy-going at
all: in mid-2015, Reed Elsevier initiated
a court case against Library Genesis and
Science Hub and by the end of 2015 the
court in New York issued a preliminary
injunction ordering the shut-down of
their domains and access to the servers. At
the same time, a court case was brought
against Aaaaarg in Quebec.
Shadow public libraries are also a
reminder of how technological complexity does not have to be harnessed only in
the conversion of socialised resources back
into the simplified formulaic logic of private property, how


hacker in Mattern 2014


ir narrative” — or what I’d
call an “epistemic framing,” by which I mean the way the library packages its
program as a knowledge institution, and the infrastructures that support it —
“must include everyone,” says the University of Michigan’s Kristin
Fontichiaro. 19 What programs and services are consistent with an institution
dedicated to lifelong learning? Should libraries be reconceived as hubs for
civic engagement, where communities can discuss local issues, create media,
and archive community history? 20 Should they incorporate media production
studios, maker-spaces and hacker labs, repositioning themselves in an evolving
ecology of information and educational infrastructures?

These new social functions — which may require new physical infrastructures to
support them — broaden the library’s narrative to include _everyone_ , not
only the “have-nots.” This is not to say that the library should abandon the
needy and focus on an elite patron group; rather, the library should
incorporate the “enfranchised” as a key public, both so that the institution
can reinforce its mission as a social infrastructure for an inclusive public,
_and_ so that privileged, ed


rnal.org/wp-content/uploads/2014/06/mattern-
library-infrastructure-15x.jpg)Mansueto Library stacks. [Photo by [Corey
Seeman](https://www.flickr.com/photos/cseeman/14148827344/)]

Back in the early aughts, when I spent a summer touring libraries, the
institutions on the leading edge were integrating media production facilities,
recognizing that media “consumption” and “creation” lie on a gradient of
knowledge production. Today there’s a lot of talk about — [and action
around](http://www.infodocket.com/2013/12/16/results-of-makerspaces-in-
libraries-study-released/) — integrating hacker labs and maker-spaces. 24 As
Anne Balsamo explains, these sites offer opportunities — embodied, often
inter-generational learning experiences that are integral to the development
of a “technological imagination” — that are rarely offered in formal learning
institutions. 25

The Hunt Library has a maker-space, a GameLab, various other production labs
and studios, an immersion theater, and, rather eyebrow-raisingly, an Apple
Technology Showcase (named after library donors whose surname is Apple, with
an intentional pun on the electronics company). 26 One might think major
funding is need


hacker in Mars & Medak 2017


Mars is an activist, independent scholar, and artist. His work has been
instrumental in development of civil society in Croatia and beyond. Marcell is one
of the founders of the Multimedia Institute – mi2 (1999) (Multimedia Institute,
2016a) and Net.culture club MaMa in Zagreb (2000) (Net.culture club MaMa,
2016a). He is a member of Creative Commons Team Croatia (Creative Commons,
2016). He initiated GNU GPL publishing label EGOBOO.bits (2000) (Monoskop,
2016a), meetings of technical enthusiasts Skill sharing (Net.culture club MaMa,
2016b) and various events and gatherings in the fields of hackerism, digital
cultures, and new media art. Marcell regularly talks and runs workshops about
hacking, free software philosophy, digital cultures, social software, semantic web
etc. In 2011–2012 Marcell conducted research on Ruling Class Studies at Jan Van
Eyck in Maastricht, and in 2013 he held fellowship at Akademie Schloss Solitude
in Stuttgart. Currently, he is PhD researcher at the Digital Cultures Research Lab at
Leuphana Universität Lüneburg.
Tomislav Medak is a cultural worker and theorist interested in political
philosophy, media theory and aesthetics. He is an advocate of free software and
free culture, and the Project Lead of the Creative Commons Croatia (Creative
Commons, 2016). He works as coordinator of theory and publishing activities at
the Multimedia Institute/MaMa (Zagreb, Croatia) (Net.culture club MaMa, 2016a).
Tomislav is an active contributor to the Croatian Right to the City movement
(Pravo na grad, 2016). He interpreted to numerous books into Croatian language,
including Multitude (Hardt & Negri, 2009) and A Hacker Manifesto (Wark,
2006c). He is an author and performer with the internationally acclaimed Zagrebbased performance collective BADco (BADco, 2016). Tomislav writes and talks
about politics of technological development, and politics and aesthetics.
Tomislav and Marcell have been working together for almost two decades.
Their recent collaborations include a number of activities around the Public Library
project, including HAIP festival (Ljubljana, 2012), exhibitions in
Württembergischer Kunstverein (Stuttgart, 2014) and Galerija Nova (Zagreb,
2015), as well as coordinated digitization projects Wr


e network was its mutually
beneficial relationship with relevant European art festivals and institutions such as
Documenta (Kassel), Transmediale/HKW (Berlin) or Ars Electronica (Linz). As a
rule of thumb, critical new media and art could only be considered in a conceptual
setup of hybrid institutions, conferences, forums, festivals, (curated) exhibitions
and performances – and all of that at once! The Multimedia Institute was an active
part of that history, so it is hardly a surprise that the Public Library project took a
similar path of development and contextualization.
However, European hacker communities were rarely hanging out with critical
digital culture crowds. This is not the place to extensively present the historic
trajectory of different hacker communities, but risking a gross simplification here
is a very short genealogy. The earliest European hacker association was the
German Chaos Computer Club (CCC) founded in 1981. Already in the early
1980s, CCC started to publicly reveal (security) weaknesses of corporate and
governmental computer systems. However, their focus on digital rights, privacy,
cyberpunk/cypherpunk, encryption, and security issues prevailed over other forms
of political activism. The CCC were very successful in raising issues, shaping
public discussions, and influencing a wide range of public actors from digital rights
advocacy to political parties (such as Greens and Pirate Party). However, unlike the
Italian and Spanish hackers, CCC did not merge paths with other social and/or
political movements. Italian and Spanish hackers, for instance, were much more
integral to autonomist/anarchist, political and social movements, and they have
kept this tradition until the present day.
PJ & AK: Can you expand this analysis to Eastern Europe, and ex-Yugoslavia
in particular? What were the distinct features of (the development of) hacker
culture in these areas?
MM & TM: Continuing to risk a gross simplification in the genealogy, Eastern
European hacker communities formed rather late – probably because of the
turbulent economic and political changes that Eastern Europe went through after
1989.
In MaMa, we used to run the programme g33koskop (2006–2012) with a goal to
“explore the scope of (term) geek” (Multimedia Institute, 2016b). An important
part of the program was to collect stories from enthusiasts, hobbyists, or ‘geeks’
who used to be involved in do-it-yourself communities during early days of
(personal) computing in Yugoslavia. From these makers of first 8-bit computers,
editors of do-it-yourself magazines and other early d


ecosystem), ‘software-asa-service’ (systems where software is hosted centrally and licensed through
subscription). In order to support these strategies of enclosure and turn them into
profit, Silicon Valley developed investment strategies of venture capital or
leveraged buyouts by private equity to close the proprietary void left after the
success of commons-based peer production projects, where a large number of
people develop software collaboratively over the Internet without the exclusion by
property (Benkler, 2006).
There was a period when it seemed that cultural workers, artists and hackers
would follow the successful model of the Free Software Movement and build a
universal commons-based platform for peer produced, shared and distributed
culture, art, science and knowledge – that was the time of the Creative Commons
movement. But that vision never materialized. It did not help, either, that start-ups
with no business models whatsoever (e.g. De.lic.io.us (bookmarks), Flickr
(photos), Youtube (videos), Google Reader (RSS aggregator), Blogspot, and
others) were happy to give their services for free, let contributors use Creative
252

KNOWLEDGE COMMONS AND ACTIVIST PEDAGOGIES

Commons licences (mostly on the side of licenses limiting commercial use and
adaptations), let news curators share and aggregate relevant content, and let Time
magazine claim that “You” (meaning “All of us”) are The Person of the Year
(Time Magazine, 2006).
PJ & AK: Please describe the interplay between the Free Software Movement
and the radically capitalist Silicon Valley start-up culture, and place it into the
larger context of political economy of software development. What are its
consequences for the hacker movement?
MM & TM: Before the 2008 economic crash, in the course of only few years,
most of those start-ups and services had been sold out to few business people who
were able to monetize their platforms, users and usees (mostly via advertisement)
or crowd them out (mostly via exponential growth of Facebook and its ‘magic’
network effect). In the end, almost all affected start-ups and services got shut down
(especially those bought by Yahoo). Nevertheless, the ‘golden’ corporate start-up
period brought about a huge enthusiasm and the belief that entrepreneurial spirit,
fostered either by an individual genius or by collective (a.k.a. crowd) endeavour,
could save the world. During that period, unsurprisingly, the idea of hacker
labs/spaces exploded.
Fabulous (self)replicating rapid prototypes, 3D printers, do-it-yourself, the
Internet of Things started to resonate with (young) makers all around the world.
Unfortunately, GNU GPL (v.3 at the time) ceased to be a priority. The
infrastructure of free software had become taken for granted, and enthusiastic
dancing on the shoulders of giants became the most popular exercise. Rebranding
existing Unix services (finger > twitter, irc > slack, talk > im), and/or designing the
‘last mile’ of user experience (often as trivial as adding round corners to the
buttons), would of


game of network effect(s).
Typically, software stack running these projects would be (almost) completely
GNU GPL (server + client), but parts made on OSX (endorsed for being ‘true’
Unix under the hood) would stay enclosed. In this way, projects would shift from
the world of commons to the world of business. In order to pay respect to the open
source community, and to keep own reputation of ‘the good citizen,’ many
software components would get its source code published on GitHub – which is a
prime example of that game of enclosure in its own right. Such developments
transformed the hacker movement from a genuine political challenge to the
property regime into a science fiction fantasy that sharing knowledge while
keeping hackers’ meritocracy regime intact could fix all world’s problems – if only
we, the hackers, are left alone to play, optimize, innovate and make that amazing
technology!
THE SOCIAL LIFE OF DIGITAL TECHNOLOGIES

PJ & AK: This brings about the old debate between technological determinism
and social determinism, which never seems to go out of fashion. What is your take,
253

CHAPTER 12

as active hackers and social activists, on this debate? What is the role of
(information) technologies in social development?
MM & TM: Any discussion of information technologies and social
development requires the following parenthesis: notions used for discussing
technological development are shaped by the context of parallel US hegemony
over capitalist world-system and its commanding role in the development of
information technologies. Today’s critiques of the Internet are far from celebration
of its liberatory, democratizing potential. Instead, they often reflect frustration over
its instrumental role in


s lack of access to knowledge caused by intellectual property in
context of digital networks) or selfish speculations over scarce basic human

256

KNOWLEDGE COMMONS AND ACTIVIST PEDAGOGIES

resources (such as problems related to housing, water or waterfront development)
(Mars, Medak, & Sekulić, 2016).
The struggle to challenge the property regime used to be at the forefront of the
Free Software Movement. In the spectacular chain of recent events, where the
revelations of sweeping control and surveillance of electronic communications
brought about new heroes (Manning, Assange, Snowden), the hacker is again
reduced to the heroic cypherpunk outlaw. This firmly lies within the old Cold War
paradigm of us (the good guys) vs. them (the bad guys). However, only rare and
talented people are able to master cryptography, follow exact security protocols,
practice counter-control, and create a leak of information. Unsurprisingly, these
people are usually white, male, well-educated, native speakers of English.
Therefore, the narrative of us vs. them is not necessarily the most empowering, and
we feel that it requires a complementary strategy that challenges the property
regime as a whole. As our le


view artists can specialize in a
medium and create in isolation of their studios – if their artwork is recognized as
masterful, it will be bought on the marketplace. This is patently a lie! Art in Croatia
depends on bonds of solidarity and public support.
Frequently it is the art that seeks political forms of engagement rather than vice
versa. A lot of headspace for developing a different social imaginary can be gained
from that venturing aspect of contemporary art. Having said that, art does not need
to be political in order to be relevant and strong.

261

CHAPTER 12

THE DOUBLE LIFE OF HACKER CULTURE

PJ & AK: The Public Library project (Memory of the World, 2016a) is essentially
pedagogical. When everyone is a librarian, and all books are free, living in the
world transforms into living with the world – so The Public Library project is also
essentially anti-capitalist. This brings us to the intersections between critical
pedagogy of Paulo Freire, Peter McLaren, Henry Giroux, and others – and the
hacker culture of Richard Stallman, Linus Torvalds, Steven Lévy, and others. In
spite of various similarities, however, critical pedagogy and hacker culture disagree
on some important points.
With its deep roots in Marxism, critical theory always insists on class analysis.
Yet, imbued in the Californian ideology (Barbrook and Cameron, 1996), the hacker
culture is predominantly individualist. How do you go about the tension between
individualism and collectivism in The Public Library project? How do you balance
these forces in your overall work?
MM & TM: Hacker culture has always lived a double life. Personal computers
and the Internet have set up a perfect projection screen for a mind-set which
understands autonomy as a pursuit for personal self-realisation. Such mind-set sees
technology as a frontier of limitless and unconditional freedom, and easily melds
with entrepreneurial culture of the Silicon Valley. Therefore, it is hardly a surprise
that individualism has become the hegemonic narrative of hacker culture.
However, not all hacker culture is individualist and libertarian. Since the 1990s, the
hacker culture is heavily divided between radical individualism and radical
mutualism. Fred Turner (2006), Richard Barbrook and Andy Cameron (1996) have
famously shown that radical individualism was built on freewheeling counterculture of the American hippie movement, while radical mutualism was built on
collective leftist traditions of anarchism and Marxism. This is evident in the Free
Software Movement, which has placed ethics and politics before economy and
technology. In her superb ethnographic work, Biella Coleman (2013) has shown
that projects such as GNU/Linux distribution Debian have espoused


tand closer to mutualist,
anarchist and communist traditions where collective autonomy is the foundation of
individual freedom.
Our work stands in that lineage. Therefore, we invoke two collective figures –
amateur librarian and custodian. These figures highlight the labor of communizing
knowledge and maintaining infrastructures of access, refuse to leave the commons
to the authority of professions, and create openings where technologies and
infrastructures can be re-claimed for radically collective and redistributive
endeavours. In that context, we are critical of recent attempts to narrow hacker
culture down to issues of surveillance, privacy and cryptography. While these
issues are clearly important, they (again) reframe the hacker community through
the individualist dichotomy of freedom and privacy, and, more broadly, through
the hegemonic discourse of the post-historical age of liberal capitalism. In this
way, the essential building blocks of the hacker culture – relations of production,
relations of property, and issues of redistribution – are being drowned out, and
262

KNOWLEDGE COMMONS AND ACTIVIST PEDAGOGIES

collective and massive endeavour of commonizing is being eclipsed by the
capacity of the few crypto-savvy tricksters to avoid government control.
Obviously, we strongly disagree with the individualist, privative and 1337 (elite)
thrust of these developments.
PJ & AK: The Public Library project (Memory of the World, 2016a) arrives
very close to visions of deschooling offered by authors such as Ivan Illich (1971),
Everett Reimer


ical
knowledge. Back in 1968, for instance, IBM researcher Hal Sackman said:
new departments of computer science in the universities are too busy
teaching simon-pure courses in their struggle for academic recognition to pay
serious time and attention to the applied work necessary to educate
programmers and systems analysts for the real world. (in Ensmenger, 2010:
133)
265

CHAPTER 12

Computer world remains a weird hybrid where knowledge is produced in both
academic and non-academic settings, through academic curricula – but also
through fairs, informal gatherings, homebrew computer clubs, hacker communities
and the like. Without the enthusiasm and the experiments with ways how
knowledge can be transferred and circulated between peers, we would have
probably never arrived to the Personal Computer Revolution in the beginning of
1980s. Without the amount of personal computers already in use, we would have
probably never experienced the Internet revolution in the beginning of 1990s. It is
through such historical development that computer science became the academic
centre of the larger computer universe which spread its tentacles into almost all
other known disciplines and professions.
PJ


ow does it work in practice?
MM & TM: Our organization is a cluster of heterogeneous communities and
fields of interest. Therefore, our approaches to public pedagogy hugely vary. In
principle, we subscribe to the idea that all intelligences are equal and that all
epistemology is socially structured. In practice, this means that our activities are
syncretic and inclusive. They run in parallel without falling under the same
umbrella, and they bring together people of varying levels of skill – who bring in
various types of knowledge, and who arrive from various social backgrounds.
Working with hackers, we favour hands-on approach. For a number of years
Marcell has organized weekly Skill Sharing program (Net.culture club MaMa,
2016b) that has started from very basic skills. The bar was incrementally raised to
today’s level of the highly specialized meritocratic community of 1337 hackers. As
267

CHAPTER 12

the required skill level got too demanding, some original members left the group –
yet, the community continues to accommodate geeks and freaks. At the other end,
we maintain a theoretically inflected program of talks, lectures and publications.
Here we invite a mix of upcoming theorists and thinkers and some of the most
prominent intellectuals of today such as Jacques Rancière, Alain Badiou, Saskia
Sassen and Robert McChesney. This program creates a larger intellectual context,
and also provides space for our collaborators in various activities.
Our political activis


hacker in Medak, Mars & WHW 2015


tournement became a social movement in all but
name. Crucially, it involved an advance in tools,
from Napster to Bitorrent and beyond. It enabled
the circulation of many kinds of what Hito Steyerl
calls the poor image. Often low in resolution, these
détourned materials circulated thanks both to the
compression of information but also because of the
addition of information. There might be less data
but there’s added metadata, or data about data, enabling its movement.
Needless to say the old culture industries went
into something of a panic about all this. As I wrote
over ten years ago in A Hacker Manifesto, “information wants to be free but is everywhere in chains.”
It is one of the qualities of information that it is indifferent to the medium that carries it and readily
escapes being bound to things and their properties.
Yet it is also one of its qualities that access to it can
be blocked by what Alexander Galloway calls protocol. The late twentieth century was — among other
things — about the contradictory nature of information. It was a struggle between détournement and
protocol. And protocol nearly won.
The culture industries took both legal and technical steps to strap in


t pretty much all of it is owned by
the vulture industry — and via them ends up in the
hands of the surveillance state.
So this is how we lost the war. Making information free seemed like a good idea at the time. Indeed, one way of seeing what transpired is that we
forced the ruling class to come up with these new
strategies in response to our own self-organizing
activities. Their actions are reactions to our initiatives. In this sense the autonomists are right, only
it was not so much the actions of the working class
to which the ruling class had to respond in this case,
as what I call the hacker class. They had to recuperate a whole social movement, and they did. So our
tactics have to change.
In the past we were acting like data-punks. Not
so much “here’s three chords, now form your band.”
More like: “Here’s three gigs, now go form your autonomous art collective.” The new tactic might be
more question of being metadata-punks. On the one
hand, it is about freeing information about information rather than the information itself. We need
to move up the order of informational density and

114

McKenzie Wark

control. On the other hand, it might be an idea to
be a bit discree


hacker in Medak, Sekulic & Mertens 2014


in this setup is based on a semi-automated transfer of files to a GNU/Linux
personal computer and on the use of free software for image editing, optical character recognition
and finalization of an e-book file. It was initially developed for the HAIP festival in Ljubljana in
2011 and perfected later at MaMa in Zagreb and Leuphana University in Lüneburg.
Public Library scanner is characterized by a somewhat less automated yet distributed scanning
process than highly automated and sophisticated scanner hacks developed at various hacklabs. A
brief overview of one such scanner, developed at the Hacker Space Bruxelles, is also included in
this manual.
The Public Library scanning process proceeds thus in following discrete steps:

1. creating digital images of pages of a book,
2. manual transfer of image files to the computer for post-processing,
3. automated renaming of files, ordering of even and odd pages, rotation of images and upload to a
cloud storage,
4. manual transformation of source images into .tiff files in ScanTailor
5. manual optical character recognition and creation of PDF files in gscan2pdf
The detailed description of the Public Library scanning process follows below.
The Br


hem from the card and prompts the user to replace the
card with the one from the left camera in order to the transfer the files from there and place them in
the same folder. The script was created for GNU/Linux system and it can be downloaded, together
with its source code, from: https://copy.com/nLSzflBnjoEB
If you have other cameras than Canon, you can edit the line 387 of the source file to change to the
naming convention of your cameras, and recompile by running the following command in your
terminal: "gcc scanflow.c -o scanflow -ludev `pkg-config --cflags --libs gtk+-2.0`"
In the case of Hacker Space Bruxelles scanner, this is handled by the same script that operates the cameras that can be
downloaded from: http://git.constantvzw.org/?
p=algolit.git;a=tree;f=scanbot_brussel;h=81facf5cb106a8e4c2a76c048694a3043b158d62;hb=HEAD

III. TRANSFORMATION OF SOURCE IMAGES INTO .TIFFS
Images transferred from the cameras are high definition full color images. You want your cameras
to shoot at the largest possible .jpg resolution in order for resulting files to have at least 300 dpi (A4
at 300 dpi requires a 9.5 megapixel image). In the post-processing the size of the image files needs
to be redu


finished and to output to a PDF, go under 'File' and select 'Save', edit the
metadata and select the format, save
If using non-free software:
2) open Abbyy FineReader in VirtualBox (note: only Abby FineReader 10 installs and works with some limitations - under GNU/Linux)
- transfer files in the 'out' folder to the folder shared with the VirtualBox
- point it to the readied .tiff files and it will complete the OCR
- save the file

REFERENCES
For more information on the book scanning process in general and making your own book scanner
please visit:
DIY Book Scanner: http://diybookscannnner.org
Hacker Space Bruxelles scanner: http://hackerspace.be/ScanBot
Public Library scanner: http://www.memoryoftheworld.org/blog/2012/10/28/our-belovedbookscanner/
Other scanner builds: http://wiki.diybookscanner.org/scanner-build-list
For more information on automation:
Konrad Voeckel's post-processing script (From Scan to PDF/A):
http://blog.konradvoelkel.de/2013/03/scan-to-pdfa/
Johannes Baiter's automation of scanning to PDF process: http://spreads.readthedocs.org
For more information on applications and tools:
Calibre e-book library management application: http://calibre-ebook.com/
ScanTailor: http://scantailor.sourceforge.net/
gscan2pdf: http://sourceforge.net/projects/gscan2pdf/
Canon Hack Development Kit firmware: http://chdk.wikia.com
Tesseract: http://code.google.com/p/tesseract-ocr/
Python script of Hacker Space Bruxelles scanner: http://git.constantvzw.org/?
p=algolit.git;a=tree;f=scanbot_brussel;h=81facf5cb106a8e4c2a76c048694a3043b158d62;hb=HEA
D



hacker in Sekulic 2015


ne-sided when it should be two-. It is purely an apparatus
for distribution, for mere sharing out. So here is a positive suggestion:
change this apparatus over from distribution to communication". See "The radio
as a communications apparatus", Brecht 2000.

Published 4 November 2015
Original in English
First published by derive 61 (2015)

Contributed by dérive © Dubravka Sekulic / dérive / Eurozine

[PDF/PRINT](https://www.eurozine.com/legal-hacking-and-space/?pdf)



whole eco-system can be formed.

It is obvious that, in order to create and sustain that type of legal hack, it
is a necessity to have a certain level of awareness and knowledge of how
systems, both political and legal, work, i.e. to be politically literate.
"While in general", says Italian commons-activist and legal scholar Saki
Bailey, "we've become extremely lazy [when it comes to politics]. We've
started to become a kind of society of people who give up their responsibility
to participate by handing it over to some charismatic leaders, experts of [a]
different type" (2013). Free software hackers, in order to understand and take
part in a constant negotiation that takes place on a legal level between the
market that seeks to cloister the code and hackers who want to keep it free,
had to become literate in an arcane legal language. Gabriella Coleman notes in
_Coding Freedom_ that hacker forums sometimes tend to produce legal analysis
that is just as serious as one would expect to find in a law office. Like the
occupants of Teatro Valle, free software hackers understand the importance of
devoting time and energy to understand constraints and to find ways to
structurally divert them.

This type of knowledge is not shared and created in isolation, but in
socialization, in discussions in physical or cyber spaces (such as #irc chat
rooms, forums, mailing lists…), the same way free software hackers share their
knowledge about code. Through this process of socializing knowledge, "the
community is formed, developed, and reproduced through practices focused on
common space. To generalize this principle: the community is developed through
commoning, through acts and forms of organization oriented towards the
production of the common" (Stavrides 2012: 588). Thus forming a community is
another crucial element of the creation of digital commons, but even more
important are its development and resilience. The emerging community was not
given something to manage, it created something together, a


hacker in Sollfrank 2018


t collective farm
model that was self-governing, community-owned, and a collaborative
enterprise, which he considers to be a major inspiration for the digital
librarians. He also identifies parallels between this Kolhoz model and the
notion of the “commons”—a concept that will be discussed in more detail with
regards to shadow libraries further below.

According to Balazs, these sorts of libraries and collections are part of the
Guerilla Open Access movement (GOA) and thus practical manifestations of Aaron
Swartz’s “Guerilla Open Access Manifesto”.25 In this manifesto the American
hacker and activist pointed out the flaws of open access politics and aimed at
recruiting supporters for the idea of “radical” open access. Radical in this
context means to completely ignore copyright and simply make as much
information available as possible. “Information is power” is how the manifesto
begins. Basically, it addresses the—what he calls—“privileged”, in the sense
that they do have access to information as academic staff or librarians, and
he calls on their support for building a system of freely available
information by using their privilege, downloading and making info


hacker in Sollfrank & Kleiner 2012


ery
producer is also a consumer of art. So everybody is an artist in that sense,
everybody potentially can be. And it’s an ongoing process. [13:52] There’s no
distinction between producer and consumer. It’s just a transient role that one
plays in a process.

[13:59]
C.S.: And in that sense it relates back to the earlier ideas of cultural
production.

[14:04]
Exactly, to the pre-commodity form of culture.

[14:11]
Copyleft

[14:15]
C.S.: Could you please explain what copyleft is, where it comes from.

[14:20]
Copyleft comes out of the software community, the hacker community. It doesn’t
come out of artistic practice per se. And it comes out of the need to share
software. [14:30] Famously, Richard Stallman and the Free Software Foundation
started this project called GNU (GNU’s Not Unix), which is the, kind of, very
famous and important project. [14:44] And they publish the license called the
GPL, which sort of defined the copyleft idea. And copyleft is a very clever
kind of a hack, as they say in the hacker community. [14:53] What it does is
that it asserts copyright, full copyright, in order to provide a public
license, a free license. And it requires that any derivative work also carries
the same license. That’s what is different about it to anti-copyright. It’s
that, rather than denying copyright outright, copyleft is a copyright license
– it is a copyright – but then the claim is used in order to publicly make the
work available to anybody that wants it under very open terms. [15:28] The key
requirement, the distinctive requirement, is that any derivative work must
also be licenced


[38:02]
Thimbl is another work, and it is completely online. This work in some ways
has become a signature work for us, even though it doesn't really have any
physical presence. It's a purely conceptual work. [38:15] One of the arguments
that the Manifesto makes is that the Internet was a fully distributed social
media platform – that's what the Internet was, and then it was replaced,
because of capitalism and because of the economic logic of the market, with
centralised communication platforms like Twitter and Facebook. [38:40] And
despite that, within the free software community and the hacker community,
there's the opposite myth, just like the copyright myth. There's this idea
that we are moving towards decentralised software. [38:54] You see people like
Eben Moglen making this point a lot, when he says, now we have Facebook, but
because of FreedomBox, Diaspora and a laundry list of other projects, we're
eventually going to reach a decentralised software. [39:07] But this makes two
assumptions that are incorrect. The first is that we are starting with
centralised media and we are going to decentralised media, which actually is
incorrect. We started with a decentralised social media


hacker in Sollfrank & Mars 2013


n meet with their readers or among themselves, and
talk about the books which they love to read and share. [07:23] It’s mostly
like a social networking around the books, where we use the idea and tradition
of the public library. [07:37] In order to get there I needed to set up a
server which only does routing. So with my software I don’t know which books
are transferred, anything. It’s just like a router. [07:56] You can do that
also if you have control of your router, or what we usually call modem, so the
device which you use to get to the Internet. But that is quite hard to hack,
just hackers know how to do that. [08:13] So I just made a server on the
Internet which you can use with one click, and it just routes the traffic
between you, if you’re a librarian, and your users, readers. So that’s that
easy.

[08:33]
Librarians

[08:38] It’s super easy to become a librarian, and that is what we should
celebrate. It’s not that the only librarians which we have were the librarians
who were the only ones wanting to become a librarian. [08:54] So lots of
people want to be a librarian, and lots of people are librarians whenever they
have a chance. [09:00] So you would p


he moment
Calibre, and Let’s Share Books software, which I wrote. But also you can – for
example, there is a Calibre plugin for Aaaaarg, so if you use Calibre… from
Calibre you can search Aaaaarg, you can download books from Aaaaarg, you can
also change the metadata and upload the metadata up to Aaaaarg.

[10:13]
Repositories

[10:17]
At the moment the biggest repository for the books, in order to download and
make your catalogue, is Library Genesis. It’s around 900,000 books. It’s
libgen.info, libgen.org. And it’s a great project. [10:33] It’s done by some
Russian hackers, who also allow anyone to download all of that. It’s 9
Terabytes of books, quite some chunk of hard disks which you need for that.
[10:47] And you can also download PHP, the back end of the website and the
MySQL database (a thumb of the MySQL database), so you can run your own
Library Genesis. That’s one of the ways how you can do that. [11:00] You can
also go and join Aaaaarg.org, where it is also not just about downloading
books and uploading books, it’s also about communication and interpretation of
making, different issues and catalogues. [11:14] It’s a community of book
lovers


hacker in Stalder 2018


however, outside of public view, namely in the
specialized divisions of large government and private organizations.
These were the only institutions in command of the necessary resources
for operating the complex technical infrastructure -- so-called
mainframe computers -- that was essential to automatic information
processing.

::: {.section}
### The independent media {#c1-sec-0010}

As with so much else, this situation began to change in the 1960s. Mass
media and information-processing technologies began to attract
criticism, even though all of the involved subcultures, media activists,
and hackers continued to act independently from one another until the
1990s. The freedom-oriented social movements of the 1960s began to view
the mass media as part of the political system against which they were
struggling. The connections among the economy, politics, and the media
were becoming more apparent, not []{#Page_42 type="pagebreak"
title="42"}least because many mass media companies, especially those in
Germany related to the Springer publishing house, were openly inimical
to these social movements. Critical theor­ies arose that, borrowing
Louis Althusser\'s influential term, regarded the med


sion and the internet -- were understood as environments in
which one could act without directly representing a reality outside of
the media. Television was analyzed down to its own legalities, which
could then be manipulated to affect things beyond the media.
Increasingly, culture jamming and the campaigns of so-called
communication guerrillas were blurring the difference between media and
political activity.[^77[]{#Page_47 type="pagebreak"
title="47"}^](#c1-note-0077){#c1-note-0077a}

This difference was dissolved entirely by a new generation of
politically motivated artists, activists, and hackers, who transferred
the tactics of civil disobedience -- blockading a building with a
sit-in, for instance -- to the
internet.[^78^](#c1-note-0078){#c1-note-0078a} When, in 1994, the
Zapatista Army of National Liberation rose up in the south of Mexico,
several media projects were created to support its mostly peaceful
opposition and to make the movement known in Europe and North America.
As part of this loose network, in 1998 the American artist collective
Electronic Disturbance Theater developed a relatively simple computer
program called FloodNet that enabled networked sympathizers to shut dow


sity of Southern California* (August 1982), online: "An important
feature of SMTP is its capability to relay mail across transport service
environments."

[9](#c3-note-0009a){#c3-note-0009}  One of the first providers of
Webmail was Hotmail, which became available in 1996. Just one year
later, the company was purchased by Microsoft.

[10](#c3-note-0010a){#c3-note-0010}  Barton Gellmann and Ashkan Soltani,
"NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden
Documents Say," *Washington Post* (October 30, 2013), online.

[11](#c3-note-0011a){#c3-note-0011}  Initiated by hackers and activists,
the Mailpile project raised more than \$160,000 in September 2013 (the
fundraising goal had been just \$100,000). In July 2014, the rather
business-oriented project ProtonMail raised \$400,000 (its target, too,
had been just \$100,000).

[12](#c3-note-0012a){#c3-note-0012}  In July 2014, for instance, Google
announced that it would support "end-to-end" encryption for emails. See
"Making End-to-End Encryption Easier to Use," *Google Security Blog*
(June 3, 2014), online.

[13](#c3-note-0013a){#c3-note-0013}  Not all services use algorithms to
sort through data. Twitter does


hacker in Weinmayr 2019


ember 2013) ‘Marc Jancou, Cady Noland, and the Case of
the Authorless Artwork’, Hyperallergic, jancou-cady-noland-and-the-case-of-an-authorless-artwork/>

Butler, Judith (2001) ‘What is Critique? An Essay on Foucault’s Virtue’,
Transversal 5,

Cariou, Patrick (2009) Yes Rasta (New York: powerHouse Books).

Chan, Sewell (1 July 2009) ‘Judge Rules for J. D. Salinger in “Catcher”
Copyright Suit’, New York Times,


Coleman, Gabriella (2014) Hacker, Hoaxer, Whistleblower, Spy: The Many Faces
of Anonymous (London and New York: Verso).

Corbett, Rachel (14 November 2012) New York Supreme Court Judge Dismisses Marc
Jancou’s Lawsuit Against Sotheby’s,
/new-york-supreme-court-judge-dismisses-marc-jancou%E2%80%99s-lawsuit-against-
sotheby%E2%80%99s/>

Cariou v Prince, et al., No. 11–1197-cv.
[http://www.ca2.uscourts.gov/decisions/isysquery/f6e88b8b-48af-401c-
96a0-54d5007c2f33/1/doc/11-1197_complete_opn.pdf#xml=http://www.ca2.uscourts.gov/decision


tps://www.stewarthomesociety.org/neoism/ninesq.htm>. See also
Nicholas Thoburn’s research into the political agency of anonymous authorship.
Nicholas Thoburn, Anti-Book, On the Art and Politics of Radical Publishing
(Minneapolis and London: University of Minnesota Press, 2016) pp. 168–223.

[117](ch11.xhtml#footnote-409-backlink) Anonymous started on 4chan, an online
imageboard where users post anonymously. ‘The posts on 4chan have no names or
any identifiable markers attached to them. The only thing you are able to
judge a post by is its content and nothing else.’ Gabriella Coleman, Hacker,
Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous (London and New York:
Verso, 2014), p. 47.

[118](ch11.xhtml#footnote-408-backlink) I thank Susan Kelly for making this
point while reviewing my text.

[119](ch11.xhtml#footnote-407-backlink) It is interesting to come back to
Foucault’s text ‘What is an author’ and complicate his own position as
authorial subject. Referring to Naomi Schor and Gayatri Spivak, Sara Ahmed
suggests, that ‘Foucault effaces the sexual specificity of his own narrative
and perspective as a male philosopher. The refusal to enter the discourse as
an empir


hacker in WHW 2016


edifice
of art as a social symptom, such practices attempt to do more than simply
squeeze novel ideas into exhausted artistic formats and endow them with
political content that produces “marks of distinction”,5 which capital then
exploits for the enhancement of its own reproduction.
The two projects visited in this text both work toward building truly
accessible public spaces. Public Library, launched by Marcell Mars and
Tomislav Medak in 2012, is an ongoing media and social project based on
ideas from the open-source software movement, while Autonomy Cube, by
artist Trevor Paglen and the hacker and computer security researcher Jacob Appelbaum, centres on anonymized internet usage in the post–Edward
*
1
2
3
4
5

David Harvey, Rebel Cities: From the Right to the City to the Urban Revolution, Verso, London and New York, 2012, p. 117.
See Wendy Brown, Undoing the Demos: Neoliberalism’s Stealth Revolution, Zone books,
New York, 2015.
Harvey, Rebel Cities, p. 83.
See Nick Srnicek and Alex Williams, Inventing the Future: Postcapitalism and a World
Without Work, Verso, London and New York, 2015.
Ibid., p. 495.
See Harvey, Rebel Cities, especially pp. 103–109.

“There is something pol


abase. It creates values through indexing and connectivity, imagined communities and imaginative dialecticization. The web of interpenetration and determination activated by Public Library creates a pedagogical endeavour that also includes a propagandist thrust, if the notion of
propaganda can be recast in its original meaning as “things that must be
disseminated”.
A similar didactic impetus and constructivist praxis is present in the work
Autonomy Cube, which was developed through the combined expertise of
artist and geographer Trevor Paglen and internet security researcher, activist and hacker Jacob Appelbaum. This work, too, we presented in the
Reina Sofia exhibition Really Useful Knowledge, along with Public Library
and other projects that offered a range of strategies and methodologies
through which the artists attempted to think through the disjunction between concrete experience and the abstraction of capital, enlisting pedagogy as a crucial element in organized collective struggles. Autonomy Cube
offers a free, open-access, encrypted internet hotspot that routes internet
traffic over TOR, a volunteer-run global network of servers, relays, and services, which provides anonymous

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.