english / deutsch | |
How We Made Our Own "Carnivore"
Disobedience to authority is one of the most natural and healthy acts. |
|
Ethernet was invented at the University of Hawaii. Scientists there in
the early 1970s faced a unique problem: How to network different campuses,
each on different islands separated by water. The solution was to use the free airwaves, to transmit
data through the air, or "ether," using radio. There were no wires. Like
a radio station, each node sent messages broadly over the sea to other
islands. A protocol was developed to avoid collision between simultaneous
communications. Ever since, Ethernet has been based on an open transmission
model. The protocol translated well to wire-based networks too, and is
now the most widely used local networking protocol in the world. Since
Ethernet is based on an open broadcast model, it is a trifle for listeners
to make themselves "promiscuous" and eavesdrop on all communications,
not simply those specifically addressed to them. This technique is called
packet-sniffing and has been used by systems administrators and hackers
alike for decades. Ethernet, sniffers, and hacking are at the heart of
a public domain surveillance suite called Carnivore
developed by RSG and now used in a civilian context by many artists and
scientists around the world. Hacking Today there are generally two things
said about hackers. They are either terrorists or libertarians. Historically
the word meant an amateur tinkerer, an autodidact who might try a dozen
solutions to a problem before being rewarded by any success.
Aptitude and perseverance have always eclipsed rote knowledge in the hacking
community. Hackers are the type of technophiles you like to have around
in a pinch, for given enough time they generally can crack any problem
(or at least find a suitable kludge). Thus, as Bruce Sterling writes,
the term hacker "can signify the free-wheeling intellectual exploration
of the highest and deepest potential of computer systems.". Or as the glowing Steven Levy reminisces of the original
MIT hackers of the early sixties, "they were such fascinating people.
[...] Beneath their often unimposing exteriors, they were adventurers,
visionaries, risk-takers, artists...and the ones who most clearly saw
why the computer was a truly revolutionary tool." These types of hackers are freedom fighters, living
by the dictum that data wants to be free . Information should not be owned, and even if it is,
non-invasive browsing of such information hurts no one. After all, hackers
merely exploit preexisting holes made by clumsily constructed code.6 And wouldn't the revelation of such holes actually
improve data security for everyone involved? Collaboration Bruce Sterling writes that the late Twentieth Century is a moment of transformation from a modern control paradigm based on centralization and hierarchy to a postmodern one based on flexibility and horizontalization:
From Manuel Castells to Hakim Bey to Tom Peters this rhetoric has become
commonplace. Sterling continues by claiming that both hacker groups and
the law enforcement officials that track hackers follow this new paradigm:
"they all look and act like 'tiger teams'
or 'users' groups.' They are all electronic ad-hocracies leaping up spontaneously
to attempt to meet a need." By "tiger teams" Sterling refers to the
employee groups assembled by computer companies trying to test the security
of their computer systems. Tiger teams, in essence, simulate potential
hacker attacks, hoping to find and repair security holes. RSG is a type
of tiger team. Coding In 1967 the artist Sol LeWitt outlined his definition of conceptual art:
LeWitt's perspective on conceptual art has important implications for code, for in his estimation conceptual art is nothing but a type of code for artmaking. LeWitt's art is an algorithmic process. The algorithm is prepared in advance, and then later executed by the artist (or another artist, for that matter). Code thus purports to be multidimensional. Code draws a line between what is material and what is active, in essence saying that writing (hardware) cannot do anything, but must be transformed into code (software) to be effective. Northrop Frye says a very similar thing about language when he writes that the process of literary criticism essentially creates a meta text, outside of the original source material, that contains the critic's interpretations of that text . In fact Kittler defines software itself as precisely that "logical abstraction" that exists in the negative space between people and the hardware they use . How can code be so different than mere writing? The answer to this lies in the unique nature of computer code. It lies not in the fact that code is sub-linguistic, but rather that it is hyper-linguistic. Code is a language, but a very special kind of language. Code is the only language that is executable. As Kittler has pointed out, "[t]here exists no word in any ordinary language which does what it says. No description of a machine sets the machine into motion." So code is the first language that actually does what it says-it is a machine for converting meaning into action Code has a semantic meaning, but it also has an enactment of meaning. Thus, while natural languages such as English or Latin only have a legible state, code has both a legible state and an executable state. In this way, code is the summation of language plus an executable meta-layer that encapsulates that language. Dreaming Fredric Jameson said somewhere that one of the most difficult things
to do under contemporary capitalism is to envision utopia. This is precisely
why dreaming is important. Deciding (and often struggling) for what is
possible is the first step for a utopian vision based in our desires,
based in what we want. "Cyberspace," he writes, "brings with it methods of perception, feeling, remembering, working, of playing and being together. [...] The development of cyberspace [...] is one of the principle aesthetic and political challenges of the coming century." Lévy's visionary tone is exactly what Jameson warns is lacking
in much contemporary discourse. The relationship between utopia and possibility
is a close one. It is necessary to know what one wants, to know what is
possible to want, before a true utopia may
be envisioned. Carnivore Personal Edition On October 1, 2001, three weeks after the 9/11 attacks in the US, the
Radical Software Group (RSG) announced the release of Carnivore,
a public domain riff on the notorious FBI software called DCS1000 (which
is commonly referred to by its nickname "Carnivore"). While
the FBI software had already been in existence for some time, and likewise
RSG had been developing its version of the software since January 2001,
9/11 brought on a crush of new surveillance activity. Rumors surfaced
that the FBI was installing Carnivore willy-nilly on broad civilian networks
like Hotmail and AOL with the expressed purpose of intercepting terror-related
communication. As Wired News reported on September 12, 2001, "An
administrator at one major network service provider said that FBI agents
showed up at his workplace on [September 11] 'with a couple of Carnivores,
requesting permission to place them in our core.'" Officials at Hotmail
were reported to have been "cooperating" with FBI monitoring
requests. Inspired by this activity, the RSG's Carnivore
sought to pick up where the FBI left off, to bring this technology into
the hands of the general public for greater surveillance saturation within
culture. The first RSG Carnivore ran on Linux.
An open source schematic was posted on the net for others to build their
own boxes. New functionality was added to improve on the FBI-developed
technology (which in reality was a dumbed-down version of tools systems
administrators had been using for years). An initial core (Alex Galloway,
Mark Napier, Mark Daggett, Joshua Davis, and others) began to build interpretive
interfaces. A testing venue was selected: the private offices of Rhizome.org
at 115 Mercer Street in New York City, only 30 blocks from Ground Zero.
This space was out-of-bounds to the FBI, but open to RSG.
(10) While many hackers use gender neutral pseudonyms, the online magazine "Phrack", with which The Mentor was associated, was characterized by its distinctly male staff and readership. For a sociological explanation of the gender imbalance within the hacking community, see Paul Taylor. Hackers: , pp.32-42. Routledge, New York, 1999 http://www.iit.edu/~beberg/manifesto.html (14) Tom Peters, , pp. 143-144. Knopf, New York, 1992. An older, more decentralized (rather than distributed) style of organizational management is epitomized by Peter Drucker's classic analysis of General Motors in the thirties and forties. He writes that "General Motors considers decentralization a basic and universally valid concept of order." See Peter Drucker. , p.47. Transaction, New Brunswick, 1993 (16) Sol LeWitt. Paragraphs on Conceptual Art, in Alberro, et al., eds., "Conceptual Art: A Critical Anthology." p.12. MIT Press, Cambridge, 1999. Thanks to Mark Tribe for bringing this passage to my attention. (17) See Northrop Frye. , Princeton UP, Princeton, 1957. See also Fredric Jameson's engagement with this same subject in From in Cynthia Davidson, Ed., "Anything". MIT Press, Cambridge, 2001 (18) Friedrich Kittler, "On the Implementation of Knowledge-Toward a Theory of Hardware", in nettime (http://www.nettime.org/nettime.w3archive/199902/msg00038.html). (http://generative.net/papers/aesthetics/). (23) Levy. SPACEWAR," p. 58. , p. 53. In his 1972 "Rolling Stone" article on the game, Steward Brand went so far as to publish Alan Kay's source code for Spacewar right along side his own article, a practice rarely seen in popular publications. See Brand, " (24) Richard Stallman. "The GNU Project," available online at www.gnu.org/gnu/thegnuproject.html |