An ode to the hacker

Wikileaks has become a modern fable. Its founder Julius Assange faces charges of rape and years of harassment. Mr Assange is seen as that loathsome creature, the hacker. The hacker threatens the security systems of foreign policy. But more than security Mr Assange, the hacker has exposed the hypocrisy of governments.
The leaks have exposed the arrogance of US secretary of state Hillary Clinton and her sense of pomposity of India as a self-appointed member of the United Nations Security Council. Wikileaks has provided an everyday X-ray of how the American ambassador reads the weakness of India as a soft state, too invertebrate to take on Pakistan. The disclosures reveal the contempt of the ordinary foreign service bureaucrats for politicians and political processes.
The general reactions everywhere have been a sense of outrage first at the temerity of the act of disclosure and secondly at what the disclosures reveal. It reveals the hypocrisy of bureaucrats and politicians and it also exposes the fragility of the power to information.
The leaks almost seem to suggest that power exposed is power weakened. The sanctity of secrecy creates a halo around power which it does not deserve.
The leaks also expose the ambivalent figure of the hacker. The hacker is half outlaw, half dissenter. He is like the Levellers and the Dissenters were in Oliver Cromwell’s time. He embodies a different idea of power and responsibility.
The hacker as dissenter is a moral figure. He is an early warning system of the pathologies of power. The hacker is a liminal, ambivalent figure, anarchic enough to threaten power, an outlaw challenging the sanctity of rules and redefining them. Many see him as a virus, a threat, as a cancer which can destroy an entire system; others as bohemian in culture, anarchist in politics.
What I want to argue is that the hacker must be seen as homeostatic to the system. Every information system needs a hacker. It threatens power but guarantees the limits of power by creating an epidemic of accountability. To control the hacker beyond the norms of democracy is futile.
Prime Minister Manmohan Singh has argued that phone tapping is essential because security demands and terror legitimises it. My counter argument is that if phone tapping is necessary for security, hacking is necessary for freedom. The right to information would be an empty promise without the presence and ingenuity of the hacker.
One admits the problem resides in the sense of proportion. If an excess of phone tapping creates the paranoid world of surveillance, an excess of hacking can destabilise norms.
The hacker is seen as a bohemian. In fact, someone like Mr Assange is seen as bohemian in his sexuality and in his attitude to information. The hacker personalises excess. Given his liminality, the hacker must be allowed his way of life. This holds as long as the hacker is a dissenter. In that sense Mr Assange is a prisoner of conscience and must be adopted by Amnesty International as one. It is illiterate to compare him to a Cyber bin Laden. Mr Assange is a dissenter not a fundamentalist. He wants to save lives not to eliminate people. It only frightens power. Hacking is a part of the power of the powerless.
The responsibility does not end with the hacker. The information the hacker revels is an invitation to citizenship. Hacking cannot end as a scandal. The scandal is a ritual that initiates deeper understanding of power. Where hacking stops, the citizen takes over — asking for accountability and transparency from power. The journalist as investigator, the dissenter as researcher finds a new sibling in the hacker as a subventor of power. The tuning fork for judgment is motive and the consequences of the hacking act. The hacker is an essential purgative to the system. In a sense what hacking needs is the equivalent of the Hippocratic oath, creating a culture that stands at right angles to power. mr Assange in a historical sense stands on par with Daniel Goldberg of the Pentagon tapes or the journalists Woodward and Bernstien who exposed Watergate and ended the strange career of Richard Nixon.
The hacker is a special kind of whistleblower. Whistleblowing is usually an individual act of courage, an exemplary act of dissent. Hacking is more communitarian. It is a network of dissent which operates on power. It is collective, communitarian, a subculture with its own style. In that sense it is more difficult to control.
I want to emphasise that I am not creating a hagiography of the hacker. I think his ambivalence is what provides a sense of limits of power. The hacker carries both the marks of a trickster and a martyr, and we need to recognise his mixed, mixed-up nature.
The hacker in homeopathic doses is necessary to prevent the arrogance of power. He is an antidote but should not become purgative. In excess he is an epidemic, in aesthetic limits he is a democratic necessity. Think of it, the right to information will be a feeble promise without the culture of hacking. If the right to information creates access to information, hacking breaks the secrecy that prevents information from going public.
One might ask what the difference between wire-tapping and hacking is. Wire-tapping as an instrument is used by the structure of surveillance. Wire-tapping invades privacy. It violates a sense of freedom. Genuine hacking questions secrecy and defies surveillance. The two belong to entirely different grammars, one operating through surveillance, the other questioning the sanctity of security and secrecy.
There is a final point one must emphasise in this ode to hacking. Hacking emerged like IT, out of the beat cultures that made Silicon Valley. Hacking was a dissenting cult which understood the spirit of the network and kept it alive. Hackers are not luddites. They are experts in technological folklore. As tricksters they understand that technology cannot be a servant of power. This much the Wikileaks proved and for this much Mr Assange must be seen as a force of freedom, a dissenter, a whistleblower, whose “noise” is always the unwelcome music that power cannot tolerate.

Shiv Visvanathan is a social scientist

Post new comment

<form action="/comment/reply/47851" accept-charset="UTF-8" method="post" id="comment-form"> <div><div class="form-item" id="edit-name-wrapper"> <label for="edit-name">Your name: <span class="form-required" title="This field is required.">*</span></label> <input type="text" maxlength="60" name="name" id="edit-name" size="30" value="Reader" class="form-text required" /> </div> <div class="form-item" id="edit-mail-wrapper"> <label for="edit-mail">E-Mail Address: <span class="form-required" title="This field is required.">*</span></label> <input type="text" maxlength="64" name="mail" id="edit-mail" size="30" value="" class="form-text required" /> <div class="description">The content of this field is kept private and will not be shown publicly.</div> </div> <div class="form-item" id="edit-comment-wrapper"> <label for="edit-comment">Comment: <span class="form-required" title="This field is required.">*</span></label> <textarea cols="60" rows="15" name="comment" id="edit-comment" class="form-textarea resizable required"></textarea> </div> <fieldset class=" collapsible collapsed"><legend>Input format</legend><div class="form-item" id="edit-format-1-wrapper"> <label class="option" for="edit-format-1"><input type="radio" id="edit-format-1" name="format" value="1" class="form-radio" /> Filtered HTML</label> <div class="description"><ul class="tips"><li>Web page addresses and e-mail addresses turn into links automatically.</li><li>Allowed HTML tags: &lt;a&gt; &lt;em&gt; &lt;strong&gt; &lt;cite&gt; &lt;code&gt; &lt;ul&gt; &lt;ol&gt; &lt;li&gt; &lt;dl&gt; &lt;dt&gt; &lt;dd&gt;</li><li>Lines and paragraphs break automatically.</li></ul></div> </div> <div class="form-item" id="edit-format-2-wrapper"> <label class="option" for="edit-format-2"><input type="radio" id="edit-format-2" name="format" value="2" checked="checked" class="form-radio" /> Full HTML</label> <div class="description"><ul class="tips"><li>Web page addresses and e-mail addresses turn into links automatically.</li><li>Lines and paragraphs break automatically.</li></ul></div> </div> </fieldset> <input type="hidden" name="form_build_id" id="form-fe14435338317ee14b82e632e0002bd1" value="form-fe14435338317ee14b82e632e0002bd1" /> <input type="hidden" name="form_id" id="edit-comment-form" value="comment_form" /> <fieldset class="captcha"><legend>CAPTCHA</legend><div class="description">This question is for testing whether you are a human visitor and to prevent automated spam submissions.</div><input type="hidden" name="captcha_sid" id="edit-captcha-sid" value="80481292" /> <input type="hidden" name="captcha_response" id="edit-captcha-response" value="NLPCaptcha" /> <div class="form-item"> <div id="nlpcaptcha_ajax_api_container"><script type="text/javascript"> var NLPOptions = {key:'c4823cf77a2526b0fba265e2af75c1b5'};</script><script type="text/javascript" src="http://call.nlpcaptcha.in/js/captcha.js" ></script></div> </div> </fieldset> <span class="btn-left"><span class="btn-right"><input type="submit" name="op" id="edit-submit" value="Save" class="form-submit" /></span></span> </div></form>

No Articles Found

No Articles Found

No Articles Found

I want to begin with a little story that was told to me by a leading executive at Aptech. He was exercising in a gym with a lot of younger people.

Shekhar Kapur’s Bandit Queen didn’t make the cut. Neither did Shaji Karun’s Piravi, which bagged 31 international awards.