| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198 | 
							- April 2004To the popular press, "hacker" means someone who breaks
 
- into computers.  Among programmers it means a good programmer.
 
- But the two meanings are connected.  To programmers,
 
- "hacker" connotes mastery in the most literal sense: someone
 
- who can make a computer do what he wants—whether the computer
 
- wants to or not.To add to the confusion, the noun "hack" also has two senses.  It can
 
- be either a compliment or an insult.  It's called a hack when
 
- you do something in an ugly way.  But when you do something
 
- so clever that you somehow beat the system, that's also
 
- called a hack.  The word is used more often in the former than
 
- the latter sense, probably because ugly solutions are more
 
- common than brilliant ones.Believe it or not, the two senses of "hack" are also
 
- connected.  Ugly and imaginative solutions have something in
 
- common: they both break the rules.  And there is a gradual
 
- continuum between rule breaking that's merely ugly (using
 
- duct tape to attach something to your bike) and rule breaking
 
- that is brilliantly imaginative (discarding Euclidean space).Hacking predates computers.  When he
 
- was working on the Manhattan Project, Richard Feynman used to
 
- amuse himself by breaking into safes containing secret documents.
 
- This tradition continues today.
 
- When we were in grad school, a hacker friend of mine who spent too much
 
- time around MIT had
 
- his own lock picking kit.
 
- (He now runs a hedge fund, a not unrelated enterprise.)It is sometimes hard to explain to authorities why one would
 
- want to do such things.
 
- Another friend of mine once got in trouble with the government for
 
- breaking into computers.  This had only recently been declared
 
- a crime, and the FBI found that their usual investigative
 
- technique didn't work.  Police investigation apparently begins with
 
- a motive.  The usual motives are few: drugs, money, sex,
 
- revenge.  Intellectual curiosity was not one of the motives on
 
- the FBI's list.  Indeed, the whole concept seemed foreign to
 
- them.Those in authority tend to be annoyed by hackers'
 
- general attitude of disobedience.  But that disobedience is
 
- a byproduct of the qualities that make them good programmers.
 
- They may laugh at the CEO when he talks in generic corporate
 
- newspeech, but they also laugh at someone who tells them
 
- a certain problem can't be solved.
 
- Suppress one, and you suppress the other.This attitude is sometimes affected.  Sometimes young programmers
 
- notice the eccentricities of eminent hackers and decide to
 
- adopt some of their own in order to seem smarter.
 
- The fake version is not merely
 
- annoying; the prickly attitude of these posers
 
- can actually slow the process of innovation.But even factoring in their annoying eccentricities,
 
- the disobedient attitude of hackers is a net win.  I wish its
 
- advantages were better understood.For example, I suspect people in Hollywood are
 
- simply mystified by
 
- hackers' attitudes toward copyrights.  They are a perennial
 
- topic of heated discussion on Slashdot.
 
- But why should people who program computers
 
- be so concerned about copyrights, of all things?Partly because some companies use mechanisms to prevent
 
- copying.  Show any hacker a lock and his first thought is
 
- how to pick it.  But there is a deeper reason that
 
- hackers are alarmed by measures like copyrights and patents.
 
- They see increasingly aggressive measures to protect
 
- "intellectual property"
 
- as a threat to the intellectual
 
- freedom they need to do their job.
 
- And they are right.It is by poking about inside current technology that
 
- hackers get ideas for the next generation.  No thanks,
 
- intellectual homeowners may say, we don't need any
 
- outside help.  But they're wrong.
 
- The next generation of computer technology has
 
- often—perhaps more often than not—been developed by outsiders.In 1977 there was no doubt some group within IBM developing
 
- what they expected to be
 
- the next generation of business computer.  They were mistaken.
 
- The next generation of business computer was
 
- being developed on entirely different lines by two long-haired
 
- guys called Steve in a garage in Los Altos.  At about the
 
- same time, the powers that be
 
- were cooperating to develop the
 
- official next generation operating system, Multics.
 
- But two guys who thought Multics excessively complex went off
 
- and wrote their own.  They gave it a name that
 
- was a joking reference to Multics: Unix.The latest intellectual property laws impose
 
- unprecedented restrictions on the sort of poking around that
 
- leads to new ideas. In the past, a competitor might use patents
 
- to prevent you from selling a copy of something they
 
- made, but they couldn't prevent you from
 
- taking one apart to see how it worked.   The latest
 
- laws make this a crime.  How are we
 
- to develop new technology if we can't study current
 
- technology to figure out how to improve it?Ironically, hackers have brought this on themselves.
 
- Computers are responsible for the problem.  The control systems
 
- inside machines used to be physical: gears and levers and cams.
 
- Increasingly, the brains (and thus the value) of products is
 
- in software. And by this I mean software in the general sense:
 
- i.e. data.  A song on an LP is physically stamped into the
 
- plastic.  A song on an iPod's disk is merely stored on it.Data is by definition easy to copy.  And the Internet
 
- makes copies easy to distribute.  So it is no wonder
 
- companies are afraid.  But, as so often happens, fear has
 
- clouded their judgement.  The government has responded
 
- with draconian laws to protect intellectual property.
 
- They probably mean well. But
 
- they may not realize that such laws will do more harm
 
- than good.Why are programmers so violently opposed to these laws?
 
- If I were a legislator, I'd be interested in this
 
- mystery—for the same reason that, if I were a farmer and suddenly
 
- heard a lot of squawking coming from my hen house one night,
 
- I'd want to go out and investigate.  Hackers are not stupid,
 
- and unanimity is very rare in this world.
 
- So if they're all squawking,   
 
- perhaps there is something amiss.Could it be that such laws, though intended to protect America,
 
- will actually harm it?  Think about it.  There is something
 
- very American about Feynman breaking into safes during
 
- the Manhattan Project.  It's hard to imagine the authorities
 
- having a sense of humor about such things over
 
- in Germany at that time.  Maybe it's not a coincidence.Hackers are unruly.  That is the essence of hacking.  And it
 
- is also the essence of Americanness.  It is no accident
 
- that Silicon Valley
 
- is in America, and not France, or Germany,
 
- or England, or Japan. In those countries, people color inside
 
- the lines.I lived for a while in Florence.  But after I'd been there
 
- a few months I realized that what I'd been unconsciously hoping
 
- to find there was back in the place I'd just left.
 
- The reason Florence is famous is that in 1450, it was New York.
 
- In 1450 it was filled with the kind of turbulent and ambitious
 
- people you find now in America.  (So I went back to America.)It is greatly to America's advantage that it is
 
- a congenial atmosphere for the right sort of unruliness—that
 
- it is a home not just for the smart, but for smart-alecks.
 
- And hackers are invariably smart-alecks.  If we had a national
 
- holiday, it would be April 1st.  It says a great deal about
 
- our work that we use the same word for a brilliant or a
 
- horribly cheesy solution.   When we cook one up we're not
 
- always 100% sure which kind it is.  But as long as it has
 
- the right sort of wrongness, that's a promising sign.
 
- It's odd that people
 
- think of programming as precise and methodical.  Computers
 
- are precise and methodical.  Hacking is something you do
 
- with a gleeful laugh.In our world some of the most characteristic solutions
 
- are not far removed from practical
 
- jokes.  IBM was no doubt rather surprised by the consequences
 
- of the licensing deal for DOS, just as the hypothetical
 
- "adversary" must be when Michael Rabin solves a problem by
 
- redefining it as one that's easier to solve.Smart-alecks have to develop a keen sense of how much they
 
- can get away with.  And lately hackers 
 
- have sensed a change
 
- in the atmosphere.
 
- Lately hackerliness seems rather frowned upon.To hackers the recent contraction in civil liberties seems
 
- especially ominous.  That must also mystify outsiders. 
 
- Why should we care especially about civil
 
- liberties?  Why programmers, more than
 
- dentists or salesmen or landscapers?Let me put the case in terms a government official would appreciate.
 
- Civil liberties are not just an ornament, or a quaint
 
- American tradition.  Civil liberties make countries rich.
 
- If you made a graph of
 
- GNP per capita vs. civil liberties, you'd notice a definite
 
- trend.  Could civil liberties really be a cause, rather
 
- than just an effect?  I think so.  I think a society in which
 
- people can do and say what they want will also tend to
 
- be one in which the most efficient solutions win, rather than
 
- those sponsored by the most influential people.
 
- Authoritarian countries become corrupt;
 
- corrupt countries become poor; and poor countries are weak. 
 
- It seems to me there is
 
- a Laffer curve for government power, just as for
 
- tax revenues.  At least, it seems likely enough that it
 
- would be stupid to try the experiment and find out.  Unlike
 
- high tax rates, you can't repeal totalitarianism if it
 
- turns out to be a mistake.This is why hackers worry.  The government spying on people doesn't
 
- literally make programmers write worse code.  It just leads
 
- eventually to a world in which bad ideas win.  And because
 
- this is so important to hackers, they're especially sensitive
 
- to it.  They can sense totalitarianism approaching from a
 
- distance, as animals can sense an approaching  
 
- thunderstorm.It would be ironic if, as hackers fear, recent measures
 
- intended to protect national security and intellectual property
 
- turned out to be a missile aimed right at what makes   
 
- America successful.  But it would not be the first time that
 
- measures taken in an atmosphere of panic had
 
- the opposite of the intended effect.There is such a thing as Americanness.
 
- There's nothing like living abroad to teach you that.   
 
- And if you want to know whether something will nurture or squash
 
- this quality, it would be hard to find a better focus
 
- group than hackers, because they come closest of any group
 
- I know to embodying it.  Closer, probably,  than
 
- the men running our government,
 
- who for all their talk of patriotism
 
- remind me more of Richelieu or Mazarin
 
- than Thomas Jefferson or George Washington.When you read what the founding fathers had to say for
 
- themselves, they sound more like hackers.
 
- "The spirit of resistance to government,"
 
- Jefferson wrote, "is so valuable on certain occasions, that I wish
 
- it always to be kept alive."Imagine an American president saying that today.
 
- Like the remarks of an outspoken old grandmother, the sayings of
 
- the founding fathers have embarrassed generations of
 
- their less confident successors.  They remind us where we come from.
 
- They remind us that it is the people who break rules that are
 
- the source of America's wealth and power.Those in a position to impose rules naturally want them to be
 
- obeyed.  But be careful what you ask for. You might get it.Thanks to Ken Anderson, Trevor Blackwell, Daniel Giffin, 
 
- Sarah Harlin,  Shiro Kawai, Jessica Livingston, Matz, 
 
- Jackie McDonough, Robert Morris, Eric Raymond, Guido van Rossum,
 
- David Weinberger, and
 
- Steven Wolfram for reading drafts of this essay.
 
- (The image shows Steves Jobs and Wozniak 
 
- with a "blue box."
 
- Photo by Margret Wozniak. Reproduced by permission of Steve
 
- Wozniak.)
 
 
  |