August 14, 2008

History of Phone Phreaking

Category: Hackers,Phreaking,Tech — Biella @ 3:27 pm

I am so happy that someone, Phil Lapsley to be exact, is writing a proper history of phone phreaking. Find out more here. Oh and here is something else you should check out: Project MF: “Project MF is a living, breathing simulation of analog SF/MF telephone signaling just as it was used in the telephone network of the 1950s through the 1980s. It lets you “blue box” telephone calls just like the phone phreaks of yesteryear … except that it’s totally legal! ” (Phil Lapsley pointed it out to me for me to use in my hacker class to begin pretty soon..)

June 25, 2008

The Cultural Significance of Free Software

Category: Academic,Anthropology,Chris_Kelty,Hackers,Open Access,Tech — Biella @ 6:33 am

When it comes to research and writing, anthropologists are notorious for being slow as molasses. It takes, on average, 9 years to finish grad school and then another 3-6 years before you write and publish your first book. Such is the sometimes frustrating pace of academia. But sometimes it is worth the wait as this new book, Two Bits, the Cultural Significance of Free Software by the anthropologist of science and technology Chris Kelty, makes clear.

I am pretty intimate with the details of the book as ck was one of my dissertation committee members. I have read earlier versions and was fortunate enough to teach the final version to a small group of graduate students last spring. While there have been previous books on the subject of open source or peer-to-peer production more generally, this is the first book to delve deep, analytically and historically, into the cultural significance of free software. And the best part is that ck managed (I am not sure how but he did) to convince Duke University Press to release the whole book under a CC license. So download it to your heart’s delight and if you find it useful, do order a treeware copy (as you can’t beat that for easy and comfortable reading).

For the developers out there, I would suggest starting with the introduction, which provides an initial overview of some of the main themes he develops and then I would dig into part two where the historical chapters reside and then loop back to the theoretical chapters in part one or continue to part three.

Trust me, these will fascinate and surprise even those geeks with a relatively deep historical sense of this world. In fact, my very favorite academic piece on free software exists in these pages: and is the chapter on the history of the actual conflict between James Gosling and Richard Stallman that led to the creation of the GNU General Public License. Here is a small excerpt to whet your appetite:

In brief the controversy was this: in 1983 James Gosling decided to sell his version of EMACS—a version written in C for UNIX called GOSMACS—to a commercial software vendor called Unipress. GOSMACS, the second most famous implementation of EMACS (after Stallman’s itself ), was written when Gosling was a graduate student at Carnegie Mellon University. For years, Gosling had distributed GOSMACS by himself and had run a mailing list on Usenet, on which he answered queries and discussed extensions. Gosling had explicitly asked people not to redistribute the program, but to come back to him (or send interested parties to him directly) for new versions, making GOSMACS more of a benevolent dictatorship than a commune. Gosling maintained his authority, but graciously accepted revisions and bug-fixes and extensions from users, incorporating them into new releases. Stallman’s system, by contrast, allowed users to distribute their extensions themselves, as well as have them included in the “official” EMACS. By 1983, Gosling had decided he was unable to effectively maintain and support GOSMACS—a task he considered the proper role of a corporation.
[ . . .]
Indeed, the general irony of this complicated situation was certainly not as evident as it might have been given the emotional tone of the debates: Stallman was using code from Gosling based on permission Gosling had given to Labalme, but Labalme had written code for Gosling which Gosling had commercialized without telling Labalme—conceivably, but not likely, the same code. Furthermore, all of them were creating software that had been originally conceived in large part by Stallman (but based on ideas and work on TECO, an editor written twenty years before EMACS), who was now busy rewriting the very software Gosling had rewritten for UNIX. The “once proud hacker ethic” that Labalme mentions would thus amount not so much to an explicit belief in sharing so much as a fast-and-loose practice of making contributions and fixes without documenting them, giving oral permission to use and reuse, and “losing” records that may or may not have existed—hardly a noble enterprise.
[. . .]

The story is a lively one, punctuated with some great e-mail “moments,” and gives you a play-by-play sense of how it is that free software become so entangled with the law and how the unwritten norms that guided sharing were violated to then become transformed, explicit, and written.

The other chapter that will also fascinate those who want a deeper sense of this history is on UNIX and its role in creating the technical and collaborative conditions necessary to secure the explosion of free software years later. “The story of the norms of sharing source code is, not by accident,” writes Kelty, “also the history of the UNIX operating system.” This connection has been made by others but not shown in any historical detail as it is done in this book.

For those interested in more anthropological issues, the first few chapters is where this type of more conceptual theorizing is at. Chris Kelty introduces the master trope of his book: the recursive public which is an idea that feeds into a longer academic debate, inaugurated by Jurgen Habermas, on the role of publicity, dialogue, and circulation of ideas and texts in cementing a democratic sphere. Many others, such as Charles Taylor, Michael Warner, and Nancy Fraser have since refigured and rehashed the meaning publics and public debate but there have been few ethnographies on the topic. It is here where Chris Kelty intervenes most forcefully to conceptualize publics in explicitly ethnographic terms and in an arena—technology and the Internet—which is often left undertheorized by cultural theorists. There is a lot more in the book (the third section examines some of the various political modulations of free software, such as Connexions and Creative Commons) but instead of saying any more, I will just leave you with his definition of a recursive public and again urge you to check out the book for yourself!

“A recursive public is a public that is vitally concerned with the material and practical maintenance and modification of the technical, legal, practical, and conceptual means of its own existence as a public; it is a collective independent of other forms of constituted power and is capable of speaking to existing forms of power through the production of actually existing alternatives.”

May 22, 2008

Comics: some help

Category: Academic,Geekitude,Hackers,Humor,Tech — Biella @ 4:26 am

So, the last day of my class on hacking, we are going to spend some time on geeky comics and talking about this pictorial genre. I have started collecting a set of examples that I think are particularly strong and funny reflections of geek/hacker life but I am looking for more.

So what are some of your all-time favorite episodes/examples from a comic strip? I am looking for stuff that someone who is not necessarily technically oriented will understand but who will be armed with a fairly broad sense of this world too. Any suggestions would be really appreciated.

The Craft and Aesthetics of Code

Category: Academic,Aesthetics,F/OSS,Geekitude,Hackers,Tech,UNIX — Biella @ 3:48 am

Someone recently asked me whether it was difficult to fill up my syllabus for my hacker course. I wish. The hard part is actually deciding what to put on as there is too much.

This is what I have so far but it will likely change over the summer. I have read a lot of the material but what I most excited about is teaching/reading Richard Sennet’s new book on Craft, which was recently reviewed in depth and in relationship to open source (which Sennet does discuss briefly) by Siva Vaidyanathan in the Chronicle of Higher Education (an article that I co-authored also got some props in the review, which is always nice).

The question of what type of activity programming is a complex and deeply interesting one. Its craft-like roots, in part, have to do with the UNIX tradition, something written about humorously by Neal Stephenson and more seriously by other folks like Peter Salus and Chris Kelty in his wonderful rich chapter on UNIX.

But craft is not enough to understand coding either. The aesthetics of coding also is a literary affair and the two pieces that capture the aesthetics of code in this light are the following two, also on my syllabus:

Black, Maurice
2002 “At the Edge of Language: The Art of Code.” (a PhD Dissertation from the Department of English at UPenn)

Chopra, Samir and Scott Dexter
2007 “Free Software and the Aesthetics of Code.” In Decoding Liberation.

I am excited to review this material, as I need to work through my own chapter on software coding, which is less about the aesthetics of code and more about the tension between collaboration and individualism in production (which obviously maps onto questions of craft and aesthetics but is not quite the same thing).

May 14, 2008

Map it: NNDB

Category: Geekitude,Hackers,Mapping,Tech,Visualization — Biella @ 6:10 am

So one of the amazing things about the net is not so much how it makes lots of data available (actually that can be the nightmare of the net) but how it makes it available. And one of the more powerful forms of availability is in the form of visual mapping. So this new tool theNNDB Mapper is just one such visualization tool that I have to say, is pretty niftfy, though still a little green and beta at least in terms of its data.

Take for example, the hacker map, which is pretty sparse right now but the great thing about it is 1) one can add data 2) and it generates useful data and links, for example, to profiles, such as this this one of Kevin Mitnick.

Apparently, he is not linked to anyone, which is ironic (and just wrong) because he it is more correct to say was linked like to an entire generation of hackers, especially those who participated in the Free Kevin movement (and that could perhaps be another field?)..

April 18, 2008

Returns

Category: Hackers,Tech — Biella @ 6:24 am

Phrack is back..

April 16, 2008

My Special Topics Course on Hacking

Category: Academic,Hackers,Teaching,Tech — Biella @ 4:52 am

So I am nearly done with teaching this year, which is a relief, not because I don’t like it but because after a full year of teaching, one naturally wants a break. But before it is even over, you have to start thinking about your fall courses, mostly so you can order books in time and because developing a syllabus also requires more than a few days or weeks of work. Next fall, I am re-teaching a first year course Introduction to Human Communication and Culture as well as a new course on computer hacking. While I have an old version of the syllabus, I am going to spend the next few weeks revising, reshuffling, and updating. If there is anything you think should be included in this type of course drop me a line.

Below is the new description of the course.

The Culture and Politics of Computer Hacking.

This course takes as its object computer hackers to interrogate not only the ethics and practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the pranksih games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, computer gaming, privacy and security, and intellectual property. This will allow us to critically 1) problematize thinking on computer hackers as a socio-cultural group guided by a singular ethic and set of practices 2) examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking.

February 11, 2008

Reviewing code

Category: Academic,Geekitude,Hackers,Humor,Tech — Biella @ 4:19 am

The politics and language of judging code.

And speaking of peer review, Scott and Samir of Decoding Liberation have posted a blog post about the problems of peer review in the sciences, making some good points and opening what I hope will be an on-going discussion. I have a lot to add from the perspective of the social sciences and humanities, but that will have to wait for another day.

September 23, 2007

Decoding Liberation, Book Launch Party

Category: Academic,Books/Articles,F/OSS,Hackers,Politics,Travel — Biella @ 7:33 am

I am helping to kick off the Decoding Liberation Book Launch Party at the Brecht Forum in NYC. If you are in the area, and are into the politics of free software, do come along. Details also pasted below as their webpage is a little bit of an aesthetic jumble.

The Brecht Forum invites you to celebrate the release of Decoding Liberation: The Promise of Free and Open Source Software, by Samir Chopra and Scott Dexter, published by Routledge in their New Media and Cyberculture Series.

October 3rd, 7:30 PM
451 West Street (between Bank & Bethune Streets, New York, NY 10014.
(212) 242-4201
brechtforum@brechtforum.org

Suggested Donation: $6/$10/$15
Free for Brecht Forum Subscribers

Featuring commentary by Gabriella Coleman and discussions with the authors
and audience.

A reception will follow.
(more…)

July 13, 2007

Food Hacking

Category: Hackers,Politics,Tech — Biella @ 6:58 am

See the video. I was lucky enough to be there and yes, the meal was deliciiousssssssssssssssssssssssssss.