The Hackers Conference

14 results back to index


pages: 611 words: 188,732

Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom) by Adam Fisher

adjacent possible, Airbnb, Albert Einstein, AltaVista, An Inconvenient Truth, Andy Rubin, AOL-Time Warner, Apple II, Apple Newton, Apple's 1984 Super Bowl advert, augmented reality, autonomous vehicles, Bill Atkinson, Bob Noyce, Brownian motion, Buckminster Fuller, Burning Man, Byte Shop, circular economy, cognitive dissonance, Colossal Cave Adventure, Computer Lib, disintermediation, Do you want to sell sugared water for the rest of your life?, don't be evil, Donald Trump, Douglas Engelbart, driverless car, dual-use technology, Dynabook, Elon Musk, Fairchild Semiconductor, fake it until you make it, fake news, frictionless, General Magic , glass ceiling, Hacker Conference 1984, Hacker Ethic, Henry Singleton, Howard Rheingold, HyperCard, hypertext link, index card, informal economy, information retrieval, Ivan Sutherland, Jaron Lanier, Jeff Bezos, Jeff Rulifson, John Markoff, John Perry Barlow, Jony Ive, Kevin Kelly, Kickstarter, knowledge worker, Larry Ellison, life extension, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Marshall McLuhan, Maui Hawaii, Menlo Park, Metcalfe’s law, Mondo 2000, Mother of all demos, move fast and break things, Neal Stephenson, Network effects, new economy, nuclear winter, off-the-grid, PageRank, Paul Buchheit, paypal mafia, peer-to-peer, Peter Thiel, pets.com, pez dispenser, popular electronics, quantum entanglement, random walk, reality distortion field, risk tolerance, Robert Metcalfe, rolodex, Salesforce, self-driving car, side project, Silicon Valley, Silicon Valley startup, skeuomorphism, skunkworks, Skype, Snow Crash, social graph, social web, South of Market, San Francisco, Startup school, Steve Jobs, Steve Jurvetson, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, synthetic biology, Ted Nelson, telerobotics, The future is already here, The Hackers Conference, the long tail, the new new thing, Tim Cook: Apple, Tony Fadell, tulip mania, V2 rocket, We are as Gods, Whole Earth Catalog, Whole Earth Review, Y Combinator

Andy Hertzfeld: So I got a phone call from Stewart Brand, and once a week for seven weeks we drove up to Sausalito. There were like seven hackers he got to design the Hackers Conference. Stewart Brand: We got a pretty good influx of folks. There was Ted Nelson, obviously. Lee Felsenstein, the sort-of master of ceremonies for the Homebrew meetings, which I had never gone to. But his reputation was good. Lee Felsenstein: By that time, Homebrew had ossified. It wasn’t new people coming anymore. There was the same old faces. I called it “the old farts society.” We had the meetings for the Hackers Conference at the tugboat that Stewart Brand lived on in Sausalito. The meetings were mostly where we threw out names of who else ought to be invited.

Everyone wanted to get in on it there. Doug Carlson (at the Hackers Conference): The dissemination of information as a free object is a worthy goal. It’s the way most of us learned in the first place. But the truth of the matter is, what people are doing has more and more commercial value, and if there’s any way for people to make money off it, somebody’s going to try to get an angle on it. So I think that it ought to be up to the people who design the product whether or not they want to give it away or sell it. It’s their product and it should be a personal decision. Robert Woodhead (at the Hackers Conference): Tools I will give away to anybody.

I don’t want anyone hacking into that product and changing it—because then it won’t be mine. Steve Wozniak (at the Hackers Conference): Hackers frequently want to look at code, like operating systems, listings, and the like, to learn how it was done before them. Source should be made available reasonably to those sort of people. Not to copy, not to sell, but to learn from. Stewart Brand: Wozniak made the point that there’s a whole bunch of work creating a piece of software that does something useful and actually works well. Steve Wozniak (at the Hackers Conference): Information should be free—but your time should not. Stewart Brand: So, putting these things out for free is kind of nuts.


pages: 398 words: 107,788

Coding Freedom: The Ethics and Aesthetics of Hacking by E. Gabriella Coleman

activist lawyer, Benjamin Mako Hill, commoditize, Computer Lib, crowdsourcing, Debian, disinformation, Donald Knuth, dumpster diving, Eben Moglen, en.wikipedia.org, financial independence, Free Software Foundation, Gabriella Coleman, ghettoisation, GnuPG, Hacker Conference 1984, Hacker Ethic, Hacker News, Herbert Marcuse, informal economy, information security, Jacob Appelbaum, Jaron Lanier, Jason Scott: textfiles.com, Jean Tirole, knowledge economy, laissez-faire capitalism, Larry Wall, Louis Pasteur, machine readable, means of production, Multics, Neal Stephenson, Paul Graham, peer-to-peer, pirate software, popular electronics, RFC: Request For Comment, Richard Stallman, rolodex, Ronald Reagan, Silicon Valley, Silicon Valley startup, slashdot, software patent, software studies, Steve Ballmer, Steven Levy, tacit knowledge, technological determinism, Ted Nelson, the Cathedral and the Bazaar, The Hackers Conference, the scientific method, The Soul of a New Machine, The Structural Transformation of the Public Sphere, web application, web of trust, Yochai Benkler

There is one event, however, which is generally experienced as startlingly unique and special—the hacker conference, which I cover in detail at the end of the chapter. The conference is culturally significant because it allows hackers to collectively enact, make visible, and subsequently celebrate many elements of their quotidian technological lifeworld. Whether it is by laying down cable, setting up a server, giving talks about technology, or hacking up some new source code, these actions at the hacker conference unfold in an emotionally charged setting. What the conference foremost allows for is a “condition of heightened intersubjectivity” (Collins 2004, 35) where copious instances of hacking are brought into being and social bonds between participants are made manifest, and thus felt acutely.

Compiled from over seventy life histories, I demonstrate how hackers interact and collaborate through virtual technologies, how they formulate liberal discourses through virtual interactions, how they came to learn about free software, and how they individually and collectively experience the pleasures of hacking. I also offer an extended discussion of the hacker conference, which I argue is the ritual (and pleasurable) underside of discursive publics. Chapter 2 (“A Tale of Two Legal Regimes”) presents what were initially two semi-independent legal regimes that over the last decade have become intertwined. The first story pertains to free software’s maturity into a global movement, and the second turns to the globalization and so-called harmonization of intellectual property provisions administered through global institutional bodies like the World Trade Organization.

Choices have to be made about what to include, what to exclude, and most important, how to include them. For the life history chapter, I have chosen stories, elements, and events that I hope faithfully capture the zeitgeist of becoming a free software hacker, ending with one of the most memorable hacker events: the hacker conference. The subsequent chapter, by examining the dual character of our age, whereby we are subject to an omnipresent legal system and also have at our disposal a vibrant set of legal alternatives, is meant to inspire a paradoxical degree of hope and despair, thereby contributing, in its reading, to the making of history.


pages: 339 words: 57,031

From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism by Fred Turner

"World Economic Forum" Davos, 1960s counterculture, A Declaration of the Independence of Cyberspace, Alan Greenspan, Alvin Toffler, Apple's 1984 Super Bowl advert, back-to-the-land, Bill Atkinson, bioinformatics, Biosphere 2, book value, Buckminster Fuller, business cycle, Californian Ideology, classic study, Claude Shannon: information theory, complexity theory, computer age, Computer Lib, conceptual framework, Danny Hillis, dematerialisation, distributed generation, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, Dynabook, Electric Kool-Aid Acid Test, Fairchild Semiconductor, Ford Model T, From Mathematics to the Technologies of Life and Death, future of work, Future Shock, game design, George Gilder, global village, Golden Gate Park, Hacker Conference 1984, Hacker Ethic, Haight Ashbury, Herbert Marcuse, Herman Kahn, hive mind, Howard Rheingold, informal economy, intentional community, invisible hand, Ivan Sutherland, Jaron Lanier, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Kevin Kelly, knowledge economy, knowledge worker, Lewis Mumford, market bubble, Marshall McLuhan, mass immigration, means of production, Menlo Park, military-industrial complex, Mitch Kapor, Mondo 2000, Mother of all demos, new economy, Norbert Wiener, peer-to-peer, post-industrial society, postindustrial economy, Productivity paradox, QWERTY keyboard, Ralph Waldo Emerson, RAND corporation, reality distortion field, Richard Stallman, Robert Shiller, Ronald Reagan, Shoshana Zuboff, Silicon Valley, Silicon Valley ideology, South of Market, San Francisco, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Ted Nelson, Telecommunications Act of 1996, The Hackers Conference, the strength of weak ties, theory of mind, urban renewal, Vannevar Bush, We are as Gods, Whole Earth Catalog, Whole Earth Review, Yom Kippur War

By and large, they agreed that although the free dissemination of information was a worthy ideal, in some cases it was clearly only an ideal. If they could not agree on proper hacker business practice, they could agree that being a hacker—in this case, being the sort of person who was invited to the Hackers’ Conference—was valuable in its own right. Lee Felsenstein explained, “That little bit of cultural identity [was] extremely important.” In the popular press, hackers had been characterized as machine-obsessed, antisocial, and potentially criminal loners. Gathered in the stucco halls of Fort Cronkhite, hackers could recognize themselves as something else.

No apologies: we’re hackers. We define what a hacker is . . . nobody else.”66 In the end, the group did not come to any consensus on the right approach to take toward the emerging challenges of the software industry. But they had begun to reformulate their own identities, partially in terms of Whole Earth ideals. In the Hackers’ Conference, Brand and company provided computer workers with a venue in which to develop and live a group identity around the idea of hacking and to make sense of emerging economic forms in terms of that identity. This work had the effect of rehabilitating hackers in the public eye, but it also explicitly and securely linked Whole Earth people and the Whole Earth ethos to the world of computing.

That is, they linked the particular issues facing hackers to the broad themes of countercultural work generally and of the Whole Earth group in particular. They did not “report” a consensus generated by the invited hackers themselves so much as they melded the voices heard within the events’ various forums with the principles along which those forums were organized and with the experience of unity within the forums. At the Hackers’ Conference, Brand and his colleagues translated the individual experiences of three generations of hackers into a shared experience, an experience organized by Whole Earth people according to Whole Earth norms in the Catalog’s hometown.71 In the post-event reporting, the concerns of conference-goers and the culture of the conference itself—the Whole Earth culture—became one, and Stewart Brand, rather than any of the hackers, arose as this fused culture’s spokesman.


pages: 345 words: 105,722

The Hacker Crackdown by Bruce Sterling

Apple II, back-to-the-land, Future Shock, game design, ghettoisation, Hacker Conference 1984, Haight Ashbury, Howard Rheingold, HyperCard, index card, informal economy, information security, Jaron Lanier, John Gilmore, John Perry Barlow, machine readable, Mitch Kapor, pirate software, plutocrats, radical decentralization, Silicon Valley, Steve Wozniak, Steven Levy, Stewart Brand, Strategic Defense Initiative, technological determinism, The Hackers Conference, the scientific method, Whole Earth Catalog, Whole Earth Review

Barlow, chatting helpfully and demonstrating the wonders of his modem to the puzzled fed, was alarmed to find all "hackers" generally under FBI suspicion as an evil influence in the electronic community. The FBI, in pursuit of a hacker called "NuPrometheus," were tracing attendees of a suspect group called the Hackers Conference. The Hackers Conference, which had been started in 1984, was a yearly Californian meeting of digital pioneers and enthusiasts. The hackers of the Hackers Conference had little if anything to do with the hackers of the digital underground. On the contrary, the hackers of this conference were mostly well-to-do Californian high-tech CEOs, consultants, journalists and entrepreneurs.

(This group of hackers were the exact sort of "hackers" most likely to react with militant fury at any criminal degradation of the term "hacker.") Barlow, though he was not arrested or accused of a crime, and though his computer had certainly not gone out the door, was very troubled by this anomaly. He carried the word to the Well. Like the Hackers Conference, "the Well" was an emanation of the Point Foundation. Point Foundation, the inspiration of a wealthy Californian 60s radical named Stewart Brand, was to be a major launch-pad of the civil libertarian effort. Point Foundation's cultural efforts, like those of their fellow Bay Area Californians the Grateful Dead, were multifaceted and multitudinous.

The crackdown raid may have done little to dissuade Phiber Optik, but its galling affect on the Wellbeings was profound. As 1990 rolled on, the slings and arrows mounted: the Knight Lightning raid, the Steve Jackson raid, the nation-spanning Operation Sundevil. The rhetoric of law enforcement made it clear that there was, in fact, a concerted crackdown on hackers in progress. The hackers of the Hackers Conference, the Wellbeings, and their ilk, did not really mind the occasional public misapprehension of "hacking;" if anything, this membrane of differentiation from straight society made the "computer community" feel different, smarter, better. They had never before been confronted, however, by a concerted vilification campaign.


Howard Rheingold by The Virtual Community Homesteading on the Electronic Frontier-Perseus Books (1993)

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", Alvin Toffler, Apple II, bread and circuses, Brewster Kahle, Buckminster Fuller, commoditize, conceptual framework, disinformation, Do you want to sell sugared water for the rest of your life?, Douglas Engelbart, Douglas Engelbart, Electric Kool-Aid Acid Test, experimental subject, General Magic , George Gilder, global village, Gregor Mendel, Hacker Ethic, Haight Ashbury, Howard Rheingold, HyperCard, intentional community, Ivan Sutherland, John Gilmore, John Markoff, Kevin Kelly, knowledge worker, license plate recognition, loose coupling, Marshall McLuhan, megaproject, Menlo Park, meta-analysis, Mitch Kapor, Morris worm, multilevel marketing, packet switching, Panopticon Jeremy Bentham, profit motive, RAND corporation, Ray Oldenburg, rent control, RFC: Request For Comment, Ronald Reagan, Saturday Night Live, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, technoutopianism, Ted Nelson, telepresence, The Great Good Place, The Hackers Conference, the strength of weak ties, urban decay, UUNET, Whole Earth Catalog, Whole Earth Review, young professional

Not only Agent Baxter, but his sources of information, seemed exceedingly unclear about the nature of whatever it was they were supposed to be investigating. It turned out that Barlow had been contacted by the FBI because his name was on the roster of an annual private gathering called the Hackers' Conference. Baxter reported that he had been informed that the Hackers' Conference was an 26-04-2012 21:46 howard rheingold's | the virtual community 15 de 36 http://www.rheingold.com/vc/book/9.html underground organization of computer outlaws that was probably part of the same grand conspiracy as the NuPrometheus League. Hacker used to mean something different from what it means now.

The Deadheads came online and seemed to know instinctively how to use the system to create a community around themselves, for which I think considerable thanks are due to Maddog, Marye, and Rosebody. Not long thereafter we saw the concept of the online superstar taken to new heights with the advent of the True Confessions conference. . . . Suddenly our future looked assured. . . ." Kevin Kelly had been editor of Whole Earth Review for several years when the WELL was founded. The Hackers' Conference had been his idea. Kelly recalled the original design goals that the WELL's founders had in mind when they opened for business in 1985. The design goals were: 26-04-2012 21:42 howard rheingold's | the virtual community 7 de 27 http://www.rheingold.com/vc/book/2.html 1) That it be free.

Just about everything Baxter told Barlow was wrong, and Barlow knew it. There was a wacky near-miss element to the way Baxter was wrong. It was true that Draper had once worked at Autodesk as a programmer, but that was as close to being the CEO of Autodesk that he ever got; the real CEO of Autodesk, John Walker, definitely was on the Hackers' Conference list of attendees himself. Autodesk makes computer-aided design software for personal computers and was in the process of developing a cyberspace toolkit for architects and designers, but it was hardly a top-secret defense contractor. John Draper did have some Russian programmer friends, but by 1990, the Evil Empire was in the throes of disintegration. 26-04-2012 21:46 howard rheingold's | the virtual community 16 de 36 http://www.rheingold.com/vc/book/9.html Baxter's story was hilariously misinformed enough to make anybody worry about how well the FBI is doing against the real techno-criminals, the nuclear terrorists and large-scale data thieves.


pages: 573 words: 142,376

Whole Earth: The Many Lives of Stewart Brand by John Markoff

A Pattern Language, air freight, Anthropocene, Apple II, back-to-the-land, Benoit Mandelbrot, Bernie Madoff, Beryl Markham, Big Tech, Bill Atkinson, Biosphere 2, Brewster Kahle, Buckminster Fuller, Burning Man, butterfly effect, Claude Shannon: information theory, cloud computing, complexity theory, computer age, Computer Lib, computer vision, Danny Hillis, decarbonisation, demographic transition, disinformation, Douglas Engelbart, Douglas Engelbart, Dynabook, El Camino Real, Electric Kool-Aid Acid Test, en.wikipedia.org, experimental subject, feminist movement, Fillmore Auditorium, San Francisco, Filter Bubble, game design, gentrification, global village, Golden Gate Park, Hacker Conference 1984, Hacker Ethic, Haight Ashbury, Herman Kahn, housing crisis, Howard Rheingold, HyperCard, intentional community, Internet Archive, Internet of things, Jane Jacobs, Jaron Lanier, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Kevin Kelly, Kickstarter, knowledge worker, Lao Tzu, Lewis Mumford, Loma Prieta earthquake, Marshall McLuhan, megacity, Menlo Park, Michael Shellenberger, microdosing, Mitch Kapor, Morris worm, Mother of all demos, move fast and break things, New Urbanism, Norbert Wiener, Norman Mailer, North Sea oil, off grid, off-the-grid, paypal mafia, Peter Calthorpe, Ponzi scheme, profit motive, public intellectual, Ralph Nader, RAND corporation, Ray Kurzweil, Richard Stallman, Sand Hill Road, self-driving car, shareholder value, Silicon Valley, South of Market, San Francisco, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Ted Nelson, Ted Nordhaus, TED Talk, The Death and Life of Great American Cities, The Hackers Conference, Thorstein Veblen, traveling salesman, Turing test, upwardly mobile, Vernor Vinge, We are as Gods, Whole Earth Catalog, Whole Earth Review, young professional

According to Levy, this ethic was a set of ideals premised on access to computers; free access to all information; distrust of authority; meritocracy; the belief that computers could create art and beauty; and the faith that computing could improve your life.[24] Kelly went to Brand and said, “You know, the funny thing about this is, as far as I can tell, none of these guys have ever met each other, these three generations of hackers. Let’s bring them together.” Brand loved the idea and he persuaded Kelly and Phelan to help organize an event to be called the Hackers Conference. They began assembling a group of elite computer programmers and hardware designers from around the Bay Area, crowding them into the Mirene for weekly evening meetings. High-profile computer designers such as Lee Felsenstein, who had designed the Osborne 1, and Andy Hertzfeld, one of the key designers of the Macintosh, trooped up to Sausalito to help with the organizing.

While Brand may simply have been intimidated by all of the Silicon Valley star power, there was also no disputing his attraction to people who were in the limelight, whether they were well-known intellectuals, CEOs, or governors. It was what Kesey had noticed when he had accused Brand of “cleaving” to power. When Brand had read the quote in a generally flattering Washington Post profile,[25] the words had stung. The Hackers Conference would become an annual event, drawing together a digital subculture that was passionate about the machines and programs they designed. The first gathering was marked by several heated debates that would continue long after everyone had gone home. While Apple cofounder Steve Wozniak argued that the term hacker represented the child in everyone, a well-known programmer named Brian Harvey warned there was a dark side as well, and the general public would soon come to see the word as synonymous with computer outlaws who broke into computers for sport and profit.

Immersion in the Brand clan, with their grudges and bad history, made him reckon intimately with how institutions that were more than a generation old could become “dysfunctionally convoluted, aggressively introspective and both oblivious and irrelevant to the rest of the world.” Some of that was particular to his own relationship with his family, but there was another concern as well. In November when he discussed the Clock Library during an impromptu session with Kevin Kelly at the Hackers Conference (still an annual event a decade after they’d founded it), the Long Clock idea proved to be a hard sell. Many of the hackers believed that an obsession with the past was lethally stultifying. “Everything that needs to be remembered is being collected and stashed easily accessible” was the consensus.


pages: 171 words: 54,334

Barefoot Into Cyberspace: Adventures in Search of Techno-Utopia by Becky Hogge, Damien Morris, Christopher Scally

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, back-to-the-land, Berlin Wall, Buckminster Fuller, Chelsea Manning, citizen journalism, cloud computing, corporate social responsibility, disintermediation, DIY culture, Douglas Engelbart, Douglas Engelbart, Electric Kool-Aid Acid Test, Evgeny Morozov, Fall of the Berlin Wall, game design, Hacker Conference 1984, Hacker Ethic, Hans Moravec, informal economy, information asymmetry, Jacob Appelbaum, jimmy wales, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Kevin Kelly, mass immigration, Menlo Park, military-industrial complex, Mitch Kapor, MITM: man-in-the-middle, moral panic, Mother of all demos, Naomi Klein, Nelson Mandela, Network effects, New Journalism, Norbert Wiener, off-the-grid, peer-to-peer, Richard Stallman, Silicon Valley, Skype, Socratic dialogue, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Telecommunications Act of 1996, The Hackers Conference, Vannevar Bush, Whole Earth Catalog, Whole Earth Review, WikiLeaks

And in fact, it was ten years later that Steven Levy did the book Hackers, which sort of told the rest of the story.” Spurred on by Levy’s Hackers, in 1984, the same year of the inaugural Chaos Communication Congress in Germany, Brand convened the US’s first Hacker Con, in Marin County, California. “Organising the Hackers Conference was like some of the early hacking at MIT, so collaborative and rapid you couldnt keep track of who did what…” he wrote at the time, “But once they were on the scene, they were the worlds easiest group to work with. If anything went wrong 1) they didnt care, 2) they could fix it.” In the end, Brand attracted around 125 hackers to the upmarket camping resort, providing tools, a place to sleep and “enough candy and soda to get them through the night”.


pages: 371 words: 78,103

Webbots, Spiders, and Screen Scrapers by Michael Schrenk

Amazon Web Services, corporate governance, digital rights, fault tolerance, Firefox, machine readable, Marc Andreessen, new economy, pre–internet, SpamAssassin, The Hackers Conference, Turing test, web application

If, however, you thirst for detailed information, or you see yourself as a future Hacker Jeopardy contestant,[64] you should read the SSL specification. The full details are available at http://wp .netscape.com/eng/ssl3/ssl-toc.html. * * * [64] Hacker Jeopardy is a contest where contestants answer detailed questions about various Internet protocols. This game is an annual event at the hacker conference DEFCON (http://www .defcon.org). Local Certificates Corporate networks sometimes use local certificates to authenticate both client and server. In the vast majority of cases, however, there is no need for a local certificate—in fact, I have never been in a situation that required one.


pages: 394 words: 108,215

What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry by John Markoff

Any sufficiently advanced technology is indistinguishable from magic, Apple II, back-to-the-land, beat the dealer, Bill Duvall, Bill Gates: Altair 8800, Buckminster Fuller, California gold rush, card file, computer age, Computer Lib, computer vision, conceptual framework, cuban missile crisis, different worldview, digital divide, Donald Knuth, Douglas Engelbart, Douglas Engelbart, Dynabook, Edward Thorp, El Camino Real, Electric Kool-Aid Acid Test, Fairchild Semiconductor, General Magic , general-purpose programming language, Golden Gate Park, Hacker Ethic, Hans Moravec, hypertext link, informal economy, information retrieval, invention of the printing press, Ivan Sutherland, Jeff Rulifson, John Markoff, John Nash: game theory, John von Neumann, Kevin Kelly, knowledge worker, Lewis Mumford, Mahatma Gandhi, Menlo Park, military-industrial complex, Mother of all demos, Norbert Wiener, packet switching, Paul Terrell, popular electronics, punch-card reader, QWERTY keyboard, RAND corporation, RFC: Request For Comment, Richard Stallman, Robert X Cringely, Sand Hill Road, Silicon Valley, Silicon Valley startup, South of Market, San Francisco, speech recognition, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, technological determinism, Ted Nelson, The Hackers Conference, The Theory of the Leisure Class by Thorstein Veblen, Thorstein Veblen, Turing test, union organizing, Vannevar Bush, We are as Gods, Whole Earth Catalog, William Shockley: the traitorous eight

Mauldin, “Chatterbots, Tinymuds, and the Turing Test: Entering the Loeb-ner Prize Competition,” paper presented at AAAI-94, January 24, 1994. 18.Sean Colbath’s e-mail from Les Earnest, posted to alt.foklore.computers, February 20, 1990. 19.Les Earnest, e-mail to author, September 15, 2001. 20.Les Earnest, comments during a seminar at the Hackers Conference, Tenaya Lodge, Caif., November 11, 2001. 4 | Free U 1.Larry McMurtry, “On the Road,” The New York Review of Books, December 5, 2002. 2.Midpeninsula Free University catalog, spring 1969. 3.Ibid., fall 1969. 4.Author interview, Jim Warren, Woodside, Calif., July 16, 2001. 5.John McCarthy, “The Home Information Terminal—a 1970 View,” in Man and Computer, Proceedings of the First International Conference on Man and Computer, Bordeaux, 1970, ed.


pages: 397 words: 110,222

Habeas Data: Privacy vs. The Rise of Surveillance Tech by Cyrus Farivar

Apple's 1984 Super Bowl advert, autonomous vehicles, call centre, citizen journalism, cloud computing, computer age, connected car, do-ocracy, Donald Trump, Edward Snowden, en.wikipedia.org, failed state, Ferguson, Missouri, Frank Gehry, Golden Gate Park, information security, John Markoff, Laura Poitras, license plate recognition, lock screen, Lyft, national security letter, Occupy movement, operational security, optical character recognition, Port of Oakland, RAND corporation, Ronald Reagan, sharing economy, Silicon Valley, Silicon Valley startup, Skype, Steve Jobs, Steven Levy, tech worker, The Hackers Conference, Tim Cook: Apple, transaction costs, uber lyft, WikiLeaks, you are the product, Zimmermann PGP

Stingrays can also be reprogrammed to work for nearly any carrier in nearly any country. As stingrays become cheaper and smaller, they will undoubtedly be used not just by large organizations like the FBI, but also by small-town police forces, or worse, organized crime. In 2010, Kristin Paget (then known as Chris Paget) demonstrated to an audience at the hacker conference DEF CON how he built a rudimentary, but functional, stingray for about $1,500 in parts. In that talk, he controlled (“pwned”) around 30 audience members’ phones with his homebrew device. Like many other enforcement tools, the federal government has used grants to encourage local law enforcement to acquire this hardware in the name of fighting terrorism.


pages: 426 words: 117,775

The Charisma Machine: The Life, Death, and Legacy of One Laptop Per Child by Morgan G. Ames

"World Economic Forum" Davos, 1960s counterculture, 4chan, A Declaration of the Independence of Cyberspace, Benjamin Mako Hill, British Empire, Burning Man, Cass Sunstein, clean water, commoditize, computer age, digital divide, digital rights, Evgeny Morozov, fail fast, Firefox, Free Software Foundation, Gabriella Coleman, game design, Hacker Conference 1984, Hacker Ethic, hype cycle, informal economy, Internet of things, John Markoff, Joi Ito, Khan Academy, Marshall McLuhan, Mary Lou Jepsen, Minecraft, new economy, One Laptop per Child (OLPC), Peter Thiel, placebo effect, Potemkin village, RFID, Richard Stallman, ride hailing / ride sharing, side project, Silicon Valley, Silicon Valley ideology, SimCity, smart cities, Steve Jobs, Steven Levy, Stewart Brand, technological determinism, technological solutionism, technoutopianism, TED Talk, The Hackers Conference, Travis Kalanick

In Proceedings of the Third International Conference on Learning Analytics and Knowledge, edited by Dan Suthers, Katrien Verbert, Erik Duval, and Xavier Ochoa, 185–189. New York: ACM, 2013. https://doi.org/10.1145/2460296.2460332. Coleman, E. Gabriella. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton, NJ: Princeton University Press, 2013. ———. “The Hacker Conference: A Ritual Condensation and Celebration of a Lifeworld.” Anthropological Quarterly 83, no. 1 (Winter 2010): 47–72. https://doi.org/10.1353/anq.0.0112. Coleman, E. Gabriella, and Alex Golub. “Hacker Practice: Moral Genres and the Cutlural Articulation of Liberarlism.” Anthropological Theory 8, no. 3 (September 2008): 255–277. https://doi.org/10.1177/1463499608093814.


pages: 312 words: 93,504

Common Knowledge?: An Ethnography of Wikipedia by Dariusz Jemielniak

Andrew Keen, barriers to entry, Benevolent Dictator For Life (BDFL), citation needed, collaborative consumption, collaborative editing, commons-based peer production, conceptual framework, continuous integration, crowdsourcing, Debian, deskilling, digital Maoism, disinformation, en.wikipedia.org, Filter Bubble, Free Software Foundation, Gabriella Coleman, Google Glasses, Guido van Rossum, Hacker Ethic, hive mind, Internet Archive, invisible hand, Jaron Lanier, jimmy wales, job satisfaction, Julian Assange, knowledge economy, knowledge worker, Menlo Park, moral hazard, online collectivism, pirate software, RFC: Request For Comment, Richard Stallman, selection bias, Silicon Valley, Skype, slashdot, social software, Stewart Brand, the Cathedral and the Bazaar, The Hackers Conference, The Nature of the Firm, the strength of weak ties, The Wisdom of Crowds, transaction costs, Wayback Machine, WikiLeaks, wikimedia commons, Wikivoyage, Yochai Benkler, zero-sum game

Coleman, E. G. (2009). Code is speech: Legal tinkering, expertise, and protest among free and open source software developers. Cultural Anthropology, 24(3), 420–454. Coleman, E. G. (2010a). Ethnographic approaches to digital media. Annual Review of Anthropology, 39, 487–505. Coleman, E. G. (2010b). The hacker conference: A ritual condensation and celebration of a lifeworld. Anthropological Quarterly, 83(1), 47–72. Coleman, E. G. (2011). Hacker politics and publics. Public Culture, 23(3), 511–516. Coleman, E. G. (2013). Coding freedom. Princeton, NJ: Princeton University Press. Coleman, E. G., & Golub, A. (2008).


pages: 353 words: 355

The Long Boom: A Vision for the Coming Age of Prosperity by Peter Schwartz, Peter Leyden, Joel Hyatt

"World Economic Forum" Davos, Alan Greenspan, Alvin Toffler, American ideology, Asian financial crisis, Berlin Wall, business cycle, centre right, classic study, clean water, complexity theory, computer age, crony capitalism, cross-subsidies, Danny Hillis, dark matter, dematerialisation, Deng Xiaoping, Dissolution of the Soviet Union, double helix, edge city, Electric Kool-Aid Acid Test, European colonialism, Fall of the Berlin Wall, financial innovation, George Gilder, glass ceiling, global village, Gregor Mendel, Herman Kahn, hydrogen economy, industrial cluster, informal economy, intangible asset, Intergovernmental Panel on Climate Change (IPCC), Isaac Newton, It's morning again in America, junk bonds, Just-in-time delivery, Kevin Kelly, knowledge economy, knowledge worker, life extension, market bubble, mass immigration, megacity, Mikhail Gorbachev, Neal Stephenson, Nelson Mandela, new economy, oil shock, open borders, out of africa, Productivity paradox, QR code, Richard Feynman, Ronald Reagan, Search for Extraterrestrial Intelligence, shareholder value, Silicon Valley, stem cell, Steve Jobs, Stewart Brand, The Hackers Conference, the scientific method, Thomas L Friedman, upwardly mobile, Washington Consensus, We are as Gods, Whole Earth Catalog, women in the workforce, Y2K, zero-sum game

Stevens, "In Kyoto, the Subject Is for Climate; the Forecast Is for Storms," New York Times (December 1, 1997), Dl. David Harris, "Sao Paulo Megacity," Rolling Stone (December 26, 1997), 126-134. to release the image: Stewart Brand is a cofounder of GBN and a longtime friend of Schwartz's. Brand went on to do many remarkable things, including founding the Hacker's Conference and the WELL, the pioneer on-line community, and writing many books, including The Media Lab. (New York: Penguin Books, 1987). gone completely global: Peter Schwartz and Stewart Brand, Decades of Restructuring. (Emeryville, Global Business Network, 1989) p. 57, "Drowning in Oil," The Economist, vol. 350, no. 8109 (March 6, 1999), 19, 23-25.


pages: 474 words: 130,575

Surveillance Valley: The Rise of the Military-Digital Complex by Yasha Levine

23andMe, activist fund / activist shareholder / activist investor, Adam Curtis, Airbnb, AltaVista, Amazon Web Services, Anne Wojcicki, anti-communist, AOL-Time Warner, Apple's 1984 Super Bowl advert, bitcoin, Black Lives Matter, borderless world, Boston Dynamics, British Empire, Californian Ideology, call centre, Charles Babbage, Chelsea Manning, cloud computing, collaborative editing, colonial rule, company town, computer age, computerized markets, corporate governance, crowdsourcing, cryptocurrency, data science, digital map, disinformation, don't be evil, Donald Trump, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, drone strike, dual-use technology, Edward Snowden, El Camino Real, Electric Kool-Aid Acid Test, Elon Musk, end-to-end encryption, fake news, fault tolerance, gentrification, George Gilder, ghettoisation, global village, Google Chrome, Google Earth, Google Hangouts, Greyball, Hacker Conference 1984, Howard Zinn, hypertext link, IBM and the Holocaust, index card, Jacob Appelbaum, Jeff Bezos, jimmy wales, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Julian Assange, Kevin Kelly, Kickstarter, Laura Poitras, life extension, Lyft, machine readable, Mark Zuckerberg, market bubble, Menlo Park, military-industrial complex, Mitch Kapor, natural language processing, Neal Stephenson, Network effects, new economy, Norbert Wiener, off-the-grid, One Laptop per Child (OLPC), packet switching, PageRank, Paul Buchheit, peer-to-peer, Peter Thiel, Philip Mirowski, plutocrats, private military company, RAND corporation, Ronald Reagan, Ross Ulbricht, Satoshi Nakamoto, self-driving car, sentiment analysis, shareholder value, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley startup, Skype, slashdot, Snapchat, Snow Crash, SoftBank, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, Telecommunications Act of 1996, telepresence, telepresence robot, The Bell Curve by Richard Herrnstein and Charles Murray, The Hackers Conference, Tony Fadell, uber lyft, vertical integration, Whole Earth Catalog, Whole Earth Review, WikiLeaks

“No other group that I know of has set out to liberate a technology and succeeded.… High tech is now something that mass consumers do, rather than just have done to them, and that’s a hot item in the world.” He added, “The quietest of the ’60s sub- subcultures has emerged as the most innovative and most powerful—and most suspicious of power.”35 The Hackers’ Conference was a big moment in the cultural history of Silicon Valley. It helped introduce computer programmers to the public in a totally different way. These were no longer engineers working for big corporations and military contractors but “hackers”—geniuses and rebels bucking the system. Although Brand was an important figure driving this change of perception, he was not operating in isolation but represented a bigger cultural sea change.


pages: 509 words: 132,327

Rise of the Machines: A Cybernetic History by Thomas Rid

1960s counterculture, A Declaration of the Independence of Cyberspace, agricultural Revolution, Albert Einstein, Alistair Cooke, Alvin Toffler, Apple II, Apple's 1984 Super Bowl advert, back-to-the-land, Berlin Wall, Bletchley Park, British Empire, Brownian motion, Buckminster Fuller, business intelligence, Charles Babbage, Charles Lindbergh, Claude Shannon: information theory, conceptual framework, connected car, domain-specific language, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, dumpster diving, Extropian, full employment, game design, global village, Hacker News, Haight Ashbury, Herman Kahn, Howard Rheingold, Ivan Sutherland, Jaron Lanier, job automation, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Kevin Kelly, Kubernetes, Marshall McLuhan, Menlo Park, military-industrial complex, Mitch Kapor, Mondo 2000, Morris worm, Mother of all demos, Neal Stephenson, new economy, New Journalism, Norbert Wiener, offshore financial centre, oil shale / tar sands, Oklahoma City bombing, operational security, pattern recognition, public intellectual, RAND corporation, Silicon Valley, Simon Singh, Snow Crash, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Telecommunications Act of 1996, telepresence, The Hackers Conference, Timothy McVeigh, Vernor Vinge, We are as Gods, Whole Earth Catalog, Whole Earth Review, Y2K, Yom Kippur War, Zimmermann PGP

The “Crypto Anarchist Manifesto” already contained the seeds of what would become a potent political ideology: technology itself, not humans, would make violence obsolete. May distributed his pamphlet electronically and in print among like-minded activists at the Crypto ’88 conference in Santa Barbara and again at the Hackers Conference that year. But something was missing. The message didn’t quite get out. By early 1992, Timothy May and a friend, Eric Hughes, were becoming annoyed with the glacial progress of actual cryptographic technologies that could be used by normal people. Yes, Phil Zimmermann had just released his home-brewed PGP (for “Pretty Good Privacy”) 1.0 to the public.


pages: 568 words: 164,014

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat by John P. Carlin, Garrett M. Graff

1960s counterculture, A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Andy Carvin, Apple II, Bay Area Rapid Transit, bitcoin, Brian Krebs, business climate, cloud computing, cotton gin, cryptocurrency, data acquisition, Deng Xiaoping, disinformation, driverless car, drone strike, dual-use technology, eat what you kill, Edward Snowden, fake news, false flag, Francis Fukuyama: the end of history, Hacker Ethic, information security, Internet of things, James Dyson, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Ken Thompson, Kevin Roose, Laura Poitras, Mark Zuckerberg, Menlo Park, millennium bug, Minecraft, Mitch Kapor, moral hazard, Morris worm, multilevel marketing, Network effects, new economy, Oklahoma City bombing, out of africa, packet switching, peer-to-peer, peer-to-peer model, performance metric, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Robert Metcalfe, Ronald Reagan, Saturday Night Live, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, Snapchat, South China Sea, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, The Hackers Conference, Tim Cook: Apple, trickle-down economics, Wargames Reagan, Whole Earth Catalog, Whole Earth Review, WikiLeaks, Y2K, zero day, zero-sum game

As I went through law school, I followed the debates and declarations from John Perry Barlow and others about defending the unique sovereignty of the online space. Barlow, who raised cattle in Wyoming, recalls awakening to the challenges of cyberspace when an FBI agent, Richard Baxter, showed up at his ranch asking about the “New Prosthesis League,” which was actually a hacking group known as Nu Prometheus League. Barlow had attended the Hackers Conference with phone phreakers like Steve Wozniak, and the FBI figured someone who had attended that conference might be able to help them track down the group that was stealing code from Apple Computer. “I knew Agent Baxter from before. I’d had livestock stolen when I was still in the cattle business, and he’s a pretty good hand with livestock theft.


pages: 598 words: 183,531

Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition by Steven Levy

"Margaret Hamilton" Apollo, air freight, Apple II, Bill Gates: Altair 8800, Buckminster Fuller, Byte Shop, Compatible Time-Sharing System, computer age, Computer Lib, computer vision, corporate governance, Donald Knuth, El Camino Real, Fairchild Semiconductor, Free Software Foundation, game design, Gary Kildall, Hacker Ethic, hacker house, Haight Ashbury, John Conway, John Markoff, Mark Zuckerberg, Menlo Park, Mondo 2000, Multics, non-fiction novel, Norman Mailer, Paul Graham, popular electronics, RAND corporation, reversible computing, Richard Stallman, Silicon Valley, software patent, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Ted Nelson, The Hackers Conference, value engineering, Whole Earth Catalog, Y Combinator

Those included in the text immediately found their names in the index and proceeded to vet passages for accuracy and technological correctness. Those not in the index sulked, and to this day whenever they encounter me, in person or in the ether of cyberspace, they complain. Ultimately, the experience was exhilarating. The Hacker Conference, which would become an annual event, turned out to be the kickoff for a spirited and public debate, continued to this day, about the future of hacking and the Hacker Ethic as defined in this book. The term “hacker” has always been bedeviled by discussion. When I was writing this book, the term was still fairly obscure.


pages: 993 words: 318,161

Fall; Or, Dodge in Hell by Neal Stephenson

Ada Lovelace, augmented reality, autonomous vehicles, back-to-the-land, bitcoin, blockchain, cloud computing, coherent worldview, computer vision, crisis actor, crossover SUV, cryptocurrency, defense in depth, demographic transition, distributed ledger, drone strike, easy for humans, difficult for computers, fake news, false flag, game design, gamification, index fund, Jaron Lanier, life extension, messenger bag, microaggression, microbiome, Neal Stephenson, Network effects, no-fly zone, off grid, off-the-grid, offshore financial centre, pattern recognition, planetary scale, ride hailing / ride sharing, sensible shoes, short selling, Silicon Valley, Snow Crash, tech bro, telepresence, telepresence robot, telerobotics, The Hackers Conference, Turing test, Works Progress Administration

His area of specialization is the ancient city of Ugarit, which to make a long story short was an interesting place from a religious standpoint, sitting in the Venn diagram intersection of what we think of as Semitic and what we think of as Greek ideas about god(s), and in an interesting transitional phase between poly- and monotheism. Some of the ideas mentioned in the Moab section of the book, under the heading of the Ethical Network Sabotage Undertaking, have been floating around for decades; Matt Blaze first mentioned them in my hearing under the name of the Encyclopedia Disinformatica, during the mid-1990s, at the Hackers Conference. The term “Meatspace,” frequently used in this novel, appears to have been coined by Doug Barnes in 1993. Finally, there have been various big-picture conversations over the years with George Dyson and Jaron Lanier that undoubtedly influenced this book. About the Author NEAL STEPHENSON is the bestselling author of the novels The Rise and Fall of D.O.D.O.