Download as pdf or txt
Download as pdf or txt
You are on page 1of 60

System.

hack()
Table of Contents Multimedijalni institut / Multimedia Institute
http://www.systemhack.org/

System.hack() Multimedijalni institut / Multimedia Institute


http://www.systemhack.org/

// System.hack() zapis poziva metodu hack nad objektom System.


// if using System.hack() syntax in programming a method hack would be invoked on the object System
vanje i tako u krug). U sluËaju kolektivnih paranoidnih fan-
tazija, zastoje probijaju i reprogramiraju hakovi - momenti
izvrsnosti nesebiËnog uvida u disfunkcionalnost krugova
nepovjerenja u koje je druπtvo zapalo.
System.hack() izloæba u svom fokusu ima domenu
tehnologije gdje su mnoge invencije zbog disfunkcional-
nog kruga nepovjerenja i potrebe za nadgledanjem, kon-
trolom, te maksimizacijom pro∫ta zastale u imple-

System.hack() mentaciji koja prijeËi uvid, razumijevanje, reΩeksiju, slo-


bodnu razmjenu informacija, te uslijed toga blokira
daljnji razvoj i inovacije na veÊ uspostavljenom.
Kao i pomak iz bilo kojeg drugog kompleksnog pro-
blema, pomak iz takve blokirajuÊe tehnoloπke konstelaci-
3

je Ëini hak ∞ apstrakciju u primjeni, izvrsnost u programi-


ranju ∞ iznenaujuÊ, medijski atraktivan, lucidan u koriπ-
tenju tehnike i tehnologije, duhovit i nenasilan.
Svaki System, koliko god nepovjerljiv prema okolini
bio, ima karakteristiku, skrivenu metodu koja se na njega
samog moæe primijeniti: System.hack()

> Paranoja nikada ne pretpostavlja apsolutno nepovje-


renje. U krajnjem sluËaju ona vjeruje u vjerovanje
kako nikome ne treba vjerovati. Paranoja, opaki stroj za
System.hack() otvara zatvorene sisteme, a otvorene
Ëini zauvijek dinamiËno promjenjivima.
Bilo koja speci∫Ëna instanca radnog i æivotnog
konstrukcije, moæe proizvesti predivne konzistentne tvo- okoliπa povoljno je suËelje za System.hack(). Iz tog razlo-
revine, ne bi li u jednom trenutku ipak poklekla davajuÊi ga izabranih πest System.hack()ova izlaæu se u reducira-
povjerenje onome kome ne bi trebala - samo kako bi se nom suËelju svakodnevnog æivota, minimalnom zajedniË-
krug zatvorio u potvrdi vjerovanja kako ipak nikome ne bi kom nazivniku naπih potreba za stanovanjem, neutralnoj
trebalo vjerovati. (sic!): hotelskoj sobi.
Kada bi svaka paranoja za svoje polaziπte uzimala Velike inovacije avangarde uvijek iznova uspijevaju
‘sumnju u samu sumnju’, kapacitet za konstrukciju predi- izokrenuti dominanto predstavljanje povijesti (umjetnos-
vnih konzistentnih tvorevina bi procvjetao. Bio bi to poËe- ti) i kroz svoju formu i materiju ekstrahirati subalterni
tak koji bi za svako netaknuto platno i Ëisti list papira evi- tok povijest, osloboditi buduÊnost za tu povijest. Povijes-
dentirao sve veÊ na njima sadræane prethodne kliπee i us- nim tokom tehnoloπke inovacije dominirali su veliki voj-
tanovljene obrasce, pa bi brisanjem, ËiπÊenjem, strugan- ni, akademski, medijski i træiπni sustavi. System.hack()ovi
jem, paranjem, paljenjem..., omoguÊio da do nas iz kaosa su pokuπaj da se ekstrahira subalterna povijest inovacije,
dopre povjetarac koji donosi viziju. (Gilles Deleuze i Felix pokuπaj da se tehnologija otvori za buduÊnost, buduÊ-
Guattari, ©ta je ∫lozo∫ja, Sremski Karlovci, Novi Sad, Iz- nost koja Êe ostati nepredstavljena. Apt-art je apstrakcija
davaËka knjiæarnica Zorana StojanoviÊa, 1995) muzeja kao stroja povijesti, a ovo je apstrakcija apstrak-
Sumnju u sumnju gotovo uvijek za paranoidnog ini- cije: hotelska soba.
cira netko drugi (prijatelj, partner, terapeut, policajac, su- Rat svjetova, zvuËna kulisa izloæbe, stvara atmosferu
dac...), netko tko sa dovoljne distance evidentira, konfron- koja uz samo trenutak koncentriranog sluπanja i Ëitanja
tira i eventualno reprogramira disfunkcionalnost kruga briπe granice izmeu stvarnosti i simulacije na naËin da
nepovjerenja (beskonaËnog prelaza iz vjerovanja u djelo- “uniπtava Svijet [koji smo poznavali] pred naπim uπima”.
Svijet koji nakon prve uvjerljive simulacije prestaje biti Simbioza trke za pro∫tom i zatvaranja informacija
uvjerljiv i kojem se tek na trenutke vraÊamo sumnjajuÊi u ne dogaa se samo u virtualnom mreænom okruæenju.
sumnju u njegovu vjerodostojnost. Znanost sve viπe otkriva upotrebljivi, operativni, program-
U sluËaju da æelimo provjeriti vjerodostojnost nekog abilni kod kojim moæemo opisati, a i stvarati æivot. Genet-
radio programa najlakπi naËin bio bi isti taj radio nazvati ski inæenjering danas je samo jedno od polja razvoja u ko-
telefonom. No, kompleksni sustav upravljanja telefon- jem se preslikavaju pozicije moÊi i dinamika borbe poz-
skim pozivima takoer je medij za koji je teπko utvrditi nata iz svijeta softvera. Hakerske odgovore neki nazivaju
dovoljnu koliËinu povjerenja u pouzdanost i vjerodosto- ‘bioloπkim graanskim neposluhom’, neki kulturnim te-
jnost njegove funkcije. Sustav upravljanja pozivima rorizmom, a neki poËetkom hladnog rata izmeu korpo-
4 podreen je mjerljivosti vremena koriπtenja kako bi se racija koje proizvode genetski modi∫cirane biljke kojima
baπ svaka upotreba naplatila; pro∫tabilna ideja koja se hakeri suprostavljaju genetski modi∫cirani korov. “Natu-
javila s vremenom, a danas (bez ikakvih sumnji) prihva- ral Reality SuperWeed Kit 1.0 (prev. Prirodna stvarnost - Set
Êena kao jedini moguÊi modus operandi. Ipak, zatvoreni za superkorov 1.0) je ‘uradi sam’ set koji omoguÊuje da se
sustavi upravljanja radoznalom duhu hakera otvaraju se proizvede genetski modi∫cirani superkorov, koji je na-
veÊ pri fuÊkanju prave frekvencije (2600 Hz) u telefonsku pravljen da napada korporativne monokulture”. Heath
sluπalicu. Ako je joπ fuÊkaljku moguÊe kupiti u obliænjem Bunting biotehnologiju naziva “novim ratiπtem na kojem
marketu na dnu pakovanja hrskavih, zaπeÊerenih kuku- se vodi bitka za kontrolu æivota i zemlje, ali i podruËjem
ruznih i zobenih pahuljica, niπta lakπe. na kojem se æivot sam rede∫nira. Bit svega krije se u kon-
Pred radoznalim hakerskim duhom koji najzanim- ceptima vlasniπtva i reprezentacije koji su na ovom
ljivija otkriÊa rado dijeli sa svim zainteresiranim nemo- popriπtu ozbiljno dovedeni u pitanje”.
guÊe je sakriti bilo πto. Tehnologija sakrivanja nikada nije Iako paralelno s proizvodnjom i industrijom vlasniË-
dovoljno kreativna u zaπtiti novih tehnoloπkih kreacija kog softvera raste i razvija se proizvodnja slobodnog soft-
(koliku god da pro∫tnu maræu oËekivali kao posljedicu vera, korporacije se nisu pomirile sa zateËenim stanjem.
novih tehnoloπkih kreacija). Za potrebu zaπtite pro∫ta i Uz proizvodnju novih restriktivnih zakonskih akata, kor-
zastarjelih poslovnih modela dræava mora sprovesti res- poracije razvijaju i tehnologije kontrole i zaπtite svojih
triktivnu zakonsku regulaciju intelektualnog vlasniπtva i proizvoda (npr. Digital Rights Management, trusted com-
autorskog prava. Restriktivna sprovedba moæe se upogo- puting...). U isto vrijeme, hakerski duh ne miruje, svaki
niti i u suprotnom smjeru, u smjeru oslobaanja. Time ureaj s vremenom biva osloboen. Ponekad uz pomoÊ
πto restriktivni sustav sve viπe inzistira na restriktivnosti u osciloskopa i ‘reverse’ inæenjeringa (Linux na Xboxu), a
dodiru s poljem osloboenog (unutar samog sebe), on ponekad samo uz pomoÊ stvarËica nadohvat ruke poput
inzistira i na sve viπe oslobaanja. vodootpornog Ωomastera ili stisnute tipke Shift. Tek tako
GNU OpÊa javna licenca (GNU GPL) Richarda Stallma- da nas usput podsjeti kako je lako biti iznenaujuÊ, medi-
na posluæila je kao ishodiπna toËka na bazi koje je izgraen jski atraktivan, lucidan u koriπtenju tehnike i tehnologije,
koncept System.hack() izloæbe. GNU OpÊa javna licenca je duhovit i nenasilan.
ingeniozni hak R. Stallmana koji je tim Ëinom simboliËki Katalog opisa radova (u vaπim rukama) i eseja inspi-
konstituirao zajednicu u za nju potpuno bizarnom prav- riranih izabranim System.hack()ovima napisan je kao
nom polju. Dvadesetak godina kasnije ne samo da se ideja ‘Table of contents:’ izloæbe. Osvrnite se, System.hack()ovi
slobode u svijetu ideja saËuvala, veÊ je na njoj sagraena su oko vas...
slobodna informacijska infrastruktura koja u svakom seg-
mentu funkcionalnosti nudi alternativu vlasniËkim soft- Happy hacking!
verskim rjeπenjima. U podruËju druπtvenog razvoja ideja
slobodne razmjene informacija nema alternative.
System.hack(1,“elektroniËki mediji”,“Orson Welles ∞ Rat svjetova”) System.hack(2,“telekom”, “Captain Crunch ∞ zviædaljka”)
System.hack(1,“broadcasting”, “Orson Welles ∞ War of the Worlds”) System.hack(2,“telecom”, “Captain Crunch ∞ whistle”)
System.hack(3,“zakon o autorskom pravu”,“Richard Stallman ∞ GNU OpÊa javna licenca”) System.hack(4,“æivi svijet”,“Heath Bunting ∞ Superweed Kit 1.0")
System.hack(3,“copyright law”, “Richard Stallman ∞ GNU GPL”) System.hack(4,“biota”,“Heath Bunting ∞ Superweed Kit 1.0")
System.hack(5,“zakljuËavanje”, “Michael Steil ∞ projekt Linux na Xboxu”) System.hack(6,“zaπtita”, “Anonimni autor ∞ set za zaπtitu CD-a [marker / shift tipka]”)
System.hack(5,“locking”, “Michael Steil ∞ Linux On Xbox”) System.hack(6,“protection”, “Anonymous ∞ CD Protection Kit [marker / shift key]”)
when it comes to collective paranoid fantasies, the paraly-
ses can be broken and reprogrammed by hacks ∞ moments
of excellence in the selΩess insight into the dysfuncionality
of closed cycles of mistrust that society has become bogged
down in.
The System.hack() exhibition focuses on the domain of
technologies where many an innovation falls victim to the
dysfunctional cycle of mistrust and need for surveillance,

System.hack() control and pro∫t-maximization, becoming paralyzed in an


implementation precluding insight, understanding,
reΩection, free exchange of information and thus effectively
blocking up further development and innovation for the
bene∫t of that which has been already achieved.
13

A step ahead in such a blocking technological conste-


llation, just as a step ahead in any other complex problem,
can be brought about by a hack ∞ an abstraction in applica-
tion, excellence in programming ∞ surprising, mediagenic,
lucid in employment of technology, funny and non-violent.
Every System, as mistrusting as it might be, has one

> Paranoia never implies absolute mistrust. In the last


instance it believes in the belief that no one should
be believed. Paranoia, that mean construction machine,
feature, a hidden method that can be applied to it, and it
only: System.hack().
System.hack() opens up closed systems, and makes
can produce wonderfully consistent constructs, only to open ones permanently dynamic.
give in at some moment by placing its trust into someone Every particular instance of working and living environ-
it shouldn’t ∞ thus closing the circle with the con∫rma- ment can be an interface susceptible to a System.hack().
tion of the belief that no one should be believed after all. This is the reason why the six System.hack()s selected for
If every paranoia would start from ‘doubting the this exhibition are displayed in a reduced environment of
doubt’, the capacity for constructing wonderful consist- everyday life, minimal common denominator of all our
ent constructs would Ωourish. It would be just a start, de- housing needs, a neutral environment (sic!): a hotel room.
tecting for every pristine canvas and clean sheet of paper Great innovations of avant-garde manage over and over
all the previous clichés and established patters already again to overturn the dominant representation of (art) histo-
contained in them, so that through the acts of erasing, ry and extract through their form and matter a subaltern
cleansing, scraping, tearing, burning... a gentle, vision in- course of history, unleash the future unto the history. The
stilling breeze from the chaos could reach us. (Gilles De- course of technological innovation similarly has been domi-
leuze and Felix Guattari, What is Philosophy? Columbia nated by large systems of military, academia, media and mar-
University Press, New York, 1995) ket. System.hack()s are an attempt to extract a subaltern his-
Doubting the doubt is for the paranoid almost al- tory of innovation, open the technology unto its futures, fu-
ways induced by someone else (a friend, partner, thera- tures which shall stay unrepresented. Apt-art was an abstrac-
pist, policemen, judge...), by someone who is detached tion from the museum as a machine of history. This is an ab-
enough to be able to detect, confront and maybe re-pro- straction of an abstraction: a hotel room.
gram the dysfunctionality of the cycle of mistrust (i.e. of The War of the Worlds, the soundscape to the exhibition,
the in∫nite passage from belief to act and back). And creates an atmosphere where a moment of intense listening
and reading is enough to suspend the limits between reality ture offering in its every segment an alternative to the pro-
and simulation, so that the world (as we know it) can be “an- prietary software solutions. Within the domain of social de-
nihilated before your ears”. The world which, after this ∫rst velopment there’s no alternative to the idea of free ex-
trustworthy simulation, can no longer be trusted and which we change of information.
can only fall back onto in the moments when our doubt in its The synergy of the race for pro∫t and hoarding of infor-
credibility becomes suspended. mation takes place not only in the virtual network environ-
If we want to con∫rm the credibility of a radio broad- ment. The science is more and more discovering the reusa-
cast, the easiest way would be to use the telephone to call ble, manipulable and programmable code with which we can
into the show. However, the complex telephone relaying sys- describe, but also create life. The genetic engineering of to-
14 tem is also a medium whose trustworthyness and credibility day is one of many areas of development where positions of 15
of functioning require an inordinate amount of trust. The power and dynamics of struggle known from the software do-
telephone relaying system was designed to accommodate main are being replicated. Some call the hacker response here
primarily the measurability of time, in order to make its eve- “biological civil disobedience”, some cultural terrorism, and
ry single use chargeable ∞ a pro∫t-driven idea which others the beginning of a cold war between the corporations
emerged over time and has by now (without any doubt) be- producing genetically modi∫ed crops that hackers counter
come accepted as the only modus operandi. However, the with genetically modi∫ed weed. The Natural Reality Super-
closed telephone relaying systems crack open as soon as the Weed Kit 1.0 is a “DIY kit capable of producing a genetically
right frequency (2600 Hz) is whistled into the mouthpiece. mutant superweed, designed to attack corporate monocul-
And if the whistle with this frequency can be found in a box ture”. Heath Bunting calls biotechnology “not only the next
of crunchy corn Ωakes in the supermarket next door, this battleground on which the control of life and land is fought,
becomes an easy task. but also on which life itself is rede∫ned. It is essential that
To hide something from a curious hacker spirit who the concepts of property and representation in this arena are
likes to share her discoveries with everyone interested seriously challenged.”
enough is impossible. The technology of concealment is ne- As proprietary software production and industry grow,
ver creative enough in the protection of technological inven- so does the development of free software. But the corpora-
tions (no matter how big the pro∫t margin expected from tions are not going to sit and watch. While continuing to
these technological innovations). In order to protect the produce ever more restrictive legal instruments, corpora-
pro∫t and obsolete business models, the state must enforce a tions are also developing the technologies of control and
restrictive legal regime of intellectual property and copyright. protection of its products (technologies such as digital
The restrictive enforcement can be however put to use to rights management, trusted computing, etc.) But the hack-
work in the other way around. The more this restrictive re- er spirit is restless too: given enough time, every machine is
gime insists on restricting when coming into contact with freed. Be it with an oscilloscope or reverse engineering (as is
what has been freed (within its own domain), the more free- the case with Linux on Xbox), or sometimes with the things
ing it unleashes. just lying around such as a marker or pressed shift key. Only
Richard Stallman’s GNU General public license (GNU to remind us how easy it is to be surprising, mediagenic, lu-
GPL) served as a starting point when creating the concept of cid in employing technology, funny and non-violent.
the System.hack() exhibition. The GNU General public li- This catalog (in your hands) with descriptions of exhib-
cense was an ingenious hack by R. Stallman that succeeded its and essays inspired by the selected System.hack()s is a
to symbolically constitute a community by means complete- Table of Contents for the exhibiton. Look around,
ly alien to it ∞ legal means. Twenty years down the line and System.hack()s are all around...
the idea of freedom in the world of ideas was not only pre-
served, but has served to erect a free information infrastruc- Happy hacking!
16
system.
hack()
System.hack(1,“elektronski
mediji”,“Orson Welles ∞ Rat
svjetova”)*

> MoguÊnost masovne manipulacije publikom koju


donose mediji moæda je tek postala oËita jednom od
”naj(ne)slavnijih zabuna u povijesti”. Dan prije NoÊi vjeπti-
ca, 30. listopada 1938., milijuni Amerikanaca ukljuËili su se
u popularni radio program Mercury Theatre on the Air koji je
emitirao radio drame u reæiji (a Ëesto i izvedbi) Orsona We-
llesa. Te veËeri izvedena je adaptacija znanstveno fantastiË-
nog romana Rat svjetova H.G. Wellsa o invaziji Marsovaca
na Zemlju. Meutim, u tu adaptaciju Welles je unio bitnu
novinu: reæirao je dramu kao da je rijeË o revijalnom radi-
jskom programu koji sve viπe postaje isprekidan izvjeπtava-
njem uæivo o invaziji Marsovaca. Ovom tehnikom namjera-
vao je pojaËati dramski uËinak. Gotovo polovina pedeseto-
minutne radio drame osuvremenjeno je prepriËavanje
dogaaja iz romana, transponiranih u dokumentarnu for-
mu. Ovakav pristup radio drami nikada prije nije bio izve-
den (barem ne s toliko uvjerljivosti), a inovativ-
* Ovaj je Ëlanak objavljen pod
GNU Licencom za slobodnu na forma bila je kljuËni faktor u pomutnji koja
dokumentaciju. »lanak je je uslijedila.
baziran na Wikipedijinom Program, emitiran s 20-og kata zgrade na
Ëlanku The War of the Worlds
broju 485 Avenije Madison u New Yorku, za-
(radio), http://en.wikipedia.
org/wiki/The_War_of_the_ poËeo je kratkim uvodom u nakane vanzemal-
Worlds_(radio). jaca i istaknuo da je adaptacija smjeπtena u
1939., a zatim se nastavio kao uobiËajeni zabavno-glazbeni Na kraju svega, CBS je izvijestio vlasti da su sluπatelji
program, povremeno prekidan kratkim vijestima. Prva bili upozoreni kroz emisiju da se radi samo o drami. Welles
vijest javila je o Ëudnim eksplozijama na Marsu. IduÊe vijes- i Mercury Theatre proπli su bez kazne, no ne i bez cenzure,
ti javljaju o meteoritu ∞ kasnije se uspostavlja da je rijeË o pa je tako CBS morao obeÊati da viπe nikada neÊe koristiti
Marsovskoj raketnoj kapsuli ∞ koji pada u New Jerseyu. Go- frazu ”we interrupt this program” u dramske svrhe.
mila se okuplja na mjestu dogaanja, a reporter Carl Philips Studija Radio Project otkrila je da je veÊina ljudi zah-
prenosi dogaaje sve dok Marsovci toplinskim zrakama ne vaÊenih panikom Ëula da se radi o napadu Nijemaca (Ger-
spale znatiæeljne promatraËe. Kasniji Êe izvjeπtaji pokazati mans) ∞ a ne Marsovaca (Martians). Druge pak studije
da su mnogi sluπatelji Ëuli samo ovaj dio programa, nakon iznose tezu da su razmjere panike napuhali tadaπnji mediji.
4 Ëega su kontaktirali susjede ili obitelj da ih upute u vijesti, a U novije vrijeme sugeriralo se da je emisija bila 5
ovi su pak kontaktirali dalje druge, dovodeÊi tako do ubrza- psiholoπki ratni eksperiment. Dokumentarac iz 1999. Mas-
nog πirenja glasina i pomutnje. ters of the Universe: The Secret Birth of the Federal Reserve,
Marsovci masovno slijeÊu na Zemlju i nastavljaju ra- pisca Daniela Hopsickera tvrdi kako je Rockefeller Founda-
zaranja kroz Sjedinjene AmeriËke Dræave, uniπtavajuÊi mos- tion u svrhu prouËavanja πirenja panike u stvari ∫nancirala
tove i æeljezniËke pruge, te ispuπtajuÊi otrovni plin u zrak. emisiju, te izradila izvjeπtaj koji je ostao dostupan samo
Jedan neimenovani ministar unutraπnjih poslova obraÊa se odabranima.
naciji. (Prvotno je bilo zamiπljeno da lik Ministra bude por- U biogra∫ji Orsona Wellesa kriju se komiËni perfor-
tret tadaπnjeg predsjednika Franklina Delanoa Roosevelta, mansi iz televizijskog programa naslovljenog Orson’s Bag.
ali je CBS inzistirao da se taj detalj izmijeni. U konaËnici je Pretvorio bi se u lik Winstona Churchilla, uvjeæbavao likove
ipak zvuËao kao Roosevelt zahvaljujuÊi Wellesovoj reæiji iz Moby Dicka. Vodio je svoj kratki πou uæivo u kojem je
glume Kennya Delmara). Vojne snage napadaju Marsovce, ugostio Muppete, Burta Reynoldsa, Angie Dickinson. Welle-
no nisu u moguÊnosti suprotstaviti im se. sovi nerealizirani, nedovrπeni, neprikazani, otkazani ∫lmski
Nakon prijenosa dogaanja priËa se prekida i nastavlja projekti proteæu se Ëitavom njegovom ∫lmskom karijerom.
kao pripovijedanje preæivjelog znanstvenika koji u svoj Graanin Kane (Citizen Kane) priËa je za sebe ∞ znaËajem se
dnevnik biljeæi posljedice kataklizme, ali i razrijeπenje priËe smjeπta u kontekst kinematogra∫je, ali i onaj kulturne pov-
(koje je bilo istovjetno s krajem romana) ∞ Marsovci podli- ijesti. VeliËina Wellesa i onoga πto se uz njega vezuje, ma πto
jeæu zemaljskim bakcilima i bakterijama. Nakon πto priËa se o tome mislilo, ipak se Ëini nerazdvojivom od prizvuka
zavrπi Welles izlazi iz uloge i podsjeÊa sluπatelje da je ova ra- grandioznosti, epskih odlika u svemu. Ova krupna ∫gura s
dio drama samo izmiπljotina uoËi NoÊi vjeπtica i ekvivalent glasom diva iz crtanih ∫lmova sposobnog za iznimno suptil-
oblaËenju u plahte i glasanju poput duha ∞ buuu. Na ovom nu interpretaciju odigrala je nevjerojatne ∫lmske role. Duh,
dodatku inzistirali su izvrπni urednici CBS-a svjesni panike sklon sanjarenju i utopijskim planovima, osmislio je radio
koju Êe emisija izazvati. dramu Rat svjetova koja je i danas predmet mnogih is-
Mnogi sluπatelji nisu Ëuli ili su pak zaboravili najavu traæivanja i teorijskih analiza ∞ prvi i moæda najveÊi
emisije, a u atmosferi rastuÊe tenzije i tjeskobe u danima masmedijski hoax.
nadolazeÊeg Drugog svjetskog rata, prihvatili su ovu radio
dramu kao stvarno izvjeπtavanje. Tadaπnje novine izvjeπta-
vale su o nastaloj panici, ljudima koji su se dali u bijeg i lju-
dima koji su u zraku osjetili miris otrovnog plina ili su pak
vidjeli bljeskove borbe u daljini. Kasnije studije pokazuju da
se panika bitno manje raπirila od onoga na πto su upuÊivali
novinski izvjeπtaji. Ipak, ostaje jasno da su mnogi srnuli ∞ u
ovoj ili onoj mjeri ∞ u pomutnju koja je uslijedila.
System.hack(1,“elektroniËki mediji”,“Orson Welles — Rat svjetova”) TreÊe, sinkronost u samom Ëinu dijelove populacije koji su prethod-
recepcije meu meusobno udalje- no bili izostavljeni ∞ nepismene, ne-
nim sluπateljima kakva prethodno punoljetne, æene, starce itd. ∞ sve
Uspon i pad medijske nije mogla postojati meu meu-
sobno udaljenim Ëitateljima. Radio
one koji su sjedili za obiteljskim radij-
skim prijemnikom ∞ i stvorivπi time
realnosti u dobu radija je ipak bio medij efemernog preno-
πenja poruke, a ne njenog pohranji-
πiroki pojam javnog mnijenja kako
ga danas obiËavamo koristiti kada
vanja kao πto su to bile novine. govorimo o ispitivanjima miπljenja
»etvrto, telestezijsko skraÊivanje graana, o Ëijim rezultatima danaπ-
6
> Sada znamo da je ranih godina
dvadesetog stoljeÊa u svoj po-
hod svijetom krenuo masovni med-
medijem i nastaje zajedniËko vri-
jeme i prostor moderne politiËke za-
jednice. Poznato je, primjerice, da je
i objedinjavanje prostora u jedin-
stveni prostor dogaanja. Sinkro-
nost recepcije i telestezijsko objedi-
nje obnaπanje vlasti toliko ovisi.
Sve veÊem legitimacijskom znaËa-
ju javnog mnijenja, koje ukljuËuje i
7

ij drugaËiji od svih prethodnih. Ra- Francuskoj revoluciji prethodila ek- njavanje prostora stvorit Êe jedin- one koji nisu prethodno bili politiË-
dio. Medij kojim zapoËinje doba ele- splozija novina i Ëasopisa najrazli- stveni prostor i vrijeme dogaanja ki pitani za miπljenje, pogodovat Êe,
ktronskih medija, medij glasa, Ëitijih vrsta. Meutim, potencijalna velike politiËke zajednice ∞ nacije. sedmo, promjena socijalne struk-
meutim, ostat Êe drugaËiji ne samo potpuna integracija javnosti iz raz- Peto, dominacija glasa kao auten- ture recepcije. Radijsko doba obilje-
od prethodnog medija pisma, veÊ i loga relativne vremenske asinkro- tiËnog iskaza i jamstva prisustva go- æit Êe poËetno formiranje srednje
buduÊeg medija slike. Medijsko do- nosti recepcije novinskog izvjeπtava- vornika bez njegove nazoËnosti. Iz klase kao buduÊe noseÊe klase po-
ba glasa drugaËije ne samo od med- nja i socijalne limitacije pismenosti tog potencijala glasa doba radija troπaËkih druπtava blagostanja.
ijskog doba pisma, veÊ i od medij- neÊe se dogoditi prije radiodifuzije. stvorit Êe tako posve novi æanr politiË- Uostalom, i sam radio je zapoËeo
skog doba slike. Radiodifuzija Êe stoga inaugurira- kog govora ∞ obraÊanje naciji, gdje kao potroπaËki proizvod ∞ prvi radi-
U tim prvim dekadama dvadese- ti novu politiËku ontologiju teme- Êe obraÊanje politiËkog autoriteta jski programi veÊinom nisu bili
tog stoljeÊa svoje formiranje za- ljenu na Ëitavom nizu posebnosti sluæiti neodloæivoj afektivnoj mobi- komercijalni, veÊ su sluæili kao
poËinje takoer socijalno-politiËka tog novog medija: lizaciji velike politiËke zajednice kao sadræaj kojim su velike robne kuÊe
organizacija modernih druπtava, Prvo, prijenos u realnom vremenu jedinstvenog subjekta. privlaËile kupce da kupe radijske
temeljena na jedinstvenoj politiËkoj ∞ istodobnost slanja i kolektivnog ©esto, prodor javnog govora u pri- naprave ili kao programi kojima su
javnosti integriranoj medijima sink- primanja poruke. Ta moguÊnost vatni prostor sluπatelja, obiteljski velike novinske kuÊe privlaËile Ëi-
rone masovne recepcije i usponu brze recepcije uËinit Êe brzo izvjeπta- prostor okupljanja oko radijskog pri- tatelje.
srednje klase kao prethodnici potro- vanje o recentnim dogaanjima ∞ jemnika, stvorit Êe novu vrstu pro- Gotovo tri desetljeÊa nakon poËe-
πaËkog druπtva druge polovice sto- vijesti ∞ politiËki formativnim obli- æimanja izmeu javne sfere i privatne taka emitiranja prvog radijskog pro-
ljeÊa. A u tom konstituiranju javnos- kom radijskog doba. sfere inicirajuÊi posve novu formaci- grama 1909., u “predveËerje” Dru-
ti kroz medijsku realnost i potroπaË- Drugo, uæivost dogaanja u nje- ju legitimacije javnog kroz privatno. gog svjetskog rata i u predveËerje
ko druπtvo radio Êe odigrati prije- govoj medijskoj transpoziciji. U Promjena socijalne forme recepci- noÊi vjeπtica 30. listopada 1938. CBS
lomnu ulogu. uvjetima prijenosa u realnom vre- je* promijenila je i demografsku i Mercury Theater on the Air emitirao
Moderno shvaÊena politiËka jav- menu, uæivost Êe sluπateljima omo- strukturu legitimacije, ukljuËivπi u je Rat svjetova H. G. Wellsa u radi-
nost konstituira se doduπe veÊ u pis- guÊiti istinsku ukljuËenost u doga- zajedniËki prostor i vrijeme jedin- jskoj adaptaciji Orsona Wellesa. Kao
anoj kulturi rane graanske klase. anja unatoË ∫ziËkoj odsutnosti. stvenog politiËkog dogaanja one πto je dobro poznato, Wellesovo
Novine stvaraju javnost koja æivi u je- Dogaaji njihovog vremena dogaat
dinstvenoj svijesti o udaljenim do- Êe se istodobno njima kao i nepo- * Premda je socijalna forma recepcije Ëesto zanemarivani aspekt u medijskoj teoriji, veÊ od Be-
gaanjima kao dogaanjima u za- srednim akterima, a recepcija Êe njamina previranje u socijalnoj formi do kojeg dolazi u tranziciji izmeu dvaju medija zapravo
predstavlja auratski moment javljanja politiËke mase ∞ masovnu mediauru kako to naziva Sam
jedniËkom vremenu i prostoru ∞ postati poseban oblik sudjelovanja, Weber. Koliko je za estetiku bitno iskustvo πoka koje kinematogra∫ja donosi s montaæom,
zapravo, tek s tim prvim masovnim afektivne mobilizacije. toliko je bitno kolektivno iskustvo gledanja ∫lma u kinematografu.
∫ngirano izvjeπtavanje uæivo o inva- Rat svjetova razotkrio je da je su-
ziji Marsovaca na planet Zemlju
natjeralo je mase uznemirenih
vremena politiËka dogaajonost
kroz elektroniËke medije postala
System.hack(2,“telekom”,
sluπatelja, koji su, ukljuËivπi se na-
knadno u emisiju, ∫kciju zamijeni-
Ωuidna kategorija: afektivno oboje-
ni svijet politike straha. Prijenos u
“Captain Crunch ∞
li za zbilju, da se paniËno daju u bi- realnom vremenu postao je velika
jeg pred nadorom Marsovaca.
Welles je u toj najslavnijoj medij-
politiËka zajednica u realnom vre-
menu, prostor globalne mobilizaci-
zviædaljka”)*
skoj varci iskoristio dotad uglavnom je nacija.
8 neprimijeÊeno pomicanje granice Meutim, spoznaja o medijskoj
odnosa medija i referentne realnos- posredovanosti politiËke realnosti
ti koje se dogodilo u radijskom do- koja je tim hoaxom uπla u opÊu svi-
bu. Povezao je moguÊnost simulira- jest nosi u sebi paradoks koji do-
nja faktiËnosti ∫ktivnih dogaanja bitak od te spoznaje Ëini neizvjes-
pomoÊu vjeπtih konstrukcija tehni- nim. Naime, iako znamo da realnost
ke prijenosa uæivo, prekidanja pri- zbog te medijske posredovanosti
jenosa vijestima, javljanjima, obra- jest podloæna hakiranju, mi uvijek
Êanjima javnosti, i moÊ afektivnog iznova ne raspoznajemo simulaciju.
mobiliziranja koje je nudio sugestiv- Jer, πto je mediji vjerodostojniji real-
ni medij zvuka i glasa. Povezao je re-
alnu prijetnju predstojeÊeg rata i
strah pred stranim predstavljen van-
nosti, to realnost postaje nevjero-
dostojnija. Taj uvid o vjerodostojnoj
simulaciji nevjerodostojne realnos-
> Lik i djelo Johna T. Drapera obavijeno je zadahom ludi-
la, situacijama koje nalikuju romanesknim zapletima i
kafkijanskom tonalitetu. Poznat je pod nadimkom Captain
zemaljskom invazijom. Sekretar ti, saæet u odjavnim rijeËima Orso- Crunch kojeg je dobio po zviædaljci iz kukuruznih pahuljica.
unutarnjih poslova u radiodrami na Wellesa “we have annihilated the Joe Engressia, slijepi djeËak, otkrio je Johnu Draperu πto je
namjerno je zvuËao kao tadaπnji world before you ears ∞ uniπtili smo moguÊe napraviti sa zviædaljkom koja je u to vrijeme bila
predsjednik SAD-a Franklin Delano svijet pred Vaπim uπima”, nakon poklon u kutiji Cap’n Crunch pahuljica. Zviædaljku se moglo
Roosevelt, a mnogi su se sluπatelji svog roenja u doba radija napo- lako modi∫cirati da emitira zvuk na 2600 Hz ∞ frekvenciju
uspaniËili Ëuvπi namjesto “Mar- sljetku u doba televizijske slike pos- koju su koristile AT&T-ove telefonske centrale za meumjes-
tians” “Germans”. taje totalan. ne pozive kako bi upozorile da je linija slobodna za novi
poziv. To bi izazvalo prekid na jednom kraju linije, dopuπta-
> Tomislav Medak < juÊi drugom, joπ uvijek spojenom kraju da pree u operator-
ski modus. Eksperimentiranje s tom zviædaljkom inspirira-
lo je Drapera da izgradi blue box ∞ elektroniËki ureaj sposo-
ban za reproduciranje drugih tonova koje koriste telefonske
kompanije kako bi pomoÊu njih mogao uspostavljati
pozive. Draper je zavrπavao tri puta u zatvoru
* Ovaj je Ëlanak objavljen pod zbog telefonskih prijevara i sliËnih optuæbi.
GNU Licencom za slobodnu UhiÊen je zbog optuæbe za telefonsku prijevaru
dokumentaciju. »lanak je
1972. i osuen na pet godina uvjetno. Sredinom
baziran na Wikipedijinom
Ëlanku John Draper, http:// ’70-ih svoje vjeπtine hakiranja telefona ∞ frikin-
en.wikipedia.org/wiki/ ga (engl. phreaking) ∞ prenio je i na Stevea Jobsa
John_Draper. i Stevea Wozniaka, koji su kasnije pokrenuli
kompaniju Apple Computer. Steve Wozniak se oduvijek di- vanje nisu u upotrebi, no u vrijeme kada je Draper eksperi-
vio Draperu. Upoznat s nacrtima za blue box, Wozniak ih je mentirao mogao je otkriti sve vrste brojevnih intervala.
bitno poboljπao i poËeo prodavati po sveuËiliπnom kampu- Draper bi podigao sluπalicu u javnoj govornici i zatim
su koristeÊi zaraeni novac za rad na onome πto Êe kasnije bi ‘isfrikirao’ poziv na drugi kraj svijeta. Bez plaÊanja, preus-
postati Apple Computer. Draper je kratko vrijeme bio zapos- mjeravao bi poziv preko razliËitih telefonskih ‘posluæitelja’
len u Appleu i osmislio je sklop telefonskog suËelja za Apple u razliËitim zemljama kao πto su Japan, Rusija i Engleska.
II. Sklop nije nikada izaπao na træiπte, i to dijelom zahvalju- Jednom je posloæio poziv tako da ide preko deset zemalja.
juÊi Draperovu uhiÊenju i osudi zbog telekomunikacijske Zatim je ukucao broj javnog telefona pored sebe. Nekoliko
prijevare 1977. »etveromjeseËnu kaznu odsluæio je u za- minuta kasnije telefon pored njega je zazvonio. Draper bi
10 tvoru u Kaliforniji, gdje je napisao EasyWriter ∞ prvi tekst neπto kazao u prvi telefon i nakon dosta sekundi zaËuo bi 11
procesor za Apple II. svoj glas jedva Ëujno na drugom telefonu. Ovo je samo jedan
Tijekom boravka u slabo Ëuvanom zatvoru dræao je pre- od primjera iz njegove karijere suludih istraæivanja.
davanja o telefonskim hakovima i poduËavao je sve zainter- Ubrzo nakon toga stvorio je jednostavniji blue box te
esirane na koje sve mogu naËine manipulirati komunikacij- poËeo istraæivati na kojem principu rade interni kodovi tele-
skim tehnologijama. Jasno mu je ukazana Ëinjenica πto bi fonskih kompanija za meumjesne linije. Otkrio je da su in-
se dogodilo ako odbije poduËavati u zatvoru te da svakako terni kodovi za biranje bili drugaËiji od normalnih brojeva
izbjegne opasnost da postane ‘dojavljivaË’, pa je tako, kako kojim bi se sluæio telefonski pretplatnik.
bi preæivio kroz kazneni sustav, bio prisiljen dræati preda- PriËa o njegovom eksperimentu se proπirila, stigla do
vanja o stanovitim tehnologijama. novinskih stranica, a zatim i do organa vlasti, razotkrivanja
Slabosti sustava koje su Draper i ostali otkrili bile su mreæe sudionika i konaËno do Draperovog zakonskog
ograniËene na preusmjeravanje poziva na sklopkama koje procesuiranja. Eksperiment je izazvao golemu materijalnu
se koristile unutarkanalnu signalizaciju (razmjena opera- πtetu koja je ukljuËivala troπkove nenaplativih telefonskih
torskih signala unutar istog kanala na kojem se odvija i poziva, redizajniranje linijskih protokola i ubrzanu zamje-
poziv), dok se novija oprema u potpunosti temelji na van- nu opreme. A Cap’n Crunch zviædaljke, nakon πto su izaπle iz
kanalnoj signalizaciji, upotrebi odvojenih kanala za prije- upotrebe, postale su vrijedan kolekcionarski predmet.
nos glasa i sprijenos ignala. Captain Crunch zviædaljka
proizvodila je ton na 2600 Hz koji na sustavu s unutarkanal-
nom signalizacijom otvara meumjesnu liniju za novi
poziv. Tada u akciju kreÊe blue box sa svojim dvofrekvenci-
jskim kombinacijama, poznatim kao multifrekvencije ili
MF, koje su sliËne tonskom biranju. Neki telefonski sustavi
rade i na jednoj frekvenciji.
Captain Crunch zviædaljka sa svojih 2600 Hz mogla je
uputiti Ëitav poziv. Jedan dugi zviæduk za uspostavljane lini-
je, kratak za “1”, dva kratka za “2”, itd. Slijepi friker
savrπenog sluha Joe Engressia mogao je birati cijeli poziv
zviædeÊi samo svojim ustima.
Nakon otkriÊa novih granica koje su otvorile blue boxes,
Draper je mogao istraæivati Ëitav novi spektar brojeva. Ti su
brojevi bili kodovi za biranje meumjesnih linija koje su ko-
ristili operateri iz jednog grada kako bi uspostavili kontakt s
operatorom iz drugog. Danas ti tzv. kodovi za preusmjera-
System.hack(2,“telekom”,“Captain Crunch — zviædaljka”) glasa ili da je razgovor stavljen na na besplatni, meumjesni 1-800
Ëekanje. Namjesto toga, AT&T se broj ∞ ili na bilo koji broj udaljen viπe
odluËio puπtati postojani ton E iz- od pedeset milja ∞ telefonski poziv
Æitne pahuljice i unutar- nad srednjeg C ∞ 2600 Hz ∞ na svim
funkcionirajuÊim raspoloæivim lini-
bio bi preusmjeren preko meu-
mjesne linije ili tzv. “trunka”. Puπta-
kanalno signaliziranje jama kako bi ostatku sistema signa-
lizirao da je linija slobodna. Moæete
nje tona na 2600 Hz uvjerilo bi me-
umjesnu liniju da je nazivatelj pok-
si ga predstaviti kao pozivni ton koji lopio sluπalicu i da treba priËekati
postoji samo kada je svaki telefon da netko drugi uputi poziv. Meu-
12
> Proteklih pedeset godina
proizvoaËi æitnih pahuljica na
dno pakovanja hrskavih, zaπeÊe-
rjeËnikom kazano, zvuk koji proiz-
vodi zrak kada titra sinusodiom
frekvencije 2600 Hz. Da bi se shvati-
poklopljen. RijeË je o neËemu πto
Ëovjek nikada ne bi trebao Ëuti, a
svakako o nemËemu πto Ëovjek nika-
mjesna linija bi se na brzinu odvoji- 13
la i ponovno spojila procedurom
poznatom kao “nadzorno poniπte-
renih kukuruznih i zobenih pahulji- lo zaπto je zviædaljka koja proizvodi da ne bi trebao proizvesti. nje”. Proizvela bi kratak klik nakon
ca skrivaju male poklone, takozvane taj ton tako bitna hakerima potreb- IspoËetka upotreba 2600 Hz bila kojeg bi uslijedila tiπina. Taj klik i
“nagrade”. To “iznenaenje”, kako no je uÊi u malo viπe tehniËkog ob- je ekskluzivno znanje u vlasniπtvu tiπina bili su zvuk kojim jedan kraj
ga djeca Ëesto nazivaju, najËeπÊe je jaπnjavanja i malo viπe u povijest. inæenjera AT&T-a. Meutim, s vre- meumjesne linije signalizira dru-
plastiËna igraËka ukraπena imenom Sredinom dvadesetog stoljeÊa te- menom, objavljenim radovima i gom kraju ∞ vjerojatno drugom di-
ili logom proizvoaËa æitarica. Ti su lefonski sustav Sjedinjenih AmeriË- brojnim sretnim pogreπkama, mno- jelu telefonskog sustava ∞ da Ëeka na
nagradni predmeti uvijek jeftini i kih Dræava bazirao se na “unutar- gi su ljudi doπli do saznanja o tonu brojeve za usmjeravanje poziva.
lomljivi. NaiÊi u zdjelici na igraËku i kanalnom signaliziranju”. To znaËi na 2600 Hz. Hakeri ∞ odnosno toËn- OdaπiljuÊi odmah drugi ton poznat
otkriti o Ëemu se ovog puta radi za da se same informacije o telefon- ije ‘djede’ danaπnjih hakera, pozna- kao “kljuËni pulsni ton” i nakon to-
dijete je gotovo redovito uzbudljivi- skoj vezi u osnovi prenose kao audio ti kao phreakeri (kombinacija poj- ga niz brojki (bilo telefonski broj ili
je no igrati se s njom. podaci preko telefonske linije. Dru- mova phone freak i hacker) ∞ otkrili interni kod telefonske kompanije)
Moæda najslavnija nagrada u pov- gim rijeËima, telefonska oprema su 2600 Hz. Iako nije jasno tko je nazivatelj koji je poslao ton na 2600
ijesti pahuljica ∞ ali svakako na- AT&T-a koristi Ëovjeku Ëujne signale toËno u frikerskoj zajednici ‘otkrio’ Hz mogao bi onda uputiti meu-
jslavnija nagrada meu hakerskom (tj. πumove ili tonove) kako bi signa- moguÊnosti upotrebe 2600 Hz za is- mjesni poziv ili interni poziv unutar
zajednicom ∞ bila je inaËe ni po Ëe- lizirala sve podatke potrebne pri us- pitivanje sustava, hakerska predaja telefonske kompanije sa meu-
mu posebna zviædaljka koja se mo- mjeravanju poziva i veza koje sustav zaslugu pripisuje Joeu Engressiji. mjesne linije. Zvao je besplatno.
gla naÊi na dnu pakovanja Cap’n koristi za komuniciranje statusa Engressia je roen slijep, obdaren Do sredine πezdesetih Engressia
Crunch æitarica u 1960-tima. Za ve- pojedinog poziva ili linije te adekvat- savrπenim sluhom, a veÊinu svoje je otkrio sve to i joπ mnogo toga. En-
Êinu onih koji nisu hakeri ta zviæ- no koordiniranje radnji. I danas adolescencije i mlae dobi proveo je gressia je tako sretno proveo godine
daljka bila je samo najobiËnija plas- kada birate telefonski brojevi proiz- na telefonu. Ponekad bi zviædao zviæduÊuÊi na svom putu do besplat-
tiËna zviædaljka ∞ velika veÊina tih vode razliËite Ëujne piskove ∞ moæe- kada je presluπavao ili ostavljao tele- nih telefonskih poziva i dubljeg ra-
zviædaljki odbaËena je i zanemarena te zasvirati melodiju pritiπÊuÊi bro- fonske poruke. Legenda kaæe da je s zumijevanja svih dijelova ameriËkog
Ëim bi ih se dijeca zasitila. Kao kod jeve na telefonu. Ali pored pukog bi- osam godina Engressia otkrio da bi, i ranog globalnog telefonskog sus-
svih zviædaljki, puhneπ u nju i ona ranja brojeva, AT&T je trebao iznaÊi kada zazviædi na 2600 Hz, bio ‘isklju- tava ∞ do razine koja je nadmaπivala
proizvede visokofrekvencijski πum. naËin kako prepoznati da linija Ëen’ s telefonskih linija (premda bi i veÊinu Bellovih inæenjera. A En-
Kao kod mnogih drugih zviædaljki, funkcionira. Odsustvo bilo kakvog one zapravo samo utihle). S vreme- gressia nikako nije bio jedini. Narav-
ako zaËepiπ jednu od izlaznih rupi- signala Ëinilo bi se idealnim naËi- nom, istraæujuÊi telefonski sustav, no, mnogi hakeri bez savrπenog slu-
ca, ton zviædaljke postane viπi. Ton nom kako predstaviti slobodnu lini- on je otkrio toËno i zaπto. ha morali su pribjeÊi tehniËkim
sa zaËepljenom rupicom bio je E ju, ali to bi moglo naprosto znaËiti Ako bi nazivatelj preko Bell/AT&T- sredstvima da bi proizveli ton na
iznad srednjeg C ∞ znanstvenim da je doπlo do stanke u prijenosu eve telefonske mreæe uputio poziv 2600 Hz. ImajuÊi upravo to na umu,
Engressia je nazvao svog prijatelja sor za Apple II. PoËetkom osamde-
Johna Drapera da mu kaæe o zanim-
ljivoj karakteristici zviædaljke koju je
setih tehnologija na kojoj se zasni-
vala telefonija uπla je u skupo i op-
System.hack(3,“zakon o
naπao u pakovanju Cap’n Crunch
pahuljica.
seæno preustrojavanje, dijelom kako
bi blokirala tehnike koje je stvorio i
autorskom pravu”,
A Draper ne samo da je upotri- proπirio Captain Crunch. Meutim,
jebio zviædaljku da bi zvao besplat-
no, nego ju je upotrijebio za svoj
bitnije za Drapera, tehnologija os-
obnih raËunala poËela je otvarati
“Richard Stallman ∞
14
hakerski nadimak, tako da je i dan
danas u hakerskoj i frikerskoj zaje-
vrata jednom sasvim novom svijetu
∞ svijetu raËunala, softvera i mreæa
GNU OpÊa javna licenca”)
dnici poznatiji kao Captain Crunch. ∞ svijetu u kojem Êe frikeri brzo
S vremenom Draper je uËinio friking postati hakeri.
jednostavnijim, a tehnologiju pris- Danas je telefonska komutacija u
tupaËnijom ugradivπi ton na 2600 svim zemljama Zapada i u veÊini os-
Hz i druge tonove korisne za one koji talog svijeta postala digitalna i
su bili zainteresirani za istraæivanje koristi vankanalno signaliziranje.
telefonskih mreæa ili za besplatne Captain Crunch zviædaljka i plave
meumjesne pozive u specijalizira- kutije ne ‘rade’ veÊ desetljeÊima. Za-
ne ureaje poznate kao “blue boxes nimljivim razvojem dogaaja pos-
∞ plave kutije” ∞ nazvane tako jer je
prva takva kutija koju je Bellov sus-
tav osiguranja kon∫scirao naena u
ljednjih godina, Voice over IP (VoIP)
tehnologije, zajedno sa sve veÊom
rasprostranjenoπÊu brzih internet-
> ZaËetnik pokreta za slobodni softver Richard Stallman
dugi niz godina radio je u laboratoriju za umjetnu inte-
ligenciju na Massachussetts Institute of Technology (MIT).
plavoj plastiËnoj kutiji, a ne zato πto skih linija, omoguÊile su hakerima PrateÊi okolnosti razvoja raËunalnih programa te uvidjevπi
su one redom ili veÊinom bile plave. da se vrate korijenima trudeÊi se os- nedostatke i etiËke dileme nastale s uvoenjem vlasniËkog
Captain Crunch je 1972. uhapπen tvariti i ostvarujuÊi izvorni frikerski softvera, pokuπao je stvoriti alternativni sustav koji bi ih izb-
na osnovu optuæbi za telefonsku cilj besplatnog telefoniranja. jegao ∞ slobodni softver. U sijeËnju 1984. napustio je posao
prevaru i osuen na petogodiπnju Njujorπki Ëasopis 2600 sebe nazi- na MIT-u i zapoËeo raditi na slobodnom operativnom susta-
uvjetnu kaznu. U nekom trenutku va “Hakerskim tromjesjeËnikom”. vu. Rad na GNU Emacsu zapoËeo je u rujnu 1984., a veÊ po-
sredinom 1970-tih poduËavao je i On ostaje jedna od najdugovjeËnijih Ëetkom 1985. poËetni sustav je poprimio upotrebljiv oblik.
utemeljitelje kompanije Apple institucija hakera koji su spremni Do 1990. GNU sustav bio je gotovo dovrπen ∞ jedina vaæna
Computer, Stevea Jobsa i Stevea izazivati sigurnosne sustave i istraæi- komponenta koja je nedostajala bila je jezgra. Prvotna jezgra
Wozniaka, kako da izrade i prodaju vati. Lokalni 2600 sastanci diljem buduÊeg operativnog sustava trebao je postati GNU HURD ∞
vlastite plave kutije. U sukob sa za- svijeta nude vaæno mjesto za hakere, jezgra koja se bazirala na mirko-jezgri Mach. Kako je GNU
konom doπao je ponovno 1977. zbog mlade i stare, da dijele struËno zna- HURD kasnio s razvojem, razvoj GNU operativnog sustava us-
optuæbe za telekomunikacijsku pre- nje, da uËe i da se druæe. Ime je, na- porio je sve dok se nije pojavila druga raspoloæiva jezgra. Go-
varu i odsluæio je Ëetiri mjeseca u ravno, danas Ëesto zaboravljena dine 1991. Linus Torvalds razvio je Unixu kompatibilnu jez-
zatvoru. Nakon puπtanja na slobodu referenca na slavnu frekvenciju i gru i nazvao je Linux, a kombiniranje Linuxa s GNU sustavom
nastavio je æivjeti kao softverski pro- jedan od najslavnijih hakova svih rezultiralo je cjelovitim slobodnim operativnim sustavom.
gramer, napisavπi prvi tekst proce- vremena. ZahvaljujuÊi Linuxu danas moæemo koristiti GNU operativni
sustav, koji se u toj kombinaciji naziva GNU/Linux.
> Benjamin Mako Hill < GNU slobodni softver saËinjavaju programi koji su ob-
javljeni pod uvjetima koji svakom omoguÊuju da ih prouËa-
va, mijenja i dalje dijeli bliænjima. Prednost GNU softvera je — Sloboda poboljπavanja programa i ustupanje vaπih
dakle njegova etiËka komponenta koja omoguÊuje koris- poboljπanja javnosti, za blagodat cijele zajednice
nicima suradnju i poπtuje njihove slobode. Da bi to postigao (sloboda 3). Pristup izvornom kodu je preduvjet za to.”
u okruæenju gdje je softver zaπtiÊen autorskim pravom, copy- U GNU projektu koristi se copyleft kako bi se te slobode
rightom, i u vremenima kada se to pravo poËelo primjenjiva- zaπtitile. Ali postoje i softveri koji su takoer slobodni, no
ti ne bi li se softver pretvorio u privatno vlasniπtvo i proizvod nemaju copyleft klauzulu. Meutim, upravo je to svojstvo
za raËunalno træiπte, bilo je potrebno naÊi naËina da se isko- omoguÊilo slobodnom softveru da upregne kreativni napor
risti pravni okvir koji je postavljao copyright kako bi se spri- tisuÊa razvijatelja diljem svijeta u zajedniËki rad na razvoju
jeËilo pretvaranje GNU softvera u privatno vlasniπtvo. Meto- slobodnog softvera bez straha da Êe taj njihov zajedniËki
16 da kojoj je Richard Stallman pribjegao nazvana je “copyleft”. trud netko moÊi prisvojiti ili da Êe netko napraviti napredak 17
Bit copyrighta, autorskog prava, poput drugih sustava vlas- na temelju njega, a da taj napredak neÊe vratiti natrag u
niËkog prava, krije se u moÊi da iskljuËuje. Vlasniku copy- daljnji razvoj slobodnog softvera.
righta pravno je dana moÊ da brani drugima kopiranje, dis- Richard Matthew Stallman utemeljitelj je pokreta za
tribuiranje i modi∫ciranje djela. Copyleft se temelji na copy- slobodni softver, GNU projekta i Fondacije za slobodni
rightu, ali izokreÊe njegov smisao: umjesto da znaËi priva- softver. U njegova najveÊa dostignuÊa spadaju Emacs (i kas-
tizaciju softvera, on znaËi oËuvanje njegove slobode. Glavni niji GNU Emacs), GNU kompajler, GNU debugger (program
smisao copylefta je prepuπtanje prava svakom korisniku da za pronalaæenje pogreπaka). Autor je GNU OpÊe javne licen-
slobodno koristi program, kopira ga, izmjenjuje i dis- ce (GNU General Public License ∞ GNU GPL), najπire prih-
tribuira izmijenjene verzije, pod uvjetom da daljnjim koris- vaÊene slobodno-softverske licence, koja je probila put kon-
nicima ne nameÊe ograniËenja bilo kakve vrste, veÊ da ga ceptu copylefta. Od sredine 1990ih veÊinu aktivnosti usmje-
dalje dijeli, u izvornom ili izmijenjenom obliku, pod istim rio je na politiËke kampanje, promicanje slobodnog soft-
uvjetima pod kojima ga je primio. Kod GNU softvera copy- vera, kampanje protiv softverskih patenata i protiv proπiri-
left, to izokretanje copyrighta iz alata privatizacije u alat di- vanja pravnog reæima copyrighta.
jeljenja, implementiran je kroz GNU OpÊu javnu licencu ∞
GNU General Public License, skraÊeno GNU GPL.
Kao πto kaæe de∫nicija slobodnog softvera (http://www.
gnu.org/philosophy/free-sw.hr.html): “‘Slobodni softver’ je
stvar slobode, a ne cijene. Za razumijevanje tog pojma, tre-
bate shvatiti ‘slobodni’ u smislu ‘sloboda govora’, a ne u
smislu ‘slobodan (besplatan) upad’.
Slobodni softver ukazuje na slobodu korisnika da
pokreÊe, kopira, distribuira, prouËava, mijenja i poboljπava
softver. Joπ odreenije, ukazuje na Ëetiri vrste sloboda za
korisnike softvera:
— Sloboda pokretanja programa, u bilo koje svrhe
(sloboda 0).
— Sloboda prouËavanja rada programa i njegovog
prilagoavanja vaπim potrebama (sloboda 1). Pristup
izvornom kodu je preduvjet za to.
— Sloboda distribuiranja kopija, kako biste mogli pomoÊi
bliænjemu (sloboda 2).
System.hack(3,“zakon o autorskom pravu”,“Richard Stallman — GNU OpÊa svojih djela, stoga gube kontrolu »ak i ako prihvatimo dvojbenu
javna licenca”) nad proizvodom svoga rada. Kako pretpostavku da intelektualno vlas-
izdavaËi nakupljaju bogatstvo u ob- niπtvo maksimira proizvodnju, ono
liku iskoristivih autorskih prava, le- πto ono maksimira jest proizvodnja
Richard Stallman gitimacija autorskog prava premjeπ-
ta se s opÊeg interesa zajednice Ëita-
neslobode. Izgubivπi pravo da plagi-
raju, kooptiraju i prerauju djela
— Hakiranje vlasniπtva telja na “ravnoteæu” interesa izme-
u pisaca i Ëitatelja. Odnosno, izme-
kako æele, Ëitatelji su suoËeni s tim
da je njihovo jedino pravo u tome da
u izdavaËa i Ëitatelja. Dok je autor- kupuju djela od izdavaËa. IzdavaËi ∞
18
> Richard Stallman je arhetipski
haker koji je kroz vlastitu prak-
su na podruËju raËunarstva otkrio
na. Naime, ako mu se neπto svia,
onda on to æeli podijeliti. Slobodni
softver se temelji na druπtvenoj
sko pravo dopuπtalo privremene
monopole u interesu opÊeg dobra,
novonastajuÊi reæim prava “intele-
vektoralna klasa ∞ tvrde da je sve πto 19
im smanjuje prodaju “piratstvo”.
Kao πto je sama pankerska princeza,
poveznicu izmeu informacije i prednosti suradnje i etiËkoj predno- ktualnog vlasniπtva” πtiti interes iz- Courtney Love, jednom rekla, glaz-
vlasniπtva s kojom se danas suoËava- sti poπtivanja korisnikove slobode. davaËa kao interes po sebi i za sebe. bena industrija je pirat ∞ ni autori
ju svi hakeri ∞ hakeri u najπirem smi- On predstavlja iskorak prema svije- Moæda zapravo kao novi klasni in- nisu u niπta boljoj situaciji no Ëita-
slu . Izazov Stallmanovog djela jest tu nakon oskudnosti. Stallman vidi teres ∞ onoga πto sam drugdje naz- telji (ili sluπatelji ili gledatelji). Suo-
kako povezati sve te razliËite haker- slobodni softver kao praktiËki idea- vao ‘vetkoralistiËke klase’, klase Ëavaju se s vektoralistiËkom klasom
ske prakse. Za Stallmana hakiranje lizam koji πiri slobodu i suradnju. koja koristi pravni reæim intelektu- koja sada tvrdi da su njena prava
znaËi ispitivanje granica moguÊeg. Stallman razlikuje otvoreni kôd od alnog vlasniπtva kao sredstvo konro- najviπi prioritet. OpÊe dobro valja
Nakon uzorne karijere u hakiranju slobodnog softvera. Otvoreni kôd je liranja proizvodnog procesa kroz mjeriti iskljuËivo i jedino maræama
softvera Stallman se okrenuo haki- metodologija razvoja, slobodni soft- vlasniπtvo nad informacijom kao vektoralistiËkih industrija.
ranju informacijske politike. ver je druπtveni pokret ∞ druπtveni privatnim vlasniπtvom. BuduÊi da je dosada uspijevala os-
Njegov pokret za slobodni softver hak. Stallman nadopunjuje svoja Konsolidiranje intelektualnog igurati svoja prava, vektoralistiËka
osporava shvaÊanje da je autorsko praktiËka nastojanja za πirenje slo- vlasniπtva kao neËeg bliskog apsolut- klasa sada zagovara potpuno zatva-
pravo prirodno pravo. On koristi za- bodnog softvera pod OpÊom javnom nom pravu privatnog vlasniπtva ranje svakog aspekta informacije u
kon o autorskom pravu protiv njega licencom kritikom onoga u πto se naznaka je da se formira novi klasni ograde vlasniπtva. Ona æeli πifrirati
samoga, kao instrument za stvara- pretvorio sustav autorskog prava. interes. Intelektualno vlasniπtvo nije informaciju, vezujuÊi je arti∫cijalno
nje provedive slobode, a ne zakone Stallman inzistira na tome da je u kontinuitet, veÊ raskid sa starim uz pojedinaËne materijalne pred-
intelektualnog vlasniπtva kao prove- Sjedinjenim AmeriËkim Dræavama pravnim formama. Ono πto je treba- mete. Æeli kriminalne sankcije za
divu neslobodu. Stallmanova OpÊa autorsko pravo poËelo ne kao prirod- lo opravdati pod autorskim pravom svakoga tko prekrπi to pravo sada
javna licenca inzistira ne samo na no pravo, nego kao umjetni monopol bio je arti∫cijelni monopol, ono πto apsolutno privatnog vlasniπtva. Pa-
tome da se ono πto se objavljuje pod ∞ prvotno na ograniËeno razdoblje. treba opravdati pod intelektualnim tenti, kao πto Stallman istiËe, funk-
tom licencom moæe dijeliti, veÊ i da Autorsko pravo donosi koristi iz- vlasniπtvom jest opÊi interes. ©to se cioniraju posve drugaËije od autor-
sve preraene verzije materijala koji davaËima i autorima ne radi njih to, zapravo, dovodi u “ravnoteæu”? »i- skih prava, no naposljetku ishod je
je objavljen pod tom licencom mo- samih, veÊ radi opÊeg dobra. Ono je tateljeva sloboda da Ëini πto god æeli jednak ∞ osiguravanje informacije
raju takoer biti slobodne. trebalo biti poticajem da se viπe piπe s informacijom ili Ëitateljev interes kao vlasniπtva koje ima ekvivalenta
Premda opetovano izjavljuje da i objavljuje. da se proizvodi viπe informacije? Pod vrijednost na apstraktnom terenu
on nije protiv biznisa, Stallman Meutim, pisci moraju prepusti- reæimom intelektualnog vlasniπtva komodi∫kacije.
predlaæe posve drugaËije poimanje ti prava izdavaËima da bi ih se objav- samo je ovo drugo “pravo”, a ne prvo. Za razliku od autorskih prava,
informacijske ekonomije. Za Stall- ljivalo. Pisci uobiËajeno ne posjedu- Jedino Ëitateljevo pravo je da kupi patenti ne vaæe automatski, veÊ se
mana je umjetna oskudnost stvore- ju sredstva za proizvodnju i dis- intelektualno vlasniπtvo. moraju registrirati, kreirajuÊi time
na prisvajanjem informacije neetiË- tribuciju da bi realizirali vrijednost dugotrajnu lutriju za hakere koji
ponekad nikako ne mogu znati tko je politiËka katastrofa. Ono πto nas-
dræi patent. To je manji teret za vek-
toralistiËku klasu. Vektoralni bizni-
taje pod kombiniranim teretom pa-
tenata i autorskih prava je samo pro-
System.hack(4,“æivi svijet”,
si akumuliraju portfelje patenata
koje licenciraju meusobno jedni
πirenje komodi∫kacije same.
To je kontekst u kojem se Stall-
“Heath Bunting ∞ Superweed
drugima, poboljπavajuÊi si meu- manovu OpÊu javnu licencu dade
sobno gotovo monopolistiËku po-
ziciju. Ishod zatvaranja informa-
shvatiti kao istinski druπtveni hak.
Ona je to u estetskom smislu te rije-
Kit 1.0”)*
cije unutar okvira vlasniπtva nije os- Ëi utoliko πto se koristi dostupnom
20 kudnost inovacije, veÊ oskudnost materijom. Ona koristi zakon o au-
suradnje. torskom pravu protiv njega samog,
Kao πto Stallman ironiËno istiËe, kao naËin da zaπtiti ono neπto malo
tijekom hladnog rata i SSSR i SAD su prostora za slobodu suradnju. Ona
kontrolirali informacije, ali pod raz- nije program ili manifest, ona je ap-
liËitim reæimima. SSSR je kontro- likacija. Stallman proπiruje haker-
lirao informacije radi politiËkih ra- sku estetiku van sfere programira-
zloga, πto je prouzroËilo ekonomsku nja u druπtvenu sferu, ali na tom no-
katastrofu. SAD koji je proizaπao iz vom i veÊem polju nastavlja praksu
hladnog rada kontrolira informaci-
je radi ekonomskih razloga ∞ i ishod
hakiranja na manje viπe isti naËin.
To je njegov genij. > Velike korporacije sve viπe imaju moÊ odluËivanja i
pro∫tiranja nad golemim podruËjima ljudskog posto-
janja. Svojedobno zajedniËka dobra poput zemlje, vode i
> McKenzie Wark < zraka danas se monopoliziraju. Tako je hrana zagaena
GMO-vima uvedenim bez znanja javnosti.
Geni kontroliraju kemijske poruke unutar stanice, koje
pak odreuju oblik i funkciju same stanice, razliËitih organa
u organizmu i konaËno Ëitavog organizma. Ovi kodovi æivota
sastavljeni su od Ëetiriju graevnih blokova organiziranih u
parove, poredane poput stuba spiralnog stubiπta. Milijuni
razliËitih kombinacija temeljnih kemijskih spojeva odreu-
ju razliËite genetiËke strukture svake vrste organizma.
Genetski inæenjering skup je tehnika i procesa za
modi∫ciranje ovih genetski kodova koji se primjenjuju na
biljke, æivotinje, mikro-organizme, pa i ljudska biÊa. Kom-
panije poput Monsanta koncentrirane su na inæenjering
sjemenja koje u svom sastavu ima pesticide i herbicide, ili
pak sjemenja koje Ëini biljke otpornijima na pesticide pa ih
se moæe πpricati u joπ veÊim koliËinama.
I pored stvarnih tehnologija zaπtite protiv
* Temeljeno na priopÊenju
genetskog kopiranja, korporacije bez oklijevanja
za javnost povodom
predstavljanja projekta u provode svoja prava intelektualnog vlasniπtva nad
londonskom ICA-u u genetskim kodom, Ëak i ako zagauju usjeve uz-
sijeËnju 1999. gajivaËa koji ne koriste njihovo sjemenje.
Tradicionalna sredstva protesta uliËnim prosvjedima i kontaminacija je nepovratna. Steve Kurtz iz Critical Art
putem sluæbenih kanala Ëine se neadekvatnima da bi doπlo Ensemblea naziva ovakav pristup “bioloπkim graanskim
do promjene u danaπnjoj opasnoj i nedemokratskoj situaciji. neposluhom” te ovakvu novu metodu protesta, koja joπ
Kulturni terorizam moæe se de∫nirati kao napad na nema Ëvrsta uporiπta u teoriji i strategijama, smatra kock-
dominantne sisteme moÊi i njihovu de∫niciju stvarnosti i anjem reproduktivnim sistemima, ekosistemima i to na vi-
prirode. Godine 1999. Michael Boorman iz Natural Realityja soke uloge. Kurtz takoer kaæe da je njegova grupa otvorena
lansirao je “Natural Reality SuperWeed Kit 1.0 (Prirodna ovom tipu akcija, no s prethodno ispitanim utjecajem i eti-
stvarnost ∞ Set za superkorov 1.0) ∞ uradi sam set koji omo- kom. Usprkos kritikama, Bunting vjeruje da je Superweed
guÊuje da se proizvede genetski modi∫cirani superkorov, samo reakcija na postojeÊu realnost. Projekti poput ovoga
22 koji je napravljen da napada korporativne monokulture”. podsjetnik su da su uËinci GM-a postali predmetom moral- 23
Heath Bunting i Rachel Baker utemeljitelji su Cultural Ter- ne debate za veÊinu svjetske populacije.
rorist Agency koja je ∫nancirala SuperWeed Kit 1.0. Umjetnik Heath Bunting, poznati haktivist, odgovoran
Michael Boorman smatra da genetska hakerska tehno- je za subverzivne informacijske kampanje protiv kompanija
logija nudi sredstva za suprotstavljanje toj nesigurnoj, nepo- kao πto su Glaxo, Nike i 7-Eleven prodavaonice, æivi i radi u
trebnoj i neprirodnoj tehnologiji genetskog modi∫ciranja Bristolu u Velikoj Britaniji. Internacionalno je priznat kao
organizama. Heath Bunting biotehnologiju naziva novim jedan od pionira net.arta. Izlagao je i predavao po cijelom
ratiπtem na kojem se vodi bitka za kontrolu nad æivotom i svijetu, s projektima koji ukljuËuju gra∫te, performanse, in-
zemljom, ali i podruËjem na kojem se æivot sam rede∫nira. tervencije, piratski radio. U jednom trenutku svoju djelat-
Bit svega krije se u konceptima vlasniπtva i reprezentacije, nost je usmjerio na genetiku, prozvavπi je sljedeÊim ‘novim
koji su na ovom popriπtu ozbiljno dovedeni u pitanje. medijem’. Natural Reality Superweed kit 1.0 je vaæan dopri-
Natural Reality SuperWeed Kit 1.0 sadræi mjeπavinu pri- nos umjetniËkoj praksi koja predstavlja novo kreativno
rodnih i genetski modi∫ciranih sjemena porodice Brassica polje na granici znanosti i umjetnosti. »lan je i osnivaË
(uljane repice, divlje rotkvice, æute gorËice, prave rusomaËe). irational.org kolektiva. Njegov glavni cilj je pronaÊi put kako
Ako se tom sjemenju dopusti da nikne i meusobno kriæa, da se svega odrekne i æivi vani kako je bog i zamislio.
nastat Êe superkorov otporan na danaπnje herbicide koji
potencijalno ugroæava pro∫tabilnost GM usjeva, ali i proiz-
vodnju i distribuciju herbicida.
Kako bi se suprotstavili prijetnji genetskog zagaenja
koje izazivaju biotehnoloπke ∫rme, ljudi se mogu suprot-
staviti superkorovom sabotirajuÊi komercijalne genetski
modi∫cirane usjeve. RijeË je o prirodno selektiranom koro-
vu koji omoguÊuje ometanje uzgoja genetski modi∫ciranih
biljaka zasijavanjem ‘superkorova’ koji je prirodno otporan
na GM herbicide. U ovom su projektu, prvi puta predstavlje-
nom u ICA-u u Londonu, a onda i πirom svijeta, kritiËari pre-
poznali kljuËni susret suvremene umjetnosti i biotehnologi-
je. ‘Superkorov’ posebno je aktualan sada, u vrijeme kada se
formira javno mnijenje o tome pitanju, a vlade su u procesu
odluËivanja o tome sluæe li znanstvena dostignuÊa u poljo-
privrednoj proizvodnji uvijek dobrobiti ËovjeËanstva.
SuperWeed mogao bi uniπtiti pro∫tabilnost GM sjeme-
nja, ali i onog konvencionalnog i organskog. Ova genetska
System.hack(4,“æivi svijet”,“Heath Bunting — Superweed Kit 1.0”) testi protiv takve hrane. Demonstra- venciju, zbog Ëega sam mjesecima
cije u Genovi u Italiji u tamoπnjem pratio nekoliko relevantnih mailing
McDonaldsu03 dovele su do toga da lista gdje se izmeu ostalog rasprav-
SuperWeed — UmjetniËki je ta multinacionalna korporacija
obustavila nabavu GM sastojaka. Ne-
ljalo i o superkorovima, pa sam se
zbog toga dao u detaljnije istraæivan-
projekt Heatha Buntinga davno je ispitivanje na laboratorij-
skim πtakorima koji su hranjeni GM
je i odluËio napraviti svoj superkorov.”
Rezultat Buntingovih nastojanja
http://www.irational.org/cta/superweed/ usjevima pokazalo da su se kod æiv- “SuperWeed” “sadræi mjeπavinu pr-
otinja razvile anomalije na organima irodnih i genetski modi∫ciranih

> Dvoslovni pre∫ks niËe sve ËeπÊe


u razgovoru kada je rijeË o hrani.
“GM hrana” iliti genetski modi∫ci-
gomilaju. Argumenti za takve usjeve
baziraju se na porastu svjetske pop-
ulacije i poveÊanoj potrebi za hra-
i promijenila krvna slika.04 To je do-
velo do obuhvatne zabrane GM pro-
izvoda u Indiji. Kako se informacije
(GM) sjemena porodice Brassica (ul- 25
jane repice, divlje rotkvice, æute
gorËice, prave rusomaËe). Ako se
rana hrana postala je standardni sa- nom. BuduÊi da je teπko zamisliti da o rezultatima kao πto su ovi sve viπe tom sjemenju dopusti da nikne i
stojak u veÊini prehrambenih prera- bismo mogli obraivati viπe zemlje javljaju diljem svijeta, tako raste i ot- meusobno kriæa, nastat Êe super-
evina na træiπtu. Od grickalica kao no πto to trenutno Ëinimo, potreba por primjeni GM usjeva u svakod- korov otporan na danaπnje herbi-
πto je Ëips preko slastica do pakirane da se poluËi veÊi prinos po hektaru nevnoj prehrani. NesluÊeni strah cide (kao πto je Roundup05) koji ugro-
hrane, “75 posto hrane kupljene u postaje bitna. GM usjevi omoguÊu- pred onime πto bi se joπ moglo poja- æava ne samo pro∫tabilnost konven-
Americi [i drugim zemljama] ima ju da doe do poveÊanja uroda jer: viti kao nuspojava konzumiranja tih cionalnih i GM usjeva Brassice, veÊ
genetski promijenjene sastojke, [i 1) ti usjevi smanjuju poπast namet- proizvoda nadvladao je njihov poten- i proizvodnju i distribuciju herbi-
pritom] promijenjene sastojke koji nika na usjevima, πto zauzvrat pov- cijal da ponude odgovor na globalnu cida.” 06 S ovim projektom njegova je
nisu navedeni na deklaraciji.”01 Zbog eÊava urod, 2) ti usjevi poluËuju veÊe prehrambenu krizu. nakana bila zagovarati onaj tip
te nekonzistentnosti u deklariranju prinose od tradicionalnih usjeva, 3) Kao odgovor na zabrinutost GM bioloπkog terorizma gdje “[a]ko os-
izmeu mnogobrojnih proizvoda, nema potrebe za koriπtenjem pesti- prehrambenim proizvodima, rad bri- jeÊate da vlasti neÊe poπtivati volju
postalo je nemoguÊe razluËiti πto cida buduÊi da su biljke otpornije na tanskog umjetnika Heatha Buntinga veÊine stanovniπtva za zabranom
sadræi GM usjeve, a πto ne. “Prema nametnike. Argumenti protiv takvih “SuperWeed ∞ Superkorov” bavi se GM usjeva (trenutno je 77% za pot-
podacima proizvoaËa poljopri- biljaka seæu od nepoznanica oko po- pitanjem prijetnje koju ti usjevi dono- punu zabranu), moæete odluËiti da
vrednih namirnica, gotovo svi proiz- sljedica po zdravlje uslijed konzumi- se kada uu u prehrambeni lanac ta- uzgojite i oslobodite u okoliπ Super-
vodi koji imaju sastojke od kukuru- ranja modi∫ciranih usjeva do nepo- ko da ilustrira utjecaj tih usjeva na nji- Weed 1.0.” 07 Iako se to moæda neki-
za ili soje, a i poneki koji imaju u sas- znanica oko njihovog porijekla ∞ me- hov neposredni okoliπ. Bunting je po- ma Ëini antagonizirajuÊim pristu-
tavu repiËino ili pamukovo ulje, ima- utim, nema dokaza da su one πtetne najprije pratio nekoliko mailing lista pom, Bunting djeluje prema uspos-
ju barem neki GM sastojak.” 02 Iako po ljude. K tome, javna potroπnja GM o GM usjevima ne bi li saznao πto tavljanju ravnoteæe izmeu GM us-
to brzo postaje realnost, mnogo pi- usjeva veÊ je dosegla visoki udio kod ljude brine kad je rijeË o poveÊanoj jeva i njihove prirodne sredine,
tanja o usjevima i njihovom uËinku veÊine prehrambenih preraevina, upotrebi GM-a. Bunting objaπnjava buduÊi da prirodni korovi nemaju
na potroπaËe ostaju otvorena. pogotovu temeljnih namirnica kao kako je zapoËeo s projektom “Htio izgleda da utjeËu na danaπnje GM
UnatoË pomutnji u javnosti oko πto su πeÊer i braπno. sam napraviti biotehnoloπku inter- usjeve.
toga koji usjevi sadræe promjene, Kako se svijest o GM usjevima
argumenti za i protiv GM usjeva se poËela πiriti, javili su se globalni pro- 03 Organic Consumers Association, “Mass Protests Against Frankenfoods in Italy”,
http://www.purefood.org/ge/italyprotest.cfm
01 News Target, “Genetically modi∫ed foods more common than many Americans think, survey 04 “Food for thought: Report reveals risks of GM items”, Times of India, 4. lipnja 2005.,
shows”, http://www.newstarget.com/006073.html http://timeso∫ndia.indiatimes.com/articleshow/1132155.cms
02 “Survey: Most folks unaware they have been eating biotech foods for years”, Associated Press, 05 http://www.monsanto.com/monsanto/layout/products/productivity/roundup/default.asp
March 24, 2005, http://www.journalnow.com/servlet/Satellite?pagename=WSJ%2FMG Article 06 “Rise of ‘Superweeds’ blamed on GM crops”: http://millennium-debate.org/ind5feb02.htm
%2FWSJ_BasicArticle&c=MGArticle&cid=1031781758183&path=!nationworld&s=1037645509161 07 Buntingova internetska stranica: http://www.irrational.org
UnatoË tom naizgled krajnje tak- odnosi se na sklonost proizvoaËa mona rasta, kao i njegove agresivne imali manje bubrege i oscilacije u
tiËkom pristupu, Bunting vjeruje u hrane da koriste GM usjeve kako bi pravne i lobistiËke prakse uËinile su sastavu krvi.” 15 Ti tipovi nalaza po-
diplomaciju kao metodu da se kor- izbjegli skupe procese odvajanja Monsanto primarnim ciljem anti- stavljaju pitanje o dugoroËnim uËin-
poracije obeshrabri od ulaganja u nejestivih proizvoda od onih koje je globalistiËkog pokreta i aktivista cima koje Êe ti usjevi imati na ljude
GM proizvode. Kao πto kaæe, “moæe- vrijedno izbaciti na træiπte. Takoer koji se bore za okoliπ.”13 Primjerice, jednom kada u potpunosti budu in-
te se alternativno odluËiti da pokre- GM urodi hipotetski donose viπe AmeriËka udruga potroπaËa organ- tegrirani u prehrambeni lanac. Ta je
nete vlastitu propagandnu kampa- pro∫ta, buduÊi da su GM usjevi tipiË- ske hrane (Organic Consumers Asso- rasprava tematiku GM hrane pre-
nju prijeteÊi biotehnoloπkim korpo- no obilniji i izdaπniji od usjeva koji ciation of America, skraÊeno OCA) tvorila u svjetsku problematiku.
rativnim interesima tim genetskim nisu GM. Meutim, koliko donose pokrenula je peticiju pod motom Iako se Bunting svojim djelom
26 oruæjem. ©to god da uËinili, prijetnja na veliËini toliko oduzimaju na oku- “Milijuni protiv Monsanta” ohra- protivi GM usjevima, projekt ipak 27
je Ëesto podjednako uËinkovita kao su u usporedbi sa svojim precima. brujuÊi uzgajivaËe i potroπaËe na uvodi vlastiti oblik GM usjeva u pri-
i primjena.” 08 I Ëini se da takav pris- Trenutno korporacije koriste GM kampanju protiv te korporacije. Nji- rodni okoliπ. Rezultat tog puπtanja
tup djeluje, kao πto pokazuje recent- usjeve kao naËin poveÊavanja godiπ- hovi zahtjevi u peticiji glase: “1) pre- u okoliπ mogao bi biti katastrofalan
ni Ëlanak o projektu “SuperWeed” u njeg uroda i time pro∫ta na uloæena stanite zastraπivati male obiteljske veÊ sam po sebi. Bunitingov super-
New York Timesu gdje se prenosi sredstva. One takoer predlaæu GM uzgajivaËe, 2) prestanite siliti potro- korov mogao bi se teorijski kriæati
kako se istraæivaË s MIT-a Joe Davis, usjeve kao metodu poboljπanja πaËe da konzumiraju neispitanu i stvarajuÊi time hibridnu GM biljku.
“otac ameriËke bioumjetnosti” 09, “hranidbenog sastava usjeva, kao nedeklariranu genetski modi∫ci- Tako stvorena biljka mogla bi pred-
oËitovao protiv “SuperWeeda” ka- πto je proteinski sastav riæe ili krum- ranu hranu, 3) prestanite koristiti stavljati Ëak i veÊu prijetnju od prvot-
zavπi: “Nije mi jasno zaπto [Bunting] pira, ili poveÊanja otpornosti usjeva milijarde dolara ameriËkih porez- ne. UnatoË kritikama upuÊenim
nije bio uhapπen. Pretpostavimo da na nepovoljne uvjete za rast, kao πto nih obaveznika kako biste poticali projektu, Bunting smatra da je “Su-
sam ja protiv benzinskih pumpi. Bi su suπa ili nametnici.”11 Druge tvrd- genetskim inæenjeringom modi∫- perweed” naprosto reakcija na veÊ
li mi to davalo za pravo da se vrz- nje, usmjerene na umirivanje nego- cirane usjeve ∞ pamuk, soju, kuku- postojeÊu stvarnost. OsvrÊuÊi se na
mam po njima s kutijom πibica u ru- dovanja javnosti, glase “da [GM us- ruz i repicu.”14 Ëinjenicu da je njegov “Superweed”
kama?”10 Taj tip reakcije, iako naiz- jevi] poboljπavaju Ëulna svojstva hra- Iako se ti usjevi koriste u proiz- takoer GM biljka, on bez libljenja
gled negativne, indikator je trenut- ne, to jest okus i teksturu, [te tako- vodima brze prehrane i u prehram- kaæe “Gerilsko ratovanje koristi
nog hypea oko tih usjeva i toga ko- er] poboljπavaju preradbena svoj- benim preraevinama koje prosjeË- naprijateljevo oruæje.”
liko je daleko uznapredovala njiho- stva ne bi li se umanjio udio otpad- ni potroπaË Ëesto ne koristi, kom- Kako se debata oko GM usjeva za-
va integracija u popularnu kulturu. nih sastojaka u hrani i minimalizirao panija je optuæivana da ne objavlju- huktava, tako se javlja i potreba da
Zaπto se onda upuπtati u takav troπak pri prijevozu i skladiπtenju.”12 je rezultate ispitivanja tih usjeva na se preispita fundamentalna πiroka
projekt? Bunting uzvraÊa: “GM je Korporacija koja predvodi razvoj laboratorijskim æivotinjama. “Pre- primjena tih usjeva. Projekti poput
opasan po zdravlje svih æivotinja i GM usjeva je Monsanto, koja je ma londonskom dnevniku Indepen- Buntingovog “SuperWeeda” pod-
biljaka.” On je uvjerenja da je na so- smjeπtena u St. Louisu, saveznoj dent, koji je priËu i iznion na svjetlo sjeÊaju da su uËinci GM-a postali
cijalnoj razini “GM primarno meh- dræavi Missouri. “Monsatov razvoj i dana, tajno istraæivanje koje je Mon- predmetom etiËke debate za veÊi dio
anizam kolonizacije koju provode izbacivanje na træiπte genetski mo- santo proveo pokazuje da su πtakori svjetske populacije. UnatoË Ëinjeni-
bogati kriminalci.” Ta pretpostavka di∫ciranog sjemena i kravljeg hor- hranjeni modi∫ciranim kukuruzom ci da bi veÊina ljudi rekla da nikada

08 Ibid. 13 Wikipedia: “Monsanto, Genetically Modi∫ed Food” (http://en.wikipedia.org/wiki/Monsanto)


09 [Preuzeto iz New York Timesa] 14 “Monsanto to Public: Ignore the Rats and Eat the GMO Corn
http://www.nytimes.com/2005/07/03/arts/design/03kenn.html/ , 3. lipnja 2005., “The Artists in OCA Reacts to Monsanto’s Latest GMO Deception”, Organic Consumers Association: http://
the Hazmat Suits”, autor Randy Kennedy www.organicconsumers.org/monlink.html
10 Ibid. http://www.organicconsumers.org/ge/corn-study.cfm/7645509161
11 http://library.thinkquest.org/C004033F/pros&cons_text.htm 15 Ibid.
12 Ibid.
nisu konzumirali GM hranu, stvar- nje da ih se svjesno kuπa. U kontek-
nost je meutim ta da njena inte-
gracija u komercijalne proizvode veÊ
stu stalno novog integriranja tih us-
jeva u prehrambeni lanac, projekti
System.hack(5,
postaje πiroko rasprostranjena.
Buntingovo djelo pokazuje da je
poput “SuperWeeda” podsjeÊaju da
GM usjevi neÊe nestati i da se mi mo-
“zakljuËavanje”,“Michael
predmet te debate dovoljno ozbiljan ramo ili prilagoditi (ili reagirati) na
da od nadleænih vlasti iziskuje ras-
vjetljavanje izravnih posljedica usl-
njih. UnatoË naπim brojnim protes-
tima, mi veÊ imamo i mi veÊ konzu-
Steil ∞ Linux na Xboxu”)
ijed dugotrajnog konzumiranja tih miramo te usjeve. A uz postojani
28 usjeva. Iako se Ëini da ti usjevi nema- porast globalne populacije ta Êe
ju potvrenih πtetnih posljedica, realnost postati sve prisutnija i
πiroko je rasprostranjeno podazre- nepobitnija.

> Jonah Brucker-Cohen <

“Zovem se Michael Steil i zakonski sam vlasnik Xboxa. U pot-


punosti sam platio njegovu punu cijenu i posjedujem 6 orig-
inalnih igara. Æivim u Evropskoj Uniji i nikada nisam pot-
pisao nikakav Licencni ugovor s krajnjim korisnikom (End
User License Agreement ∞ EULA) niti bilo kakve Uvjete usluge
(naime, nisu doπli u paketu s Xboxom), pa tako nisam
ograniËen nikakvim ugovorom. Stoga Xbox smatram svojim
osobnim vlasniπtvom. (Svjestan sam da bi Microsoft mogao
polagati prava na neka ograniËenja u Sjedinjenim Amer-
iËkim Dræavama, no buduÊi da sam ja graanin EU, nastan-
jen u EU, bilo kakva ograniËenja na upotrebu Xboxa opisana
u bilo kakvom EULA-u nisu primjenljiva, kao niti njihova
upitna legalnost u SAD-u i πire. Samom upotrebom Xboxa
ne znaËi da ja na njih i pristajem.) Takoer treba naglasiti
da moj Xbox nije ‘modi∫ciran’ ni na koji naËin.”
— Michael Steil, 10. listopada 2003.

> Michael “mist” Steil æivi u Münchenu, bavi se raËunali-


ma od svoje desete godine, zapoËeo je na Commodoreu
64 i oduvijek su ga zanimali mikroprocesori, ugraeni sus-
tavi i operativni sustavi. Voditelj je projekata Xbox Linux i
GameCube Linux. Gore citirani pasus njegov je javni protest
zbog prepreka na koje je naiπao pri koriπtenju Xboxa. Steil je
naime na Xbox instalirao GNU/Linux operativni sustav. Kako bi se suprotstavilo nesagledivim posljedicama
Xbox je jednom prilikom «samoinicijativnofl ponudio mo- masovnog uvoenja takvih sigurnosnih sustava u potroπaË-
guÊnost upgradea, a Steil je nesmotrenim klikom pokrenuo ku elektroniku, posljedicama s kakvima se danas veÊ suoËa-
uËitavanje novije verzije nakon Ëega su njegovi podaci iz vamo u vidu razliËitih tehnoloπkih sustava zaπtite intelektu-
GNU/Linux sustava instaliranog na Xboxu nestali. Ovakvu alnog vlasniπtva, tzv. Digital Rights/Restrictions Management
intervenciju izazvanu postavkama na Xboxu Steil je doæivio sustava, a ujedno i iskoristila prilika da se doe do jeftinog
kao atak proizvoaËa na privatno vlasniπtvo, u ovom sluËaju hardvera za slobodni softver, Michael Robertson, direktor
njegovo vlasniπtvo i to ga je potaklo na reakciju. open source kompanije Lindows, poËetkom 2003. raspisao
Xbox je Microsoftova igraËa konzola. Kada je krajem je nagrade od po 100.000 dolara za onoga tko prvi uspije in-
30 2001. izaπao na træiπte, Xbox je u sebi krio za to vrijeme stalirati GNU/Linux na Xbox uz hardversko modi∫ciranje i 31
moÊno osobno raËunalo s Intel Celeron procesorom na 733 za onoga tko to prvi uspije bez hardverske modi∫kacije.
MHz, 8GB do 10GB tvrdog diska, 64MB RAM-a i 4 USB ulaza Dugo vremena tzv. modËipovi bili su jedina opcija, no kas-
(Xboxovi kontrolni ulazi su samo varijacije standardnih USB nije se pokazalo da TSOP Ëip na kojemu se nalazi Xboxov
1.1 ulaza). Microsoft je Xbox ponudio bitno ispod træiπne ci- BIOS moæe biti obrisan. Naposljetku su slabosti otkrivene u
jene takvog osobnog raËunala, raËunajuÊi da Êe gubitak na- jednoj igri omoguÊile da se GNU/Linux pokrene na Xboxu
doknaditi prodajom igara za konzolu i preuzimanjem prev- bez hardverske intervencije. Upravo je to uspjelo Steilovom
lasti na træiπtu igraËih konzola (dakle, prevlasti u de facto Xbox Linux timu.
standardu) od Sonyevog PlayStationa. U meuvremenu viπe je takvih projekata koji iz sve
Uvidjevπi moguÊnost da dou do jeftinog hardvera za moÊnijih ureaja potroπaËke elektronike nastoje instalaci-
postojeÊi slobodni softver, Ëiju bi nabavku ∞ koje li ironije ∞ jom slobodnog softvera osloboditi snaæna raËunala koja se
dotirao upravo najveÊi protivnik slobodnog softvera ∞ kriju iza zakljuËanog hardvera ∞ iPodLinux je danas vjerojat-
Microsoft, hakerska zajednica primila se zadatka da prila- no najpopularniji.
godi GNU/Linux kako bi mogao raditi na Xboxu. Druπtveno- Krajem 2005. Microsoft je objavio novu generaciju svo-
razvojni znaËaj jeftinog hardvera s besplatnim slobodnim je igraËe konzole Xbox 360. PoËetkom 2006. pokrenut je pro-
softverom za siromaπne krajeve svijeta bio je oËigledan. jekt njenog oslobaanja: Free60.
Meutim, upravo da bi onemoguÊio pristup jeftinom hard-
veru na svoj troπak i sprijeËio da jeftini hardver ugrozi træiπte
osobnih raËunala, Microsoft je taj moÊni stroj onesposobio
da ne bi mogao posluæiti bilo kojoj drugoj namjeni osim
jedne ∞ igranju.
Xbox koristi klasiËni sigurnosni sustav zakljuËavanja
gdje hardver prihvaÊa samo digitalno potpisani kod, u ovom
sluËaju, naravno, Microsoftov digitalno potpisani kod.
Takav tip sigurnosne tehnologije naziva se sigurnosno raËu-
narstvo. I premda omoguÊuje mnoge sigurnosne primjene
u raËunarstvu, on korisniku oduzima moguÊnost kontrole
nad njegovim vlastitim hardverom i pretvara ga, kako to
Richard Stallman kaæe, u raËunalo u koje korisnik ne moæe
imati sigurnosti. Upravo je takav sigurnosni sustav pobrisao
podatke GNU/Linux operativnog sustava na Steilovom
Xboxu i natjerao ga u bijes.
System.hack(5,“zakljuËavanje”,“Michael Steil — Linux na Xboxu”) aËi stvaraju hrpu jeftinih dodataka a posljednji Apple (Mac OS X, 2001),
za PC, Ëime bitno poveÊavaju vrijed- takoer naslanjajuÊi se na Unix.
nost investicije u sam PC (viπe o ovoj
Kako prodati slobodu ekonomskoj strategiji poslije). Sav
bitni softver za CP/M izlazi u novim
Druπtveni utjecaj
Za potrebe ove rasprave, druπtve-
verzijama za DOS, i do kraja osam- no utjecajnom tehnologijom smat-
desetih PC-ovi (IBM-ovi ili ne) nalaze rat Êemo onu koja zadovoljava dva
se u svakom uredu i πkoli. Otprilike kriterija: masovnost i novost. Oba
istodobno s pojavom PC-a otvara se pojma su relativna: Apple II jest bio

> Otkad je zagovornika slobode


softvera, svako toliko neki se
entuzijast upusti u nabrajanje vrli-
prikazat Êemo u terminima komple-
menata i supstituta. Pokazat Êemo
kako iza najuspjeπnijih proizvoda u
treÊi veliki segment træiπta, kuÊna
raËunala, koji se razvija uglavnom
nezavisno. Sredinom osamdesetih
druπtveno utjecajan jer su se prije 33
njega kompjuterom sluæili samo in-
æenjeri, bankari, vojska, te poneki
na slobodnog softvera, u pravilu s mladoj povijesti mikroraËunarstva Apple izbacuje Macintosh, prvo mi- osobito spretni studenti informati-
ciljem da pokaæe kako sloboda stoje dobri hakovi, manipulacije kroraËunalo s gra∫Ëkim suËeljem. ke koji su svoje kompjutere izrai-
softvera donosi mnoge prednosti za komplementima i supstitutima. U Potkraj osamdesetih træiπte igara vali sami; CP/M nije bio druπtveno
korisnike, programere i tvrtke. Im- tom Êemo kontekstu zasebno pro- pomalo prelazi na PC i DOS. utjecajan jer se njime sluæila tek
plicitno ili eksplicitno, takvi mani- komentirati i smisao Xbox Linuxa. Microsoft 1992. izbacuje Win- manjina tajnica i knjigovoa, iako u
festi gotovo beziznimno sadræe dows 3.1 i objedinjuje sve segmente tehniËkom smislu jest bio novost.
oËekivanje predstojeÊe softverske NajkraÊa povijest træiπta mikrokompjutera, i prvi put Windows 3.1 bili su druπtveno utje-
revolucije, od koje nas dijeli tek ne- mikrokompjutera ikad na jednom te istom stroju moæete cajni jer su svim segmentima træiπta
dovoljna osvijeπtenost masa koris- Mikrokompjuteri su se od kraja se- raditi sve: pisati, crtati, raËunati, ponudili ergonomski superiorno
nika raËunala. damdesetih razvijali na dva kolosije- igrati se, a sve to uz pomoÊ gra∫Ëkog gra∫Ëko suËelje,01 uz potpunu kom-
Ni u jednom takvom razmatranju, ka upotrebe, kuÊnom i πkolskom, od- suËelja. Svi programi za DOS rade na patibilnost s DOS-om.
koliko mi je poznato, ne otvara se nosno poslovnom. Apple II (1977) po- Windowsima bez ikakvih interven- Gdje je na toj karti slobodni soft-
prethodno pitanje: zaπto, uza sve te stao je standardnom πkolskom opre- cija i ulaganja. A buduÊi da svi kup- ver? U biti, nigdje. Od 1983. do da-
prednosti, slobodni softver nije mom u Sjedinjenim Dræavama, a ci sada trebaju manje-viπe sliËan nas, slobodni softver s aspekta druπ-
druπtveno uspjeπniji, odnosno, za- program za tabelarne izraËune Visi- stroj, kompjuteri konaËno postaju tvenog utjecaja (dakle masovnost
πto je manje uspjeπan od neslobod- Calc kasnije ga je pomalo uveo i u jeftini, barem za æitelje ove strane plus novost) nije proizveo ni jedan
nog? Kao πto je poznato, najuspjeπ- poduzeÊa. Tamo je raznorazne kom- digitalnog jaza. jedini skok. Danas najrasprostra-
niji informatiËki projekti u posljed- pjutere (zajedniËki im je bio procesor Od sredine devedesetih operativ- njeniji slobodni softver Ëine progra-
njih Ëetvrt stoljeÊa nisu bili slobod- Zilog) pogonio operativni sustav CP/ ni sustavi za osobna raËunala poma- mi kao πto su web-server Apache i
ni, dapaËe nisu imali nikakve veze sa M (1976), prvi poslovni operativni lo prelaze na minikompjuterski mo- (prema zastupljenosti, u puno ma-
slobodnim softverom. Sloboda sustav za mikorokompjutere. Za CP/ del, koji predvia pravi viπezadaÊni njoj mjeri) Mozillin web-klijent Fire-
softvera u druπtvenom smislu jest i M je napisano brdo poslovnog softve- i viπekorisniËki rad te punu um- fox. Iako je s procvatom Interneta,
bila je relativno efemerna pojava. ra, od revolucionarne baze podataka reæenost. Prvi je bio Microsoft 1993. osobito weba, softver vezan za taj
ImajuÊi u vidu komponentu soci- dBASE, preko jednako revolucionar- (Windows NT, na arhitekturi naslije- segment upotrebe znatno dobio na
jalne organizacije u njegovom razvo- nog programa za obradu teksta Word- enoj od VMS-a), zatim zajednica vaænosti, i Apache i Firefox druπtve-
ju i ciljevima, to uopÊe nije samora- Star, do verzije VisiCalca za CP/M. slobodnog softvera sa svojom verzi- no su zapravo nevaæni. Zaπto? Zami-
zumljiv ishod. Na scenu 1981. ulazi IBM s otvore- jom Unixa (GNU s kernelom Linux- slite na Ëas da ih nema. ©to se promi-
Druπtveni uspjeh de∫nirat Êemo nom PC-arhitekturom, Microsofto- om, efektivno krajem devedesetih), jenilo? Niπta. Isti broj ljudi manje-
kao spoj masovnosti i inovacije, a di- vim klonom CP/M-a i Intelovim ja- 01 Superiorno u odnosno na suËelje DOS-a, ne nuæno na druga gra∫Ëka suËelja koja nisu bila
namiku informatiËke ekonomije Ëim procesorom. Nezavisni proizvo- masovno koriπtena.
viπe jednako pregledava isti broj cencom GPL, “skoro sve” znaËi “uz nosno, πto su prepreke veÊoj masov- zauzeo ni manje ni viπe nego Stall-
web-stranica koje se i dalje manje- jedini uvjet da, ako distribuiramo nosti i veÊoj razini inovacije u slo- man, koji smatra da je koristiti nes-
viπe jednako posluæuju.02 izmijenjeni program, taj program bodnom softveru? Pokuπat Êemo lobodni softver samo po sebi nemo-
Pravde i poπtenja radi, mislim da takoer ponudimo pod GPL-om”.04) odgovoriti na ta pitanja na osnovi ralno. Time pred, recimo, umjetni-
postoji jedan druπtveno utjecajan Za dobro rasprave, pretpostavimo dvaju izvora problema: svojstava za- ka postavlja moralni zahtjev da ko-
slobodan softver: to je Wiki Warda da imamo jedan tipiËni vlasniËki jednice korisnika/stvaralaca slobod- risti slobodni softver iako je prila-
Cunninghama. Wiki je istinski ino- softverski proizvod s jedne strane, a nog softvera, te speci∫Ënosti ekono- goen informatiËaru a ne umjetni-
vativan i u ovih dvanaest godina viπe s druge istovjetan slobodni pro- mije slobodnog softvera. ku i time ga efektivno sputava (ili
nego masovno iskoriπten koncept, gram. Nadalje, pretpostavimo da naprosto treba zatomiti svoj dar
34 koji je doæivio nebrojene varijacije i nas i jedan i drugi koπtaju isto. Tradicija, druπtvo, zajednica ËekajuÊi da se pojavi odgovarajuÊi 35
poneke doista spektakularno utje- GledajuÊi samo na ovlaπtenja (dak- ZakoraËimo naËas u povijest nas- softver). Osim πto je moralno upi-
cajne primjene (npr. Wikipedia).03 le, ako je sve ostalo jednako), slo- tanka slobodnog softvera. Richard tan, jasno je da ovaj tip tehno-autiz-
Kako objasniti izostanak uspjeha bodni program za korisnika uvijek Stallman, programer s uglednog ma ne pridonosi komunikaciji s ko-
slobodnog softvera u svjetlu Ëinjen- ima veÊu ili jednaku vrijednost.05 MasaËusetskog instituta za tehnolo- risnicima obdarenim drugim talen-
ice da sloboda softvera zaista dono- Jednaku vrijednost, naime, imali bi giju (MIT), osmislio je projekt GNU tima i manje zainteresiranima za
si velike potencijalne prednosti za jedino u sluËaju da sa slobodnim tako da su obje mete (masovnost tehnologiju kao takvu.
korisnika? Neslobodni softver je za- programom nikad ne poæelimo plus novost) veÊ u poËetku bile pro- OpÊenito, tradicionalni korisnici
tvoreni „proizvod“ (izvrπni kod) koji uËiniti baπ niπta πto nam vlasnik i maπene. GNU je, naime, teæio nado- slobodnog softvera njegovi su stva-
je neËije intelektualno vlasniπtvo, a inaËe ne bi dopustio. U svim ostalim mjestiti razvojnu okolinu postojeÊih raoci, bilo izravno, tako da ga koriste
vlasnik nas ovlaπÊuje da taj proizvod sluËajevima, slobodni softver je za neslobodnih Unix-sustava, a ne sami autori, bilo neizravno, da od
koristimo pod uvjetima koje je pro- korisnika, dakle u upotrebnom stvoriti neπto novo. Drugo, Unix je bio korisnika oËekuju razinu informa-
pisao ∞ to, naime, kupujemo kad ku- smislu, vredniji od istovjetnog ne- (i ostao sve donedavno, do Appleovog tiËkog znanja usporedivu s razinom
pujemo korisniËku. Naprotiv, licen- slobodnog softvera.06 Mac OS X-a) operativni sustav nami- znanja samog autora. To moæe biti
ca slobodnog softvera ne regulira Ako je, dakle, slobodni softver jenjen prvenstveno informatiËarima upravo sjajno: osobama koje pri-
naËin upotrebe softvera pa s progra- naËelno vredniji, poæeljniji od ne- i drugim znanstvenicima viËnim in- bliæno odgovaraju opisu idealnog
mom moæemo raditi skoro sve πto slobodnog, zaπto je druπtveno ma- formatici, a ne laicima. Razlika u korisnika nekog slobodnog softve-
poæelimo. (U sluËaju softvera pod li- nje uspjeπan od neslobodnog? Od- odnosu na druπtveno utjecajna os- ra, takav softver Ëesto savrπeno od-
obna raËunala je oËita: Apple II se govara. Da ste programer Ëiji je pri-
02 Poznavatelji slobodnog softvera sad Êe protestirati ∞ programski kod Apachea i Firefoxa je i obraÊao uËenicima i uËiteljima, marni jezik LISP, moæete li i zamis-
dalje tu, slobodan za sve daljnje primjene, Ëak i da se fondacije Apache i Mozilla ugase. ©toviπe,
to je znaËajni feature, a ne bug. Ali, ja æelim reÊi neπto drugo: Ëak i da sav taj kod odjednom DOS raËunovoama i drugim ured- liti bolju radnu (i neradnu) okolinu
nestane, ukljuËujuÊi i izvrπne programe, Ëak i da se magiËno izbriπu sva sjeÊanja na elemente skim radnicima, a Windows igraËi- od Emacsa, programa za rad sa svim
tih programa kod svih njegovih programera, svejedno se ne bi niπta dogodilo. Ni zamisao, ni ma, likovnjacima, glazbenicima, oblicima teksta, koji je napisan u
prva izvedba, ni neko revolucionarno unapreenje web-posluæitelja nisu nastali unutar govornicima i svima ostalima. Etos jednom dijalektu LISP-a i vama je
projekta Apache. Isto vrijedi i za Mozillin web-klijent.
svijeta Unixa i svijeta osobnih raËu- potpuno razumljiv, prilagodljiv i
03 http://en.wikipedia.org/wiki/Wiki
04 http://www.gnu.org/philosophy/free-sw.hr.html
nala se otpoËetka znatno razlikuje: proπiriv. Onaj djeliÊ promila u uku-
05 Ovdje izlaæemo argument iznesen na Usenet grupi hr.comp.gnu 19. prosinca 2002, u poruci
uniksaπi cijene i oËekuju infor- pnoj populaciji koji odgovara tom
pod naslovom “SOK i MESO za velike kupce”. matiËke vrline, a korisnici osobnih opisu u Emacsu se vjerojatno osjeÊa
06 U prilog slobodnog, odnosno open-source softvera, njegovi zagovornici obiËno se pozivaju na raËunala lakoÊu koriπtenja pri konk- kao u raju.
druga dva kriterija. Zaklada za slobodu softvera (FSF), slijedeÊi misao Richarda Stallmana, tvrdi retnim zadacima koji sami po sebi Kako odmiËemo od sretnog spo-
da je slobodni softver jedini moralan softver, kako za stvaraoce tako i za korisnike. Inicijativa nemaju nuæno veze s informatikom. ja programera, odnosno informa-
za otvoreni kod (OSI) pak tvrdi da je razvojni model svojstven slobodnom ili open-source
softveru superioran razvojnim modelima vlasniËkog softvera. Smatramo da je prvi stav Osobito iskljuËiv stav prema in- tiËara, i primarnog korisnika, ova
besmislen, a drugi empirijski neosnovan. formatiËkim laicima eksplicitno je ideja se pomalo pretvara u noÊnu
moru. Danas je slobodni softver to- previπe poznavanja tehnologije is- ©to mislite, koji Êe pristup koris- menti nekog proizvoda jeftiniji, to
liko razvijen da se njime moæe probati æeljeni postupak. Korisnik niku dovesti do veÊeg druπtvenog us- on moæe biti skuplji. Tako je IBM,
napraviti gotovo sve, pitanje je samo slobodnog softvera postiÊi Êe sliËan pjeha, popularizacije kompjuterske kako smo napomenuli, PC-arhitek-
tko i kako. Fotograf koji radi s nekim rezultat tako da se podrobno in- obrade fotogra∫je? turu uËinio otvorenom i tako otvo-
od specijaliziranih neslobodnih formira o ∫zici i tehnologiji dinamiË- Po naπem sudu, ni najjaËa ni naj- rio træiπnu utakmicu za hardverske
programa za gra∫Ëku obradu, kad kog raspona u fotogra∫ji, ovlada os- slabija toËka slobodnog softvera dodatke svim nezavisnim proizvo-
hoÊe eksperimentirati s dinamiËkim novama nekog od skriptnih jezika, nemaju puno veze s programira- aËima. DostupnoπÊu velikog broja
rasponom fotogra∫ja, moæe odabra- pronae odgovarajuÊe programËiÊe njem. Glavna vrlina slobodnog soft- raznih kartica za PC sam je PC do-
ti odgovarajuÊu stavku s izbornika i poveæe ih na æeljeni naËin, na vera je druπtvena, a glavni doseg bio na vrijednosti. No, istodobno je
36 ponuenih specijalnih efekata, i bez primjer ovako:07 stvaranje zajednice korisnika/stva- Microsoft izveo joπ bolji πtos: IBM-u 37
ralaca slobodnog softvera. Glavni nisu dali ekskluzivnu licencu na
problem je u onome πto programeri DOS, nego su je prodavali i konku-
#!/usr/bin/perl
ne znaju ili ih jednostavno ne zani- rentskim tvrtkama, kako bi spustili
open I, “> /tmp/hdr-in”; ma. Za druπtveni uspjeh slobodnom cijenu hardvera i time podigli vrijed-
for $f (@ARGV) { softveru trebaju neprogrameri i nost (svog) softvera.
$jh=‘jhead -c “$f”‘; neinformatiËari: dizajneri suËelja i I dok je igra komplemenata vaæan
chop $jh; psiholozi koji Êe ga testirati; jeziko- sastojak u kuhanju najuspjeπnijih
slovci koji Êe napraviti poπten sustav informatiËkih proizvoda, za slobod-
if($jh=~/\(1\/(\d+)\) f\/([\d.]+)/) { $e=$1; $a=$2; }
za provjeru pravopisa i gramatike, a ni softver to je jedini raspoloæivi eko-
if($e<2) { po moguÊnosti i bazu sinonima i nomski model. Bitno ograniËenje
$jh=‘jhead “$f” | grep “Exposure time”‘; antonima; i tako dalje. Njihov Êe do- restriktivnijih slobodnih licenci od-
if($jh=~/:.*?([\d.]+).*?s/) { $e=1/$1; } prinos znaËajno pomoÊi da se laici- nosi se, naime, na strogo propisan
} ma olakπa pristup slobodnom naËin distribucije slobodnog softve-
softveru. No, kako Êemo vidjeti, ni ra koji efektivno onemoguÊuje
$n=‘basename “$f” .jpg‘; chop $n;
sve to neÊe biti dovoljno dok slobod- standardni poslovni model prodaje
print I “$n.ppm $e $a 0 0\n”; ni softver na zadobije bolje ekonom- „licenci za krajnjeg korisnika“. Dru-
print “preparing $n (1/$e f/$a) ...\n”; ske temelje. gim rijeËima, za tvrtke kojima je pri-
system “convert ‘$f’ -geometry 1024x1024 ‘/tmp/$n.ppm’”; marni biznis proizvodnja softvera za
$d=‘dirname “$f”‘; chop $d; Ekonomija slobodnog softvera masovnu distribuciju, slobodni
NajveÊi dio ekonomije slobodnog softver je neupotrebljiv, barem u
}
softvera, i dobar dio informatiËke svojim restriktivnijim licencama
close I; ekonomije, vrti se oko pojmova kao πto je GPL.
system “cd /tmp; mkhdr -fptiff hdr-in $d/$n-HDR.tiff”; komplementa i supstituta, te proce- Stoga IBM i mnoge druge manje
system “pfsin $d/$n-HDR.tiff | pfstmo_fattal02 -b 0.85 | pfsgamma -g sa komodi∫kacije, odnosno pretva- tvrtke danas pokuπavaju odigrati joπ
2.2 | pfsout $d/$n-HDRfattal.jpg”; ranja u robu.08 Veliki “hakovi” u IT- jednu varijantu trika s komplemen-
ekonomiji djeluju kao manipulaci- tima ulaganjem u slobodni softver,
system “pfsin $d/$n-HDR.tiff | pfstmo_drago03 | pfsgamma -g 2.2 |
je s komplementarnim proizvodi- prodajuÊi konzultantske, projektant-
pfsout $d/$n-HDRdrago.jpg”; ma. Osnovni princip ekonomije ske i druge struËne usluge temeljene
komplemenata je: πto su komple- na slobodnom softveru kao jeftinom
07 Primjer nije izmiπljen, skripta je pod GPL-om i stvarno radi. Autor je ∫ziËar i fotograf Domjan 08 Roba u ovom smislu je proizvod koji je pao na najniæu moguÊu, robnu cijenu. Viπe o tome u
SvilkoviÊ. Izvor: hr.rec.fotogra∫ja.digitalna, 21. travnja 2006, pod naslovom High Dynamic udæbeniËkom izlaganju programera, biznismena i pisca Joela Spolskog,
Range. v. http://www.joelonsoftware.com/printerFriendly/articles/StrategyLetterV.html.
odnosno besplatnom komplemen- mogu iskoristiti kao komplement za zapravo posve bezopasan za Micro- teom, u vidu „Laptopa za sto
tu. NajveÊi pro∫ter na slobodnom usluge drugih operatera, iako su sve soft. Postoji brdo naËina da se sas- dolara“.09 Ideja je da hardver ∫nan-
softveru je vjerojatno ipak Google aktualne mreæe za mobilnu telefoni- tavi skoro jednako jeftin stroj za ciraju vlade i meunarodne organ-
koji πakom i kapom ulaæe u slobod- ju potpuno standardizirane i svaki Linux, koji Êe obiËno puno bolje izacije, dok se za softver brine zajed-
ni softver, koristeÊi ga u serverskoj, a ureaj izvorno moæe raditi u mreæi odgovarati æeljenom zadatku od ex- nica slobodnog softvera. I opet, slo-
sve viπe i komplementarno, u klijent- bilo kojeg operatera. Xboxa pa ne vjerujem da je imalo bodni softver ima ulogu komple-
skoj (preglednik Firefox) infrastruk- ZakljuËavanje mobitela tek je znaËajan broj ljudi kupio Xbox samo menta hardveru i politiËkoj volji.
turi svog oglaπivaËkog carstva. jedan od vidljivijih oblika prljave kao Linux-stroj. Kao ciljna publika Godinu dana kasnije, Microsoft
SudeÊi po ∫nancijskim izvjeπta- igre s komplementima. U kontekstu Xbox Linuxa tako ostaju samo nudi platformu FlexGo, prilagoeno
38 jima, takva strategija se isplati. informatiËke tehnologije, meu linuksaπi koji su i igraËi, a oni Êe PC raËunalo pokretano verzijom 39
Meutim, IBM-ove i Googleove muπ- per∫dnijima je uvoenje posebnih ionako morati kupiti igre ako se æele Windowsa, po modelu izvedenom iz
terije su veliki poslovni sustavi od- vlasniËkih mreænih protokola, kao igrati na Xboxu. »emu je onda ima- mobilne telefonije. ZnaËi: ureaj se
nosno oglaπivaËi, a ne “mali potro- πto su Microsoftov SMB ili svojedo- lo sluæiti zakljuËavanje? U sluËaju daje u pola cijene, a ostatak se na-
πaËi”. Za veÊinu korisnika softvera i bno AppleTalk ili Novellov IPX. Ide- konzola ∞ niËemu. To pokazuje Xbox plaÊuje kroz cijenu razgovora,
veÊinu primjena, najbolji dostupni ja je sliËna: ako trebate povezati viπe Linux, a joπ viπe Ëinjenica da je do- odnosno vrijeme upotrebe raËuna-
softver i dalje pripada kategoriji nes- raËunala u mreæu, bit Êe nam drago minantna tvrtka na træiπtu igraÊih la koje se doplaÊuje bonovima.
lobodnog softvera. Iako stoji da sva- udovoljiti vam. Pod uvjetom da za konzola, Sony, ionako sluæbeno po- Taj koncept je zapravo prirodni
ko poboljπanje koje proizlazi iz svaku radnu stanicu kupite naπ dræala Linux za Playstation 2 pa zbog nastavak Microsoftovog tradicional-
poslovanja sa slobodnim softverom softver (Windows ili nekad Novell), toga nije prestala biti dominantna. nog modela poslovanja u kojem se
donosi neku korist cijeloj zajednici, ili joπ bolje, i naπ softver i naπ hard- komplement proizvoda, hardver,
obiËno nije rijeË o stvarima koje bi ver (Macintosh i MacOS kod Apple- • ©to, kako i za koga nastoji uËiniti πto pristupaËnijim,
se obraÊale masovnom træiπtu. Talka). Sudbina ovakvih podvala U svojoj dosadaπnjoj povijesti, kako bi se softver uËinio za koris-
dosad nije bila ruæiËasta: IPX i Ap- raËunarstvo je donijelo goleme nika vrednijim a za vlasnika
• Siva zona pleTalk su sreÊom propali, a SMB promjene u naËinu na koji uËimo, pro∫tabilnijim. U jednoj moguÊoj
Uspjeh u igri s komplementima joπ, naæalost, nije. zabavljamo se, æivimo i radimo. No, verziji FlexGo scenarija, osnovni
nije zajamËen, osobito u standard- U svijetu igraÊih konzola, takvo tko smo to „mi“? Mi smo pripadni- hardver bi tako mogao biti bespla-
iziranom infrastrukturnom okruæe- zakljuËavanje komplemenata je ci onih 15% svjetske populacije koji tan ili skoro besplatan dok se softver
nju, u kojem “sve radi sa svim”. Sto- posve normalna stvar. Nintendo, posjedujemo raËunalo i imamo uopÊe neÊe naplaÊivati „na komad“,
ga si brojni proizvoaËi nastoje Sony i odnedavno Microsoft proda- pristup Internetu. Drugim rijeËima, nego Êe se iznajmljivati. To pak
olakπati posao tako πto oteæavaju ko- ju relativno jeftine konzole da bi πaËica early-adoptera, beta-testera obeÊava joπ veÊe pro∫tne margine
risnicima upotrebu onoga, πto bi zaradili na relativno skupim igrama. na kojima se tehnologija kali da bi nego πto je to bio sluËaj s koris-
trebalo biti komplementarno nji- Analogno mobitelima, Microsoftov jednog dana moæda postala opÊepri- niËkim licencama, ukoliko se dois-
hovom i samo njihovom prima- Xbox je tehniËki gledano standard- hvaÊena. ta stekne velik broj novih korisnika
rnom proizvodu, u korist neËeg ili ni PC koji je zakljuËan za svaku Inicijative kojima se pokuπava ∞ a govorimo o milijardama ljudi
nekog drugog. primjenu osim one koja kljuËaru premostiti „digitalni jaz“ i prodrijeti koji si ne mogu priuπtiti raËunalo a
Mobilni telefon je komplemen- donosi dobit. To, jest, bio je zak- do preostalih 85% potencijalnih ko- bonove mogu.
taran upotrebi telekomunikacijskih ljuËan dok ga ekipa Xbox Linuxa nije risnika usko su vezane za manipu- Treba li uopÊe spomenuti da Êe
usluga, pa telekomi redovito nude otkljuËala. laciju komplementima. Prvi potez FlexGo kompjuteri biti zakljuËani?
telefone po viπestruko niæoj cijeni Osim kao gesta otpora Xbox- povukao je 2005. MIT Media Lab Epizodu s Xbox Linuxom stoga je
od maloprodajne. U Ëemu je kvaka? linuksaπa jednom obliku reketare- predvoen Nicholasom Negropon- moæda najbolje shvatiti kao zagri-
U tome πto su „njihovi“ ureaji zak- nja u informatiËkoj industriji, ovaj
ljuËani na njihovu mreæu pa se ne projekt je zanimljiv i po tome πto je 09 One Laptop per Child, laptop.media.mit.edu/
javanje pred veliku bitku za informa- dalje biti neslobodan. S druge stra- povoda optimizmu, naæalost nije iz- gi. No, nuæno je da i oni pronau
tizaciju globalnog juga. Iako Êe Flex- ne, inovacije, odnosno istraæivanja gledan u neposrednoj buduÊnosti. smisao u upotrebi i stvaranju slo-
Go kompjuteri biti zakljuËavani koja su za njih potrebna, u slobod- bodnog softvera, dakle da osjete da
hardverski, Ëak na razini procesora, nom se softveru mogu kapitalizirati Za izostanak druπtvenog uspjeha ih zajednica æeli i treba. »ini se da
pred buduÊim FlexGo-linuksaπima jedino kroz komplementarne proiz- slobodnog softvera, dakle, postoje se ethos zajednice slobodnog soft-
je moæda i lakπi dio posla. Od prve vode i nije jasno kakvom bi se eko- ozbiljni ekonomski i socijalni razlo- vera sve viπe mijenja u tom smjeru pa
milijarde ljudi, na pitanje „Æelite li nomskom logikom taj problem mo- zi, kako po kriteriju masovnosti tako moæemo biti donekle optimistiËni.
platiti vlasniËki softver ili besplatno gao zaobiÊi. i po kriteriju inovativnosti. Glavnu Problem inovacije Ëini nam se u
koristiti slobodni bez ikakvih Jedno moguÊe, barem djelomiË- prepreku masovnijem koriπtenju osnovi nerjeπiv u postojeÊim eko-
40 ograniËenja?“ golema veÊina je opti- no rjeπenje ponudio je Nicholas slobodnog softvera vidimo u neus- nomskim okvirima kompetitivnog 41
rala za ono prvo, a preostali Êe dobi- Carr u Ëlanku IT nije bitan10 i nizu pjehu zajednice njegovih stvaralaca/ træiπta. Ipak, moguÊe rjeπenje proiz-
ti joπ mnogo bolje ponude od vlas- kasnijih publikacija. Iako se Car- korisnika da u svoje redove ukljuËi lazi iz promjene okvira u kojem se
nika softvera. rovoj argumentaciji moæe πtoπta viπe informatiËkih laika. Na prvi po- odvija informatiËka ekonomija i
prigovoriti,11 i priliËno je sigurno da gled, to izgleda kao zaËarani krug: prebacivanja teæiπta na infrastruktu-
Izmeu ËekiÊa i nakovnja teza u najradikalnijoj verziji nije korisnika Êe biti viπe kad ih bude ru. U tom sluËaju, za relativni uspjeh
Gledano iz perspektive novosti, posve odræiva, Carr je pronaπao viπe, ali nije sasvim tako. Meu in- slobodnog softvera u pogledu ino-
naπeg drugog kriterija druπtvenog jedan moguÊi put druπtvenog uspje- formatiËkim laicima nalaze se struË- vacija najzasluæniji bi bio neuspjeh
uspjeha, posredniËki model u ha slobodnog softvera. njaci na podruËjima koja su za ma- onog neslobodnog. Koliko Êe to do-
poslovanju sa slobodnim softverom Glavna Carrova teza je da cijela sovnu informatiku vaæna, kao πto su bra donijeti u Velikoj shemi svih
tek je uzgredno orijentiran inovaci- informacijska tehnologija, dosegav- dizajneri, lingvisti, psiholozi i dru- stvari, teπko je reÊi.
jama. No, problem s ekonomijom πi svoju zrelost, ubrzano gubi
inovacije u slobodnom softveru nije strateπku vaænost i od kompetitivne > Ognjen StrpiÊ <
tek uzgredan, nego duboko struk- postaje infrastrukturna tehnologija.
turni. U jednoj reËenici, svaka Ako to barem djelomiËno stoji, to su
softverska inovacija za koju ulagaË izvrsne vijesti za slobodni softver.
ocijeni da mu moæe donijeti Svoje najveÊe uspjehe slobodni soft-
strateπku prednost bit Êe zatvorena ver je, naime, redovito doæivljavao
(uopÊe se neÊe distribuirati, ili Êe se upravo u domeni mreænih servisa i
distribuirati kao vlasniËki softver). protokola, πto s prebacivanjem
»ini se da iz tog πkripca nema izla- teæiπta na infrastrukturu dobiva na
za. Najpro∫tabilniji „maloprodajni“ relativnoj vrijednosti. Drugo i zani-
(koji se obraÊa masovnom træiπtu mljivije, narav infrastrukturnih ino-
korisnika) poslovni modeli u indus- vacija je drukËija od onih kompeti-
triji softvera su distribucija koris- tivnih; infrastrukturnim inovacija-
niËkih licenci vlasniËkog softvera i ma ne æeli se odskoËiti od konkuren-
iznajmljivanje resursa. Stoga treba cije nego se uklopiti u postojeÊe
oËekivati da Êe najpoæeljniji softver okvire i proπiriti ih na dobrobit svi-
za masovnu upotrebu veÊinom i ju. Takav razvoj dogaaja, iako daje
10 Nicholas G. Carr, „IT Doesn’t Matter“, Harvard Business Review, 81(5): 41∞49, (2003). V.
takoer http://www.nicholasgcarr.com
11 Suzdræan osvrt na Carra i buduÊnost IT-a ponudili smo u kolumni „Gnoj i pakao“, Mreæa
9(3): 21 (2006)
samom reprodukcijom sadræaja nosaËa na ureajima krajn-
System.hack(6,“zaπtita”, jih korisnika.
Sustavi zaπtite protiv kopiranja CD-a koji ovise samo o
“Anonimni autor ∞ set za softveru pokazali su se trivijalnima za onesposobljavanje, a
alternativne strategije koje modi∫ciraju format CD podata-
ka neizostavno Êe izazvati prigovore javnosti zbog nekom-
zaπtitu CD-a [marker / patibilnosti s legalnim playerima.
Doduπe, ranije generacije takvih zaπtitnih mjera od ko-
shift tipka]”) piranja pokazale su se joπ trivijalnijima ∞ proslavile su se po
lakoÊi kojom ih se moglo probiti uz pomoÊ markera. 43
Sony je 2001. CD-ove opremio Key2Audio sustavom ∞
tehnologijom koja spreËava kopiranje ili konvertiranje pje-
sama u MP3 datoteke na osobnim raËunalima. Tehnoloπke
mjere za zaπtitu glazbenih diskova poput Cactus Data Shield
100/200 i Key2Audio mogu se probiti upotrebom najjednos-
tavnijih pomagala poput markera i izolacijske trake. Na dis-
kovima vanjski je rub vidljivog dijela audio podataka zaπti-
Êen, πto onemoguÊuje kopiranje pa Ëak i sviranje na raËu-
nalima. Prekrivanjem vanjskog ruba zaπtitu se moæe probiti

> Hakeri su podijeljeni u dvije skupine po etiËkoj osnovi:


prva skupina kreira patentne sustave i zaπtitne meha-
nizme, druga ih pokuπava zaobiÊi. Dok su prvi usmjereni na
i osposobiti disk za normalnu upotrebu na raËunalima.
SunnComm Technologies je 2003. stvorio zaπtitu Medi-
aMax CD3 dizajniranu da sprijeËi upravo neovlaπteno ko-
korporativno djelovanje, drugi su socijalno angaæirani. piranje audio CD-ova pomoÊu osobnog raËunala. Diskovi
Otkako su moguÊnosti kopiranja koje su donijele digitalne proizvedeni tom tehnikom sadræe dvije verzije glazbe, svaku
tehnologije stavile izazov pred regulaciju intelektualnog zaπtiÊenu na drugaËiji naËin. Jedan set pjesama su audio CD
vlasniπtva, industrija glazbe, ∫lma i zabave uËinila je sve kompozicije koje sviraju na standardnim CD playerima, ali
kako bi pooπtrila zakonske mjere zaπtite, uvela tehnoloπke na raËunalima se navodno ne bi trebale moÊi kopirati. Dru-
mjere zaπtite i kriminalizirala donedavno legitimno prouËa- gi set su komprimirane i πifrirane Windows Media datoteke
vanje i zaobilaæenje takvih tehnoloπkih mjera zaπtite intele- koje upotrebljavaju tzv. DRM (Digital Rights/Restrictions
ktualnog vlasniπtva. Znanje steËeno radoznaloπÊu da se Management) ∞ tehnoloπko upravljanje pravima/ograniËen-
prouËavaju tehnoloπki sustavi kontrole postalo je opasno jima ∞ kako bi ograniËile moguÊnosti koriπtenja.
znanje, a hakeri su pretvoreni u opasne likove koji vladaju Ti sistemi zaπtite Ëine CD-ove nekompatibilnima s veÊi-
znanjima za koje bi dræavni aparat i kompanije htjele da ih nom raËunala. Iako je to sprijeËilo kopiranje na mnogim PC
druπtvo æeli provjeriti samo dræavnom aparatu i kon∫guracijama, takoer je dovelo i do nekompatibilnosti s
kompanijama. pojedinim DVD playerima, sistemima za video igre i auto-
Tema ovog rada su sustavi zaπtite od kopiranja i um- mobilskim CD playerima. Savrπena kompatibilnost moæe se
naæanja CD-ova i DVD-ova, te trivijalne tehnike kojima ih se postiÊi jedino zadræavanjem standardnog audio CD seg-
moæe zaobiÊi. menta diska nezaπtiÊenim, pa stoga MediaMax koristi dru-
Tehnoloπki sustavi zaπtite protiv kopiranja CD/DVD-a gu metodu kako bi sprijeËila kopiranje na raËunalima.
mehanizmi su koji prijeËe korisnicima da umnaæaju CD-ove John Halderman, student sveuËiliπta Princeton, nedu-
ili DVD-ove. Ti mehanizmi variraju, a tehnoloπke mjere na go nakon objavljivanja prvog diska sa zaπtitom MediaMax
kojima poËivaju uËestalo znaju dovesti do problema i sa CD3 na svojoj je web stranici objavio znanstveni rad s uput-
stvima kako onesposobiti SunnCommovu mjeru zaπtite od System.hack(6,“zaπtita”,“Anonimni autor ∞ set za zaπtitu CD-a
kopiranja ∞ jednostavnim dræanjem shift tipke. Ovaj pos- [marker / shift tipka]”)
tupak primijenio je na albumu Anthonyja Hamiltona kojeg
je izdao BMG.
Pod normalnim okolnostima, kad god bi se pokrenuo
Hamiltonov album na raËunalnom CD ËitaËu, odmah bi se
Hakeri se mogu samo slatko
na Windows strojevima podigao anti-piratski softver koji bi
sprijeËavao kopiranje ili konvertiranje u MP3 format.
nasmijati ;)
Meutim, dræanje shift tipke prilikom ubacivanja CD-a
44 spreËava Windowsov sustav samopokretanja aplikacija da
uËita softver za zaπtitu od kopiranja i glazbu se moæe kopira-
ti.
> Druπtvo voli stvarati heroje, baπ
kao πto voli i naÊi nekoga koga
Êe stigmatizirati i time maknuti
upotrijebiti u analizi i pokuπaju ra- 45
zumijevanja hakerske zajednice i
kulture. Kako je hakerskoj kulturi
Po objavljivanju znanstvenog rada SunnComm je podi- fokus s traumatskih polja s kojima zadnji u nizu tik do prvog u suprot-
gao optuænicu protiv Haldermana, temeljenu na Digital Mil- se ne moæe suoËiti. Hakeri su kao nom smjeru, træiπna logika (ipak)
lenium Copyright Actu ∞ Zakonu o autorskom pravu u digital- stvoreni za oboje. moæe posluæiti kao taj drugi instru-
nom mileniju ∞ kojim je zabranjeno otkrivanje i obznan- Kada provala u tui vojni sistem ment kojem Êe se u dijalektici i ne-
jivanje naËina zaobilaæenja tehnoloπkih mjera zaπtite, od moæe posluæiti podizanju nacional- gaciji prouËavanog ukazati neuhvat-
koje je doduπe uskoro odustao. nog ponosa, klinac iz susjedstva (u ljivost i kompleksnost.
Sony je krajem 2005. uveo sustav zaπtite CD-a Extended pravilu) s naoËalama brzo dobije Da bi sveo hakersku kulturu na ra-
Copy Protection. Sustav je na raËunala korisnika bez upo- svojih petnaest minuta slave. U me- zumljivu razinu usporedivosti s dru-
zorenja i dopuπtenja instalirao softver koji se lako mogao uvremenu hakera se treba bojati i gim kulturama koje danas pozna-
iskoristiti i za upad u raËunalo pomoÊu virusa ili crva. Na- kao takve (opasne) ih markirati, jer jemo, Hollywood i ostatak medijske
kon πto je Mark Russinovich na svom blogu obznanio anali- hakeri znaju i u moguÊnosti su kon- maπinerije morao je izmisliti ‘hake-
zu funkcioniranja Sonyevog ilegalnog softvera i upozorio na trolirati i uËiniti sve ono πto druπtvo ra’ koji u trideset sekundi, za koje je
krπenje prava privatnosti korisnika primjenom DRM-a, inaËe dozvoljava samo obavjeπtaj- vrijeme dodatno uzbuen felacijom,
pionirska organizacija za zaπtitu kiber-prava Electronic Fron- nim sluæbama i megakorporacija- provaljuje u najËuvanije raËunalne
tier Foundation pokrenula je kolektivnu tuæbu pred kojom je ma. Obavjeπtajne sluæbe i megakor- sisteme ili ‘hakera’ koji (u Holly-
Sony posustao i ponudio mjere za otklanjanje tog softvera, poracije raËunamo uraËunljivim. woodu) popularnim zemaljskim pr-
povukao CD-e sa zaπtitom iz prodaje i nagodio se za odπtetu. Mit o hakerima podrazumijeva ge- ijenosnim raËunalom i neπto manje
Najpoznatiji sluËaj zaobilaæenja zaπtite protiv kopiran- nije zla i neuraËunljivost. popularnim operativnim sustavom
ja DVD-a raËunalni je program DeCSS kojim je mladi Takve mitove danaπnja kultura provaljuje u raËunalni sustav vanze-
norveπki programer Jon Lech Johansen 1999. omoguÊio da razvija i odræava dominantnim in- maljaca. U sluËaju predstavljanja
se sadræaj komercijalnih DVD-a, zaπtiÊen Content-Scram- strumentom interpretacije: træiπ- stvarne povijesti hakerske kulture
bling Systemom, moæe gledati na slobodnim operativnim nom logikom. Træiπna logika podra- scenarij je ponovno poznat i uspore-
sustavima kao πto su BSD ili GNU/Linux, na kojima se do zumijeva reprezentaciju (brand, lo- div: (zove se) Trijumf Nekolicine. Ne-
tada DVD-i nisu mogli gledati. Meutim, da bi omoguÊio go, slogan...), konkurentnost (kom- kolicine træiπno najuspjeπnijih. U al-
gledanje DVD-ova, DeCSS je morao zaobiÊi tehnoloπki sus- parativnu prednost, usporedi- ternativnijem pristupu Nekolicine
tav zaπtite Ëije tajne speci∫kacije dakako nisu bile dostupne vost...), materijalni interes kao pri- egzotiËnijih voa (neËega) ili Ne-
zajednici za slobodni softver. Ubrzo nakon objavljivanja marni motiv (pro∫t) i na kraju sve- kolicine osuenih za cyber-kriminal.
DeCSS koda protiv Johansona tuæbu su pokrenuli DVD Copy divost na mjeru (broj). Na sliËan naËin na koji træiπna
Control Association i Motion Picture Association of America. Træiπna logika zadnji je instru- logika nema kapaciteta prikazati
Nakon 5 godina sudskih procesa optuæbe su odbaËene. ment (u nizu) koji bi netko trebao neku zajednicu, kulturu (ili u krajn-
jem sluËaju proizvod) bez branda, prilagodbu sustava toj radikalnoj tragove utjecaja i fundamenata sva- surauje i dijeli znanja (nova i stara)
manekena i logoa, ona je podkapac- inovaciji.03 ke tzv. ‘vrlo nove inovacije’, tj. uka- s ostalima u zajednici.
itirana i za evaluaciju i analizu kri- Kriterij inovacije omeen i proiz- zivala bi na kolektivnu prirodu ljud- Prvi korak u hakerskoj proizvod-
terija uspjeha iste te zajednice/kul- veden interpretativnim alatom træiπ- ske kreativnosti. U tom smislu ha- nji je proizvodnja problema. Konk-
ture. Jedan od Ëestih kriterija vred- ne logike, a koji prije svega zavrπava kerska zajednica je najbolji primjer retno elegantno rjeπenje kompleks-
novanja hakerske zajednice je i koli- u patentnoj potvrdi, gotovo je nep- kako ideja kolektivne prirode stva- nog problema tek je drugi korak (za
Ëina inovacija koju ona proizvodi. rimjenjiv kao kriterij vrednovanja ranja nimalo ne ugroæava jedin- koji Ëak nije nuæno ni da se desi).
Taj kriterij naravno podrazumijeva proizvodnje unutar hakerske kul- stvenost i kreativnost svakog poje- Kompleksnim problemima uvijek
usporeivanje s nehakerskom, kor- ture. Uvjetovana træiπnom logikom dinca (hakera). se suprotstavlja apstrakcija (metafo-
46 porativnom kulturom.01 inovacija traæi jedan vrlo speci∫Ëan Hakerska kultura proizvodi kor- ra). Kompleksne apstrakcije traæe 47
De∫nicija inovacije u svakoj Êe se tip formatiranja proizvoda ne bi li se pus dijeljenog znanja koji za rezul- rekurzivni pristup apstrahiranju i to
diskusiji vrlo brzo pokazati kao di- proizvod (na træiπtu) prepoznao kao tat ima kreativne i inovativne ha- tako da se njima suprotstavljaju
rektna derivacija træiπne logike, te Êe inovativan. Hakerska zajednica kere, a njihovi (neupuÊenom Ëesto nove (meta)apstrakcije.
na kraju biti svediva na nekoliko po- puno viπe proizvodi svima dostupne nevidljivi) inventivni hakovi Ëine Bilo koji zanimljiv kompleksni
jmova i brojeva: patentibilnost, broj biblioteke (eng. library) nego kon- cjelinu (npr. slobodni operativni sustav koji se iz bilo kojeg razloga
patenata, breakthrough... 02 Jedin- aËne proizvode za krajnje korisnike, sustav) moÊnijim, kreativnijim i in- opire apstrahiranju hakerska zajed-
stvenost i maksimalno razlikovanje kako u tehniËkom tako i u metafor- ventivnim, te svojom otvorenoπÊu nica vrlo brzo Êe shakirati i podvrg-
od svega u svojoj okolini preduvjet je iËkom smislu. spremnijim za novu iteraciju inova- nuti daljnjem apstrahiranju, stvar-
prepoznatljivosti i uspjeha na træiπtu. Mjera inovacija i inventivnosti ha- tivnih hakiranja. anju i dijeljenju znanja.
Hakerska kultura, meutim, puno kerske kulture i/ili rezultata surad- Hakerska kultura je za razliku od Takav tip permanentne reΩeksije
je bliæe harmoniËnom (ali i izuzetno niËkih modela proizvodnje (poput korporativne kulture (prvenstveno) promiπljanog stvara kulturu koja se
dinamiËnom) ekosustavu u kojem GNU/Linuxa, *BSD-a i drugih) mor- ekosustav znanja, a ne ekonomski opire bilo kakvoj reprezentaciji, jer u
svaki novi organizam ima tenden- ala bi za poËetak biti promiπljena sustav roba. Zbog hibridne prirode Ëasu kad se reprezentacija pojavlju-
ciju naÊi svoju poziciju suradnje s novim interpretativnim alatima u slobodnog softvera kao informaci- je ona postaje samo novi okidaË (kao
okolinom, a jedinstvena funkcional- kojima bi se træiπna logika vjerojat- jske infrastrukture razvijeni su i i fokus) rekurzivne reΩeksije. Svesti
nost i novost koju organizam dono- no puno viπe vezala uz ekonomiju poslovni modeli koji slobodni soft- reprezentaciju hakerske kulture na
si ekosustavu neodvojiva je od nje- paænje, ali bi i kao takva Ëinila tek ver tretiraju kao robu, no primarni reprezentativna imena je najveÊi mo-
govog kapaciteta suradnje. »ak i u rubni i mali dio kompleksnog sagle- (suradniËki) model produkcije osta- guÊi promaπaj iz perspektive haker-
sluËaju gotovo oËite superiornosti i davanja inovacija i inventivnosti. je u domeni proizvodnje i razmjene ske kulture. Dosadaπnji pokuπaji rep-
inovacije, ako rjeπenje/novi organi- Kada bi se maknuli od pritiska træiπ- znanja. Hakerska kultura, kako rezentacije povijesti hakerske kul-
zam traæi radikalnu prekon∫gu- ne logike i potrebe za stvaranjem je- egzistira u kompleksnom polju raz- ture u πirem kulturnom kontekstu
raciju i repozicioniranje cijelog eko- dinstvenih pop zvijezdi u svakom voja i razmjene znanja, ne poznaje gotovo u pravilu su povijest proma-
sustava teπko da Êe takvo rjeπenje polju ljudske kreativne produkcije, mehanizme træiπta koji se grade na πaja tih istih pokuπaja.
naiÊi na odobravanje, prihvaÊanje i mjere inovacije sadræavale bi i jasne osnovu evidentiranja, proizvodnje i Bilo πto u digitalnoj formi ili samo
odræavanja oskudice. par koraka od digitalizacije u dome-
01 U dijelovima teksta o inovaciji i proizvodnji unutar hakerske kulture, uglavnom Êu poistovjetiti Preduvjet distribucije i proizvod- ni je igre i apstrahiranja hakerske
hakersku kulturu sa kulturom FLOSS (Free/Libre Open Source Software) pokreta, kao pokreta nje znanja je suradnja, visoka pro- zajednice. Domenu digitalnog nitko
koji, po mom miπljenju, najbolje predstavlja hakersku kulturu u cjelini. To naravno ne znaËi da pusnost kolanja u svim smjerovima, ne poznaje bolje od hakerske zajed-
je hakerska kultura svediva na Pokret slobodnog softvera, a posebno ne vrijedi suprotno.
te nesmetani, nediskriminatorni nice. Informacije i ideje ne mogu
02 U Teslinom muzeju u Beogradu kao kljuËni izraz Tesline veliËine vodiËi Êe uvijek naglasiti broj
patenata, a rijeË inovacija (gotovo) uopÊe neÊe spomenuti.
pristup resursima znanja. Bolju po- biti komodi∫cirane i u privatnom
03 Najbolji primjer takve novine je trnoviti put prihvaÊanja Reiser4 datoteËnog sustava u Linux jedinaËnu poziciju u hakerskoj kul- vlasniπtvu. Mogu biti skrivene, Ëu-
jezgru (eng. kernel). turi tako dobiva onaj koji proizvodi, vane i πifrirane, no ni taj pristup ne
moæe za njih (ideje i informacije) tivnih tehnologija. Danaπnjih dana
osigurati vjeËni veo tame. sve viπu siju strah i paniku.
Upravo ovaj moment pobjede ha- Nesnalaæenje giganata kreativne
kerskog duha nad interesima (dræav- industrije (zabave) u novonastaloj
ne) kontrole i (korporativnog) pro∫ta konstelaciji tehnologije i (hakerske)
pokreÊe stvaranje mita o opasnim kulture primat inventivne pro∫ta-
hakerima koji su u stanju razruπiti bilne industrije danas prepuπta
svijet (koji poznajemo). Udruæeni, spam i porno industriji. Hakeri se na
dræava i kapital, napraviti Êe sve πto to mogu samo slatko nasmijati ;)
48 je u njihovoj moÊi ne bi li proizveli πto Apsolutna mobilnost digitalnih
viπe straha, neizvjesnosti i sumnje04 informacija, s tendencijom pada
oko ruπenja svijeta koji poznajemo. troπkova svake nove kopije prema
Daljnje odræavanje status quo-a, na nuli, ima nesagledive prednosti za
veliku æalost korporacija, ne mogu cjelokupnu ljudsku kulturu. Tih
osigurati restrikcije ‘inventivnih’ prednosti su danas svjesni svi (bar-
DRM (Digital Rights (sic!) Manage- em 90% korisnika raËunala) koji su
ment) patenata, pa je dræava uskoËi- ikad uz par klikova miπem imali
la u pomoÊ zakonskim regulativama pristup ogromnoj koliËini digital-
poput DMCA i/ili protuteroristiËkim iziranih dostignuÊa ljudske intele-
zakonima. ktualne produkcije.
Dræava je ugroæena najπirom raz- Dræava i træiπna logika globalno
mjenom kompleksnih znanja o (ko- harmoniziranom restriktivnom za-
munikacijskim) tehnologijama ek- konskom regulativom nerazumi-
skluzivni pristup kojima joj je u pro- jevanja (ne viπe tako novog) digital-
πlosti osiguravao neupitno i stabilno nog svijeta πizofreno stavlja u pozic-
mjesto nadgledanja, kontrole i moÊi. iju kriminalaca sve one koji su se
Korporacije su ugroæene nedostat- uvjerili u nesagledivost prednosti
kom inventivnosti u pronalaæenju hakerske kulture. SreÊom da protiv
novih poslovnih modela, a koji se ne njenih inovativnih patentnih Goli-
zasnivaju na eksploataciji pozicije jata postoje hakovi zajednice anon-
kreativnih proizvoaËa i nemoguÊ- imnih, Hollywoodu neatraktivnih
nosti krajnjih korisnika da meu- heroja, koji posezanjem za vodoot-
sobno podijele proizvode zabave i pornim Ωomasterom ili shift tipkom
interesa. Stari poslovni modeli, izgra- tu cijelu farsu Ëine ridikuloznom i
eni na nekoÊ inventivnoj tehnolog- zabavnom.
iji, desetljeÊima su, u suradnji s dræa-
vom, blokirali prodor novih inven- > Marcell Mars <

04 Poznata agresivna marketinπka strategija IBM-a iz 70-ih u kojoj je fokus poruke javnosti na
proizvodnji straha, neizvjesnosti i sumnje (kratica FUD) o konkurentnom proizvodu (umjesto
pokuπaja da se svoj vlastiti proizvod prikaæe boljim od drugih). Takoer marketinπka strategija
koju je Microsoft intenzivno primijenjivao krajem 90-ih i poËetkom 00-ih u borbi protiv FLOSS-
a (Free/Libre Open Source Software).
System.hack(1,
“broadcasting”,“Orson
Welles ∞ War of the
Worlds”)*

> The ability to confuse audiences en masse may have


∫rst become obvious as a result of one of the most infa-
mous mistakes in history. It happened on the eve of Hallo-
ween, on Oct. 30, 1938, when millions of Americans tuned
in to a popular radio program Mercury Theatre on the Air
that featured radio plays directed by, and often starring,
Orson Welles. The performance that evening was an adapta-
tion of the science ∫ction novel, H. G. Wells’s The War of the
Worlds, about a Martian invasion of the earth. But in adapt-
ing the book for a radio play, Welles made an important in-
novation: under his direction the play was written and per-
formed so it would sound like a live newscast reporting an in-
vasion from Mars, a technique that, presumably, was intend-
ed to heighten the dramatic effect. Approximately one-half of
the 50-minute play was a contemporary retelling of the events
of the novel, presented in documentary style. This approach
to radio drama had never been attempted before (at least not
* This article is licensed under with as much continued verisimilitude), and the
the GNU Free Documentation innovative format has been cited as a key factor
License. It is based on the in the confusion that would ensue.
Wikipedia article “The War of
The program, broadcast from the 20th Ωoor
the Worlds (radio)” http://
en.wikipedia.org/wiki/The_ at 485 Madison Avenue, New York, started with a
War_of_the_Worlds_(radio)/. short introduction to the intentions of the
aliens, and noted that the adaptation was set in 1939. The could see the Ωashes of the ∫ghting in the distance. Later
program continued as an apparently ordinary music show, studies suggested this “panic” was far less widespread than
only occasionally interrupted by news Ωashes. Initially, the newspaper accounts suggested. However, it remains clear
news was of strange explosions sighted on Mars. The news re- that many people were caught up ∞ to one degree or another
ports grew more frequent and increasingly ominous after a ∞ in the confusion that followed.
“meteorite” ∞ later revealed as a Martian rocket capsule ∞ In the aftermath of the reported ‘panic’, a public outcry
lands in New Jersey. A crowd gathers at the landing site, and arose, but CBS informed of∫cials that listeners were re-
the events are related by reporter Carl Philips up until the minded throughout the broadcast that it was only a per-
Martians incinerate curious onlookers with their heat rays. formance. Welles and the Mercury Theatre escaped punish-
50 Later surveys indicate that many listeners heard only this por- ment, but not censure, and CBS had to promise never again 51
tion of the show before contacting neighbors or family to in- to use the ‘we interrupt this program’ prompt for dramatic
quire about the broadcast. Many of these people contacted purposes.
others, in turn; leading to rumours and later confusion. A study by the Radio Project discovered that most of the
Martian ships land, and then proceed to wreak havoc people who panicked assumed Germans ∞ not Martians ∞
throughout the United States, destroying bridges and rail- had invaded. Other studies have suggested that the extent of
roads, and spraying a poison gas into the air. An unnamed the panic was exaggerated by contemporary media.
Secretary of the Interior advises the nation on the growing It has been suggested in recent years that the War of the
conΩict. (The Secretary was originally intended to be a por- Worlds broadcast was actually a psychological warfare ex-
trayal of then-President Franklin Delano Roosevelt, but CBS periment. In the 1999 documentary, Masters of the Universe:
insisted this detail, among others, be changed. The “Secre- The Secret Birth of the Federal Reserve, writer Daniel Hop-
tary” did, however, end up sounding very much like Roo- sicker claims that the Rockefeller Foundation actually fund-
sevelt as the result of directions given to actor Kenny Del- ed the broadcast, studied the ensuing panic, and compiled
mar by Welles. Military forces attack the Martians, but are a report that was only available to a chosen few.
unable to ∫ght them off. The biography of Orson Welles reveals amusing per-
After the live reporting of the events, the story breaks formances he put on in his television show Orson’s Bag. He
and continues as a narration of the survivor scientist record- would transform himself into Winston Churchill, or would
ing in his diary the aftermath of the devastation and the mimic the characters from Moby Dick, hosting the Muppets,
conclusion of the story (whish ends in the same way as the Burt Reynolds, Angie Dickinson. Welles’s never ∫lmed, nev-
novel), with the Martians falling victim to earthly germs and er ∫nished, never shown ∫lm projects spawn throughout his
bacteria. Following the conclusion of the play, Welles career. The Citizen Kane is a ∫lm apart ∞ signi∫cant not only
breaks character to remind listeners that the play was only a in the context of cinema, but also in the context of cultural
Halloween concoction, the equivalent of dressing up in a history. The signi∫cance of Welles and of all that is associat-
sheet and saying “Boo” like a ghost; reportedly, this “dis- ed with him cannot, whatever one might think, be imagined
claimer” was added to the broadcast at the insistence of without a tone of grandeur, of epic character of it all. This
CBS executives as they became aware of the panic inspired giant ∫gure with the cartoon voice capable of subtle inter-
by the program. pretation has delivered many memorable ∫lm performanc-
Many people missed or ignored the opening credits of es. Spirited, prone to musing and utopian plans, he con-
the program, and in the atmosphere of growing tension and ceived the radio drama The War of the Worlds, which to day
anxiety in the days leading up to World War II, took it to be present is subject to research and theoretical analyses ∞ this
an actual news broadcast. Contemporary newspapers re- ∫rst and arguably greatest media hoax ever.
ported on the panic that ensued, with people Ωeeing the
area, and others thinking they could smell the poison gas or
System.hack(1,“broadcasting”,“Orson Welles ∞ War of the Worlds”) of their time and age as much as the by initiating a completely new for-
immediate actors, and the reception mation of legitimating the public
will attain a particular form of par- through the private. The transfor-
The Rise and Fall of Mediatized ticipation ∞ affective mobilization. mation of the social form of recep-
Third, the synchronous act recep- tion* worked in turn to also trans-
Reality in the Age of Radio tion between remote listeners,
which could not have been the case
form the demographic structure of
legitimation, including into the
between remote readers. The radio common space and time of unitary
was after all a medium of ephemer- political event those parts of the
52
> We know now that in the early
years of the twentieth century a
mass medium different from all
a uni∫ed sense of remote events as
events taking place in their com-
mon time and space ∞ indeed, it was
al passing of the message, and not
its ∫xation as the newspaper was.
Fourth, the telesthetic contrac-
population who were previously ex- 53
cluded ∞ illiterate, minors, women,
elderly, etc. ∞ all those who were
precedent was conquering the world. only with this ∫rst mass medium tion and homogenization of space huddling around the family’s radio
Radio. The medium that ushered in that a common space and time of into a unitary space of events. Syn- receiver ∞ creating thereby a wide
the age of broadcasting media, the modern polity came about in the chronous reception and telesthetic concept of public opinion we are
medium of voice, will however re- ∫rst place. However, because of the homogenization of space will create used to today when speaking about
main not only different from the relatively asynchronous way of re- a uni∫ed space and time of events polls among public on the results of
precedent medium of writing, but ception of newspaper reporting and for the big political community ∞ which the governance of today is so
also from the antecedent medium of social limitations to literacy, a po- nation. dependent.
image. And the age of the medium of tential for a complete integration of Fifth, the domination of voice as The increasing legitimational
voice will remain not only different public sphere would not come the authentic statement and guar- importance of public opinion,
from the age of the medium of the about before the onset of radio antee of the speaker’s actual pres- which began to include the prefer-
written word, but also from the age broadcasting. ence in his physical absence. This ences of those who weren’t previ-
of the medium of the image. Radio broadcasting will thus in- potential of the voice in the radio ously asked for their political opin-
In those early decades of the twen- augurate a new political ontology age will create, for instance, a whole ion, was additionally favored by, sev-
tieth century a socio-political organ- based on a number of qualities in- new genre of political speech ∞ ad- enth, a transformation of the social
ization of modern societies started troduced by the new medium: dress to the nation, where the ad- structure of reception. The radio age
to form, based on a unitary political First, the real-time transmission ∞ dress by a political authority serves would become marked by the incip-
public sphere integrated through i.e. the coincidence of emitting and the immediate affective mobiliza- ient formation of the middle class
media of synchronous reception collective reception of a message. tion of the general political commu- on its way of becoming a dominant
and the rise of the middle class as With this potential for immediate nity as a unitary subject. class of consumerist welfare socie-
forerunner of the consumer society reception of the undelayed reporting Sixth, the intrusion of public ties. Indeed, the radio itself began
of the latter part of the century. And on recent events ∞ i.e. news reporting speech into the listeners’ private its career as a consumer product ∞
it is in this process of formation of ∞ will become a politically formative space, family space of gathering after all, the ∫rst radio programs
the public through mediatized real- characteristic of the radio age. around the radio receiver, will cre- were mostly non-commercial, whe-
ity and consumer society that the Second, the liveness of events in ate a new kind of interlock between re the broadcast program primarily
radio will play a crucial role. their transposition by media. Under the public and private sphere, there- served as a tool for department
It is true that the modern politi- the condition of transmission in
cal public sphere already begins to real-time, the liveness will allow lis- * Although the social form of reception is an aspect often ignored in media theory, since Ben-
constitute in the written word cul- teners to participate in the events jamin it is the shift in the social form occurring in a transition between two media that is a gen-
uine auratic moment where political masses emerge ∞ mass mediaura as Sam Weber has called
ture of the early bourgeoisie. The regardless of their physical absence. it. Accordingly, the collective experience of watching a ∫lm in a cinema theater is aesthetically
newspapers create a public that has They will become part of the events just as signi∫cant as the experience of shock introduced by cinematographic editing.
stores to persuade buyers into pur- Internal Affairs appearing in the ra-
chasing radio receivers or as a tool
for large newspaper publishing
dio dramatization was intentional-
ly made to sound like the US presi-
System.hack(2,“telecom”,
houses to attract readers.
Almost three decades after the
dent at the time Franklin Delano
Roosevelt, while many listeners pan-
“Captain Crunch ∞ whistle”)*
∫rst radio program in 1909, on Oc- icked only after confusing the word
tober 30, 1938, on the “eve” of World “Germans” for the word “Martians”.
War II, the CBS and Mercury Theat- What The War of the Worlds made
er on the Air aired as their Halloween apparent was that the broadcasting
54 special Orson Welles’s radio adap- media had made the contemporary
tation of H. G. Wells’s The War of the political event a Ωuid category: affec-
Worlds. As is well known, Welles’s tively colored world of the politics of
fake live reporting of the Martian fear. The transmission in real-time
invasion of the planet Earth scared transformed into a general political
masses of frightened listeners, who community in real-time, a space of
tuned in late only to confuse the ∫c- global mobilization of nations.
tion for reality, into Ωeeing their The realization that all political
homes before the onslaught of Mar- reality is a mediatized reality that
ian troops. has become general knowledge
In this most famous of all media
hoaxes, Welles made use of a shift
that has come to pass between me-
through this hoax, brings, however,
a very uncertain gain, as it is wro-
ught by an internal paradox. That is,
> John T. Draper’s life is a frenzied one, with situations
taken straight from a novel full of kafkian atmosphere.
He’s more known as Captain Crunch, after a whistle from
dia and their referential reality in although we are aware that the me- the cereal box. A blind friend named Joe Engressia in-
the radio age, which remained diatization, mediatic mediation, formed him that a toy whistle that was, at the time, pack-
mostly unnoticed until then. He had makes this reality hackable, we over aged in boxes of Cap’n Crunch cereal, could be easily
managed to connect the potential and over fail to recognize the simu- modi∫ed to emit a tone at precisely 2600 hertz ∞ the same
for simulating factuality of ∫ctional lation. The reason is: the more a frequency that was used by AT&T long lines to indicate that
events by means of skillful editing medium becomes true to reality, the a trunk line was ready and available to route a new call. This
of live transmission, interrupting reality itself becomes less true. And would effectively disconnect one end of the trunk, allowing
news Ωashes, live reporting, ad- this insight into the increasingly the still connected side to enter an operator mode. Experi-
dresses to the public, with the power trustworthy simulation of increas- menting with this whistle inspired Draper to build blue box-
of affective mobilization offered by ingly untrustworthy reality, empha- es: electronic devices capable of reproducing other tones
the suggestive medium of sound sized also in Orson Welles’s con- used by the phone company.
and voice. He had managed to con- cluding words: “we have annihilat- Draper was arrested three time on various wire fraud
nect a real threat of the coming war ed the world before your ears”, after charges. Convicted on toll fraud charges in 1972, he was
with the fear before the alien as rep- its emergence in the age of radio, sentenced to ∫ve years’ probation. In the mid 1970s he
resented by the extraterrestrial inva- will become total come the age of taught his phone phreaking skills to Steve Jobs
sion. For instance, the Secretary of televised image. * This article is licensed under and Steve Wozniak, who later founded Apple
the GNU Free Documenta-
Computer. He was brieΩy employed at Apple,
tion License. It is based on
> Tomislav Medak < the Wikipedia article John where he created a telephone interface board
Draper, http://en.wikipedia. for the Apple II personal computer. The board
org/wiki/John_Draper. was never marketed, however, partially due to
Draper’s arrest and conviction for wire fraud in 1977. He As the story of his experiments spread and got into
served his four-month sentence at the Federal Correctional newspapers, it also reached the authorities, leading to the
Institution, Lompoc, California, where he wrote EasyWriter, investigation that exposed his accomplices and to Draper’s
the ∫rst word processor for the Apple II. prosecution. The experiments with the whistle and blue box
“While serving time in minimum security prison I held lead to huge material expenses of sustaining the unbilled
Phone hacker classes, and taught everyone who was interest- phone calls, the redesign of the line protocols and the accel-
ed how to do anything they wanted with a phone. It was made erated equipment replacement. Though they could no long-
clear to me what would happen if I refused to provide this tu- er serve practical use, the Cap’n Crunch whistles did beco-
toring service. Another thing that was made especially clear me valued collector’s items.
56 to me was to avoid being a “Snitch”. So, to survive the system, 57
I was forced to offer classes on certain technology.”
The class of vulnerabities Draper and others discovered
was limited to call routing switches that employed in-band
signaling, whereas newer equipment relies almost exclu-
sively on out-of-band signaling, the use of separate circuits
to transmit voice and signals. The Captain Crunch cereal
whistle could blow 2600Hz note and seize a phone line. The
blue box then took over with it’s dual frequency combina-
tions known as ‘multfrequency’ or MF, similar to touch tone
frequencies. Some phone systems worked on SF, or Single
Frequency.
The 2600 Hz Captain Crunch whistle could make the
entire call. One long whistle to seize the line, a short one for
a “1”, two short ones for a “2”, etc. The blind phone phreak,
Joe Engressia, could dial an entire call just by whistling it
out of his own mouth.
“Once I discovered the new frontiers that blue boxes af-
forded me, I was able to explore a whole new relm of num-
bers. These numbers were inter-city dial codes that opera-
tors from one city would use to reach operators in another.
These were called routing codes, which are no longer used,
but during the times I was experimenting, I was able to ∫nd
out all sorts of internal numbers.”
Draper picked up a public phone, then proceeded to
“phreak” his call around the world. At no charge, he routed
a call through different phone “servers” in countries such
as Japan, Russia and England. Once he had set the call to go
through tens of countries, he dialed the number of the pub-
lic phone next to him. A few minutes later, the phone next
to him rang. Draper spoke into the ∫rst phone, and, after
quite a few seconds, he heard his own voice very faintly on
the other phone.
System.hack(2,“telecom”,“Captain Crunch ∞ whistle”) a conversation placed on mute. In- If the caller on the Bell/AT&T net-
stead, AT&T chose to place a steady work placed a long distance tele-
tone of the E above Middle C ∞ phone call to, for example, a toll-
Breakfast Cereal and 2600Hz ∞ on all unused and availa-
ble lines to signal to the rest of the
free, long distance, 1-800 number ∞
or anything over ∫fty miles away ∞
In-Band Signaling system that the line was free. You
can think of it like a dial tone that
the phone call would be routed over
a long distance line or “trunk.” By
only exists when every phone is playing the 2600Hz tone, the trunk
hung up. It’s not something that a would become convinced that the
58
> For the last ∫fty years, breakfast
cereal companies have includ-
ed little prizes, called “premiums”
dle C ∞ in scienti∫c terminology, the
sound created by vibrations of air in
a sine wave with a frequency of
human being should ever hear and
it’s certainly not something that any
human being was ever supposed to
caller has hung up and that it should 59
wait for someone else to take it over.
The trunk would quickly go off-hook
at the bottom of their boxes of toast- 2600Hz. To understand why a whis- make. and then back on-hook in what is
ed and sugared corn and oats. The tle that makes this tone is so At ∫rst, the use of 2600Hz was the known as a “supervision Ωash.” It
“prize,” as it is frequently referred to signi∫cant to hackers requires both proprietary knowledge of AT&T en- would make a short clicking noise
by children, is most often a small a little more technical explanation gineers. With time, with publica- following by silence. This click and
plastic toy emblazoned with the and a little more history. tions, and with a number of happy silence was the sound of one end of
name or logo of the cereal compa- In the middle of the twentieth accidents, many people learned the the trunk signalling to the other end
ny. These premiums are universally century, the US phone system about the 2600Hz tone. Hackers ∞ or ∞ presumably another part of the
cheap and Ωimsy. For a child, ∫nd- worked with what is called “in-band more precisely, the ‘grandfathers’ of phone system ∞ that it is waiting for
ing the toy in his or her bowl, and signaling.” Basically, this means modern hackers known as “phreak- routing digits. By following up with
∫nding out what it is this time, is that information about the phone ers” (a combination of the terms another tone known as a “key pulse”
almost always more exciting than connection itself is transmitted as freak, phone, and hacker) ∞ discov- and then with a set of digits (either
actually playing with it. audio data over the phone line. In ered 2600Hz. It’s not clear who in a phone number or an internal
Perhaps the most famous premi- other words, AT&T phone hardware the phreaker community “discov- phone company code) the caller
um in the history of cereal ∞ certain- used signals audible to humans (i.e., ered” the possibilities of using who had played the 2600Hz tone
ly the most famous premium in noises or tones) to signal all of the 2600Hz to explore the system but could then make long-distance or
hacker communities ∞ is an other- routing and connection data used hacker lore places the credit with Joe internal phone company phone
wise unnotable whistle found at the by the system to communicate the Engressia. calls from the trunk line. They could
bottom of boxes of Cap’n Crunch status of a given call or line and to Engressia was born blind, was call for free.
cereal in in the 1960s. To most non- coordinate actions accordingly. blessed with perfect pitch, and spent By the mid-sixties, Engressia had
hackers, the whistle was just an or- Phone numbers when you type much of his adolescence and young discovered all of this and much
dinary plastic whistle ∞ the vast ma- them today continue to make differ- adulthood on the telephone. Some- more. In this way, Engressia happily
jority were put aside and tossed ent audible beeps ∞ this is what al- times, he whistled while he listened spent years whistling his way to both
away when children grew tired of lows you to play songs by pressing to or made phone recordings. Leg- free phone calls and to a deep under-
them. Like all whistles, one blows numbers on the phone. But in addi- end says that at eight years old, En- standing of the ins and outs of the US
into it and it makes a high-pitched tion to just dialing numbers, AT&T gressia found out that by whistling and early global phone systems ∞ to
noise. Like many other whistles, if needed a way to recognize if a line 2600Hz, he would be ‘disconnected’ a degree that surpassed even most
one covers one of the output holes, was in use. No signal at all may seem from phone lines (in fact, they would Bell Engineers. And by no means was
the tone of the whistle raises in like an ideal way to represent an just go silent). With time, and with Engressia alone. Of course, many
pitch. The tone, with one of the empty line but it might merely indi- exploration of the phone system, he hackers without perfect pitch had to
holes covered, was the E above Mid- cate a pause in a voice connection or discovered out exactly why. resort to more technical means to
create 2600Hz tones. It was with this ran the phone system was in an ex-
fact in mind that Engressia called his
friend John Draper to tell him about
pensive and extensive state of Ωux,
in part to block the techniques cre-
System.hack(3,“copyright
the interesting property of the whis-
tle he had found in a box of Cap’n
ated and propagated by Captain
Crunch. More importantly to Drap-
law”,“Richard Stallman ∞
Crunch cereal. er though, personal computer tech-
Not only did Draper use the whis-
tle to make free phone calls, he used
nology had begun to open the door
to a whole new world ∞ the world of
GNU GPL”)
it as his hacker namesake and, to computers, software, and networks
60 this day, is more widely known in the ∞ the world where phreakers would
hacking and phreaking communi- quickly become hackers.
ties as “Captain Crunch”. Over time Today, phone switching in all
Draper made phreaking easier and Western Nations and in most of the
the technology more accessible by rest of the world has become digital
building the 2600Hz tone, and oth- and uses out-of-band signalling. The
er useful tones for those interested captain crunch whistle and blue box-
in exploring the phone company’s es have not ‘worked’ for decades. In
network or in making free long dis- an interesting turn of events over the
tance phone calls, into pieces of spe- last several years, Voice over IP (VoIP)
cialized hardware known as “blue
boxes” ∞ named so because the ∫rst
such box con∫scated by Bell Sys-
technologies, combined with in-
creasingly widespread broadband
Internet connections, have allowed
> Richard Stallman, the founder of the free software
movement, spent a number of years working at the MIT
Arti∫cial Intelligence Laboratory. Following the develop-
tems security was found in a blue hackers to return to their roots by ment of computer programing and seeing the shortcom-
plastic case and not because all, or striving for and achieving the origi- ings and ethical dilemmas that came with the rise of propri-
even most, were blue. nal phreaker goal of free phone calls. etary software, he set out to create an alternative system to
Captain Crunch was arrested on New York-based 2600 Magazine avoid them ∞ free software. In January 1984 he left his job at
phone-related fraud charges in 1972 bills itself as “The Hacker Quarter- MIT and began working on a free operating system. The
and sentenced to ∫ve years proba- ly.” It remains one of the longest work on GNU Emacs began in September 1984, and already
tion. At some point in the mid- running institutions of hackers who at the beginning of 1985, the system was already usabe. By
1970s, he taught Apple Computer are willing to challenge security sys- 1990, the GNU operating system was practically complete;
founders Steve Jobs and Steve Woz- tems and to explore. Local 2600 its only missing component was the kernel. Initially, the
niak to make and sell their own blue meetings around the globe provide GNU HURD kernel was to be used, based on the Mach mi-
boxes. He ran into trouble with the an important venue for hackers, cro-kernel. As the development of the GNU HURD was be-
law again in 1977 for wire-fraud and young and old, to share expertise, to hind schedule, the GNU operating system development
served four months in jail. Upon re- learn, and to socialize. The name, of stalled until another available kernel appeared. In 1991, Li-
lease, he continued life as a software course, is a now often-forgotten ref- nus Torvalds developed the Unix compatible kernel and
programmer writing the ∫rst word erence to the famous frequency and named it Linux. The combination of Linux with the GNU
processor for the Apple II. By the to one of the most famous hacks of system resulted in an integral free operating system. Due to
early eighties, the technology that all time. Linux today we can use the GNU operating system, called
the GNU/Linux.
> Benjamin Mako Hill < The GNU free software is comprised of programs pub-
lished under conditions that allow anyone to study, modify
and share it with their friends. The advantage of GNU soft- In the GNU project, we use “copyleft’’ to protect these
ware is its ethical component, enabling the users to collabo- freedoms legally for everyone. But non-copylefted free soft-
rate while respecting their freedom. To achieve this in an ware also exists. It is precisely this feature that has allowed
environment where software is protected under copyright the free software to harness the creative power of thousands
and at a time when that copyright were beginning to be en- of developers world wide, allowing them to jointly work on
forced in order to transform the software into a private the development of free software without having to fear that
property and a computer market commodity, it was neces- their effort will be appropriated or used as a base for new
sary to ∫nd a way to use the legal framework of copyright to development without that progress feeding back into the
prevent GNU becoming private property. The method Rich- further development of free software.
62 ard Stallman resorted to came to be known as copyleft. The 63
essence of copyright law is in it power to exclude. The copy- Richard Matthew Stallman is the founder of the free
right owner has the legal power to forbid others to copy, dis- software movement, the GNU Project, and the Free Software
tribute and modify the work. Copyleft is based on copyright, Foundation. His major accomplishments include Emacs
but working in opposing direction: instead of privatizing (and the later GNU Emacs), the GNU C Compiler, and the
software, it enables it to preserve its freedoms. The main GNU Debugger. He is also the author of the GNU General
idea behind copyleft is allowing each user the right to freely Public License (GNU GPL or GPL), the most widely-used free
use, copy, modify and distribute altered versions of the soft- software license, which pioneered the concept of the copy-
ware, as long as she doesn’t restrict in any way the freedoms left. Since the mid-1990s, Stallman has spent most of his
of other users, but enables them to share it, in original or time as a political campaigner, advocating free software and
modi∫ed form, under the same conditions. For GNU soft- campaigning against software idea patents and expansions
ware, the means of transforming the copyright, a tool of pri- of copyright law.
vatization, into a tool of sharing ∞ copyleft ∞ is the GNU Gen-
eral Public License, or GNU GPL.
As The Free Software De∫nition states (http://www.
gnu.org/philosophy/free-sw.html): “‘Free software’ is a mat-
ter of liberty, not price. To understand the concept, you
should think of ‘free’ as in ‘free speech,’ not as in ‘free beer.’
Free software is a matter of the users’ freedom to run,
copy, distribute, study, change and improve the software.
More precisely, it refers to four kinds of freedom, for the us-
ers of the software:
— The freedom to run the program, for any purpose
(freedom ø).
— The freedom to study how the program works, and
adapt it to your needs (freedom 1). Access to the source
code is a precondition for this.
— The freedom to redistribute copies so you can help your
neighbor (freedom 2).
— The freedom to improve the program, and release your
improvements to the public, so that the whole commu-
nity bene∫ts (freedom 3). Access to the source code is a
precondition for this.”
System.hack(3,“copyright law”,“Richard Stallman ∞ GNU GPL”) over the product of their labor. As Even if we accept the questiona-
publishers accumulate wealth in the ble assumption that intellectual
form of exploitable copyrights, the property maximizes production,
Richard Stallman ∞ Hacking legitimation of copyright shifts from
the common interest of a commu-
what it maximizes is the production
of unfreedom. Having lost the right
Property nity of readers to a ‘balance’ of in-
terests between writers and readers.
to plagiarize and co-opt and modify
works as their please, readers ∫nd
Or rather, between readers and pub- their only right is to purchase works
lishers. Where copyright licensed from publishers. Publishers ∞ the
64
> Richard Stallman is the arche-
typal hacker, who discovered,
through his own practice in compu-
tion in unethical. If he likes some-
thing, he wants to share it. Free soft-
ware is based in the social advantage
temporary monopolies in the inter-
ests of the common good, the
emerging regime of ‘intellectual
vectoral class ∞ then claims that an- 65
ything that takes away its sales is ‘pi-
racy’. As the punk princess herself,
ter science, the nexus between infor- of cooperation and the ethical ad- property’ rights protects the inter- Courtney Love once said, it is the
mation and property as it confronts vantage of respecting the user’s free- ests of publishers as an interest in record companies that are the pi-
all hackers ∞ in the broadest sense ∞ dom. It is explicitly a step towards a and of itself. Perhaps indeed as a rates ∞ authors ∫nd themselves no
today. The challenge of Stallman’s post-scarcity world. He sees free new kind of class interest ∞ of what I better off than readers (or listeners
work is to connect these diverse software as a practical idealism that have elsewhere called a ‘vectoralist or viewers). They confront a vectoral-
hacker practices. For Stallman, spreads freedom and cooperation. class’, a class which uses intellectu- ist class that now claims its rights
hacking means exploring the limits Stallman distinguishes Free Soft- al property law as a means of con- are paramount. The public good is
of what is possible. After an exem- ware from open source. Open trolling the production process to be measured by the margins of
plary career in hacking software, Source is a development methodol- through the ownership of informa- the vectoralist industries and by
Stallman turned to hacking the ogy; Free Software is a social move- tion as private property. nothing else.
politics of information. ment ∞ a social hack. Stallman com- The consolidation of the intellec- Having secured its interests thus
The Free Software movement that plements his practical efforts to tual property as something close to far, the vectoralist class then argues
he initiated challenges the notion spread free software under the Gen- an absolute private property right is for complete enclosure within prop-
that copyright is a natural right. He eral Public License with a critique of the sign that a new class interest is erty of every aspect of information.
uses copyright law against itself, as what has become of the copyright forming. Intellectual property is not They want to encrypt information
it were, as the instrument for creat- system. Stallman insists that in the a continuity but a break with the old however they want and have the
ing an enforceable freedom, rather United States copyright began not a legal forms. What had to be justi∫ed state impose criminal sanctions for
than an enforceable unfreedom. natural right but an arti∫cial mo- under copyright was the arti∫cial anyone else who breaches this now
Stallman’s General Public License nopoly ∞ originally for a limited monopoly; what has to be justi∫ed absolute private property right. Pat-
insists not only that what is released time. Copyright provides bene∫ts to under intellectual property is the ents, as Stallman points out, func-
under the license may be shared, publishers and authors, not for their common interest. What, in any case, tion very differently to copyrights,
but that modi∫ed versions that in- own sake, but for the common good. is being ‘balanced’? The reader’s and yet the end result is the same ∞
corporate material issued under It was supposed to be an incentive freedom to do whatever she or he the securing of information as prop-
this license must also be free. to writing and publishing more. wants with information, or the read- erty that has equivalent value on the
While Stallman repeatedly states However, writers usually cede er’s interest in the production of abstract terrain of commodi∫ca-
that he is not against business, he rights to publishers in order to get more of it? Under the intellectual tion.
stakes out a quite different under- published. Writers usually do not property regime, only the latter is a Unlike copyrights, patents are not
standing of an economy of informa- own the means of production and ‘right’, not the former. The reader’s automatic but have to be applied
tion. For Stallman, the arti∫cial scar- distribution to realize the value of right is the right to purchase intel- for, producing a time consuming
city created by hoarding informa- their works, and so they lose control lectual property. lottery for hackers who sometimes
never know who holds a patent on produced under the combined
what. This is less of a burden for the
vectoralist class. Vectoral business-
weight of patent and copyright is
merely the extension of commodi∫-
System.hack(4,“biota”,
es accumulate portfolios of patents
and cross license to each other, en-
cation itself.
This is the context in which Stall-
“Heath Bunting ∞ SuperWeed
hancing each other’s quasi-monop- man’s General Public License can
oly position. The result of the enclo-
sure of information within property
be understood as a genuine social
hack. It is a hack in the aesthetic
Kit 1.0")*
is not a scarcity of innovation, but a senses of the word, in that it uses the
66 scarcity of cooperation. materials to hand. It uses the law of
As Stallman wryly points out, dur- property against itself, as a way of
ing the cold war the USSR and USA protecting some small space of free
both controlled information, but cooperation. It is not a program or a
under different regimes. The USSR manifesto but an application. Stall-
controlled information for political man extends the hacker aesthetic
reasons, producing an economic beyond the world of programming
disaster. The USA that emerged out into the social realm, but practices
of the cold war controls information hacking in this new and larger ter-
for economic reasons ∞ and the re-
sult is a political disaster. What is
rain in much the same way. This is
his genius. > Big corporations increasingly decide over and pro∫t on
vast dominions of human existence. Formerly common
things such as land, water, and air are being monopolised.
> McKenzie Wark < Food is being polluted by GMOs introduced without any
public knowledge.
Genes control the chemical messages within cells, they
determine the form and functioning of the cell, the orga-
nism’s various organs, and the whole organism. These
codes of life consist of four chemical building blocks, arran-
ged in pairs, like the treads of a spiral staircase. Millions of
different combinations of the basic chemicals determine
the different genetic make up of each kind of organism.
Genetic engineering is a set of techniques and process-
es for altering these genetic codes. Our friends like Monsan-
to have a tendency to concentrate a lot on engineering seeds
which incorporate both pesticides and herbicides, or seeds
which make plants more resistant to pesticides so you can
spray lots more on.
Aside from the actual technology of genetic copy pro-
tection, corporations are nevertheless vigorously enforcing
* Based on a press release
their intelectual property rights over genetic
announcing the project code, even when they pollute the crops of
presentation at the ICA in farmers not using their seeds.
1999.
The traditional means of protesting through street Heath Bunting, is a British artist and well known inter-
manifestations and via formal channels seem inadequate net hacker activist responsible for information subversion
for invoking changes in the present dangerous and undem- campaigns against organisations such as Glaxo, Nike and
ocratic situation. 7-Eleven stores. He lives in Bristol, Great Britain. Internati-
Cultural terrorism can be de∫ned as an attack against onlly he’s recognized as one of the pioneers of net.art. He
the dominant systems of power and their attempt to de∫ne has exhibited all over the world with projects including
reality and nature. In 1999, Michael Boorman of Natural graphity, performance, intervention, pirate radio and other
Reality launched the ‘Natural Reality SuperWeed Kit 1.0 ∞ a forms. At some poing he ventured into the ∫eld of genetics
DIY kit capable of producing a genetically mutant super- proclaiming it to be the next “new media”. ‘Natural Reality
68 weed, designed to attack corporate monoculture’. Heath Superweed kit 1.0’ is an important contribution to an artis- 69
Bunting and Rachel Baker are founders of The Cultural tic practice that is opening a new creative ∫eld between sci-
Terrorist Agency, that has ∫nanced SuperWeed Kit 1.0 ence and art. He is a founder and member of irational.org
Michael Boorman of Natural Reality said “Genetic collective. His main ambition is to ∫nd a way to give it all up
hacker technology gives us the means to oppose this unsafe, and live outside as god intended.
unnecessary and unnatural technology. To quote Heath
Bunting of irational.org: “Biotechnology is not only the next
battleground on which the control of life and land is fought,
but also on which life itself is rede∫ned. It is essential that
the concepts of property and representation in this arena
are seriously challenged.”
The kit supposedly contains a mixture of naturally oc-
curring and genetically mutated seeds of Brassica seeds
(e.g. Oilseed Rape, Wild Radish, Yellow Mustard, Shepard’s
Purse), which, if allowed to germinate and cross pollinate,
would create a SuperWeed resistant to current herbicides,
potentially threatening the pro∫tability of GM crops, but
also of herbicide production and distribution as well.
Steve Kurtz of the Critical Art Ensemble terms the
Irational.org approach “biological civil disobedience.” Such
a new method of protest is “not well theorized or strate-
gized,” he writes. “Playing with reproductive systems, eco-
systems, and germ lines is a pretty high gamble.” Kurtz says
his group is open to this type of action, but is still assessing
the impact and ethics. The members are now making a bac-
teria-release machine. “It has similar potential, but in the
end, like the SuperWeed, it’s more spectacle than sub-
stance,” he says. “While there is a possibility of disaster, the
probability is exceptionally low.”
System.hack(4,“biota”,“Heath Bunting ∞ SuperWeed Kit 1.0") global protest against the foods. In lem of super-weeds was discussed
May 2000, a protest in Genoa, Italy so I conducted further research and
at a local McDonalds 03 resulted in then decided to make my own.”
SuperWeed ∞ An Art project the multi-national corporation halt-
ing its purchasing of GM ingredi-
As a result of his efforts, Bunting’s
“SuperWeed” “contains a mixture of
by Heath Bunting ents. Recently a study of laboratory
rats fed GM crops found that the an-
naturally occurring and genetically
mutated (GM) Brassica seeds
http://www.irational.org/cta/superweed/ imals developed organ abnormali- (Oilseed Rape, Wild Radish, Yellow
ties and changes in their blood Mustard, Shepard’s Purse). If these

> A two-letter pre∫x is beginning


to crop up in conversations
about food. “G.M. food” or genetical-
ments for the crops are based on the
global population increase and the
increased need for food. Since there
pro∫le.04 This has led to the wide-
spread ban of G.M. crops in India.
As information surrounding results
seeds are allowed to germinate and 71
cross pollinate, a Super Weed will be
created that will be resistant to cur-
ly modi∫ed food has become a is dif∫culty imagining cultivating like these proliferate around the rent herbicides (e.g. Roundup 05),
standard ingredient in most proc- more land than we are currently us- globe, the resistance to accepting thus not only threatening the pro∫t-
essed products on the market. From ing, the need to yield more per acre G.M, crops into everyday subsist- ability of conventional and GM
snack foods like potato chips to can- becomes important. GM crops allow ence is growing. The unknown fear Brassica crops, but also of herbicide
dy to other packaged foods, “75 per- for this yield to increase for the fol- of what else might occur as a side production and distribution as
cent of food bought in America [and lowing reasons: 1) The crops cut effect of consuming the products well.” 06 His intention with the
other countries] has genetically al- down on pest infestation, which ul- has taken over their potential as an project is to advocate a type of bio-
tered ingredients, [with most of] the timately increases the harvest, 2.) answer to the global food crisis. logic terrorism, where “If you feel
alterations not listed on labels.” 01 The crops produce more of their Responding to the concern over that the authorities are not going to
Because of this inconsistency in la- yield than traditional crops, 3.) No G.M. foods, U.K. based artist, Heath respect the wishes of the majority of
beling across many products, it has need to apply pesticides since the Bunting’s work, “SuperWeed”, ad- the population for a ban on GM
become unclear what contains G.M. plants are more resistant to pests. dresses the threat of the crops once crops (currently 77% in favor of a to-
crops or not. “Nearly every product Arguments against the plants range they enter the food chain by illus- tal ban), you could choose to culti-
with a corn or soy ingredient, and from confusion over the resulting trating the crop’s inΩuence on their vate and release SuperWeed 1.0 into
some containing canola or cotton- health consequences of consuming immediate surroundings. Bunting the environment.” 07 Although this
seed oil, has a GM element, accord- the modi∫ed crops to uncertainty of initially monitored several G.M. may seem antagonistic to some,
ing to the grocery-manufacturers their origins; however there is no crop related mailing lists to ∫nd out Bunting’s focus is to create equilib-
group.” 02 Although this is quickly evidence they are harmful to hu- what was important to people about rium between GM crops and their
becoming a reality, there are still mans. In addition, public consump- the rise of GM use. Bunting explains natural surroundings since natural-
many questions about the crops and tion of GM crops is already at a high how he began the project, “I want- ly occurring weeds have no chance
their effect on consumer’s health. level with most processed food, par- ed to make a bio tech intervention of effecting current GM crops.
Despite public confusion on what ticularly staples such as sugar and so I monitored several related mail- Despite this seemingly highly tac-
crops may contain the modi∫ca- Ωour. ing lists for months and the prob- tical approach, Bunting also be-
tions, arguments for and against As knowledge about GM crops 03 Organic Consumers Association, “Mass Protests Against Frankenfoods in Italy”, http://
GM crops are building. The argu- begins to circulate, there has been www.purefood.org/ge/italyprotest.cfm
01 News Target, “Genetically modi∫ed foods more common than many Americans think, survey 04 “Food for thought: Report reveals risks of GM items”, Times of India, June 4, 2005,, http://
shows”, http://www.newstarget.com/006073.html timeso∫ndia.indiatimes.com/articleshow/1132155.cms
02 “Survey: Most folks unaware they have been eating biotech foods for years”, Associated Press, 05 http://www.monsanto.com/monsanto/layout/products/productivity/roundup/default.asp
March 24, 2005, http://www.journalnow.com/servlet/Satellite?pagename=WSJ%2FMGArticle% 06 “Rise of ‘Superweeds’ blamed on GM crops”: http://millennium-debate.org/ind5feb02.htm
2FWSJ_BasicArticle&c=MGArticle&cid=1031781758183&path=!nationworld&s=1037645509161 07 Buntingova internetska stranica: http://www.irrational.org
lieves in diplomacy as a method for costly process of ∫ltering out inedi- gressive legal and lobby practices have turned the topic of GM foods into a
discouraging corporations to invest ble products for those worthy of made Monsanto a primary target of global concern.
in GM products. He states, “Alterna- bringing to market. Also a GM yield the anti-globalization movement and Even though Bunting is rallying
tively you could choose to create will hypothetically bring a higher environmental activists.” 13 For in- against the crops with the work, the
your own propaganda campaign pro∫t since GM crops are typically stance, the Organic Consumers Asso- project nevertheless introduces his
threatening biotech corporate inter- larger and heartier than non-GM ciation of America (OCA) has started own form of GM crop into the natu-
ests with this genetic weapon. What- crops. However, what they bring to a “Millions Against Monsanto” peti- ral environment. The result of this
ever you do, the threat is often as ef- size, they often decrease in Ωavor tion encouraging farmers and con- output might be disastrous in itself.
fective as the execution.” 08 This ap- from their predecessors. sumers to rally against the corpora- Bunting’s Superweed could theoret-
72 proach seems to be working, as a Currently, corporations have tion. Their goals with the petition are ically cross-pollinate and create a 73
recent article in the New York Times been using GM crops as way to in- to “ 1) Stop intimidating small fami- hybrid GM plant. This resulting crop
about the “SuperWeed” detailed crease their yearly yield and thus ly farmers. 2) Stop force-feeding un- might pose even more of a threat
how MIT-based researcher Joe Dav- pro∫t from the investment. They tested and unlabeled genetically en- than the original. Despite this criti-
is, the so-called “father of American also propose GM crops as a method gineered foods on consumers. 3) cism for the project, Bunting be-
bio-Art” 09 spoke against “Super- of “improving the nutrient compo- Stop using billions of dollars of U.S. lieves that the Superweed is merely
Weed” when he said “I don’t under- sition of crops, such as the protein taxpayers’ money to subsidize genet- a reaction to an existing reality. He
stand why [Bunting] wasn’t arrest- content of rice or potatoes or to in- ically engineered crops—cotton, soy- bluntly states, “Guerrilla warfare
ed. Suppose I’m against gas sta- crease the tolerance of crops to ad- beans, corn, and canola.” 14 steals the weapons of its enemy,”
tions. Does that give me the right to verse growing conditions, e.g. Although most of these crops are referring to the fact that his “Super-
walk around them with a pack of drought or pests.” 11 Other claims in- used in fast-food items and proc- Weed” is a GM crop in itself.
matches?” 10 This type of response, tended to quell protests among the essed foodstuffs that are often dis- As the debate over GM crops inten-
although seemingly negative, is an public are “that [GM crops] improve regarded by the average consumer, si∫es, there is a need to question the
indicator of the current hype sur- sensory attributes of food, e.g. the company has been blamed for fundamental widespread use of
rounding these crops and how far Ωavor, texture [and also] improve not reporting results from studies of these plants. Projects like Bunting’s
their integration into popular cul- the processing characteristics so as the crops on laboratory animals. SuperWeed are reminders that the
ture has grown. to reduce wastage of food and mini- “According to the London based In- effect of GM has become a moral de-
So why attempt this project? mize the cost during transport and dependent which broke the story, bate to most of the world’s popula-
Bunting contends, “GM is danger- storage.” 12 secret research carried out by Mon- tion. Despite the fact that most peo-
ous to health of all animals and One corporation spearheading santo shows that rats fed the modi- ple would deny that they have ever
plants.” On a social level, he believes the development of GM crops is the ∫ed corn had smaller kidneys and consumed GM food, the reality is
that “GM is primarily a mechanism Monsanto Corporation, based in St. variations in the composition of that its integration into commercial-
of colonization by rich criminals.” Louis, Missouri. “Monsanto’s devel- their blood.” 15 These types of ∫nd- ly available products is already be-
This assumption pertains to the opment and marketing of genetical- ings bring into question the long- coming increasingly widespread.
impetus of food manufacturers to ly engineered seed and bovine term effects on humans once the What Bunting’s work shows is that
use G.M. crops in order to avoid the growth hormone, as well as its ag- crops are thoroughly integrated into this debate is something serious
the food chain. This debate has enough to need clari∫cation from
08 Ibid.
09 [Preuzeto iz New York Timesa] 13 Wikipedia: “Monsanto, Genetically Modi∫ed Food” (http://en.wikipedia.org/wiki/Monsanto)
http://www.nytimes.com/2005/07/03/arts/design/03kenn.html/ , June 3, 2005, “The Artists in 14 “Monsanto to Public: Ignore the Rats and Eat the GMO Corn
the Hazmat Suits”, autor Randy Kennedy OCA Reacts to Monsanto’s Latest GMO Deception”, Organic Consumers Association: http://
10 Ibid. www.organicconsumers.org/monlink.html
http://www.organicconsumers.org/ge/corn-study.cfm/7645509161
11 http://library.thinkquest.org/C004033F/pros&cons_text.htm
12 Ibid. 15 Ibid.
authorities as to the direct rami∫ca- weed” stand as reminders that GM
tions of continued consumption of
the crops. Although the crops appear
crops are here to stay and we must
adapt (or react) to them. Despite our
System.hack(5,“locking”,
to have no con∫rmed harmful side
effects, the general wariness to con-
many protests, we have or are already
consuming the crops. As global pop-
“Michael Steil ∞ Linux On
sciously try them is widespread. With ulation steadily increases this reality
their continual integration into the
food chain, projects like “Super-
will become increasingly apparent
and undeniable.
Xbox”)
74 > Jonah Brucker-Cohen <

“My name is Michael Steil, I am a legitimate Xbox owner. I


have fully paid the price for it, and I own 6 original games. I
live in the European Union and I never signed any End User
License Agreement (EULA) or Terms Of Service (indeed, none
came with the Xbox), thus I am not bound therefore to any
agreement or contract. Thus I regard the Xbox as my own
personal property. (I am aware that within the US certain re-
strictions may be claimed by Microsoft, however as a citizen
of the EU, residing wholly within the EU, any limitations of
the usage of the Xbox described in any EULA would be inap-
plicable, nor their questionable legitimacy in the US and fur-
ther; just using the Xbox would not mean that I agree to
them.) It should also be noted that my Xbox is not ‘modded’
in any way.”
— Michael Steil, 10. October, 2003

> Michael “mist” Steil lives in Munich and has been


involved with computers since the age of ten. Starting on
the Commodore 64, he has always had an interest in micro-
processors, embedded systems and operating systems. He is
the head of the Xbox Linux and GameCube Linux Projects.
The above quote is his public protest against the privacy vio-
lations he encountered while using the Xbox. Steil had in-
stalled the GNU/Linux operating system on his Xbox. One day tems), and to use the opportunity to attain cheap hardware
he accidentally hit a menu item that initiated the update of for free software, in 2003 Michael Robertson, the CEO of the
Xbox software, and without a warning or consent it erased open source company Lindows, funded two $100.000 boun-
data from the GNU/Linux system on his machine. Steil saw ties for anyone ∫rst to install GNU/Linux on Xbox by using
this intervention, the result of the Xbox settings, an intrusion any means available and later for anyone ∫rst to install it
of the manufacturer into private property, his own property without a hardware modi∫cation. Originally, modchips
in this case, and this provoked him to react. were the only option. However, it was later demonstrated
The Xbox is Microsoft’s game console. When it debuted that the TSOP chip on which the Xbox’s BIOS is held may be
on the market in 2001, hidden within the Xbox was a really reΩashed. Finally, a buffer overΩow found in one game al-
76 powerful PC, with a 733 MHz Intel Celeron processor, an lowed for the booting of a GNU/Linux loader without hard- 77
8GB-10GB (formatted) hard drive, 64MB of RAM (although ware intervention. This is what Steil’s Xbox Linux team suc-
on all earlier boxes this is upgradeable to 128MB), and 4 ceeded at doing.
USB ports (the controller ports are just variations of stand- In the meanwhile, there’s an increasing number of
ard USB 1.1 ports). Microsoft offered the Xbox at a price well such projects attempting to use the free software in order to
below the market price of a comparable PC, counting to set free powerful machines lying hidden behind hardware
make up for the loss with pro∫ts from sale of the games for locks in contemporary user electronics ∞ the iPodLinux be-
the console and by becoming the dominant player on the ing probably the most popular.
gaming console market (and thereby to establish a de facto At the end of 2005 Microsoft unveiled the new genera-
market standard), overpowering Sony PlayStation. tion of its gaming console ∞ the Xbox 360. Beginning of 2006
Seeing a possibility of getting their hands on some a project to set it free followed: Free60.
cheap hardware for existing free software, which would be
also subsidezed ∞ what an irony ∞ by the biggest opponent of
the free software, Microsoft, the hacker community started
working on porting GNU/Linux to run on the Xbox. The sig-
ni∫cance of cheap hardware with free-of-charge free soft-
ware in terms of social importance and development for the
developing world, was rather obvious. But, to prevent access
to cheap hardware at its expense, Microsoft had cippled that
powerful machine for all uses but one ∞ gaming.
The Xbox uses a digital signature system to prevent the
public from running unsigned code, accepting in this case
only Microsoft’s digitally signed code. This type of technolo-
gy is called trusted computing. Although it has many securi-
ty applications, it deprives the user of the ability to control
her own hardware, turning it, as Richard Stallman says, in a
computer the user can’t trust. It is this trusted system that
deleted the GNU/Linux operating system from Steil’s Xbox
and infuriated him.
To confront the immeasurable consequences of mass
introduction of this kind of trusted systems into user elec-
tronics (the consequences we already face today in the form
of different Digital Rights/Restrictions Management sys-
System.hack(5,“locking”,“Michael Steil ∞ Linux On Xbox”) PC extensions, increasing the value ties). The last to come was Apple
of consumer investment in a PC (Mac OS X, 2001), also Unix-based.
(more on this strategy later). All im-
How to Sell Free portant CP/M software comes out
with new DOS versions, and by the
Social success
For the purpose of this argument,
late eighties PCs (IBM’s or not) are socially inΩuential technology by
in every of∫ce and school. About the de∫nition meets two criteria: wide-
same time the PC appeared, a third spread use and innovation. Both are
segment of the market opens up, relative: the Apple II was socially in-

> For as long as there have been


advocates of free software, eve-
ry once in a while an enthusiast em-
mentary and substitute goods. It will
be shown that behind most success-
ful products in short history of micro-
home computers, mostly developed
independently. In mid-eighties Ap-
ple releases Macintosh, the ∫rst rel-
Ωuential because computers were 79
previously used only by engineers,
bankers, military and exceptionally
barks on to listing the merits of free computing lie some good hacks, atively popular graphic interface apt computer science students who
software, usually with the goal of manipulations with complements microcomputer. By the end of eight- built their own machines; CP/M was
showing how free software brings and substitutes. Xbox Linux will be ies, the gaming market gradually not socially inΩuential because only
about many advantages for the us- discussed in this context. migrates to PC and DOS. a minority of secretaries and book-
ers, developers and companies. Ei- In 1992 Microsoft releases Win- keepers used it, although it was in-
ther implicitly or explicitly, almost The shortest history of dows 3.1, encompassing all seg- novation in technological sense.
without exception, such manifestos microcomputers ever ments of the microcomputer mar- Windows 3.1 were socially inΩuential
contain the expectation of immi- From the late seventies, micro- ket. On a single machine, with a uni- because they offered an ergonomi-
nent revolution in software, not yet computers have developed on two form graphic interface, the user can cally superior graphic interface to all
underway just because conscious- parallel tracks of use, home and now do it all: write, draw, calculate, segments of the market,01 with full
ness of the masses of computer us- school or business use. The Apple II play. All DOS applications run on DOS compatibility.
ers hasn’t yet reached desired levels. (1977) became standard school Windows, requiring no modi∫ca- Where on this map lays free soft-
Yet, I can’t recall any of these anal- equipment in the US, its VisiCalc tions and zero investment. And ware? Nowhere, really. From 1983 to
yses to open the preceding question: spreadsheet application later intro- since all users now need similar present time, from the aspect of so-
why free software, having all those duced it to companies. Different machines, computers ∫nally be- cial inΩuence (so, widespread use
advantages, isn’t socially more suc- computers that used the Zilog 80 come cheap, at least to those living and innovation), free software has
cessful? None of the most inΩuen- processor were powered by the CP/ on the right side of the digital divide. not made one single breakthrough.
tial computing projects in the last M operating system (1976), the ∫rst From the mid-eighties onward, Today’s most widespread free soft-
quarter of a century were free ∞ in business operating system for mi- operating systems gradually trans- ware applications are network-relat-
fact, none had any connection to crocomputers. Many business ap- form into the minicomputer model, ed, e.g. web server Apache and (al-
free software. In social sense, free plications were written for CP/M, designed for true multitasking and though, in terms of market share to
software was and still is ephemeral. from the revolutionary database multi-user networked operation. a much lesser extent) Mozilla’s web
Considering its social emphasis, management system dBASE, the The ∫rst to break the ice was Micro- browser Firefox. The ascent of the
this is by no means an obvious also revolutionary text processor soft in 1993 (Windows NT, inherit- Internet, especially the World Wide
outcome. WordStar, to VisiCalc for CP/M. ing VMS OS architecture), then Web, made network-related soft-
In what follows, social success will In 1981 IBM joins the game with came the free software community ware signi∫cantly more important,
be de∫ned as a combination of mass open PC architecture, a Microsoft’s with its version of Unix (GNU with but both Apache and Firefox are ac-
usage and innovation, while dynam- CP/M clone and more powerful In- Linux kernel, effectively by late nine- tually socially irrelevant. Why? Im-
ics of IT economics will be present- tel processor. Independent produc- 01 Superior to the DOS interface, not necessarily to other graphic interfaces that were not widely
ed in terms of economics of comple- ers begin creating a myriad of cheap used.
agine for a moment that they didn’t tribution, and we are free (i.e. al- greater value for the user than the Unix users value and expect IT mer-
exist. What would change? Nothing. lowed) to use the software, its source equivalent proprietary software.06 its, personal computer users value
The same number of people would and executable form, in practically So, if free software is in principle
ease of use while solving tasks that
browse through a more or less same any way we see ∫t. (In the case of GPL of greater value for the user, and thus
by themselves do not necessarily
number of web-pages served in a licensed software, “practically any more desirable, why is it less socially
have to do anything with IT.
more or less same way.02 way” means “on the condition that successful? Or, what impairs wider Stallman himself has taken an es-
In all honesty, I believe there actu- modi∫ed versions shall also be pre- use and higher level of innovation of pecially exclusive stance towards IT
ally is one exception to this verdict: sented under the GPL, in case they free software? The problem stems laymen by stating that all use of pro-
Ward Cunningham’s Wiki. Wiki is are to be distributed”.04) from two sources: the character of prietary software is immoral. Thus he
80 truly innovative and in twelve years it For the sake of the argument, let’s the free software user/developer puts a moral imperative before, for 81
has become a widely used concept assume we have one typical propri- community and the peculiarity of the example, an artist to use free soft-
through uncountable variations, and etary software product on one side economics of free software. Let’s try ware that, although it is suitable for
some spectacularly successful appli- and on the other an almost identi- to address them both. an IT expert but not for an artist, ef-
cations (e.g. Wikipedia).03 cal free software product. Let’s then fectively wasting her talent on solving
How to make sense of this, having assume they both cost the same. Tradition, society, community technical issues (or worse, suppress-
in mind that software freedom does Taking into account only the value Let’s brieΩy look into the history ing it until more usable free software
bring great potential advantages to for the user, what software permits of the creation of free software. Ri- comes along). Besides being moral-
the user? Proprietary software is a us to do with it (everything else be- chard Stallman, a software develop- ly questionable, this type of techno-
closed source “product” (executable ing the same), the free software al- er from Massachusetts Institute of autism clearly doesn’t favor commu-
code). The product is someone ways has equal or greater value.05 Technology (MIT), envisioned the nication with the users who have oth-
else’s intellectual property, and the Both programs would be of equal GNU project in such a way that he er talents and those less interested in
owner allows users to use the prod- value only in the case where we made sure that both targets (wide- technology as such.
uct under terms prescribed ∞ this would never want to do anything spread use and innovation) would In general, traditional free soft-
user-license is what we purchase with the free software which the be missed from the start. GNU at- ware users are its developers, either
when we purchase proprietary soft- owner of the proprietary software tempted to replace the existing de- directly, when authors use their own
ware. No free software license is product would not allow us to do. In velopment environment of proprie- products, or in the case where au-
user-license. All they regulate is dis- all other cases, free software has tary Unix systems, not to create thors expect users to have the level
something new. Second, Unix was of expertise comparable to their
02 Those familiar with free software will protest ∞ the source code of Apache and Firefox is still (and remained until recently, until own. This can work out marvelous-
here, free to be used in other applications, even if Apache and Mozilla foundations cease to ex-
ist. It is a feature, not a bug. But, I wish to say something else: even if all that code disappeared, the Apple Mac OS) an operating sys- ly: persons approaching the descrip-
including the executable programs, even if all the developers’ memories of the elements of tem designed for IT experts and oth- tion of the ideal user usually ∫nd the
those programs were to be magically erased, still nothing would happen. Neither the idea, nor er technologically savvy scientists, software perfectly ∫tting. If you were
∫rst implementation or any revolutionary advancement of web-server came about with the not for the laymen. The difference a developer whose primary language
Apache project. The same goes for Mozilla’s web browser.
from socially inΩuential personal is LISP, could you imagine a better
03 http://en.wikipedia.org/wiki/Wiki
04 http://www.gnu.org/philosophy/free-sw.html
computers is evident: Apple II working (and non-working) environ-
05 This argument was ∫rst presented at news-group hr.comp.gnu, in a message titled „SOK i
turned to students and teachers, ment than Emacs, an application
MESO za velike kupce“ on December 19th, 2002. DOS to accountants and other of∫ce dealing with all sorts of text, written
06 In favor of free, or open-source software, its advocates usually call upon two different criteria. workers, Windows to gamers, visu- in a dialect of LISP and thus perfect-
The Free Software Foundation (FSF), following Richard Stallman, claim free software is the al artists, musicians, public speak- ly comprehensible, adaptable and
only moral software, both for the developer and the user. The Open Source Initiative (OSI) ers and others. The ethos of the Unix expandable when in your hands. For
claims, on the other hand, that the development model inherent to free or open-source soft-
ware is superior to the development models of proprietary software. My view is that the ∫rst world and the personal computer the entire portion of the population
claim is simply meaningless, while the second is empirically unfounded. worlds were different from the start: that ∫ts this description (one hun-
dred in a billion?) using Emacs photographs, can choose the appro- Which user approach do you availability of a large number of var-
probably feels like heaven. priate item from the menu of availa- think will bring about greater social ious PC add-ons made the PC itself
As we move away from the happy ble special effects, and try out a de- success and popularization of com- more valuable. At the same time
marriage of skilled developer or IT sired procedure without much know- puter aided image processing? Microsoft performed an even better
expert and primary user combined in ledge of underlying technology. A In my opinion, the weakest link of gimmick: they did not grant IBM
one person, this lovely idea turns into user of a free software product will free software has nothing to do with exclusive license for DOS, but sold
a nightmare. For whatever you want achieve the same result, should he programming, the problem is in it also to other PC vendors, effective-
to do, there is probably some free become familiar with details of phys- what the programmers do not know ly lowering the price of hardware
software available, it’s just not clear ics and technology of the dynamic or are simply not interested in. To and ∫nally making DOS-based soft-
82 who can use it and how. A photogra- range in photography, master the attain social success, free software ware more valuable. 83
pher working with any one of the spe- basics of one or the other script lan- needs people who are not program- While the game of complements
cialized proprietary software image guage, and ∫nd the appropriate tools mers or IT workers: interface de- is an important ingredient in haute
processing products and wishing to to combine and manipulate. Like signers, usability experts and psy- IT cuisine, for free software it is of-
experiment with a dynamic range of this: 07 chologists who will test it; language ten the only economic model avail-
experts who will create proper spell- able. Crucial restriction of some of
#!/usr/bin/perl
ing- and grammar-checking sys- the most, well, restrictive free soft-
open I, “> /tmp/hdr-in”;
tems, thesauri and so on. ware licenses refers to strictly de-
∫ned mode of distribution, effec-
for $f (@ARGV) {
Economics of free software tively putting standard business
$jh=‘jhead -c “$f”‘;
Most of the free software econom- model of end-user licenses out of
chop $jh;
ics, and much of software econom- the game. In other words, for com-
if($jh=~/\(1\/(\d+)\) f\/([\d.]+)/) { $e=$1; $a=$2; }
ics in general, revolves around the panies whose primary business is
if($e<2) {
concepts of complements and sub- producing software for mass mar-
$jh=‘jhead “$f” | grep “Exposure time”‘; stitutes, with the underlying process ket, free software is untenable, at
if($jh=~/:.*?([\d.]+).*?s/) { $e=1/$1; } of turning complements of a target- least GPL-ed free software.
} ed product into commodity.08 The These days, IBM and various
$n=‘basename “$f” .jpg‘; chop $n; great “hacks” in IT economy are ma- smaller companies are attempting
print I “$n.ppm $e $a 0 0\n”; nipulations with complementary on another variant of the same hack
print “preparing $n (1/$e f/$a) ...\n”; products. The basic principle of eco- by investing in free software and
system “convert ‘$f’ -geometry 1024x1024 ‘/tmp/$n.ppm’”; nomics of complements amounts selling consulting, design and oth-
$d=‘dirname “$f”‘; chop $d; to: a product is more valuable to buy- er specialized services, using free
} ers (can be priced higher and/or sold software as a cheap complement.
close I; in larger quantity) as its comple- Probably the biggest pro∫t from free
system “cd /tmp; mkhdr -fptiff hdr-in $d/$n-HDR.tiff”; ments get cheaper, ideally when software is made by Google, a com-
system “pfsin $d/$n-HDR.tiff | pfstmo_fattal02 -b 0.85 | pfsgamma -g they reach their lowest, commodity pany that heavily invests into free
2.2 | pfsout $d/$n-HDRfattal.jpg”; price. IBM has made PC architec- software, using it in the server, and
system “pfsin $d/$n-HDR.tiff | pfstmo_drago03 | pfsgamma -g 2.2 |
ture open, and has thus started mar- more and more, in the client (the
pfsout $d/$n-HDRdrago.jpg”;
ket competition for hardware devic- Firefox browser) infrastructure of its
es by independent producers. The advertising empire.
07 This example is not invented, the script is functional and licensed under GPL. The author is a
physicist and photographer Domjan SiloviÊ. Source: hr.rec.fotogra∫ja.digitalna, April 21st, 08 More on this in the textbook exposition by developer, businessman and writer Joel Spolsky,
2006, under the title High Dynamic Range. see: http://www.joelonsoftware.com/printerFriendly/articles/StrategyLetterV.html
Looking at ∫nancial reports, we dirty in the game of complementa- bought their Xboxes solely for the will. One year later, Microsoft an-
can conclude this strategy pays. Still, ry goods. In the context of IT, really purpose of running Linux. That nounces FlexGo, a full-featured PC
IBM’s and Google’s customers are nasty ones include introducing pro- leaves us with the target audience of platform running Windows OS, ∫-
big businesses and advertisers, not prietary network protocols like Mi- Linux users which are also console nanced like mobile phones, i.e the
the mass of “small scale consum- crosoft’ SMB, or late AppleTalk and gamers, and they will have to buy the device if sold at half the retail price,
ers”. For most software users and Novell IPX. The idea is similar, games anyway. What was the lock- the rest being paid through pre-paid
most uses, the best available soft- though: if you need to connect sev- ing in for, then? In the case of gam- or subscription time.
ware still belongs to the category of eral machines into the network, ing consoles, it’s meaningless. That This concept is a rather natural
proprietary software. Although it is we’ll be happy to oblige. Provided is demonstrated by Xbox Linux, but extension of Microsoft’s traditional
84 true that the improvements result- that you buy, for each workstation, even more by the fact that the dom- business model where complement 85
ing from business of free software our software (Microsoft or Novell), inant console gaming vendor, Sony, goods, hardware, is made affordable
contribute to the whole communi- or even better, both our software of∫cially supported Linux for Play- in order to make software more val-
ty, many of them don’t address the and our hardware (Macintosh with Station 2 and remained dominant. uable for the user and more pro∫ta-
consumer market directly. Mac OS). Fortunately, such swin- ble for the owner. In one possible
dling rarely succeeds in the long • What, how, for whom FlexGo scenario, basic hardware
• The Gray zone run, and IPX and AppleTalk are Computing has so far brought could be free (as a beer) and software
Pulling up this commoditize- mostly abandoned by now, while about enormous changes to the leased instead of selling user licens-
your-complements trick isn’t easy, SMB is still alive and kicking, but ways we learn, have fun, live and es. This model promises even bigger
though, even less so in standardized hopefully not for long. work. But, who are “we”? We belong pro∫t margins, if suf∫cient number
infrastructural environment, where In the world of console gaming, to the 15% of global population who of new users join in ∞ remember,
“everything works with everything”. locking of complementary product have a computer connected to the we’re talking billions of people who
Therefore, many vendors try to is considered perfectly normal. Nin- Internet. In other words, we are all can’t afford owning a computer but
make things easier for themselves, tendo, Sony, and recently Microsoft just a handful of early adopters, use pre-paid mobile phones.
by making it harder for users to use sell consoles relatively cheaply in beta-testers of a technology that may It goes without saying that FlexGo
what should be complementary to order to make money on relatively one day become widespread. computers will be locked. The Xbox
the vendor’s product, in less desira- expensive games. Not unlike a mo- Initiatives to bridge the “digital Linux episode should probably be
ble ways. bile phone, Microsoft Xbox, techni- divide” and reach the remaining best understood as warming up be-
A mobile phone is complementa- cally speaking, is a standard PC 85% of potential users are closely fore the big battle for computeriza-
ry to telecommunications services, locked to applications pro∫table to tied to manipulation with comple- tion of the global south. Although
so telecoms routinely offer phones the locker, and locked out from all ment goods. The ∫rst to make a FlexGo computers will be hardware-
at the fraction of usual retail price. other uses. That is, it was locked be- move was MIT Media Lab’s Nicho- locked, apparently on the processor
What’s the catch? The catch is that fore Xbox Linux did their job. las Negroponte in 2005, with the level, future FlexGo-Linux guys may
“their” devices are locked to their Xbox Linux project is a show off $100 dollar laptop project.09 The be facing the easier part of the job.
network, which renders them unus- of disobedience to one type of IT idea is that governments and inter- When asked “Do you wish to pay for
able as a complement for services of racket, but it’s also interesting be- national organizations ∫nance proprietary software or use free soft-
other operators, although all mod- cause it doesn’t really pose any hardware, and the free software ware as you please?”, the vast major-
ern networks in mobile telephony threat to Microsoft. There is a ton of community contributes with the ity of the ∫rst billion opted for the
are completely standardized so any different ways to put up an equally software. Once again, free software former clause. The rest is likely to be
device is originally fully operational cheap Linux box, usually much bet- has assumed a role of a complemen- given more appealing offers from
in every network. ter suited to task at hand than an ex- tary good to hardware and political the proprietors.
Locking mobile phones is but one Xbox, so I’d be surprised if signi∫-
of the more visible forms of playing cant number of people actually 09 One Laptop per Child, http://laptop.media.mit.edu/
Between a rock and a hard place maturity and now rapidly looses nity wants and needs them. It seems change in the framework of IT eco-
From the perspective of our sec- strategic importance. Consequent- the ethos of the free software com- nomics, namely from the shift to
ond criterion for social success, the ly, IT ceases to be competitive and munity is increasingly shifting in that infrastructure. In that case, the
middle-man business model in free becomes infrastructure technology. direction, so we can be somewhat most signi∫cant contribution to a
software is only exceptionally orient- If this is even only partly true, this is optimistic in that respect. relative success of free software in
ed towards innovation. However, great news for free software. Free The problem with innovation the ∫eld of innovation will be the
the problem of economics of inno- software has seen its biggest suc- doesn’t seem solvable within the failure of the proprietary. As for how
vation in free software is not just a cesses in the domain of web servic- current economical framework of much good this will bring in the
byline, but a deeply structural one. es and protocols, and with the shift competitive market. Still, one possi- Grand scheme of things, I wouldn’t
86 Every software innovation that the of the market to infrastructure, its ble solution may arise from the dare saying. 87
investor estimates may provide stra- relative value will considerably
tegic advantage will be closed (will grow. Second, and more interesting, > Ognjen StrpiÊ <
not be distributed at all, or will be is that the nature of infrastructural
distributed as proprietary software). innovation is different from the
The most pro∫table retail busi- competitive; infrastructural innova-
ness models in the software indus- tion doesn’t seek to stand out from
try are distribution of user licenses its competition, but to blend into
of proprietary software and leasing the existing frame and widen it to
resources. Therefore, the most de- the bene∫t of all.
sirable consumer software will There are serious economical and
probably stay proprietary. On the social reasons for the absence of so-
other hand, it is extremely dif∫cult cial success of free software, both in
to capitalize of innovative free soft- terms of widespread use and in
ware and it is unclear what econom- terms of innovation. The main obsta-
ical logic could surpass this prob- cle to wider use of free software is the
lem. failure of the community of its devel-
One possible, if only partial, solu- opers/users to include in their ranks
tion was offered by Nicholas Carr in more IT laymen. At ∫rst sight, it
his article IT Doesn’t Matter 10 and a seems to be a vicious circle: there will
series of later publications. Al- be more users when there will be
though Carr’s arguments do leave more of them, but it’s not really so.
much to be desired,11 and his hy- Among the IT laymen are experts in
pothesis in its most radical version ∫elds important for mass IT, experts
is most likely untenable, Carr has like visual designers, linguists, psy-
found a possible path of social suc- chologists and others. But, it is nec-
cess of free software. essary that they also ∫nd their motive
Carr’s main hypothesis is that in- for the use and development of free
formation technology reached its software, that they feel that commu-
10 Nicholas G. Carr, “IT Doesn’t Matter”, Harvard Business Review, 81(5): 41∞49, (2003). see
also: http://www.nicholasgcarr.com
11 See Hogwash Voodoo, my reserved op-ed on Carr and the future of IT (in Croatian, “Gnoj i
pakao”, Mreæa 9(3): 21 (2006).
DVDs. These systems vary, but the technologies which are
System.hack(6, employed often break the basic functionality of end-user
equipment to play the content stored on the medium. The
“protection”,“Anonymous software-only CD copy protection systems proved to be trivi-
al to circumvent, while the alternative strategies modifying
the CD data format inevitably lead to complaints from the
∞ CD Protection Kit [marker public because incompatibilities with CD and DVD players.
However, the earlier generations of copy protection
/ shift key]”) measures proved to be even more trivial ∞ they became fa-
mous for being easily circumvented with a marker pen, by 89
drawing a tangential line on the rim of the visible edge of
audio data.
These systems rendered CDs incompatible with most
computers. Although this effectively prevented copying in
many PC con∫gurations, it also reportedly caused incom-
patibility with some DVD players, video game systems, and
car CD players. Such perfect compatibility can only be
achieved by leaving the standard CD audio portion of the
disc unprotected, so MediaMax uses another method to

> Hackers can be placed into two groups with respect to


their ethics: while the ∫rst group creates patented sys-
tems and protection mechanisms, the other group tries to
block PC-based copying.
In 2001 Sony, for instance, applied to its CDs Key2Audio
system a technology preventing the copying or ripping tracks
circumvent them. While the ∫rst group is corporate-orient- into MP3 ∫les on personal computers. Technological music
ed, other group is activist. Ever since the potentials for copy- CD copy protection systems such as Key2Audio or Cactus
ing created by digital technologies have started to challenge Data Shield 100/200 can be defeated by a marker pen or sticky
the intellectual property regimes, the music, ∫lm and enter- tape. The rim of the visible edge of audio data is protected
tainment industries have gone to extreme lengths to make disabling the copying and playing on a PC. By covering this
the legal protection measures severe, to introduce techno- outer edge the protection can be circumvented and the disc
logical copy protection measures and to criminally prose- enabled for normal use on computers.
cute until recently legit practices of studying and circum- In 2003 SunnComm created a system, called MediaMax
venting such technological means of controlling intellectu- CD3, designed to prevent unauthorized copying of audio
al property. The knowledge driven by curiosity to explore CD-s on a PC. Discs manufactured with SunnComm’s tech-
the technological systems of control has become outlawed nique included two versions of the music, each protected in
knowledge, and the hackers have been ostracized as dark a different way. One set of songs were CD audio tracks that
characters commanding the knowledge the state apparatus play in standard CD players but were supposed to be dif∫-
and companies would like the society to entrust only to cult for computers to copy. The second set are compressed,
state apparatus and companies. encrypted Windows Media ∫les that employed digital rights
This exhibit deals with the CD/DVD copy protection management (DRM) ∞ technological means of enforcing
systems and the trivial techniques that can be used to cir- copyright ∞ to restrict how they are used.
cumvent them. These systems rendered CDs incompatible with most
The technological CD/DVD copy protection systems are computers. Although this effectively prevented copying in
mechanisms preventing the users from copying CDs or many PC con∫gurations, it also reportedly caused incom-
patibility with some DVD players, video game systems, and possible to watch DVDs, DeCSS had to circumvent the pro-
car CD players. Such perfect compatibility can only be tection system used on DVDs, which didn’t have open speci-
achieved by leaving the standard CD audio portion of the ∫cations available to the free software community. Soon af-
disc unprotected, so MediaMax uses another method to ter the DeCSS code was published, DVD Copy Control Asso-
block PC-based copying. ciation and Motion Picture Association of America pressed
Soon after the ∫rst disc with MediaMax CD3 protection charges against Johansen. After 5 years of court litigation he
was released, John Halderman, a graduate student from was acquitted.
Princeton, published on his web site an academic paper an-
alyzing SunnComm’s protection method and how easy it
90 can be circumvented ∞ by holding down the shift key. This 91
method was ∫rst applied on an Anthony Hamilton album
released by BMG.
Under usual circumstances, whenever the Hamilton al-
bum would be played in a computer CD player on a Win-
dows machine, it would auto-run the anti-pirating software
disabling copying or ripping into MP3 format. However,
holding down the shift key when inserting the CD would
prevent the Windows auto-run from running the copy pro-
tection software, allowing for the music to be copied.
After Halderman published his paper, SunnComm
pressed charges against him, citing the Digital Millennium
Copyright Act which prohibits exploring and publishing of
digital rights management circumvention methods. Howev-
er, SunnComm soon after droped the charges.
End of 2005 Sony introduced the Extended Copy Pro-
tection, the infamous Rootkit, on its CD. The system would,
without informing and seeking permission, install on the
user’s computer software which was vulnerable to worms
and trojans. After Mark Russinovich revealed on his blog
the analysis of Sony’s illegal software and drew attention to
user privacy violation through the application of this DRM,
the pioneer cyber-rights organization Electronic Frontier
Foundation initiated a civil lawsuit and criminal investiga-
tion forcing Sony to offer an uninstaller, and eventually to
recall the CDs and bargain the settlement.
The most famous DVD copy protection circumvention
case was created by DeCSS, a software created in 1999 by the
Norwegian hacker Jon Lech Johansen in order to enable
playing of commercial DVDs, copy protected through the
Content-Scrambling System, on free operating systems
such as BSDs or GNU/Linux, on which, prior to that, it had
been impossible to watch DVDs. But, in order to make it
System.hack(6,“protection”,“Anonymous ∞ CD Protection Kit were the most successful in the mar- tion of collaboration with its envi-
[marker / shift key]”) ketplace. Or alternatively, of the Few ronment, and unique functionality
exotic leaders (of something) or of and novelty that an organism intro-
the Few convicted for cyber-crime. duces into an ecosystem is insepa-
Hackers can only laugh out Just as market logic has not been
capable of presenting a communi-
rable from its capacity for collabo-
ration. Even in the case of apparent
loud ;) ty, culture (or ultimately a product)
without a brand, a model-∫gure or
superiority and innovation, if the
solution/new organism seeks a rad-
a logo, it is also under-capacitated ical recon∫guration and reposition-
92
> Society likes to create heroes,
just as it likes to ∫nd someone
to stigmatize in order to shift the fo-
Market logic is the last instru-
ment (on the list) one should resort
to when analyzing and trying to un-
for evaluating and analyzing the cri-
teria of success of that community/
culture. One frequently employed
ing of the entire ecosystem, it is un- 93
likely that such a solution will meet
with the approval, acceptance and
cus from the traumatic spots it derstand the hacker community criterion for evaluating the hacker adaptation by the system of such a
doesn’t want to face. Hackers are and hacker culture. Just as hacker community is the quantity of inno- radical innovation.03
just made for both. culture takes the last on the list to vations it has produced. Naturally, The innovation criterion is limit-
When an intrusion into a foreign be the nearest to the ∫rst in the op- the prerequisite for this criterion is ed and produced by the interpreta-
military system can serve to raise posite direction, the market logic a comparison with non-hacker, cor- tive tool of market logic, which pri-
national pride, a (usually) eyeglass- can (after all) serve as that other in- porative culture.01 marily leads to a patent certi∫cate,
es-wearing kid from the neighbor- strument to which ungraspability Every discussion on a de∫nition is almost unappliable as an evalua-
hood is quick to receive his ∫fteen and complexity of the matter stud- of innovation will quickly demon- tion criterion for production within
minutes of fame. But meanwhile ied, through its dialectics and nega- strate that it derives directly from hacker culture. Conditioned by mar-
hackers are to be feared and as such tion, can be demonstrated. the market logic and that the inno- ket logic, an innovation requires a
(meaning: as dangerous) to be stig- In order to reduce hacker culture vation is ultimately reducible to sev- very speci∫c type of product format-
matized, because hackers know to a level where it becomes compa- eral concepts and numbers: patent- ting in order for the product to be
how to and are able to control and rable to other cultures that we are ability, number of patents, break- recognized (in the marketplace) as
do everything a society would usual- familiar with today, Hollywood and through...02 Uniqueness and maxi- innovative. The hacker community
ly allow only its intelligence and the rest of the media machine had mal differentiation from anything produces libraries available to eve-
mega-corporations. We consider to invent the ‘hacker’ who can in surrounding is a prerequisite for ryone, rather than ∫nal products for
intelligence and mega-corporations mere thirty seconds, while at the recognizability and success in the end users, both in the technical and
accountable. The myth of hacker same time being additionally marketplace. metaphoric sense.
assumes a genius of evil and an un- aroused by fellatio, break into the Hacker culture is, however, much Measuring innovativity and in-
accountable one. best protected computer systems or closer to a harmonious (yet highly ventivity of hacker culture and/or
Such myths are fabricated and sus- the ‘hacker’ who (from a location in dynamic) ecosystem where every results of collaborative production
tained in today’s culture by means of Hollywood) can use a popular terres- new organism tends to ∫nd its posi- models (such as GNU/Linux, *BSDs
dominant instrument of interpreta- trial portable computer and some- 01 In parts of the text on innovation and production within hacker culture I will mostly equate
tion: market logic. Market logic sees what less popular operating system hacker culture with the FLOSS (Free/Libre Open Source Software) movement culture, which, to
representation (brand, logo, slo- to break into the alien computer sys- me, represents the best of hacker culture as a whole. This is of course not to say that hacker cul-
gan,...), competitiveness (competi- tem. And when it comes to present- ture is reducible to the Free Software Movement, and particularly not the vice-versa.
tive advantage, comparability, ...), ing the actual history of hacker cul- 02 At the Tesla Museum in Belgrade, to bear testament to Tesla’s greatness, the guides will always
stress the number of patents awarded, while (almost) never ever mentioning the word “innova-
material interest as prime motive ture the story is again a familiar and tion”.
(pro∫t) and the ultimate reducibility comparable one: (it is called) the 03 The best example of such an innovation is the bumpy road the Reiser4 ∫le system had to pass
to the measurable (number). Triumph of the Few. Of the Few who before it was included into the Linux kernel.
or other projects) must, ∫rstly, be re- of knowledge production and ex- ture to representative names is the al Rights (sic!) Management) pat-
thought through new interpretive change. Hacker culture, existing in biggest mistake that can be made ents, so the state had to come to aid
tools, where market logic would be a complex environment of knowl- from the perspective of hacker cul- with legislative restrictions such as
much more related to attention edge development and exchange, ture. All attempts so far to give a rep- DMCA and/or anti-terrorist laws.
economy, but would even then ac- knows no market mechanisms resentation of the history of hacker The state ∫nds itself threatened
count for a marginal and small part which thrive on evidencing, produc- culture in a larger cultural context by the widespread exchange of com-
of a complex reΩection on the inno- ing and sustaining scarcity. have almost regularly been a history plex knowledge on (communica-
vation and inventiveness If we The prerequisite for knowledge of failures of all such attempts. tion) technologies, the exclusive ac-
would avoid the pressure of market distribution and production is col- Anything that has a digital form or cess to which had previously se-
94 logic and the need for creating laboration, high permeability to cir- is only several steps away from be- cured its undisputed and stable po- 95
unique pop-stars in every ∫eld of culation in all directions, and unre- ing digitized falls within the domain sition of supervision, control and
human creativity, measuring inno- stricted, non-discriminatory access of tinkering and abstraction for power. Corporations ∫nd them-
vation would always have to account to knowledge resources. A better hacker community. No one knows selves threatened by the lack of in-
for traces of what inΩuenced a very position in hacker culture is given to better the digital domain than the ventiveness in discovering new busi-
‘recent innovation’ and what it was one who produces, collaborates and hacker community. Information ness models that wouldn’t be
building upon, i.e. indicate the col- shares knowledge (both new and and ideas cannot be commodi∫ed founded on the exploitation of cre-
lective nature of human creativity. In old) with others in the community. and turned into private property. ative producers and barring of end
this sense, the hacker community is A ∫rst step in hacker production They can be hidden away, guarded users from sharing products of en-
the best example how the idea of the is the production of a problem. A and encrypted, but this cannot en- tertainment or of interest. Old busi-
collective nature of creativity does concrete elegant solution to a com- sure they (i.e. ideas and informa- ness models, built on once innova-
not endanger uniqueness and crea- plex problem is only a second step tion) will stay under the veil of dark- tive technologies, together with the
tivity of each individual (hacker). (and not a necessary one). Complex ness forever. state, have now for decades been sti-
Hacker culture produces a body problems are always confronted It is this moment of victory of Ωing the introduction of new inno-
of shared knowledge which results with through employing an abstrac- hacker spirit over the interests of vative technologies. At present day
in creative and innovative hackers, tion (a metaphor). Complex abstrac- (state) control and (corporate) pro∫t they are more and more spreading
whose innovative (yet for most un- tions require a recursive approach that fuels the creation of the myth fear and panic.
noticeable) hacks make in turn the to abstraction, where those are con- about dangerous hackers who are The failure of creative (entertain-
whole (e.g. a free operating system) fronted with through employing capable of destroying the world (as ment) industry giants to ∫nd a new
much more powerful, creative and new (meta-)abstractions. we know it). United, the state and footing in the emerging constella-
innovative, and in its openness Every intriguing complex system the capital, will do anything in their tion of technology and (hacker) cul-
more ready for a repeated iteration that for any reason resists abstrac- power in order to produce more ture, shifted the primacy in the in-
of innovative hacks. tion is bound to be soon hacked by fear, uncertainty and danger 04 novative pro∫t-making industry to
Hacker culture is, unlike corpo- the hacker community and submit- around the destruction of the world spam and porno industries. Hackers
rate culture, (primarily) an ecosys- ted to further abstraction, creation as we know it. The continued status can only laugh out loud ;)
tem of knowledge and not an eco- and sharing of knowledge. quo, to a great distress of corpora- The absolute mobility of digital
nomic system of commodities. Due This kind of permanent reΩection tions, cannot be upheld by the re- information, where the price with
to the hybrid nature of free software on the reΩected creates a culture re- strictions of innovative DRM (Digit- every additional copy being made is
as information infrastructure, busi- sisting any representation, because
ness models developed which treat as soon as a representation emerges 04 This is a reference to a famous aggressive marketing strategy the IBM undertook in the 70s,
free software as commodity, but the where emphasis is placed on spreading fear, uncertainty and danger (FUD) about the compet-
it becomes merely a new trigger (and
ing product (instead of trying to show own product as being better). This is also the marketing
primary (collaborative) model of focus) of recursive reΩection. Reduc- strategy used intensively by Microsoft at the end of the 90s and beginning of 00s in its battle
production remains in the domain ing the representation of hacker cul- against FLOSS (Free/Libre Open Source Software).
tending towards zero, brings im- hension of the (no longer so new)
mense advantages for the entire hu- digital world, schizophrenically
man culture. Everyone (or at least criminalize anyone who has experi-
90% of computer users) who has enced the immense advantage of
gone through those couple of mouse hacker culture. With their innova-
clicks to access that huge quantity of tive patenting Goliaths, it is luck
human intellectual production is that there are hacks by the commu-
aware of those advantages today. nity of anonymous, for Hollywood
The state and market logic with uninteresting heroes, who reach for
96 their globally harmonized restric- a marker or a shift key to turn this
tive legal regulation of miscompre- farce into ridicule and fun.

> Marcell Mars <

You might also like