Hacker, pirates and trolls
Transcription
Hacker, pirates and trolls
Observatoire du Management Alternatif Alternative Management Observatory __ Essai The community of the free: Hacker, pirates and trolls Claudia Pöpperl 29 janvier 2009 Majeure Alternative Management – HEC Paris 2008-2009 : Hackers, pirates and trolls» – Janvier 2009 1 Genèse du présent document Cet essai a été réalisé sous la forme initiale dans le cadre de la Majeure Alternative Management, spécialité de troisième année du programme Grande Ecole d’HEC Paris. Il a été dirigé par Thanh Nghiem, professeur du cours « Métabolisme » et soutenu le janvier 2009. Origins of this research This research was originally presented as a research essay within the framework of the “Alternative Management” specialization of the third-year HEC Paris business school program. The essay has been supervised by Thanh Nghiem, (Professor in HEC Paris) and delivered on January, 29th 2009. Charte Ethique de l'Observatoire du Management Alternatif Les documents de l'Observatoire du Management Alternatif sont publiés sous licence Creative Commons http://creativecommons.org/licenses/by/2.0/fr/ pour promouvoir l'égalité de partage des ressources intellectuelles et le libre accès aux connaissances. L'exactitude, la fiabilité et la validité des renseignements ou opinions diffusés par l'Observatoire du Management Alternatif relèvent de la responsabilité exclusive de leurs auteurs. : Hackers, pirates and trolls» – Janvier 2009 2 La communauté des logiciels libres: Hackers, pirates et trolls Résumé : Dans cet essai, la communauté des hackers est examinée. Après une définition de ce que sont les hackers, nous abordons l’évolution de ce groupe en donnant des exemples illustrés. Nous décrivons le contexte actuel ainsi que les tendances évolutives de ce groupe. Nous présenterons ensuite brièvement le style de vie des hackers, avant de terminer en analysant le phénomène de « peer production » ainsi que son importance pour l’avenir. Mots-clés : Hacker, Troll, Peer Production The community of the free : Hackers, pirates and trolls Abstract : This essay represents a personal view and tries to describe the hacker community . Starting with a definition of these terms, its evolution is consecutively presented showing some illustrating examples. Furthermore, the actual context and existing transitory tendencies are highlighted, as well as the hacker lifestyle. Finally, the phenomenon of “peer production”, as well as its importance for the future is explained. Key words : Hacker, Troll, Peer Production : Hackers, pirates and trolls» – Janvier 2009 3 Remerciements I would like to thank my professor Thanh Nghiem as well as Tom Bouillut (a living example of the hacker community) and my friend Felix Husse. : Hackers, pirates and trolls» – Janvier 2009 4 Table des matières Claudia Pöpperl........................................................................................................................1 Genèse du présent document...................................................................................................2 La communauté des logiciels libres: Hackers, pirates et trolls.............................................3 Remerciements .........................................................................................................................4 Table des matières ....................................................................................................................5 Introduction...............................................................................................................................6 Partie 1.Hacker – A Definition...............................................................................................8 Partie 2.Evolution of the hacker community..........................................................................9 Partie 3.A state of transition..................................................................................................13 Partie 4.Peer production........................................................................................................18 Conclusion ...............................................................................................................................23 Bibliographie...........................................................................................................................25 : Hackers, pirates and trolls» – Janvier 2009 5 Introduction This essay is exploring a subject which so far has rarely been studied. Thorough information on this topic is hard to obtain and the main sources can be found on the internet. Yet, these sources are difficult to validate and therefore, I’d like to underline that this essay represents rather a personal opinion than a scientific study. Nevertheless, this essay is treating a subject with quite fundamental implications for the whole society. Today, we see ourselves confronted for the first time with a technology that allows spreading information at basically no costs – except the cost for equipment. This could implicate essential changes: Access to education might no longer be a question of financial means, nor of social standing. The way of learning might also be a different one since auto didacticism is fostered by this new technology. We can already observe these phenomena in the hacker society and it was therefore my concern to explore the same in order to deduct possible influences on the whole society and on our ways of creating. Once upon a time, there was a man who dedicated his whole life to overcome ignorance. His firm belief was that individuals only do wrong because they lack information, because they don’t know better. So in order to live a righteous life, he demonstrated that you first must question your knowledge and start learning. For this belief he even accepted to be executed. This individual I am describing here is no fictional character; the man I am talking about is Socrates, one of the greatest philosophers of all times and one of the first representatives of what we call “hackers” today. To associate Socrates with the expression “hackers” might be a bit surprising since in the mind of the general public, hackers are pirates, irresponsible computer geeks and a real threat to today’s society. Movies like “Wargames” and personalities like Karl Koch, alias Hagbard Celine who tried to sell information he had obtained illegally through hacking to the KGB, or Kevin Mitnick, the world famous cracker, have contributed to create this negative image. Without doubt, personalities like these are part of the hacker community, but the concept of “hackers” is broader. It is not necessarily negative, nor positive. In this essay, I will first have a closer look at what we call hackers and I will try to give a more accurate definition for this term. Secondly, I will try to show where hackers come from, : Hackers, pirates and trolls» – Janvier 2009 6 how this movement evolved over time in order to illustrate the motivation behind the concept. The next step will be to describe today’s situation, how things are changing and what role hackers may take in this world. And finally, I will examine something called peer production, a derivate of the hacker ethic, and its impact on the future. : Hackers, pirates and trolls» – Janvier 2009 7 Partie 1. Hacker – A Definition Looking up the term “hacker” on the internet within my research led to a variety of confusing concepts and names which describe all kinds of special subcultures. You can find any expression linked to the subject, from script kiddies to black or white hats, i.e. “the good and the bad” hackers. So in order to define hackers, let’s first try to identify the smallest common denominator of all the existing descriptions. Consequently we will see that hackers are extremely curious individuals who are looking for knowledge, who want to understand and are destined to create. They look for an intellectual challenge, they want to experiment and they are fascinated by innovation and technology. The field of expertise they want to explore might be the latest technology, but it might as well be the field of social studies. The aim is to appropriate oneself a particular knowledge and then to use it in order to gain peer respect. Their culture is deeply anchored in science fiction and the world of role plays. In these fictional worlds, they can fully develop their imagination, they can be whoever they want to be and even though certain rules exist, there are no such boundaries as those we are confronted with in our society. This influences the main credo that all hackers share which states that all information should be available to everybody, hence every individual should be able to decide for itself if it wants to access a piece of information. In a world where elites decide what kind of information is available to which person, this credo provokes confrontation. But I will deepen this problematic at a later point of this essay. Given this definition we will now examine history in order to identify famous hackers and trolls and to follow the evolution of this term. : Hackers, pirates and trolls» – Janvier 2009 8 Partie 2. Evolution of the hacker community As already mentioned in the introduction, one of the first hackers in human kind history was Socrates. Not only did he advocate the search for knowledge, he also rebelled against prevailing structures limiting access to knowledge. In ancient Greek society, education and therefore knowledge, was limited to the people who had a certain position in society and the money necessary to pay tutors and teachers, the Sophists. Socrates opposed these methods as well as the idea of paid education, and he regarded the knowledge the Sophists taught as being superficial. He claimed that a perpetual search for knowledge and truth was the only way to live up to the moral obligations human beings have. This claim influenced his method of teaching, which actually was not so much a way of teaching somebody, but rather the collective questioning of existing knowledge or what was thought to be knowledge. This technique, the Socratic dialogue, aimed to evaluate how much an individual actually knows, where knowledge has to be improved and finally to foster peoples’ modesty and to clarify that it's all about "learning to learn".1 Another philosopher one can mention in this context is Immanuel Kant, one of the founding fathers of the German “Aufklärung” who lived more than 2000 years after Socrates. Like his predecessor, he embraced the idea of developing knowledge through constant questioning. Furthermore, he demanded the emancipation of the human being in the field of knowledge where the individual should dare to know, as he put it.2 Of course, I am well aware that these are only two brief examples of a variety of representatives of the hacker spirit before the upcoming of telecommunication technologies, but I chose them specifically to underline some of the most important philosophical aspects of the hacker ethic. 1 Skills, Socrates and the Sophists: Learning from History Author(s): Steve Johnson Source: British Journal of Educational Studies, Vol. 46, No. 2 (Jun., 1998), pp. 201-213 Published by: Blackwell Publishing on behalf of the Society for Educational Studies 2 Kant and the End of the Enlightenment in Prussia Author(s): Steven Lestition Source: The Journal of Modern History, Vol. 65, No. 1 (Mar., 1993), pp. 57-112 Published by: The University of Chicago Press : Hackers, pirates and trolls» – Janvier 2009 9 With the upcoming of the telecommunication technology, notably the telephone, the world entered a new era, globalization became more tangible and people all over the world were just a phone call away from each other. It was the beginning of a time of easy information exchange which should find its consecutive continuation in the invention of the internet. In the 1950s this technological development provoked the appearance of a group of people who can be considered the inspiration and forefathers for today’s hackers, the phreakers. Phreakers developed methods to infiltrate the telephone network which therefore became for them a place to meet like-minded people. Probably the most famous representative of these phone phreakers is the notorious John Draper, alias Captain Crunch, who demonstrated the use of a simple gimmick sold with a cereal brand that allowed manipulating and entering the telephone network. But creating technological devices, like the notorious blue box, in order to hack the telephone network was only one part of phreaking. Additionally, this movement gave rise to a technique that one might even call the “art” of social engineering as phreakers accessed crucial, mostly confidential information by interacting in a manipulative way with their conversational partner on the phone. So when phreaking became known to the public through an article written by Ron Rosenbaum in the early seventies, it caused enormous paranoia, especially regarding the latest political incident, the Watergate scandal. This set an end to phone phreaking, but could not avoid the rise of another group, the hackers.3 To understand the hacker movement, one first has to remember the computer technology’s origin. The first computers were constructed in the context of war like the famous ENIAC, a computer weighing over 30 tons which had been constructed on 14th February 1946 by John Atanassof, professor at the State University of Iowa. Another famous example is the electronic device “Colossus” which had been created in 1942 during the Second World War by the British secret service in order to crack the communication code of the German military.4 They were impersonal, hard to understand and not to be touched. But when Steve Wozniak, the co-founder of Apple computers, read the article about phreaking mentioned above in the 1970s, things were about to change. More and more people, may it be at Massachusetts Institute of Technology (MIT) or in the famous Homebrew computer club, a gathering of people interested in technology who tried to develop practical and accessible 3 http://www.dailymotion.com/video/x1mez1_history-of-hacking-1-of-3_tech http://www.dailymotion.com/video/x1mf0k_history-of-hacking-2-of-3_tech, visited Saturday, 3 January 2009 4 « Il y a 50 ans, l'ordinateur » by Marie SANZ, published on 14 février 1996 in the ORIGINE-DEPECHE: WASHINGTON : Hackers, pirates and trolls» – Janvier 2009 10 computers and software, and used the club as a place to exchange ideas and to help each other with problems occurred during the developing process5, started to explore computers adapting it to their needs and therefore democratizing computer technology. Technology became accessible to the public and as a consequence, the hacker community grew steadily. During this time of innovation, another tendency became visible. Some computer geeks started to realize the business potential behind their activity and tried to sell the software they came up with. As a result, they opposed the hacker community which they considered as competition and thieves since the geeks did not have the same philosophy of non existing property of ideas6. This led to several confrontations between them and hackers, one famous example being a letter from Bill Gates, one of the founders of Microsoft, addressed to the Homebrew computer club. In this letter, Bill Gates accused the members of stealing his ideas, an understanding that the hacker community did not share. The hacker society evolved over time and gave rise to such remarkable personalities like Richard Stallmann, a researcher at the artificial intelligence laboratory at MIT who started the Free Software Foundation and who is a passionate advocate of the concept of copy left, something we will explore in more detail later on, or Mitch Kapor, the famous author of “Lotus Software”. These two personalities are representatives of two different current tendencies in the hacker community: The former advocating the complete liberation of information in order to achieve an educational goal, the latter movement consists of hackers who rather posses an entrepreneurial spirit and favour a certain extent of confidentiality of private information in order to avoid manipulation. Even though these two tendencies contradict themselves in certain points, they both stand for the liberation of general, public information. This also involves software and the information included in the program’s object code. So far, I have only listed bright and righteous examples of hackers. But in order to reflect the whole truth, I also have to portray those who fell for the "dark side", the pirates. Two famous examples I’d like to mention here, are Karl Koch and Kevin Mitnick. The former sold information he had obtained infiltrating computer systems to the KGB, the latter was the most wanted computer criminal in the late 1990s due to his social engineering and computer 5 http://www.atariarchives.org/deli/homebrew_and_how_the_apple.php, visited Friday, 20 March 2009 Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility Author(s): Gary R. Ignatin Source: University of Pennsylvania Law Review, Vol. 140, No. 5 (May, 1992), pp. 1999-2050 Published by: The University of Pennsylvania Law Review 6 : Hackers, pirates and trolls» – Janvier 2009 11 cracking activities. Why some hackers decide to use their abilities in a malicious way, is a difficult question. Of course, one might argue that they see themselves as outlaws in an artificial world they try to conquer like the Wild West. However, I personally believe that the choice to use your knowledge for criminal acts depends almost completely on a being’s personality. But as I progress with this essay, I hope to give more indications to answer the question mentioned above. In the following part, I will describe the actual situation today, i.e. the legal situation for software development, the changing partition of power, as well as an exemplary lifestyle of a hacker I have interviewed. : Hackers, pirates and trolls» – Janvier 2009 12 Partie 3. A state of transition Today, the people we call hackers are mainly developers of free software. Yet, this term can be used for people being active in so many other fields, like social sciences, arts or research – just to name a few possibilities. As shown above, the definition given here is quite broad. Nonetheless, we will now have a look at hackers being active in the field of software development. Their software is special insofar that you can study it, modify it and copy it (sometimes with certain restrictions). Free software is embracing a new concept of sharing ideas which conventional software does not and represents therefore a break with established norms. Legislation regarding conventional software and the intellectual property associated with it is a quite complex topic. When computers and corresponding software came up, legislators had to decide how exactly to protect such items and what jurisprudential concept to use. In order to give an incentive to continue creating and innovating, most governments decided to apply the concept of copyright. This concept is usually applied to literature and written work, whereas technology usually is covered by the concept of patents. The reason for choosing copyright as a legislative frame might be the artistic character of producing software. Furthermore copyright legislation is supposed “to foster the growth of learning and culture for the public welfare, and the grant of exclusive rights to authors for a limited time is a means to that end."7 Within this legal framework, ideas as such are not protected, but only the way they are expressed. So theoretically, a software developer who wishes to develop a program which is compatible with existing prevalent software, i.e. to use a common structure in order to enable exchange between these programmes, can access to the idea behind the existing software and adapt his work to it. In practice, however, it is only possible to access the idea behind software via something called reverse engineering, a method to translate the unreadable binary code of which software is composed. Yet ironically, this procedure is considered to be copyright infringement. So practically, copyright applied as in the case of software is overprotective and 7 Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility; p.17; Author(s): Gary R. Ignatin Source: University of Pennsylvania Law Review, Vol. 140, No. 5 (May, 1992), pp. 1999-2050 Published by: The University of Pennsylvania Law Review : Hackers, pirates and trolls» – Janvier 2009 13 therefore harmful to the actual idea behind it. This fact has led to a market situation where only a few big actors have real influence. Their products have become a standard that clients follow because they want to ensure the compatibility with a maximum possible of other additional products on the market. Of course, this development did not foster, but actually harm innovation. Hackers oppose the idea of copyright since it is incompatible with their credo of free access to information. They - in particular Richard Stallman and his Free Software Foundation - advocate another solution, the concept of copyleft which enables modifications and distribution of software as it is classified as a public domain. As a consequence, the rule of copyright becomes more and more questionable and the success of the copyleft concept among software developers starts to become evident. Currently, about 80% of the projects distributed via Sourceforge, a large Open Source applications and software directory on the internet, are under the copyleft license.8 A reason for this success is certainly the prevailing mentality amongst software developers, but also the enormous costs associated to defend one’s copyright. In an interview conducted with a representative of the hacker community, he explained that legal prosecution is only logical if there is a lot of money at stake. Moreover, he stated that it is really hard, almost impossible to prove implementation of reverse engineering to an extent big enough to be considered copyright infringement. So de facto, copyright is rather a mean to threat and hardly ever applied. As we have seen, the legal perspective of software and its development are in a state of transition. But is this the only change that is taking place? If you have a look at our society, you can see that from its beginning, a strong hierarchy determined every day’s life. Social status determined a citizen’s rights, his way of living, the choice of sources of income and even who to marry. As I have illustrated already, this sociological and political structure existed during ancient times, but if you have a closer look, you’ll see that it actually is still in place today despite the emergence of democracy. Even though we have the concept of equal rights, it is still a small group of persons, the so called elite, which is in fact leading the world, not the people. Let’s just have a look on a paper released by the U.S. census bureau in august 2008, called “Income, Poverty and Health Insurance Coverage in the United States: 2007” 8 http://www.freesoftwaremagazine.com/columns/copyleft_has_no_impact_project_activity, visited Tuesday, 27 January 2009 : Hackers, pirates and trolls» – Janvier 2009 14 which is one of the current population reports.9 Here, you can see that “[t]he official poverty rate in 2007 was 12.5 percent” and that “[a]t 8.2 percent, the 2007 poverty rate for nonHispanic Whites was lower than the rate for Blacks and Asians—24.5 percent and 10.2 percent, respectively.” To measure the depth of poverty the “Income-to-poverty ratio” is used, “a percentage that compares a family’s or an unrelated individual’s (people who do not live with relatives) income with their poverty threshold.” And this ratio indicates quite obliviously that not only is the percentage of people suffering from poverty in the United States in not negligible, but also that the poverty becomes more and more intense. 10 So already the income discrepancy becomes more and more evident. But due to this fact, the access to higher education – which in so many states you have to pay for - is also limited to only a small group of people. Of course, one might easily argue that the difference in income is easily compensated by the amount of scholarships proposed. Here again, we can consult the statistics, this time published by the U.S. Department of Education in their “Mini-Digest of Education Statistics 2008”.11 Here, they show that even though “[t]he percentage of American college students who are minorities has been increasing[, it is still only ]32 percent in 2007.”12 One has to remember that minorities includes several groups, such as Hispanics, Asian and Afro-Americans who do not only represent just a small community in the United States. Of course one cannot deduct from only these numbers that social injustice is still prevailing. But if you have a look around you just cannot deny the fact that the poor population increases and that the access to knowledge is still limited to a very small group of people. And naturally this also has consequences for the world of business. In companies, strong hierarchies are prevailing and rules frame every single action taking place there and of course your education defines one’s place in this structure. The interesting question now is who actually dictates these rules? It is evident that in conventional firms this is not object of a democratic process, but the role of the management and the entrepreneurs. For years, this way of functioning was working quite well – until we suffered an enormous shock: In the year 2007 a financial has shaken the world and finally led to an economic crisis whose dimension 9 “Income, Poverty and Health Insurance Coverage in the United States: 2007” by Carmen DeNavas-Walt, Bernadette D. Proctor and Jessica C. Smith, issued in August 2008 Seen on http://www.census.gov/prod/2008pubs/p60-235.pdf, visited Friday, 20 March 2009 10 “Income, Poverty and Health Insurance Coverage in the United States: 2007” by Carmen DeNavas-Walt, Bernadette D. Proctor and Jessica C. Smith, issued in August 2008, p. 23 Seen on http://www.census.gov/prod/2008pubs/p60-235.pdf, visited Friday, 20 March 2009 11 “Mini-Digest of Education Statistics 2008” by Thomas D. Snyder at the National Center for Education Statistics, issued in March 2009, Seen on http://nces.ed.gov/pubs2009/2009021.pdf, visited Friday, 20 March 2009 12 “Mini-Digest of Education Statistics 2008” by Thomas D. Snyder at the National Center for Education Statistics, issued in March 2009, p. 13 Seen on http://nces.ed.gov/pubs2009/2009021.pdf, visited Friday, 20 March 2009 : Hackers, pirates and trolls» – Janvier 2009 15 is yet to be determined. Right now, numerous economists are trying to explain what reasons exactly have created such an enormous impact. I don’t have the audacity to claim that I have an answer to this question. Yet, in the process of research for this essay, I began to question myself. At this time, where information is so relevant to master all challenges with which we are confronted on a daily basis, could it be possible that our old way of doing business and traditional structures are just not efficient anymore? Of course, I do not advocate a radical change of doing business here, but regarding the challenges we face in our times, is it perhaps time to treat information differently? Should we leave more space to individuals to develop their creativity? But let’s be a bit more concrete and have a closer look at an example, the software industry. Today, the need for new and more adapted software solutions becomes more and more urgent and therefore developmental periods are reduced as well. To keep up with such an intense speed is not easy for the hitherto big players like Microsoft since their organizational structure is in line with a strongly developed hierarchy because this hierarchy can be harmful as it tries to control and consequently slows down the developing process. Indicators for the shift in power in the software industry are easy to find: just remember the failure of Microsoft Vista for example. Other big companies, like Google, have recognized the importance of free software, which now represents an important part of their offer in order to overcome problems which are associated with their hierarchical structure. In this changing environment, the hackers now take a special place. With their behaviour and beliefs they exercise an important influence on today’s IT economy, and perhaps even on society, or at least on knowledge society. They already managed to transform the IT industry. They managed to decentralize existing power and introduced a new concept, the one of free software. We have already discussed the legal aspects, but the idea behind this concept is strongly rooted in the history of the hacker movement. Still today, you can find the prevailing spirit of collaboration and exchange of ideas, the same values that were at the origin of the hacker community. The advantage of free software is the fact that the resulting product is not only more adapted to customer needs, as it is highly individualized depending on personal requirements. This, however, guarantees a : Hackers, pirates and trolls» – Janvier 2009 16 minimum risk of virus infiltration since a virus is normally designed to infect a large amount of computers, i.e. standard software. In this context it might be interesting to have a closer look at those specimen called hackers in order to get a more complete picture of what we actually talk about and to understand how important an exchange of ideas is for their culture. During my research, I conducted an interview with Tom Bouillut, an active member of the hacker community which permitted me to gain a deeper inside in this world. When I first chose this topic, I associated hackers with the romantic image of cowboys who live in a new world, where conventional rules hardly apply. I then discovered that a life of a “professional” hacker - as I have interviewed somebody whose profession is software development - is yet different: those who have managed to become freelancers can organize their schedule themselves, they receive the whole value added created during their activities, they are contributing depending on their motivation and most of them perceive software development rather as a passion, not as a job. As stated in an interview I have conducted, the process of developing something is an art, where the ultimate goal is producing something beautiful. For this, they work together, they are not, as one could imagine, lonely artists. Even though, they are not necessarily living close by, the fact that the only things they need to work are their notebooks, telephones and an access to the internet, allows them to communicate easily among each other in order to solve problems that occur during the creation of free software or just to find new ideas. Furthermore, this strong community helps them to keep their clients loyal who on the other hand address them because of their reputation and because of the fact that most hackers share clients and project development as a group, so they hardly encounter any commercial costs. These conditions allow hackers to develop the extent of creativity which is essential to foster innovation and which are easily compatible with their beliefs. : Hackers, pirates and trolls» – Janvier 2009 17 Partie 4. Peer production As we now have tried to illustrate how hackers live, what their philosophical inspiration is and how society and the IT industry are changing, we will now have a closer look at a phenomenon which has occurred as a logical consequence of the hacker mentality: peer production. The idea of information liberalization has reached society as we have seen. Here, we do not talk about software development any more, but rather of collaboration using the internet. As mentioned in the introduction, human kind is for the first time confronted with a medium which does not generate exorbitant costs, which enables the exchange of ideas (one of the cornerstones of the hacker spirit) and which creates a whole new way of learning. Hence, this medium combined with conception of free information and creation through cooperation has lead to what will now be described in more detail. The most famous example for a peer production is the online encyclopaedia Wikipedia that is a project of the non-profit Wikipedia foundation. Here, over 12 million articles “have been written collaboratively by volunteers around the world, and almost all of its articles can be edited by anyone who can access the Wikipedia website”13, except for some countries where the Wikipedia website is blocked. But Wikipedia is only one of numerous examples of peer production even though it might be the one that attracts the biggest attention of the general public. Another interesting and perhaps more illustrating example is Nasa Clickworkers, "an experiment that showed that public volunteers (clickworkers), many working for a few minutes here and there .. . can do some routine science analysis that would normally be done by a scientist or graduate student working for months on end.” 14 To be more specific, the Nasa Clickworkers project is conducted via a website on which volunteers from all over the world are encouraged to spend only short amount of time in order to “mark craters on maps of Mars, classify craters that have already been marked, or search the landscape of Mars for "honeycomb" terrain”.15 The astonishing result of this project was that “[i]n its first six 13 http://en.wikipedia.org/wiki/Wikipedia, visited Wednesday, 28 January 2009 Coase's Penguin, or, Linux and "The Nature of the Firm" Author(s): Yochai Benkler Source: The Yale Law Journal, Vol. 112, No. 3 (Dec., 2002), pp. 369-446 Published by: The Yale Law Journal, Company, Inc.; p. 384(17), 15 Coase's Penguin, or, Linux and "The Nature of the Firm" Author(s): Yochai Benkler Source: The Yale Law Journal, Vol. 112, No. 3 (Dec., 2002), pp. 369-446 Published by: The Yale Law Journal Company, Inc.; 14 : Hackers, pirates and trolls» – Janvier 2009 18 months of operation, more than 85,000 users visited the site, with many contributing to the 1.9 million entries recorded (including redundant entries of the same craters used to average out errors)”16 So apparently the motivation to participate was given amongst volunteers. Furthermore, the quality which resulted from these six months is surprisingly high as “the automatically-computed consensus of a large number of clickworkers is virtually indistinguishable from the inputs of a geologist with years of experience in identifying Mars craters.”17 But how is this possible in our society where rules and obligations or financial incentives are the most common way to ensure collaboration, and where intrinsic motivation is still considered insufficient without the complementaries of financial stimulus? And how come that quality can be kept at a certain level? Conclusively, we encounter the following main issues which peer production has to manage in order to be successful: 1) Motivation: How can you motivate people to work for free when afterwards they are not able to appropriate the results and benefits? 2) Organization: How should a project be organized so that resources are used efficiently if none of the members has the power to control collaboration? 3) Quality: How can you ensure integration of good contributions at low costs and how can you filter out bad ones? I will therefore try to answer these questions, mainly based on Yochai Benkler’s analysis of these problems in his essay “Coase's Penguin, or, Linux and "The Nature of the Firm"”. The questions that are displayed here necessitate a closer look at human nature. Human beings are creative: they like to create, construct and solve problems. However human beings often lack patience, so their creative urge is naturally quite short unless motivational factors can prolong the phase of interest. This theory can be easily illustrated by the example of a person trying to solve a riddle. The first hours, this person might be extremely passionate and 16 Coase's Penguin, or, Linux and "The Nature of the Firm" Author(s): Yochai Benkler Source: The Yale Law Journal, Vol. 112, No. 3 (Dec., 2002), pp. 369-446 Published by: The Yale Law Journal Company, Inc.; p. 384(17), 17 Coase's Penguin, or, Linux and "The Nature of the Firm" Author(s): Yochai Benkler Source: The Yale Law Journal, Vol. 112, No. 3 (Dec., 2002), pp. 369-446 Published by: The Yale Law Journal Company, Inc.; p.384(17), : Hackers, pirates and trolls» – Janvier 2009 19 even enthusiastic. After a while however, if she or he doesn’t see any advancement, the being can easily become discouraged. But when you have peer production, there are only limited motivational factors: you do not get pay for your work; you are only one amongst many contributors and your work can be modified, which means that the outcome of your work is not your property. So how do projects like the NASA clickworkers overcome this disadvantageous situation? If you go on the website and have a closer look at it, you will see that marking a crater only takes about five minutes, a time slot short enough to ensure sufficient motivation. As a conclusion one might draw that in order to guarantee peer production, you have to break down a task into small modules, i.e. components which should be as small as possible. This guarantees that participants only have to sacrifice a short amount of time which avoids a negative, tiring association affiliated with the project. Another important aspect which has to be taken into consideration is the different motivational levels of volunteers. Not every individual displays the same amount of devotion to a task and therefore the size of the mentioned components has to vary in order to adapt to every individual’s willingness to work. In the Clickworkers project for example one can choose how many craters he wants to mark, how much time one invests in this activity. So the contributors can adapt their workload to their motivational level and their schedule – a fact that guarantees a lot of freedom in their way of working. But the granularity of tasks, as Benkler puts it, also helps to answer the second question. Just imagine you have a variety of components from which you can choose. Your personal choice will of course depend on your motivation, but also on your capabilities, or to be more precise on your own evaluation of your capabilities. In companies or markets, this process of evaluation is up to a second person who is going to judge your inner motivation and capabilities based on criteria that are visible to the outside environment. But all criteria not visible to the outside world, but kept inside of a person, are neglected so that the result of such an evaluation is not necessary valid. On a long run, an assignment based on personal evaluation, i.e. a democratisation of task assignment will probably lead to better results. This also overcomes the problem of dilution of power in such a project, since every individual has to power to decide in what form and to what extent it desires to participate. But all the statements made so far are based on a postulate which so far has not been mentioned concerning the second resource used in existing peer production, the first one being human creativity. This resource is a special one and has an extremely important role in : Hackers, pirates and trolls» – Janvier 2009 20 our society, it is information. Its nature is insofar particular since information is nonrival 18, which means its use does not imply its consumption, it can even be used at the same time by several persons. Naturally, this is an extremely important premise to ensure that this special form of task assignment can actually work because it spares the necessity to include the assignment of information into his considerations. The efficient distribution of an additional resource would in fact necessitate somebody to coordinate, which is not the case when human creativity is the only factor to think about. Finally, to solve the third problem stated above, it is advisable to facilitate tasks, make them easy to integrate in their construction and to install a mechanism to sort out qualitatively inferior contributions. This mechanism can take two different forms. Either one uses the mean of results which perquisites a certain redundancy as in the case of the clickworkers. Here, craters have been marked several times by different volunteers in order to average out flawed contributions. The other option is peer monitoring as carried out in other peer production projects. In this case volunteers get to edit their collaborators’ work. This option can be quite refined to the extent where ratings of volunteer’s work can be adopted to create peer pressure due to recognition. For example, if I know that my work will be graded after it has been displayed, I will necessarily put more effort into it. And even if this incentive fails to promote quality, the rating will still make it possible to identify bad work or even qualitatively bad participants in the project. This way of production is clearly rooted in the Hacker mentality which encourages collaboration without hierarchical structures and puts a strong emphasis on recognition from peers. Nevertheless, there are some limits to this way of group effort. As we have already seen, the possibility of fractioning a project and the nonrival nature of information are two important conditions for the success of such an endeavour. Additionally, another prerequisite is indispensable to foster such collaboration. Since volunteers are not supposed to appropriate the profit resulting from their activity, it is necessary that nobody else does as well. If one of the actors in the project tries to monopolize the project, it will immediately lead to a decline in motivation amongst the other participants. 18 Coase's Penguin, or, Linux and "The Nature of the Firm" Author(s): Yochai Benkler Source: The Yale Law Journal, Vol. 112, No. 3 (Dec., 2002), pp. 369-446 Published by: The Yale Law Journal Company, Inc.; p. 377(10), : Hackers, pirates and trolls» – Janvier 2009 21 The same decline in motivation will occur if the project inscribes itself in a business framework, which means that results are used to achieve a profit by its initiators or administrators. : Hackers, pirates and trolls» – Janvier 2009 22 Conclusion As we have seen now the model of peer production, how it functions, what has to be ensured in order to guarantee that it will work, we also have to admit that it is not applicable to every sort of project. But could it still revolutionize our way of producing value? Or more daring - is this even an indicator for the change in our society? One of the major keys to a better life is education, but so far, this key has mostly been in the hands of those who actually already are in a good position. Until the rise of the internet and its various applications, one always had to pay for information, so basically the basis for education. Information was conceived as a good which should only be consumed by the few who could afford this. This, however, is completely against its nature since information is nonrival Moreover, it is also completely against a fundamental right every single one of us has, the right to learn. In a society where we claim to respect human rights, can we really think that we can neglect the right to learn and the free access to knowledge? Isn’t it knowledge which makes us become better, more fulfilled human beings as Socrates suggested it? So if we know that due to the internet, information can be spread at basically no costs and if we know that due to movements like peer production the exchange of information is even more facilitated, is it too daring to imagine that education is entering a new era? If someone on the other end of the world can explain how to analyse a problem, how to even solve it – and this only thanks to the fact that this person and you can communicate via the internet at very low costs, isn’t it possible to imagine that more and more people will use this possibility in order to educate themselves? Can education actually turn from a privilege into a right which everybody can exercise? The answer to this question could be a yes, but one should not neglect the threats to this movement. Quite recently we have witnessed how governments have tried to censor contents which could be disadvantageous for their purpose: May it be China, who tries to silence critical voices on its policies, or Burma, which tries to avoid involvement of other states in its inner politics by controlling what kind of image of its government is transmitted via the internet, censorship is not something unusual, even at the age of internet. : Hackers, pirates and trolls» – Janvier 2009 23 But censorship is never something which cannot be circumvented. There is always a way to get hold onto information. A bigger threat to this whole educational revolution is of another, more subtle kind. When we transmit knowledge, we also always transmit values, ideas and basic convictions which influence our way of seeing things. If someone is a firm believer in democracy for example, he or she will defend his convictions and therefore interpret facts in a way that they will strengthen his beliefs. And if asked to explain a problem linked to this topic, it is just natural that he or she will pursue an argumentation favourable to his or her cause. So if we access information on the internet, it should be our natural reflex to question this information, to ask ourselves what ideas and values are linked to it and if these values are compatible with our own values, ideas or if perhaps they challenge our beliefs. However, this questioning is not necessarily a reflex for someone who has never been confronted with this kind of duty, who is not what I have described as a hacker. But how can someone in this position learn how to analyse what might be called meta-information? Since the internet is a great, yet rather impersonal source of information, this task can be quite a challenge. Yet again, I would like to point to the previous chapter of peer production where reputation and peer control help to sort out such a problem. Nevertheless, a consumer of information has to be careful in this case since it might as well be the case that the publisher of information and his peers might just share the same convictions, values, ideas, or whatever you may call this. So, as a consequence, the constant questioning of what we seem to know and the motives behind displayed information cannot only be left to the internet, but should be something that our environment fosters. Yet again, who exactly is this environment? It is our family, our teachers, our professors, the educational system. I therefore advocate adapting our existing educational system to these needs. We should not only be taught facts, but rather should we be guided in our process to develop a critical and questioning mind which will enable to use the internet in a prosperous and positive way. Only if we learn about the fragile character of information, we will be able to profit from this abundant source of information, the internet. We should all embody the hackers’ spirit, this rebellious quest for truth implicating a constant questioning of facts and rules so that we can start learning and consequently become better human beings. : Hackers, pirates and trolls» – Janvier 2009 24 Bibliographie Articles: Skills, Socrates and the Sophists: Learning from History Author(s): Steve Johnson Source: British Journal of Educational Studies, Vol. 46, No. 2 (Jun., 1998), pp. 201-213 Published by: Blackwell Publishing on behalf of the Society for Educational Studies Kant and the End of the Enlightenment in Prussia Author(s): Steven Lestition Source: The Journal of Modern History, Vol. 65, No. 1 (Mar., 1993), pp. 57-112 Published by: The University of Chicago Press Coase's Penguin, or, Linux and "The Nature of the Firm", Author(s): Yochai Benkler Source: The Yale Law Journal, Vol. 112, No. 3 (Dec., 2002), pp. 369-446 Published by: The Yale Law Journal Company, Inc. Erratum: Wizards, Bureaucrats, Warriors, and Hackers: Writing the History of the Internet Source: The American Historical Review, Vol. 104, No. 1 (Feb., 1999), p. 321 Published by: American Historical Association Review: [untitled] Author(s): Stephen Pfohl Reviewed work(s): A Hacker Manifesto by McKenzie Wark Source: Contemporary Sociology, Vol. 34, No. 6 (Nov., 2005), pp. 684-685 Published by: American Sociological Association Le prophétisme hacker et son contenu politique par Nicolas Auray Mise en ligne le vendredi 29 octobre 2004 Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility; Author(s): Gary R. Ignatin Source: University of Pennsylvania Law Review, Vol. 140, No. 5 (May, 1992), pp. 19992050, Published by: The University of Pennsylvania Law Review A Bleak First for Microsoft: Layoffs; In Sign of Deeper Recession, Tech Giant to Cut 5,000 Jobs, Peter Whoriskey and Annys Shin, Washington Post Staff Writers, 23 January 2009 The Washington Post, FINALD01, Copyright 2009, The Washington Post Co. All Rights Reserved “The Pain Begins” by Frank Hayes, published 26 January 2009 on “Computerworld” Issue: 04 (c) 2009 Wizards, Bureaucrats, Warriors, and Hackers: Writing the History of the Internet Author(s): Roy Rosenzweig Source: The American Historical Review, Vol. 103, No. 5 (Dec., 1998), pp. 1530-1552 Published by: American Historical Association : Hackers, pirates and trolls» – Janvier 2009 25 Quieting the Virtual Prison Riot: Why the Internet's Spirit of "Sharing" Must Be Broken Author(s): Albert Z. Kovacs Source: Duke Law Journal, Vol. 51, No. 2 (Nov., 2001), pp. 753-785 Published by: Duke University School of Law “Income, Poverty and Health Insurance Coverage in the United States: 2007” by Carmen DeNavas-Walt, Bernadette D. Proctor and Jessica C. Smith, issued in August 2008 Seen on http://www.census.gov/prod/2008pubs/p60-235.pdf, visited Friday, 20 March 2009 “Mini-Digest of Education Statistics 2008” by Thomas D. Snyder at the National Center for Education Statistics, issued in March 2009, Seen on http://nces.ed.gov/pubs2009/2009021.pdf, visited Friday, 20 March 2009 Pour les données consultées sur Internet Une interview de Pekka Himanen, auteur de "l’Ethique Hacker": La « hacker attitude », modèle social pour l’ère post-industrielle http://www.freescape.eu.org/biblio/article.php3?id_article=129 Publié le vendredi 25 mai 2001. Mis en ligne le mardi 6 mai 2003. Le prophétisme hacker et son contenu politique par Nicolas Auray Mise en ligne le vendredi 29 octobre 2004 http://www.freesoftwaremagazine.com/columns/copyleft_has_no_impact_project_activity, visited Tuesday, 27 January 2009 http://en.wikipedia.org/wiki/Wikipedia, visited Wednesday, 28 January 2009 http://www.gnu.org/copyleft/copyleft.de.html, visited Thursday, 29 January 2009 http://en.wikipedia.org/wiki/Hacker_(computing), visited Saturday, 3 January 2009 http://www.atariarchives.org/deli/homebrew_and_how_the_apple.php, visited Friday, 20 March 2009 http://www.dailymotion.com/video/x1mez1_history-of-hacking-1-of-3_tech, visited Saturday, 3 January 2009 http://www.dailymotion.com/video/x1mf0k_history-of-hacking-2-of-3_tech, visited Saturday, 3 January 2009 http://en.wikipedia.org/wiki/Hacker_(programmer_subculture), visited Saturday, 3 January 2009 : Hackers, pirates and trolls» – Janvier 2009 26