Post on 03-Apr-2018
7/29/2019 Revisiting the Curious World of Art Hacktivism
1/19
Revisiting the Curious World of Art & Hacktivism.Marc Garrett March 2012.
Revisiting the Curious World of Art & Hacktivism, is the first of a series of articles exploring
how contemporary artists engaged with technology and activism are transcending established
art behaviours. Crossing over into territories that reflect not only social and political contexts,
but new dialogues of experiencing and understanding art. The politics of today becomes the
background, the material and canvas of imaginative and critical play.
"It is not accidental that at a point in history when hierarchical power and
manipulation have reached their most threatening proportions, the very concepts of
hierarchy, power and manipulation come into question. The challenge to these concepts
comes from a redsicovery of the importance of spontaneity - a rediscovery nourished by
ecology, by a heightened conception of self-development, and by a new understanding
of the revolutionary process in society. Murray Bookchin. Post-scarcity and Anarchism
(1968).
7/29/2019 Revisiting the Curious World of Art Hacktivism
2/19
The rise of neo-liberalism as a hegemonic mode of discourse, infiltrates every aspect of our social
lives. Its exponential growth has been helped by gate-keepers of top-down orientated alliances;
holding key positions of power and considerable wealth and influence. Educational, collective and
social institutions have been dismantled, especially community groups and organisations sharing
values associated with social needs in the public realm. [1] Bourdieu.
In this networked society, there are controversies and battles taking place all the time. Battles
between corporations, nation states and those who wish to preserve and expand their individual and
collective freedoms. Hacktivist Artists work with technology to explore how to develop their critical
and imaginative practice in ways that exist beyond traditional frameworks of art establishment and
its traditions. This article highlights a small selection of artists and collaborative groups, whose
work is linked by an imaginative use of technology in order to critique and intervene into the
opressive effects of political and social borders.
Hacking & Cracking
In June 2000, Richard Stallman [2] when visiting Korea, illustrated the meaning of the word
'Hacker' in a fun way. When at lunch with some GNU [3] fans a waitress placed 6 chopsticks in
front of him. Of course he knew they were meant for three people but he found it amusing to find
another way to use them. Stallman managed to use three in his right hand and then successfully pick
up a piece of food placing it into in his mouth.
"It didn't become easyfor practical purposes, using two chopsticks is completely
superior. But precisely because using three in one hand is hard and ordinarily never
thought of, it has "hack value", as my lunch companions immediately recognized.
Playfully doing something difficult, whether useful or not, that is hacking." [4] Stallman
The word 'hacker' has been loosely appropriated and compressed for the sound-bite language of
film, tv and newspapers. These commercial outlets hungry for sensational stories have
misrepresented hacker culture creating mythic heroes and anti-heroes in order to amaze and shock
an unaware, mediated public. Yet, at the same time hackers or 'crackers' have exploited this
mythology to get their own agendas across. Before these more confusing times, hacking was
considered a less dramatic activity. In the 60s and 70s the hacker realm was dominated by computer
nerds, professional programmers and hobbyists.
In contrast to what was considered as negative stereotypes of hackers in the media. Steven Levy [5],
7/29/2019 Revisiting the Curious World of Art Hacktivism
3/19
in 1984 published Hackers: Heroes of the Computer Revolution [6]. In three parts, he writes about
the canonical AI hackers of MIT, the hardware hackers who invented the personal computer
industry in Silicon Valley, and the third-generation game hackers in the early 1980s. Yet, in this
publication, what has had the most impact on hacker culture and is still used widely as a guideline
by many is the 'hacker ethic'. He identified this Hacker Ethic to be a code of practice consisting of
key points such as that "all information is free", and that this information should be used to "change
life for the better".
The Hacker Ethic:
1. Access to computersand anything which might teach you something about the way the world
worksshould be unlimited and total. Always yield to the Hands-on Imperative!
2. All information should be free.
3. Mistrust authoritypromote decentralization.
4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or
position.
5. You can create art and beauty on a computer.
6. Computers can change your life for the better.
Levy's hacker ethic promotes the idea of performing a duty for the common good, an analogy to a
modern day 'Robin Hood'[ibid]. Proposing the concept that hackers are self-reliant whilst embracing
a 'healthy' anti-authoritarian stance, combined with free and critical thinking. Proposing that hackers
should be judged by their ability to hack, and presenting hacking as an art-form. Levy also says that
the Free and open source software (FOSS) movement is the descendant of the hacker ethic.
However, Levy's hacker ethic has often been quoted out of context and misunderstood as to refer to
hacking as 'breaking' into computers. This specifically prescribed role, denies the wider and creative
context of what hacking is and could be. It does not have to be just about computer security.
This leads us to 'crackers'. All crackers hack and all hackers hack. But, crackers are seen as second
rate wannabe hackers by the older generation of hackers. The Black Hat Hacker or cracker designs
7/29/2019 Revisiting the Curious World of Art Hacktivism
4/19
and releases malicious code, gathers dangerous information and brings down sensative systems. The
White Hat Hacker hunts down and destroys malicious code, and the casual hacker who hacks in
order to learn information for his or her own curiosity; both generally dislike Black Hats and
Crackers, and tend to view them as computer criminals and dysfunctional juveniles. Lately,
crackers have also been labeled as 'script kiddies'. As a kind of snobbish insult, it refers to those
who are not capable of building or programming their own tools, but tend to use scripts and
programs written by others to perform their intrusions. To add to the confusion we also have the
term 'Grey hat'. Which refers to a hacker acting between black hat and white hat. Indeed, this could
demonstrate where art hacktivists reside, challenging the trappings of the traditional concept of
goody and baddy.
"There is another group of people who loudly call themselves hackers, but aren't. These
are people (mainly adolescent males) who get a kick out of breaking into computers and
phreaking the phone system. Real hackers call these people 'crackers' and want nothing
to do with them." [7] Raymond.
"The basic difference is this: hackers build things, crackers break them." [ibid]
Raymond.
But before we judge,
let's view a snippet of the \/\The Conscience of a Hacker/\/ by +++The Mentor+++
Written on January 8, 1986.[8]
"This is our world now... the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals. We seek
after knowledge... and you call us criminals. We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals."
7/29/2019 Revisiting the Curious World of Art Hacktivism
5/19
Art & Hacktivism
The term 'Hacktivism' was officially coined by techno-culture writer Jason Sack in a piece about
media artist Shu Lea Cheang published in InfoNation in 1995. Yet, the Cult of the Dead Cow [9] are
also acknowledged as defining the term. The Cult of the Dead Cow are a group of hackers and
artists. They say the Hacktivism phrase was originally intended to refer to the development and use
of technology to foster human rights and the open exchange of information.
Hacktivism techniques include DoS attacks, website defacement, information theft, and virtual
sabotage. Famous examples of hacktivism include the recent knocking out of the PlayStation
Network, various assistances to countries participating in the Arab Spring, such as attacks on
Tunisian and Egyptian government websites, and attacks on Mastercard and Visa after they ceased
to process payments to WikiLeaks.
Hacktivism: a policy of hacking, phreaking or creating technology to achieve a political or social
goal.
"Hacktivism is a continually evolving and open process; its tactics and methodology are
not static. In this sense no one owns hacktivism - it has no prophet, no gospel and no
canonized literature. Hacktivism is a rhizomic, open-source phenomenon." [10]
metac0m.
The practice or behaviour of Hacktivism is at least as old as Oct 89 when DOE, HEPNET and
SPAN (NASA) connected to (virtual) networked machines world wide. They were penetrated by the
anti-nuclear group WANK worm.
WANK penetrated these machines and had their login screens altered to...
7/29/2019 Revisiting the Curious World of Art Hacktivism
6/19
HACKING BORDERS: Examples of Art Hacktivism & Cultural Hacking
"Radical groups are discovering what hackers have always known: Traditional social institutions are
more vulnerable in cyberspace than they are in the physical world. And some members of the
famously sophomoric hacker underground are becoming motivated by causes other than ego
gratification." [11] Harmon.
Hacktivism, exploits technology and the Internet, experimenting with the immediacy of
distributable networks as a playful medium for independent, creative and free expression. There has
been a gradual and natural shift from net art (and net.art) into Hacktivism. Net Art in spirit, has
never really been just about art being viewed on a web browser alone. Some of the very same artists
whose artwork involved being shown in browsers and making code behind the browser as part of
the art, have also expanded their practice outside of the browser. One such artist is Danja Vasiliev,
"Fifteen years ago WWW was something very new in Russia and besides the new dial-up aesthetics
and world-wide means it brought a complete new layer of existence - "netosphere", which made my
youth." Vasiliev very soon moved on from playing with browsers into a whole new territory. [12]
Danja co-founded media-lab moddr_in 2007, a joint project at Piet Zwart Institute alumni and
WORM Foundation. Based in Rotterdam moddr_is a place for artists and hackers, engaging with
critical forms of media-art practice. He collaborated withGordan Savicic and Walter Langelaar
from the moddr.net lab on the project Web 2.0 Suicide Machine, which lets you delete your social
networking profiles and kill your virtual friends, and it also deletes your own profile leaving yourprofile image replaced by a noose."The idea of the "Web 2.0 Suicide Machine" is to abandon your
http://k0a1a.net/http://k0a1a.net/http://moddr.net/http://pzwart.wdka.nl/networked-media/category/study-programme/students-alumnihttp://worm.org/http://www.yugo.at/processing/http://www.yugo.at/processing/http://lowstandart.net/http://suicidemachine.org/http://suicidemachine.org/http://moddr.net/http://pzwart.wdka.nl/networked-media/category/study-programme/students-alumnihttp://worm.org/http://www.yugo.at/processing/http://lowstandart.net/http://suicidemachine.org/http://k0a1a.net/7/29/2019 Revisiting the Curious World of Art Hacktivism
7/19
virtual life so you can get your actual life back, Gordan Savicic tells NPR's Mary Louise Kelly.
Savicic is the CEO which he says stands for "chief euthanasia officer" of
SuicideMachine.org." [13]
Just like another project called 'Face to facebook' that stole 1 million facebook profiles and re-
contextualized them on a custom made dating website (lovely-faces.com), set up by Italian artists
Paolo Cirio and Alessandro Ludovico, whom also just so happens to be editor in chief ofNeural
magazine. Web 2.0 Suicide Machine, had to close its connections down regarding its Facebook
activities after receiving a cease and decease letter from Facebook. [14]
Julian Oliverand Danja Vasiliev teamed up and formed the mysterious group Men in Grey. The
Men In Grey explore our online vulnerabilities by tapping into, intervening into wireless network
traffic. Observing, tracing and copying what we do. This hack then redisplays our activities back to
us, showing the data of our online interactions.
At first no one (except myself & a few others) knew who they were. When they first arrived on the
scene I started an interview with them and then suddenly, I was asked to hold back due to their
antics on the Internet and interventions in public environments receiving much coverage. They were
not sure how it would pan out for them. Partly due to the anonymous nature of their project, and
also because of the sudden impact of the larger hacktivist group Anonymous getting much press in
commercial media themselves.
http://www.paolocirio.net/http://www.labforculture.org/en/resources-for-research/contents/research-in-focus/cultural-blogging-in-europe/interview-with-alessandro-ludovico-neural-ithttp://neural.it/http://neural.it/http://julianoliver.com/http://meningrey.net/http://en.wikipedia.org/wiki/Anonymous_(group)http://www.paolocirio.net/http://www.labforculture.org/en/resources-for-research/contents/research-in-focus/cultural-blogging-in-europe/interview-with-alessandro-ludovico-neural-ithttp://neural.it/http://neural.it/http://julianoliver.com/http://meningrey.net/http://en.wikipedia.org/wiki/Anonymous_(group)7/29/2019 Revisiting the Curious World of Art Hacktivism
8/19
"Men In Grey emerge as a manifestation of Network Anxiety, a fearful apparition in a
time of government wiretaps, Facebook spies, Google caches, Internet filters and
mandatory ISP logging." M.I.G
"Spooks are listening into calls, just like they always have," said Eric King of London's
Privacy International, in an e-mail. "With A5/1 being brokenyou can decrypt and
listen into 60 calls at once with a box smaller than a laptop." [15]
Later they won the Golden Nica (1st prize) Interactive Arts category, Prix Ars Electronica in 2011.
In a show called Project Space -- M.I.G. -- Display of unknown, quarantined equipmenthosted at
the Aksioma Project Space Komenskega, Ljubljana 2011. The statement read:
"The particularly threatening quality of the Men In Grey equipment is its apparentlyinvasive nature; it seems able to penetrate and even hack into virtually any
electronic device in its reach. While we are all aware of the wire-tapping and data
retention done by the government (along with the spying carried out by corporations
like Facebook and Google), Men In Grey seem to operate with a range of tools and
techniques well beyond those that are currently known to be in use."
Image taken from the Men in Grey Video. 'H1606: Field Officer Protocol'.
http://www.aksioma.org/mig/index.htmlhttp://www.aksioma.org/mig/index.htmlhttp://www.aksioma.org/mig/index.html7/29/2019 Revisiting the Curious World of Art Hacktivism
9/19
Hacktivism involves many different levels of social intervention and engagement. Whether it is to
do with direct action, self-referential geekiness, obscure networked antics, crtical gaming, or peer 2
peer and collective change. Hacktivists challenge defaults put in place by other people, usually the
systms imposed upon them and the rest of us by authority. Even though the subjects themselves
may be concerning serious matters, humour and playfulness are both essential ingredients.
"A promising tactic for the early Situationists was the unpredictable yet forceful
potential of play what anthropologist Victor Turner termed the "liminoid," or the
freeing and transformational, moments of play when the normal roles and rules of a
community or society are relaxed." [16] Dovey & Kennedy.
One group crossing over from the digital into physical and social realms, isTiltfactor. [17] Their
form of intervention is not necessarily about causing political controversy, but is engaged inreaching people through games of play. Experimenting with social everyday contexts, making
games that tackle less traditional topics, such as public health, layoffs,GMO crops. One of the
many games creating awareness on these subjects, is POX"Our game actually helps a player
understand how a disease can spread from one place to another and how an outbreak might happen"
says Mary Flanagan. [18]
A local public health group called Mascoma Valley Health in the New Hampshire region of the US
approached Tiltfactor with the problem of the lack of immunization. "At first, a game about gettingpeople immunized seemed like one of the most "un-fun" concepts imaginable. But that sinking
feeling of impossibility almost always leads to good ideas later." [19] Flanagan.
http://www.tiltfactor.org/http://www.tiltfactor.org/http://www.tiltfactor.org/play-layoffhttp://www.tiltfactor.org/profit-seedhttp://www.tiltfactor.org/profit-seedhttp://www.tiltfactor.org/poxhttp://www.tiltfactor.org/poxhttp://www.mvhi.org/http://www.tiltfactor.org/http://www.tiltfactor.org/play-layoffhttp://www.tiltfactor.org/profit-seedhttp://www.tiltfactor.org/poxhttp://www.mvhi.org/7/29/2019 Revisiting the Curious World of Art Hacktivism
10/19
"Geopolitical space has always been a conflicted and fragile topic. Borders and
frontiers are changing so fast, that sometimes it seems that our sociopolitical status can
change from citizen to immigrant from one moment to another, or simply live
under the immigrant status all your life. Were getting used to words like refugees,
enclaves, war, borders, limits and the list has no end." Ethel Baraona Pohl & Csar
Reyes
The Transborder Immigrant Tool (TBT).
Ricardo Dominguez collaborated with Brett Stalbaum, Micha Cardenas, Amy Sara Carroll & Elle
Mehrmand, on (TBT) (and others), on a hand-held mobile phone device that aids crossers of the
Mexico-US border. An inexpensive tool to support the finding of water caches left in the Southern
California desert by NGOs for those crossing the border.
"The entire group of artists who are part ofElectronic Disturbance Theater 2.0/b.a.n.g. labworking
on the Transborder Immigrant Tool (TBT) was being investigated by UCSD and 3 Republican
Congressmen starting on January 11, 2010. Then I came under investigation for the virtual sit-in
performance (which joined communities statewide against the rising students fees in the UC system
and the dismantling of educational support for K12 across California) against the UC Office of the
http://bang.calit2.net/category/electronic-disturbance-theater/http://bang.calit2.net/category/electronic-disturbance-theater/http://bang.calit2.net/category/electronic-disturbance-theater/7/29/2019 Revisiting the Curious World of Art Hacktivism
11/19
President (UCOP) on March 4, 2010. This was then followed by an investigation by the FBI Office
of Cybercrimes." [20] Ricardo Dominguez.
Billboard campaign, design by Ricardo Dominguez & Amy Sara Carroll
In an interview with Lawrence Bird Dominguez discusses that the TBT is still developing as a gps
tool, but infers that it is not just a tool but also 'border disturbance art', consisting of different
nuances existing as part of a whole with other factors at play. Such as a hybrid mix of things,
objects and expressions "artivism, tactical poetries, hacktivism(s), new media theater, border
disturbance art/technologies, augmented realities, speculative cartographies, queer technologies,transnational feminisms and code, digital Zapatismo, dislocative gps, intergalactic performances,
[add your own______]." [ibid]
7/29/2019 Revisiting the Curious World of Art Hacktivism
12/19
BorderXing Guide by Heath Bunting
"Borders are there to be crossed. Their significance becomes obvious only when they are violated
and it says quite a lot about a societys political and social climate when one sees what kind of
border crossing a government tries to prevent." [21] Florian Schneider
Heath Bunting and collaborators crossing the Rhine river on self-made raft, Germany
National borders are front-lines of political and social friction. The exerience of asylum-seekers and
political migrants reflect some of the most significant issues of our time. Immigration is a toxic
issue and unpopular with voters. Bunting's BorderXing Guide, plays on the fear of invisible alien
hordes of people crossing our borders illegally.
The context of this work fits well with issues about borders, whether it is about creating borders
online or physical environments. Only those needing to cross a border are allowed access to the site,
it is limited to social clients who have a static IP (Internet Protocol) address and who, most
notably, have gained the artists confidence. Such as peer activists and immigrants using libraries,
colleges, cultural centres. The site allows those who would other wise end up crossing borders in
harmful ways, such as in containers, on the backs of (and underneath) lorries and planes.
http://irational.org/borderxing/open/http://irational.org/borderxing/open/7/29/2019 Revisiting the Curious World of Art Hacktivism
13/19
Heath Bunting's BorderXing Guide website primarily consists of documentation of walks that
traverse national boundaries, without interruption from customs, immigration, or border police. The
work comments on the way in which movement between borders is restricted by governments and
associated bureaucracies. It is a manual written not at distance like a google map, but by foot. A
physical investigation, involving actually going to these places; trying these discovered routes out
and then sharing them with others. A carefully calculated politics of public relations.
BorderXing Guide: map of journey from Krmend to Gssing. Heath Bunting.
7/29/2019 Revisiting the Curious World of Art Hacktivism
14/19
Kate Rich and Feral Trade
"The Feral Trade Caf is more than just an art space thats a working caf, its about provoking
people to question the way big food corporations operate by looking at the journey of the food we
end up scraping into our pampered bins." [22] Gastrogeek
Feral Trade uses social and cultural hand baggage to transport food based items between cities,
often using other artists and curators as mules. Feral Trade products (2003-present), alongside
ingredient route maps, bespoke food packaging, video and other artefacts from the Feral Trade
network. The goods rangefrom coffee from El Salvador, hot chocolate from Mexico and sweets
from Montenegro, as well as locally sourced bread, vegetables and herbs.
Kate Rich uses the word 'feral' as a process referiing to being deliberately wild, as in pigeon, as
opposed to romantic nature wild as the wolf. It is an unruly wild, shitting everywhere, disruption
and annoyance in contrast to 'official' human structures and connected infrastructures. Feral Trade
freight operates largely outside commercial channels, using the surplus potential of social, cultural
and data networks for the distribution of goods. Working with co-operatives, small growers andfood producers.
7/29/2019 Revisiting the Curious World of Art Hacktivism
15/19
The Feral Trade Courier is a live shipping database for a freight network running outside
commercial systems. The database offers dedicated tracking of feral trade products in circulation,
archives every shipment and generates freight documents on the fly.
Feral Trade atFurtherfield's Gallery (2009) [23]
7/29/2019 Revisiting the Curious World of Art Hacktivism
16/19
Every shipment is different and has its own story of how and where it was delivered from. Also
included is information on who the carriers are with details about producers and their local culture
as contextual information. The product packaging itself is also a carrier of information about social,
political context and discussions with producers and carriers.
Conclusion
Since the rise of the Internet individual and collective actions are symbiotically connected to the
every day. In a world transformed, common people have access to tools that can change 'our'
cultures independently; sharing information, motivating actions and changing situations. We know
of the Arab Spring, the Occupy movement, Anonymous and Wikileaks and how successful they
have been in exploiting technology and social networks. Technology just like any other medium is a
flexible material. By tweaking, breaking and remaking 'something' you can re-root it's function,
change its purpose.
The links between these mass social movements and the artists here are not just relating to
technology's use but, a shared critique at the same enemy, neo-liberalism.
""Neo-liberalism" is a set of economic policies that have become widespread during the last 25years or so. Although the word is rarely heard in the United States, you can clearly see the effects of
neo-liberalism here as the rich grow richer and the poor grow poorer." [24] Martinez & Garcia.
At the same time as highlighting the continual privatization of human society. This form of art
practice shows us the cracks of where a social divide of gate-keeping has maintained power within
the Western World's, traditional art structures. We now realize that the art canons we have been
taught to rely on as reference are more based around privelage, centralization and market
dominance rather than democratic representation or even just pure talent. Hacktivist artists adaptand recontextualize with a critical approach, towards a larger and more inclusive context beyond
their own immediate selves. Demonstrating a respect and use of autonomy, and an awareness of
social contexts and political nuances, freeing up dialogue for new discussions which include a
recognition of social contexts, as a vital ingredient and valued resource in art. Re-aligning,
reconfiguring the defaults of what art is today.
7/29/2019 Revisiting the Curious World of Art Hacktivism
17/19
References
[1] This is the imposition everywhere, in the upper spheres of the economy and the state as at the
heart of corporations, of that sort of moral Darwinism that, with the cult of the winner, schooled in
higher mathematics and bungee jumping, institutes the struggle of all against all and cynicism as the
norm of all action and behaviour. Bourdieu.
[2] Richard Stallman. American software freedom activist and computer programmer. In September
1983, he launched the GNU Project to create a free Unix-like operating system, and he has been the
project's lead architect and organizer. With the launch of the GNU Project, he initiated the free
software movement; in October 1985 he founded the Free Software Foundation.
http://en.wikipedia.org/wiki/Richard_Stallman
[3] GNU Operating System. http://www.gnu.org/
[4] On hacking by Richard Stallman. http://www.stallman.org/articles/on-hacking.html#cracker
[5] Steven Levy. Wired Senior Writer, and author of Hackers, In the Plex, and other books.
http://www.stevenlevy.com/
[6] Steven Levy. Hackers Heroes of the Computer Revolution. 25th anniversary edition published
by OReilly. http://www.stevenlevy.com/index.php/books/hackers
[7] The Jargon File. (version 4.4.7). The Jargon File, a comprehensive compendium of hacker slang
illuminating many aspects of hackish tradition, folklore, and humor. Eric Raymond.
http://catb.org/jargon/html/index.html
(Also view - cracking. http://catb.org/jargon/html/C/cracking.html)
[8] File: archives/7/p7_0x03_Hacker's Manifesto_by_The Mentor.txt ==Phrack Inc.== Volume
One, Issue 7, Phile 3 of 10. http://www.phrack.org/issues.html?issue=7&id=3&mode=txt
(PHRACK MAGAZINE is one of the longest running electronic magazines in existence. Since
1985, PHRACK MAGAZINE has been providing the hacker community with information on
operating systems, network technologies and telephony, as well as relaying features of interest for
the international computer underground. PHRACK MAGAZINE is made available to the public, as
http://www.gnu.org/http://www.stallman.org/articles/on-hacking.html#crackerhttp://www.stevenlevy.com/http://www.stevenlevy.com/index.php/books/hackershttp://catb.org/jargon/html/index.htmlhttp://catb.org/jargon/html/C/cracking.htmlhttp://www.phrack.org/issues.html?issue=7&id=3&mode=txthttp://www.gnu.org/http://www.stallman.org/articles/on-hacking.html#crackerhttp://www.stevenlevy.com/http://www.stevenlevy.com/index.php/books/hackershttp://catb.org/jargon/html/index.htmlhttp://catb.org/jargon/html/C/cracking.htmlhttp://www.phrack.org/issues.html?issue=7&id=3&mode=txt7/29/2019 Revisiting the Curious World of Art Hacktivism
18/19
often as possible, free of charge.)
[9] Based in Lubbock, Texas, CULT OF THE DEAD COW (cDc) is the most-accomplished and
longest-running group in the computer underground. Founded in 1984 and widely considered to be
the most elite people to ever walk the face of the earth, this think tank has been referred to as both
"a bunch of sickos" (Geraldo Rivera) and "the sexiest group of computer hackers there ever was"
(Jane Pratt, _Sassy_ and _Jane_ magazines). The cDc is a leading developer of Internet privacy and
security tools, which are all free to the public. In addition, the cDc created the first electronic
publication, which is still going strong.
http://w3.cultdeadcow.com/cms/
[10] metac0m (Dec 2003) Copyleft TheHacktivist.com
[11] 'Hacktivists' of All Persuasions Take Their Struggle to the Web. Amy Harmon.
http://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-
web.html?pagewanted=all
[12] An Interview with Danja Vasiliev. By Marc Garrett (2010).
http://www.furtherfield.org/interviews/interview-danja-vasiliev
[13] Web 2.0 Suicide Machine: Erase Your Virtual Life.
http://www.npr.org/templates/story/story.php?storyId=122379695
[14] Facebook cease and decease letter Web 2.0 Suicide.
http://suicidemachine.org/download/Web_2.0_Suicide_Machine.pdf.
[15] From encryption to darknets: As governments snoop, activists fight back. By Cyrus Farivar
http://arstechnica.com/business/the-networked-society/2012/02/from-encryption-to-darknets-as-
governments-snoop-activists-fight-back.ars
[16] Jon Dovey and Hellen W. Kennedy, Game Cultures (London: Open University Press, 2006).
[17] Tiltfactor instigates, provokes, and inspires change. Our lab is home to many research projects
which creatively disrupt the norm by using an approach we call critical play.
http://www.tiltfactor.org/
http://w3.cultdeadcow.com/cms/http://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html?pagewanted=allhttp://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html?pagewanted=allhttp://www.furtherfield.org/interviews/interview-danja-vasilievhttp://www.npr.org/templates/story/story.php?storyId=122379695http://suicidemachine.org/download/Web_2.0_Suicide_Machine.pdfhttp://arstechnica.com/business/the-networked-society/2012/02/from-encryption-to-darknets-as-governments-snoop-activists-fight-back.arshttp://arstechnica.com/business/the-networked-society/2012/02/from-encryption-to-darknets-as-governments-snoop-activists-fight-back.arshttp://www.tiltfactor.org/http://w3.cultdeadcow.com/cms/http://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html?pagewanted=allhttp://www.nytimes.com/1998/10/31/world/hacktivists-of-all-persuasions-take-their-struggle-to-the-web.html?pagewanted=allhttp://www.furtherfield.org/interviews/interview-danja-vasilievhttp://www.npr.org/templates/story/story.php?storyId=122379695http://suicidemachine.org/download/Web_2.0_Suicide_Machine.pdfhttp://arstechnica.com/business/the-networked-society/2012/02/from-encryption-to-darknets-as-governments-snoop-activists-fight-back.arshttp://arstechnica.com/business/the-networked-society/2012/02/from-encryption-to-darknets-as-governments-snoop-activists-fight-back.arshttp://www.tiltfactor.org/7/29/2019 Revisiting the Curious World of Art Hacktivism
19/19
[18] Interview with Mary Flanagan. Game Developed at Dartmouth Helps Players Understand
Infectious Disease Control By Bonnie Barber.
http://now.dartmouth.edu/2011/04/game-developed-at-dartmouth-helps-players-understand-
infectious-disease-control/
[19] Pox: Save the People. An interview with Mary Flanagan. By Emilie Giles. 2011.
http://www.furtherfield.org/features/interviews/pox-save-people-interview-mary-flanagan
[20] Global Positioning: An Interview with Ricardo Dominguez. By Lawrence Bird. 2011
http://www.furtherfield.org/features/interviews/global-positioning-interview-ricardo-dominguez
[21] Reverse Authentification June 2002. Florian Schneider
http://www2.tate.org.uk/intermediaart/entry15468.shtm
[22] Article. Wasted again by Gastrogeek about The Feral Trade Caf
http://gastrogeek.wordpress.com/2009/07/29/wasted-again
[23] Feral Trade Caf at HTTP Gallery (Furtherfield Gallery) Summer 2009.
http://www.furtherfield.org/exhibitions/feral-trade-cafe
[24] ""Neo-liberalism" is a set of economic policies that have become widespread during the last 25
years or so. Although the word is rarely heard in the United States, you can clearly see the effects of
neo-liberalism here as the rich grow richer and the poor grow poorer."
Post-political Attitudes on Immigration, Utopias and the Space Between Us by Ethel Baraona Pohl
& Csar Reyes. On 'The Funambulist architectural narratives' website
http://thefunambulist.net
Notes: This article was published on Furthefield Sat 10th March 2012.
http://www.furtherfield.org/features/articles/revisiting-curious-world-art-hacktivism
If you wish to use any of this information please contact me at marc.garrett@furtherfield.org
http://now.dartmouth.edu/2011/04/game-developed-at-dartmouth-helps-players-understand-infectious-disease-control/http://now.dartmouth.edu/2011/04/game-developed-at-dartmouth-helps-players-understand-infectious-disease-control/http://www.furtherfield.org/features/interviews/pox-save-people-interview-mary-flanaganhttp://www.furtherfield.org/features/interviews/global-positioning-interview-ricardo-dominguezhttp://www2.tate.org.uk/intermediaart/entry15468.shtmhttp://gastrogeek.wordpress.com/2009/07/29/wasted-againhttp://www.furtherfield.org/exhibitions/feral-trade-cafehttp://thefunambulist.net/http://www.furtherfield.org/features/articles/revisiting-curious-world-art-hacktivismhttp://now.dartmouth.edu/2011/04/game-developed-at-dartmouth-helps-players-understand-infectious-disease-control/http://now.dartmouth.edu/2011/04/game-developed-at-dartmouth-helps-players-understand-infectious-disease-control/http://www.furtherfield.org/features/interviews/pox-save-people-interview-mary-flanaganhttp://www.furtherfield.org/features/interviews/global-positioning-interview-ricardo-dominguezhttp://www2.tate.org.uk/intermediaart/entry15468.shtmhttp://gastrogeek.wordpress.com/2009/07/29/wasted-againhttp://www.furtherfield.org/exhibitions/feral-trade-cafehttp://thefunambulist.net/http://www.furtherfield.org/features/articles/revisiting-curious-world-art-hacktivism