Professional Documents
Culture Documents
Threats and
opportunities in
a wired world
Paul Miller
Paul Miller is a policy advisor at
Forum for the Future.
p.miller@forumforthefuture.org.uk
www.forumforthefuture.org.uk
ISBN 0-9540069-1-7
3
• Then we look at the so-called Hacker ethic. In internet
speak, hackers aren’t the computer criminals that the
media would have us believe (they’re termed crackers).
A hack is simply defined as ‘a neat programming trick’,
a hacker as ‘a computer virtuoso’. It was hackers that
created the technology and computer programs that
make up the internet we all take for granted today.
But what were the personal values that drove them?
4
The rise of Hacktivism
5
500,000 people were silently, remotely, bringing down the
WTO’s website. This was the work of the ElectroHippies
who had organised a cyber protest whereby anybody who
wanted to could join together to repeatedly ‘ping’ the
WTO website – the equivalent of knocking on the door.
With half a million computers repeatedly requesting a
response from the website at the same time, the server
was unable to cope and the website was brought down,
thereby causing ‘denial of service’ for regular users.
Ricardo Dominguez of the EDT points to the idea
of the ‘Panther Moderns’ – characters who break into
‘the Information Bunker’ by inserting 10,000 new
realities into it – in William Gibson’s cult cyberpunk
novel Neuromancer as the inspiration for EDT’s use
of Denial of Service attacks. Indeed, hacktivists have
found that electronic blockage can sometimes cause more
financial stress and damage than physical blockage, as
companies and governments become more reliant on
electronic transactions (Dominguez, 2001).
EDT was involved in using a similar tactic in what
has become known as the ‘Toy War’. At the height of the
dotcom frenzy, brand was everything in cyberspace and
your domain name was key to your brand – they were
traded for hundreds of thousands of dollars. In Autumn
1999, the established start-up eToys.com managed to
evict an arts co-operative from the domain name
‘eToy.com’ through the US courts. When hacktivist
groups became aware of what had happened, they turned
the internet on the internet company. It was war. The aim:
to force eToys.com to give back the domain name. The
tactic: to deflate eToys.com’s share price from $87 per
share to nothing in a campaign that would last for the
‘twelve days of Christmas’.
Different groups took different angles of attack:
putting negative rumours in share dealing chat rooms;
virtual sit-ins to slow the eToys.com server; and even
creating a program called ‘virtual shopper’ which went
round the site selecting hundreds of products but when
it got to the final ‘click here to buy’ screen would just start
again. Over the twelve days, eToys.com’s market value
dropped by $4.1 billion or 70 per cent. EToys.com relented
and gave back the domain name. Shortly afterwards they
went bust – a victim of the dotcom shake out and, perhaps,
of the hacktivists (Wishart & Bochsler, 2002).
6
Some hacktivists have defaced the websites of their
targets (The US Central Intelligence Agency temporarily
became the ‘Central Stupidity Agency’) while other
groups have set up spoof sites to draw attention to the
social and environmental records of companies, while
mimicking the look and feel of the real site. For example
www.rtmark.com/shell Shell has been a victim of RTMark and, at the height
of the controversy over genetically modified crops,
Monsanto fell foul of a group called the Decepticons
at www.monsantos.org (Taylor, 2001).
www.theyesmen.org A group called ‘The Yes Men’ took things one
step further. Shortly after they set up a spoof WTO site
at www.gatt.org, they received an email inviting then
WTO director Mike Moore to address a conference in
Finland. The Yes Men replied saying that unfortunately
Mr Moore wouldn’t be able to make it, but would it be
okay if he sent a substitute speaker? The conference
organisers agreed and when it came to the event, 150
business people were in for quite a surprise. After a rather
unorthodox presentation, the speaker stripped out of his
business suit to reveal a skin-tight golden leotard with a
rather peculiar device attached (the story is documented
at www.theyesmen.org).
So, Jonah Peretti’s ‘sweatshop’ email isn’t alone in
cyberspace. The above are just a few examples of people
using digital technologies for ‘activist’ ends. Sometimes
the hacktivists are individuals (you don’t need a multi-
million dollar campaign fund to make your point),
sometimes they’re groups with a shared agenda and
increasingly hacktivism is also being used as a tactic
by established campaigners.
Now let’s turn to the factors that have made this
possible. We’ll then go on to discuss what it could mean
in the long run.
7
Small worlds
8
to the other. If the connections were entirely random it
would be possible, but this diagram is far removed from
the reality of society where each of us has friends and
family that are not randomly selected but are a function
of birth, location and other factors. It turns out that a
simple trick allows you to create a realistic model that
does fit with real world experience. The trick is a small
number of random connections amongst a large number
of strong, predictable ones. If you were to run a test on a
computer to find the number of degrees of separation
with two out of every 10,000 of the links being random,
you come out with a figure of eight degrees of separation.
If three out of 10,000 connections are random, the
average number of degrees of separation becomes five
(Buchanan, 2002).
To many people in the policy community this is a
familiar model. Originating in the US amongst commen-
tators like Robert Putnam but continuing in Europe, the
debate about social capital uses the idea of bonding social
capital within social groups and bridging social capital –
links into other groups. A society is more likely to be
sustainable, or have greater social capital, if it contains a
mixture of strong bonds, connecting family members,
close friends and neighbours, as well as random links
which connect groups that are not alike.
But this isn’t the whole story. There’s another factor
that makes ours a ‘small world’. Malcolm Gladwell,
author of The Tipping Point, looked at how connected
students in a Manhattan college were, by asking them
to look at a list of surnames from the phone book and
note how many people they knew with any surname
from the list. The average was 21, but what surprised
Gladwell was the range, which stretched from two to
95 (Gladwell, 2000). It seemed that some people were
very well connected and it turns out that these ‘hubs’
or ‘connectors’ play an important role in creating small
worlds. In his book, Linked, network theorist
Albert-László Barabási explains:
“Hubs are special… indeed, with links to an unusually
large number of nodes, hubs create short paths between any
two nodes in the system. Consequently, while the average
separation between two randomly selected people on Earth
is six, the distance between anybody and a connector is often
only one or two.” (Barabási, 2002)
9
But what’s this got to do with hacktivism? Few can
deny that the twentieth century saw an unprecedented
rise in the ease and speed of global communication.
As we’ll see in the next section, we are more connected,
able to send and receive information to and from more
people in more places, than we’ve ever been before.
Technology is facilitating a change towards a greater
number of ‘random’ or ‘bridging’ connections in society.
Word spreads in minutes in this type of ‘small world’.
Reputations can be shattered in the space of hours and
whole organisations can be demolished by scandal
almost overnight. It turns out that a little bit of
randomness has turned society into what mathematicians
call a complex adaptive system, and this is where the
relevance for hacktivism comes in: these types of system
behave very differently from the traditional model of a
hierarchical society.
Jonah Peretti’s ‘sweatshop’ email was able to jump
from a small circle of friends because of the small world
phenomenon. A few random connections and the help of
a few highly connected people meant that the idea passed
quickly from just a few people to go on to be seen by
millions. And if it can happen once, it can happen again.
This, of course, has implications for those charged with
managing reputational risk for companies as well as for
people in government. Now, more than ever before, there’s
a strong case for understanding how to respond to the
challenge of the small world phenomenon.
10
Information overload and network failure
11
It seems that there’s so much information available we
don’t know whom to trust anymore. We’re not just in an
information rich period; we’ve reached ‘information
overload’.
Information and communication technologies are
linked to another source of instability as well. According
to some commentators, notably Spanish born sociologist
Manuel Castells now based at the University of California
at Berkeley, ICTs have helped create a ‘Network Society’.
He says many of the economic and political changes that
have occurred over the past few decades have been due to
the development of the network as a new organisational
form (Castells, 1996).
In business, as demand for products and services
has become unpredictable and markets have diversified
to become global, the system of mass-production has
become too rigid and costly to sustain. Hence large
companies have adopted new business models, often
subcontracting to small and medium sized businesses
whose flexibility allows productivity gains for the large
corporations as well as for the economy as a whole.
This new organisational form could be called a network
business, relying on a large number of connections
between smaller businesses, where the connections
can easily be broken and reformed in a short amount
of time according to demand.
Visa, the credit card company, is an oft-quoted
example of this type of restructuring. It’s not really a
company at all, but a co-ordinating body owned by
21,000 financial institutions to oversee transactions.
In 2002, over $2 trillion in goods and services will be
purchased using Visa, constituting the largest consumer
purchasing block in the world, but Visa has no assets
other than its relationships. Its success is based on its
network structure (Leadbeater, 1999).
The network business may have enabled global
companies to thrive economically, but these complex
supply chains of materials, information and knowledge
mean that it’s impossible to say exactly how many people,
in how many different locations were involved in the
production of the final product. This leaves consumers
unsure of the social and environmental implications of
their purchasing decisions. What were the conditions like
in the factory that produced the product?
12
Were endangered resources used in its production? Was
pollution caused during manufacture? These are questions
that companies are increasingly being asked to answer.
Outside the business sphere, the effects of the
network society are mixed too. Our definitions of families,
communities and businesses have become more fluid and
flexible. As the think tank, the Future Foundation, put it:
“The Network Society is created by the actions and choices
of individuals participating in key emotional, social and
economic networks, rather than consisting of fixed social
structures and groupings.” (BT/Future Foundation, 2001)
13
But it needn’t be like this. There are opportunities, so
far largely unrealised by business and government, to use
digital technologies for social and environmental benefit.
In order to see where these opportunities lie, we need to
go back and examine the origins of the internet and learn
a little about the people who created it.
14
The hacker ethic
15
were creating. This community evolved according to rules
set by the original few – but there was never any internet
authority to enforce them. Instead, they were maintained
through a shared set of beliefs. According to Steven Levy
in Hackers, Heroes of the Computer Revolution, the beliefs
of the hacker are:
• Access to computers should be unlimited and total
• Freedom
• Social worth
• Openness
• Activity
• Caring
16
For instance, there’s more than a hint of similarity between
hacker values and the values of Forum for the Future:
• Commitment
• Respect
• Fairness
• Compassion
• Fun
17
A global conversation
18
typically overlooked by mainstream media and policy-makers.”
The implications of a network where information is
sent at light speed is that companies and governments will
be forced to become more sustainable in their operations
since they will be under scrutiny like never before.
Hacktivism means that there will be fewer opportunities
than ever for companies to pull the wool over the eyes of
NGOs and activists. The protest groups involved in street
protest have been some of the most avid users of the inter-
www.indymedia.org net. A visit to the Indymedia.org site shows just how suited
the technology is to activism. Video and audio clips, press
releases, articles and photographs from ‘actions’ around
the world are posted 24 hours a day. A whole new system
of information transmission has been created for a group
of people who are cynical about the lack of alternative
voices in the mainstream media. As their catch phrase
goes, ‘Don’t hate the media, be the media.’
And the internet is easy. The speed and anonymity it
provides suit people that otherwise may not have taken
action. As Oxblood Ruffin, spokesman for hacktivist
group the Cult of the Dead Cow says, “I know from
personal experience that there is a difference between
street and online protest. I have been chased down the
street by a baton wielding police officer on horseback.
Believe me, it takes a lot less courage to sit in front of
a computer.”
Some of the established NGOs have latched onto this.
‘Automatic’ campaigning is a feature on their websites,
allowing visitors to send electronic messages to global
leaders quickly and cheaply. For instance, a few clicks on
www.oxfam.org.uk the Oxfam UK website currently allows you to make your
feelings known about the policies of the big international
coffee companies to their chief executives in minutes.
The internet can be seen as an ‘active’ medium. It
encourages interaction rather than the previous layers
of communication technology which have encouraged
a couch potato mentality. Even Robert Putnam, while
ringing the alarm bell of declining social capital in the
US, thinks the internet has potential. He ends his book
with a rallying call:
“Let us find ways to ensure that by 2010 Americans will spend
less leisure time sitting passively alone in front of glowing
screens and more time in active connection with our fellow
citizens. Let us foster new forms of electronic entertainment
19
and communication that reinforce community engagement
rather than forestalling it.” (Putnam, 2000)
20
Open Policy
21
seemingly emerge only by a succession of miracles. The fact that
this bazaar style seemed to work, and work well, came as a
distinct shock… the Linux world not only didn’t fly apart in
confusion but seemed to go from strength to strength at a speed
barely imaginable to cathedral-builders.” (Raymond, 1999)
22
environmental issues relating to the company. The EU
www.europa.eu.int has launched its Interactive Policy-Making initiative
/yourvoice although so far the issues debated have been limited.
But we could go much further. In the Hacker Ethic,
Pekka Himanen suggests that the open source model
could be applied more widely, saying, “The hacker open
model could be transformed into a social model – call it
the open-resource model – in which someone announces:
I have an idea, I can contribute this much to it, please join
me! Although this version of the open model would also
involve local physical action, the Net would be used as an
effective means for joining forces and later disseminating
and developing the idea further.”
This idea deserves further exploration. Companies
and public bodies that wish to be leaders in sustainable
development and improve their social and environmental
performance, should experiment with the idea of Open
Policy. They should first look to a particular problem, say
how to cut their carbon dioxide emissions, to try it out,
and if successful should extend it to other areas.
This is how it might work. In developing an Open
Policy, the equivalent of the software source-code would
be the policy and how it was implemented. Organisations
would set the criteria for a particular policy (say, cutting
their carbon dioxide emissions by 20 per cent by 2010),
but then would open up the decision to anyone who
might wish to contribute. Using the web, they would
provide all the information available to contributors who
would then be able to post ideas as to how the goals could
be met. A system, such as that employed by the commu-
nities at Slashdot.org or Plastic.com, where users rate the
postings of other users for usefulness and relevance, would
ensure that the best ideas gradually move up the agenda.
These ideas could then be taken by other users and
improved still further until eventually, rather than coming
to a compromised endpoint between several entrenched
positions, the process would result in the ‘best’ solution
given the skills, knowledge and creativity of those involved.
The Open Policy approach would have several
advantages. First, it will take the venom out of the current
situation where conflict and suspicion are often the norm.
Cyberprotest thrives on the oxygen of secrecy. Hacktivists
are simply spurred on by organisations building up their
firewalls and adding expensive security systems. If you try
23
to hide it, they’ll try to find it. Open Policy, on the other
hand, by focussing on solving problems should lead to a
more constructive dialogue and encourage collaboration.
Secondly, Open Policy will mean that if an
organisation is serious about sustainability, it will show.
Up until now, many ‘sustainable development’ policies
have been cosmetic and unless you’re an expert it’s been
difficult to tell apart those that are truly committed from
the ‘greenwashers’. Open Policy would focus on how to
solve a real challenge with real impacts. It shouldn’t be
used to simply reword a PR statement. It shouldn’t be
a talking shop.
Thirdly, it will take policy out of boardrooms and
policy elites. Business thinker John Kao proposes that
creativity rises exponentially with the diversity and
divergence of those connected to a network (Kao, 1996).
And, in order to move towards sustainability, we need a
great deal of creativity. The beauty of Open Policy is that
anybody can contribute; the focus of success is on how to
create the most successful outcome, not on who you are.
This, of course, should not belittle the responsibility of
organisations to engage with the stakeholders affected
by their activities.
Finally, Open Policy could promote the spread of
best practice from one organisation to others. Solutions
could be taken as complete policies and adapted to new
organisations. Perhaps a central Open Policy website
could carry examples of particular policies that could
be used by other organisations. It might be a way of
overcoming the problem of organisations refusing to
learn from best practice policy that was ‘not invented
here’. Open Policy would actually encourage organi-
sations to take policies from elsewhere and improve them.
24
Conclusion
25
government could use the idea of Open Policy.
Thus far, government and business have failed to
grasp the opportunity that technology presents to open
themselves up. They’ve quite often seen the ideas of
people outside their organisations as a burden rather
than a resource. That needs to change. Open Policy
would be one way of turning the vibrancy of the internet
into a positive solution, both for the organisations
involved and for sustainable development. The idea itself
is open and upgradeable so consider this as a proposal for
Open Policy version 1.0, your comments on how it could
be improved and implemented are very welcome.
www.forumforthefuture.org.uk/openpolicy
26
Acknowledgements
References
27
Levy, S (1984) Hackers: heroes of the computer
revolution, Anchor Press/Doubleday,
Garden City, NY
Mulgan, G (1997) Connexity, how to live in a connected
world, Chatto & Windus, London
Naughton, J (1999) A Brief History of the Future, Phoenix,
London
Putnam, R (2000) Bowling Alone, the collapse and
revival of American community, Simon & Schuster,
New York
Raymond, E S (1999) The cathedral and the bazaar:
musings on Linux and open source by an accidental
revolutionary, O’Reilly, Cambridge
Stix, G (2001) ‘The Triumph of the Light’, in Scientific
American, January 2001
Taylor, P.A. (2001) "Hacktivism: in search of lost ethics?"
in Crime and the Internet, Wall, D (ed.) Routledge,
London 59-73
Wishart, A & Bochsler, R (2002) Leaving Reality Behind:
Inside the battles for the soul of the internet, Fourth
Estate, London
Zadek, S (2001) The Civil Corporation, Earthscan,
London
28
Open Policy
Threats and
opportunities in
a wired world
Paul Miller
ISBN 0-9540069-1-7
£7 www.forumforthefuture.org.uk