|
|
HACKING SEDUCTIONS AS ART
This
interview by Cornelia Sollfrank with Jenny
Marketou took place in Hamburg,Germany on July
25, 2000.
|
CS:
Jenny you agreed to show up personally in this video interview.You
are not a typical hacker who tries to hide her face.What kind of hacker
are you?
|
JM:
I would like to describe myself as an artist hacker, which means I am
interested in operating as a culture hacker. I believe that there are
two kinds of hackers.One is the cultural hacker, who uses computer hacking
methods as an open source medium and strategy to reconstruct new systems,
new creative environments on the internet. But hacking as art is also
a means to infiltrate hacking culture and to contribute to the formation
of new configurations of characters, space, time and play.
The other is the computer underground hacker that can be defined by
its digital virtuosity, anonymity and skills , and who directly manipulates
the code, breaking into the economy and system of the internet in order
to access and manipulate certain information. In this case I am referring
to the celebrity hacker ,which I am not.
The second kind of hacker has received a lot of media attention lately.
I think the reason why hackers have become the technological cause celebre
ripe for media coverage can be found in the wider social and historical
context of the information revolution and the current importance of
information technologies in our economy.Therefore information technologies,
by being a new economic, cultural and political asset have become particularly
vulnerable to a unique form of crime. The activity itself embodies the
elements of both fear and fascination, and the aura of anonymity makes
hacking suitable for media hyperboles as it is sedentary, repetitive
and non-photogenic.
My work uses information technologies and communication, and I appropriate
hacking methods and strategies in my art process either as an esthetic
experience or as an intervention of resistance. Hacking means reappropriating,
reforming and regenerating not only culture but also redefining systems
and processes, and it can account for a new coinage when the process
is an open system. I believe that artists have always been cultural
hackers.
|
CS:
As I understand there were “hackers” even before
the computer existed?
|
JM:
I think hacking refers to any imaginative and unorthodox use of any
artifact. “Hacking” means reconstructing a tool to understand
its workings and to reconstruct it in a personal, creative way. How
can art subvert and reappropriate given esthetics and technologies and
what does this mean in culture in general.
I can make reference to the history of art when Duchamp took a wheel
and put in the gallery space or snatched Mona Lisa. He snatched a product
and reconstructed a new system of meaning and representation.
|
CS:
But this is a conceptual thing without any skills. What do you think?
|
JM:
The computer underworld is populated with young men and (almost no women
) who live out their fantasies of power and glory on a keyboard. Of
course, computer hacking requires technical skills, compulsive digital
virtuosity and addiction.
|
CS:
You say to “hack into something”, so there has to be something
there ie, a system of some kind that you can “hack into.”
What is the relation or what might be the motivation for breaking into
a system which already exits, and make changes to it, whether it is
a technological system, a server, a computer network, or even a cultural
system?
|
JM:
I have come to think of “hacking” both as an important phenomenon
and as a metaphor for how we digitally manipulate and think through
the electronic culture that engulfs us and how this demonstration of
virtuosity can be be addressed in the arena of theoretical, and cultural
politics and esthetics. I believe hacking is a form of cultural activism,
as a syntax for resistance and critical discourse.
Artists have always used their process as a strategy and methodology
for resistance.This kind of activism has become very apparent on the
internet, especially since information is becoming more and more valuable
in our economy. In which case the intention and ethics which drive both
artist hackers and underground computer hackers are the same.The intention
is to dismantle the present economic logic of the Internet in order
to take it forward into a state of free public space.
|
CS:
What are the different kind of skills between the computer hacker
and the artist hacker?
|
JM:
As I mentioned before, I would describe the computer hacker by its virtuosity,
mastery and ingenuity in breaking into computer systems and getting
at encryption technology. On the other hand, like the sampling rap MC,
hacker artists operate as culture hackers who manipulate existing techno-semiotic
structures towards a different end, to get inside cultural systems on
the net and make them do things they were never intended to do.
On a technical level, of course, the artist(s) avoids having to put
in the extensive time required for programming and instead get a lot
of technical support from computer hackers. Artists have a green light
in using those skills. I strongly believe that hacking is not an evil
act, but a very intelligent and creative process.There are straight
out culture hacks whose mere existences underscore the viability of
this subculture, its affinities with other parasitico-critical practices,
and the robustness of its free ware economy, a marketplace-bazaar for
codes of all kinds. Game patching also implies and includes the act
of tearing open a finished program to get at the underlying code and
explore what new coinages are invented when the process is an open system.
|
CS:
A lot of the bad image of hacking has to do with the media. Why do you
think society needs this dark side of information technology?
|
JM:
We have been always fascinated by the “black box” and the
technical virtuosity of hackers who manipulate them, but at the same
time we are fearful of their lack of transparency and the fact that
our conventional concept of technological experts may be fatally undermined
by largely anonymous,unaccountable and potentially subversive technological
whiz-kids.The perennial nature of techno-anxiety is illustrated by the
historical range of cultural expressions that give it voice. It is present
in the fate of such Greek mythological figures as Prometheus and Icarus;
it is vividly portrayed in Mary Shelley’s gothic classic Frankenstein.
The Zeitgeist that hackers personify has been vividly expressed in the
fictional genre of cyberpunk novel Neuromanser and science fiction films
such as Blade Runner ,Terminator and Matrix.
I also think our government has helped in promoting this fear by the
way information has always been controlled, yet any information we get
about cases of hacking through media is not real and the government
purposely keeps the truth of what is really going on from us. So it
is very convenient to perpetuate this “evil image” of hacker.
But the mainstream always creates this kind of alienation with anything
marginal or any form of resistance until it is embraced and domesticated
by it. Making hackers celebrities advances their disempowerment.
|
CS:
At this point, Jenny, I would be interested in learning more
about your work.Can you give me an example of your way of hacking?
|
JM:
In my my most recent work,I am creating artificially intelligent agents,
bots, with hacking and tracking behaviors, which vary from IP snatching
and reappropriating codes, to getting personal information from privately
networked environments such as CUSEEME chat rooms. My goal is to develop
website controlled, electronically based installations and environments
that use transformational imagery to explore the fluidity of personal,
cultural, and historical identity, and what kind of new coinage can
be created through the open source agency of information hacking, classification,
and snatching.
What has always interested me is the body, embodied and disembodied,
its relation to space and time as well as the potentiality and meanings
of embodiment within an environment built around and within communication
technologies, with a special regard to the relationship between technology,
body, and subjectivity - the alienation,dislocation and liquidation
of subjectivity all experienced within networked environments.
|
CS:
Can you give me a concrete example ?
|
JM:
A good example of IP snatcher and code hacker is the artificial intelligence
of CHRIS.053 the protagonist in my web based project SMELL.BYTES TM.
SMELL.BYTES TM was originally conceived and produced as an on-line project,
since the internet has become a fantasy generating dream machine for
the wired man. The project can be experienced part on-line and part
as a hybrid physical environment through three panoramic streaming video
projections. Through the hacking virtual persona of Chris.053 , SMELL.BYTES
TM explores human subjectivity on the net. Chris.053 is an invisible
bot and has been programmed to be driven by its insatiable olfactory
desires, relentlessly lurking, and sniffing on the net and gaining unauthorized
access to servers and IP addresses of participants in CU SEE ME teleconference
environments and chat rooms on line.
Visitors can enter the "odor lab" on the SMELL.BYTES TM website
to witness Chris.53’s hacking virtuosity, peruse graphics based
on the molecular structures and data of 7,000 odors and witness the
constant downloading and processing of grabbed unaware human portraits.
Accordingly, those with the most beautiful faces-the most symmetrical-are
assigned seductive odors. The narrative of the interface scripting and
design was based on my research on current studies at The Ludwig Boltzmann
Institute of Urban Ethology,Vienna .The studies support that beauty
and symmetry in humans is correlated to body odors. In other words,if
you are symmetrical you are beautiful therefore you have beautiful body
odors.SMELL.BYTES TM of course takes a critical stance on this kind
of biological classification and Frankensubjectivity.
|
CS:
What happens to the information ?
|
JM:
The information from each CU SEE ME hacked participant has been processed
and classified in the “stinky gallery” as a series of numbers
and corresponding odors.However the viewers do not not have access to
the code. I do.
I created the video projections by appropriating Chris.053’s hacking
skills, and as an invisible agent, I can hack into IP addresses and
access codes of teleconferencing networks , and also log on onto CU
SEE ME chat rooms. Invisible and anonymous, I can join these chat rooms
and download patches of live video streams from those teleconferencing
participants on line. These patches are recorded, processed, manipulated
and projected. As the viewer interacts with the website of Chris.053,
the artificial intelligence simultaneously is surrounded by these stolen
processed profiles of unaware participants. In SMELL.BYTES TM I have
always felt that the author/artist of the project is really Chris.053.
Cornelia Sollfrank is an artist, cultural activist and editor
of Cyberfeminism magazine. For the last two years, she has been interviewing
and researching women hackers. She lives in Hamburg, Germany.
|
|
|