Продолжая использовать наш сайт, вы даете согласие на обработку файлов cookie, которые обеспечивают правильную работу сайта. Благодаря им мы улучшаем сайт!
Принять и закрыть

Читать, слущать книги онлайн бесплатно!

Электронная Литература.

Бесплатная онлайн библиотека.

Читать: Cyberia - Douglas Rushkoff на бесплатной онлайн библиотеке Э-Лит


Помоги проекту - поделись книгой:

Crashing the System

David Troup gained his fame in the computer underground for a program he wrote called The Bodyguard, which helps hackers maintain their chain of connections through a long series of systems breaches. Through another ingeniously exploited communications system glitch, we spoke as he relaxed on his living room couch in Minnesota. From the sound of his voice I knew he was using a speaker phone, and I heard several of his friends milling about the room, popping open beers, and muttering in agreement with Troup, their local hero.

''The fun of hacking lies in the puzzle solving. Finding out what lies around that next corner, around the next menu or password. Finding out just how twisted you can get. Popping out of a computer-based network into a phone-based network and back again. Mapping networks that go worldwide. We watched a system in Milwaukee grow from just two systems into a huge network. We went with them. By the end, we probably had a more detailed map of their network than they did. ''

The Bodyguard has become an indispensable part of the hacker's daytrip survival kit. ''It's kind of a worm [a tunnelling computer virus] that hacks along with you. Say I'm cruising through fifteen Unixes [computers that run Unix software] to get at some engineering firm. Every time I go onto a Unix, I will upload my Bodyguard program. What it does is watch me and watch the system. It's got the names of the system operators. If a system operator [''sysop,'' the watchdog for illegal penetrants] or somebody else who has the ability to check the system logs on [enters the network through his own computer], the Bodyguard will flash an error flag [warning! danger!] and terminate you at that point. It also will send you a number corresponding to the next place down the hierarchy of machines that you've penetrated. You'll have your last connection previous to the one where you got canned. It will then reconnect you to where you were, without using the system that knocked you off. It'll recreate the network for you. It takes about four or five minutes. It's nice because when you're deep in a group of systems, you can't watch everything. Your Bodyguard gets you off as soon as a sysop signs on, before he even knows you're there. Even if they just log in, you hit the road. No need to take any chances.''

While the true hacker ethic is not to destroy anything, most young people who find themselves in a position where it' possible to inflict damage find it hard to resist doing so. As Troup explains, ''Most kids will do the most destructive thing they know how to do. There's nothing in there that they need, or want, or even understand how to use. Everybody's crashed a system now or then.''

Someone at Troup's end coughs in disagreement and paranoia. David corrects himself. No need to admit he's ever done anything illegal, now, is there? ''I'd say 90 percent of everybody. Everybody's got that urge, you know? `God, I've got full system control – I could just do a recursive rm [a repeated cycle to begin removing things] and kiss this system goodbye.' More likely, someone will create a small bug like putting a space before everyone's password [making it impossible for anyone to log on] and see how long it takes the system operator to figure it out.'' The passwords will appear correct when the system operator lists them – except that each one will have a tiny space before it. When the sysop matches the user's password with the one that the computer says the user should have, the operator won't notice the extra space before the computer's version.

This is the ''phony phone call'' to the nth power. Instead of pranking one person on the other end, the hacker incapacitates a big company run by "nasty suits.'' Hard to resist, especially when it's a company known to keep tabs on us. The events that frightened Troup out of hacking for a while concerned just such a company. ''TRW is the Holy Grail target for hackers. They're into everything, which is why everyone wants to get into them. They claimed to be impenetrable, which is half the reason why everyone wants to get in. The more you look into it, the more security holes they have. They aren't so bad.'' One of Troup's friends in the background chortles with pride. "It's difficult, because you have to cover your tracks, but it's not impossible. Just time-consuming,'' Troup explains.

''I remember TRW used to have those commercials that just said `TRW, making the world a better tomorrow.' That's all they did. They were getting us used to seeing them. Because they were into everything. They sent Tiger Teams [specialized computer commando squads who establish security protocol in a system] into every system the government has, either to improve the system's security or to build it in the first place. They have back doors into everything they've ever worked on. They can assume control over anything they want to. They're big. They're bad. And they've got more power than they should have, which is why we were after them. They had Tiger Teams into airport security, aerospace security. And the government gets software from TRW, upgrades from TRW [also, potentially, with back doors].

''When we got all the way up to the keyhole satellite, we said `That's enough.' We have really good resources. We have people that can pose as nonpeople – they have Social Security numbers, tax IDs, everything. But we all got kind of spooked by all this. We had a continuation of our plan mapped out, but we decided not to go through with it. We ditched all the TRW stuff we had. I gave it to a friend who buried it underwater somewhere along the Atlantic shelf. If I tell him to get it back, he will, but if I tell him to get it back using a slightly different phrase, he will disappear ... for obvious reasons.''

Most purposeful hacking is far less romantic, and done simply to gain access to systems for their computing power. If someone is working on a complex program or set of computations, it's more convenient to use some corporation's huge system to carry out the procedure in a few minutes or hours than to tie up one's own tiny personal computer for days. The skill comes in getting the work done before the sysop discovers the intrusion. As one hacker explains to me through an encrypted electronic mail message, ''They might be on to you, but you're not done with them yet – you're still working on the thing for some company or another. But if you've got access to, say, twenty or thirty Unix systems, you can pop in and out of as many as you like, and change the order of them. You'll always appear to be coming from a different location. They'll be shooting in the dark. You're untraceable.''

This hacker takes pride in popping in and out of systems the way a surfer raves about ducking the whitewater and gliding through the tube. But, just as a surfer might compete for cash, prizes, or beer endorsements, many young hackers who begin with Cyberia in their hearts are quickly tempted by employers who can profit from their skill. The most dangerous authoritarian response to young cyberian hackers may not be from the law but from those hoping to exploit their talents.

With a hacker I'll call Pete, a seventeen-year-old engineering student at Columbia University, I set up a real-time computer conference call in which several other hackers from around the country could share some of their stories about a field called ''industrial hacking.'' Because most of the participants believe they have several taps on their telephone lines, they send their first responses through as a series of strange glyphs on the screen. After Pete establishes the cryptography protocol and deciphers the incoming messages, they look like this (the names are mine):

#1: The Purist

Industrial hacking is darkside hacking. Company A hires you to slow down, destroy, screw up, or steal from company B's R&D division [research and development]. For example, we could set up all their math wrong on their cadcams [computer aided design programs] so that when they look at it on the computer it seems fine, but when they try to put the thing together, it comes out all wrong. If all the parts of an airplane engine are machined 1mm off, it's just not going to work.

#2: The Prankster

There was a guy in Florida who worked on a cadcam system which used pirated software. He was smart, so he figured out how to use it without any manuals. He worked there for about a year and a half but was fired unfairly. He came to us get them shut down. We said ''Sure, no problem.'' Cadcam software companies send out lots of demos. We got ahold of some cadcam demos, and wrote a simple assembly program so that when the person puts the disk in and types the "install'' or ''demo'' command, it wipes out the whole hard disk. So we wrapped it up in its package, sent it out to a friend in Texas or wherever the software company was really from, and had him send it to the targeted company with a legit postmark and everything. Sure enough, someone put the demo in, and the company had to end up buying over $20,000 worth of software. They couldn't say anything because the software we wiped out was illegal anyway.

The Purist

That's nothing. That's a personal vendetta. Industrial hacking is big business. Most corporations have in-house computer consultants who do this sort of thing. But as a freelancer you can get hired as a regular consultant by one of these firms – say McDonnell Douglas – get into a vice president's office, and show them the specs of some Lockheed project, like a new advanced tactical fighter which he has not seen, and say, ''There's more where this came from.'' You can get thousands, even millions of dollars for this kind of thing.

#3: The Theorist

During the big corporate takeover craze, companies that were about to be taken over began to notice more and more things begin to go wrong. Then payroll would get screwed up, their electronic mail messages aren't going through, their phone system keeps dying every now and then in the middle of the day. This is part of the takeover effort.

Someone on the board of directors may have some buddy from college who works in the computer industry who he might hire to do an odd job now and again.

The Purist

I like industrial hacking for the idea of doing it. I started about a year or so ago. And William Gibson brought romance into it with Neuromancer. It's so doable.

#4: The Pro

We get hired by people moving up in the political systems, drug cartels, and of course corporations. We even work for foreign companies. If Toyota hired us to hit Ford, we'd hit Ford a little bit, but then turn around and knock the hell out of Toyota. We'd rather pick on them than us.

Most industrial hackers do two hacks at once. They get information on the company they're getting paid to hit, but they're also hacking into the company that's paying them, so that if they get betrayed or stabbed in the back they've got their butts covered. So it's a lot of work. The payoffs are substantial, but it's a ton of work.

In a real takeover, 50% of the hacking is physical. A bunch of you have to go and get jobs at the company. You need to get the information but you don't want to let them on to what you're doing. The wargames-style automatic dialer will get discovered scanning. They know what that is; they've had that happen to them many times before.

I remember a job that I did on a local TV station. I went in posing as a student working on a project for a communications class. I got a tour with an engineer, and I had a notebook and busily wrote down everything he said. The guy took me back where the computers were. Now in almost every computer department in the United States, written on a piece of masking tape on the phone jack or the modem itself is the phone number of that modem. It saves me the time and trouble of scanning 10,000 numbers. I'm already writing notes, so I just write in the number, go home, wait a week or so, and then call them up (you don't call them right away, stupid). Your local telephone company won't notice you and the company you're attacking won't notice you. You try to be like a stealth bomber. You sneak up on them slowly, then you knock the hell out of them. You take the military approach. You do signals intelligence, human intelligence; you've got your special ops soldier who takes a tour or gets a job there. Then he can even take a tour as an employee – then he's trusted for some reason – just because he works there, which is the biggest crock of shit.

DISCONNECT

Someone got paranoid then, or someone's line voltage changed enough to suggest a tap, and our conversation had been automatically terminated.

Pete stores the exchange on disk, then escorts me out onto the fire escape of his apartment for a toke and a talk. He can see I'm a little shaken up.

''That's not really hacking,'' he says, handing me the joint. I thank him with a nod but opt for a Camel Light. "That's cracking. Hacking is surfing. You don't do it for a reason. You just do it.'' We watch a bum below us on the street rip a piece of cardboard off an empty refrigerator box and drag it away – presumably it will be his home for tonight.

''That guy is hacking in a way,'' I offer. "Social hacking.''

''That's bullshit. He's doing it for a reason. He stole that cardboard because he needs shelter. There's nothing wrong with that, but he's not having such a good time, either.''

''So what's real hacking? What's it about?''

Pete takes a deep toke off his joint and smiles. ''It's tapping in to the global brain. Information becomes a texture ... almost an experience. You don't do it to get knowledge. You just ride the data. It's surfing, and they're all trying to get you out of the water. But it's like being a environmental camper at the same time: You leave everything just like you found it. Not a trace of your presence. It's like you were never there.''

Strains of Grateful Dead music come from inside the apartment. No one's in there. Pete has his radio connected to a timer. It's eleven o'clock Monday night in New York, time for David Gans's radio show, The Dead Hour. Pete stumbles into the apartment and begins scrounging for a cassette. I offer him one of my blank interview tapes.

''It's low bias but it'll do,'' he says, grabbing the tape from me and shoving it into a makeshift cassette machine that looks like a relic from Hogan's Heroes. "Don't let the case fool you. I reconditioned the whole thing myself. It's got selenium heads, the whole nine yards.'' Satisfied that the machine is recording properly, he asks, ''You into the Dead?''

''Sure am.'' I can't let this slip by. "I've noticed lots of computer folks are into the Dead ... and the whole subculture.'' I hate to get to the subject of psychedelics too early. However, Pete doesn't require the subtlety.

''Most of the hackers I know take acid.'' Pete searches through his desk drawers. "It makes you better at it.'' I watch him as he moves around the room. ''Look at this.'' He shows me a ticket to a Grateful Dead show. In the middle of the ticket is a colour reproduction of a fractal.

''Now, you might ask, what's a computer-generated image like that doing on a Dead ticket, huh?''

Chapter 2

Operating from Total Oblivion

The fractal is the emblem of Cyberia. Based on the principles of chaos math, it's an icon, a metaphor, a fashion statement, and a working tool all at the same time. It's at once a highly technical computer-mathematics achievement and a psychedelic vision, so even as an image it bridges the gap between these two seemingly distant, or rather ''discontinuous,'' corners of Cyberia. Once these two camps are connected, the real space defined by "Cyberia'' emerges.

Fractals were discovered in the 1960s by Benoit Mandelbrot, who was searching for ways to help us cope, mathematically, with a reality that is not as smooth and predictable as our textbooks describe it. Conventional math, Mandelbrot complained, treats mountains like cones and clouds like spheres. Reality is much ''rougher'' than these ideal forms. No real-world surface can accurately be described as a "plane,'' because no surface is absolutely two-dimensional. Everything has nooks and crannies; nothing is completely smooth and continuous. Mandelbrot's fractals – equations which grant objects a fractional dimensionality – are revolutionary in that they accept the fact that reality is not a neat, ordered place. Now, inconsistencies ranging from random interference on phone lines to computer research departments filled with Grateful Deadheads all begin to make perfect sense.

Mandelbrot's main insight was to recognize that chaos has an order to it. If you look at a natural coastline from an airplane, you will notice certain kinds of mile-long nooks and crannies. If you land on the beach, you will see these same shapes reflected in the rock formations, on the surface of the rocks themselves, and even in the particles making up the rocks. This self-similarity is what brings a sense of order into an otherwise randomly rough and strange terrain. Fractals are equations that model the irregular but stunningly self-similar world in which we have found ourselves.

But these discontinuous equations work differently from traditional math equations, and challenge many of our assumptions about the way our reality works. Fractals are circular equations: After you get an answer, you plug it back into the original equation again and again, countless times. This is why computers have been so helpful in working with these equations. The properties of these circular equations are stunningly different from those of traditional linear equations. The tiniest error made early on can amplify into a tremendous mistake once the equation has been ''iterated'' thousands of times. Think of a wristwatch that loses one second per hour. After a few days, the watch is only a minute or so off. But after weeks or months of iterating that error, the watch will be completely incorrect. A tiny change anywhere in a fractal will lead to tremendous changes in the overall system. The force causing the change need not be very powerful. Tremendous effects can be wrought by the gentlest of "feedbacks.''

Feedback makes that loud screeching sound whenever a microphone is brought close to its own speaker. Tiny noises are fed back and iterated through the amplification system thousands of times, amplified again and again until they are huge, annoying blasts of sound. Feedback and iteration are the principles behind the now-famous saying, ''When a butterfly flaps its wings in China, it can cause a thunderstorm in New York.'' A tiny action feeds back into a giant system. When it has iterated fully, the feedback causes noticeable changes. The idea has even reached the stock market, where savvy investors look to unlikely remote feedbacks for indications of which way the entire market might move once those tiny influences are fully iterated. Without the computer, though, and its ability to iterate equations, and then to draw them as pictures on a screen, the discovery of fractals would never have been possible.

Mandelbrot was at IBM, trying to find a pattern underlying the random, intermittent noise on their telephone lines, which had been causing problems for their computer modems. The fact that the transmission glitches didn't seem to follow many real pattern would have rendered a classical mathematician defenceless. But Mandelbrot, looking at the chaotic distribution of random signals, decided to search for signs of self-similarity – that is, like the coastline of beach, would the tiny bursts between bursts of interference look anything like the large ones? Of course they did. Inside each burst of interference were moments of clear reception. Inside each of those moments of clear reception were other bursts of interference and so on. Even more importantly, the pattern of their intermittency was similar on each level.

This same phenomenon – self-similarity – can be observed in many systems that were previously believed to be totally irregular and unexplainable, ranging from the weather and the economy to the course of human history. For example, each tiny daily fluctuation in the weather mirrors the climatic record of the history of the planet. Each major renaissance in history is itself made up of smaller renaissance events, whose locations in time mirror the overall pattern of renaissances throughout history. Every chaotic system appears to be adhering to an underlying order of self-similarity.

This means that our world is entirely more interdependent than we have previously understood. What goes on inside any one person's head is reflected, in some manner, on every other level of reality. So any individual being, through feedback and iteration, has the ability to redesign reality at large. Mandelbrot had begun to map the landscape of Cyberia.

It Is the Mind of God

The terrace of the Applied Sciences Building overlooks what students at University of California at Santa Cruz call ''Elf Land'' – a dense section of woods where psychedelically enhanced humans meet interdimensional beings. Back in the corridor of the building, posters of computer-generated fractal images depicting the "arithmetic limits of iterative nonlinear equations'' line the walls. The pictures nearest the terrace look like the ferns on the floor of the forest. The ones farther back look more like the arrangements of the trees above them. Posters still farther seem like aerial maps of the forest, seen from above.

The mathematician residing in this self-similar niche of academia and psychedelia is Ralph Abraham, who broke through to Cyberia on his own, and in a very different manner. He abandoned Princeton University in favor of U.C. Santa Cruz in 1968, during what he calls ''the apex of the counterculture.'' It was while taking psychedelics in huge barn "be-ins'' with his newfound friends that Abraham became familiar with what people were calling the ''emotional reality'' of numbers, and this led him to the hills and caves of the Far East where he spent several years meditating and hallucinating. On returning to the university and his computer, he embarked with renewed vigor into hyperspace to churn out the equations that explain his hallucinations and our existence.

While it seems so unlikely to the modern mind that psychedelics could contribute to real progress in mathematics and science, cyberians, for the most part, take this connection for granted. ''In the sixties,'' Abraham explains, "a lot of people on the frontiers of math experimented with psychedelic substances. There was a brief and extremely creative kiss between the community of hippies and top mathematicians. I know this because I was a purveyor of psychedelics to the mathematical community. To be creative in mathematics, you have to start from a point of total oblivion. Basically, math is revealed in a totally unconscious process in which one is completely ignorant of the social climate. And mathematical advance has always been the motor behind the advancement of consciousness. What's going on now is at least as big a thing as the invention of the wheel.''

The brief kiss Abraham witnessed was the marriage of two powerful intellectual communities, both of which had touched Cyberia – one theoretically and the other experientially. And as cyberian mathematicians like Abraham tripped out further, they saw how this kiss was itself a fractal event, marking a point in human history from which the underlying shape or order of existence – the very "roughness'' of reality – could be inferred. They had conceived and birthed their own renaissance.

Abraham has since dedicated himself to the implications of this rebirth. He sees the most important, seemingly sudden, and non sequitur events in human history – of which the kiss above is one – as part of an overall fractal curve. ''It's happened before. The Renaissance was one. Christianity is one. The troubadors in the south of France; agriculture; the new concept of time that came along with the Old Testament – they are all actually revivals. But they are more than revivals. It's sort of a spiral model where there's a quantum leap to a new level of organization and complexity.''

Today, Abraham is in his Santa Cruz office, wearing a sweatshirt, drawstring pants, and Birkenstocks. He does not sport a slide rule or pocket protector. He is Cyberia's Village Mathematician, and his words are reassuring to those who are living in a world that has already taken this quantum leap. Just as the fractal enabled Mandelbrot to comfort IBM executives about the ultimately orderly nature of their line interference, Abraham uses fractals to show how this uncharted island in history on which we have found ourselves fits into a larger picture.

''There is this fractal structure of discontinuity. If you look at the biggest discontinuities in human history, you will see they all seem to have very similar structures, suggesting a mathematical model behind the evolution of civilization.''

Abraham argues that cyberian interest in the pagan, psychedelic, spiritual, and tribal is not in the least contradictory to the advances in computer technology and mathematics. Historically, he points out, renaissance periods have always involved a resurgence of archaic elements along with the invention of new technologies and mathematical systems. The success of Cyberia, according to the bearded technosage, will depend on our ability to put these disparate elements together. ''We have emphasized integration and synthesis, trying to put everything together in one understanding, using mathematical models only as one tool. We are also open to various pagan elements like astrology, telepathy, the paranormal, and so on. We're an interesting network.''

For younger cyberians, Abraham's network provides an invaluable template by which they can direct their own activities. As Ralph would say, he ''groks'' their experience; he understands how these kids feel responsible for reshaping not only their own reality but the course of human history.

''We have to consciously interact with the creation of the future in order for it to be other than it was.'' In past renaissances, each creative birth, each intimation of what we can call "fractal reality,'' was buried by a tremendous counterrevolutionary force. ''What happened with the Renaissance? Within 200 or 250 years, it was dead again.'' Society refused to cope with Cyberia then. But the invention of the computer coupled with the undeniable usefulness and profound beauty of the fractal has made today's renaissance impossible to resist.

Valley of the Nerds

Two men are staring into a computer screen at Apple's research and development branch. While the first, a computer nerd straight out of Central Casting, mans the keyboard, beside him sits the other, John Barlow, lyricist for the Grateful Dead, psychedelics explorer, and Wyoming rancher. They watch the colorful paisley patterns representing fractal equations swirl like the aftervisions of a psychedelic hallucination. Tiny Martian colonies forming on an eerie continental coastline. The computer operator magnifies one tiny piece of the pattern, and the detail expands to occupy the entire screen. Dancing microorganisms cling to a blue coral reef. The new patterns reflect the shape of the original picture. He zooms in again and the shapes are seen again and again. A supernova explodes into weather system, then spirals back down to the pods on the leaf of a fern plant. The two men witness the creation and recreation of universes.

Barlow scratches his whiskers and tips his cowboy hat. ''It's like looking at the mind of God.''

The nerd corrects him: ''It is the mind of God.''

And as the latest kiss between the worlds of science and spirituality continues, the fractal finds its way into the new American psychedelic folklore – as evidenced by that fractal-enhanced Grateful Dead ticket.

It's the morning after a Dead show, in fact, when the young man who designed that famous concert ticket unveils his latest invention for a small group of friends gathered at his Palo Alto home. Dan Kottke, who was one of the original Apple engineers, left the company and sold off his stock to launch his career as an independent computer graphic designer. He has just finished the prototype for his first effort: a small light-up LED device that flashes words and pictures. He plugs it in and the group watches it go through its paces. It's not as trippy as a fractal, but it's pretty mesmerizing all the same. So is Kottke, who approaches the psychedelic-spiritual search with the same patience and discipline he'd use to assemble an intricate circuit board.

''When I was a freshman in college,'' he carefully removes the wires from the back of his invention, "I would take psychedelics and sit by myself for a whole day. What I arrived at was that cosmic consciousness was a completely normal thing that one day everyone would arrive at, if they would just sit and think clearly.''

Kottke, like many of the brilliant people at his home today, sees Cyberia as a logical result of psychedelics and rationality. ''That's how I became friends with Steve Jobbs. We used to take psychedelics together and talk about Buddhist philosophy. I had no idea he was connected with Woz [Steve Wozniak] or selling blue boxes [telephone dialers that allow you to make free calls] at the time. We just talked about transcendentalism and Buddhism and listened to Bob Dylan. It must have been his alter ego.''

Until Jobbs and Wozniak created the Apple personal computer, cyberian computer exploration was limited to the clunky and essentially unusable Altair brand. ''It appealed to the soldering iron kinds of hackers,'' explains Dan, "but not the spiritual kind.'' So the very invention of the personal computer, then, was in some ways psychedelics-influenced. Maybe that's why they called it Apple: the fruit of forbidden knowledge brought down to the hands of the consumer through the garage of a Reid College acid head? In any case, the Apple gave computing power and any associated spiritual insights to the public and, most important, to their children.

It's easy to understand why kids are better at learning to use computers than adults. Just like in the immigrant family who comes to America, it is the children who learn the new language first and best. When mainframe computers appeared in high schools around the country, it was the students, not the administrators, who became the systems operators. This set into a motion a ''revenge of the nerds'' on a scale we haven't yet fully comprehended. But when the computer industry was born and looking desperately for skilled programmers and developers, these kids were too young to be hired. The companies turned instead to the acid heads.

''When your brain is forming,'' explains Kottke, using his long fingers to draw pictures in the oriental rug, "it makes axons that are long, linear things, feeling their way to some part of the brain very far away to get connected. Your consciousness develops the same way. The middle teen years are about making connections between things in your mind like computers and psychedelics and fractals and music.'' Everyone is staring at the impression Dan's fingers have left in the rug, relating the pattern he's drawn to the design of the colorful weave underneath.

Kottke's soft voice grounds the group in reality once again. ''But this kind of thinking is very easily discouraged. The quelling of creativity is like a virus that gets passed down generation to generation. Psychedelics can break that cycle.'' So, according to firsthanders like Kottke, everything old becomes new again, and the psychedelics user's mind is rejuvenated to its original ability to wander and wonder. The frames and systems of logic one has been using to organize experience fall away. What better language to adopt than computer language, which is also unfettered by prejudices, judgments and neuroses?

''Consciousness is binary,'' poses Kottke, from a casual lotus position. "It's essentially digital.'' At least this is the way computers ''think.'' When information is stored digitally rather than in a picture, on a record, or even in a book of words, it is broken down into a series of yes/no's or dot/dashes. Things must be spelled out explicitly. The computer functions purely in duality but, unlike the human mind, has no interpretive grid.

One of the primary features of the psychedelic experience as it relates to the human computer hardware, believes Ron Lawrence, a Macintosh expert from Los Angeles who archives Tim Leary's writing, is that it ''reformats the hard disk and clears out the ram.'' That is, one's experience of life is reevalutated in an egoless context and put into a new order. One sees previously unrecognizable connections between parallel ways of thinking, parallel cultures, ideologies, stories, systems of logic, and philosophies. Meanwhile, trivial cares of the moment are given the opportunity to melt away (even if in the gut-wrenching crucible of intense introspection), and the tripper may reenter everyday life without many of the cognitive traps that previously dominated his interpretation of reality. In other words, the tripper gains the ability to see things in an unprejudiced manner, like the computer does.

Just like the great chaos mathematicians, great programmers must be able to come from ''a point of total oblivion'' in order to fully grok cyber language, and in the mid-1970s and early 1980s, psychedelics users were the only qualified, computer-literate people available to rapidly growing companies trying to develop software and hardware before their competitors. In the field of pure research, no one cares what an employee looks like or what kinds of drugs he eats – it's creative output that matters. Steve Jobbs felt this way, which is why his Macintosh project at Apple was staffed mostly by tie-dye – wearing young men. Today, even executives at the more establishment-oriented computer companies have been forced to include psychedelics-influenced developers in their ranks.

Chris Krauskopf, manager of the Human Interface Program at Intel, admits, ''Some of the people here are very, very, very bright. They were bored in school, and as a result they hung out, took drugs, and got into computers.'' Luckily for them, the drug tests that defense contractors such as Intel are required to give their employees cannot detect psychedelics, which are taken in microdoses. As for marijuana tests, well, it's gotten pretty easy to predict when those are coming, and a phone call or two from personnel executives to the right people in Research and Development can easily give, say, forty-eight hours' notice. ...

A high-level personnel executive from a major Southern California defense contractor admits that the company's biggest problem now is that ''alternative culture members'' are refusing to work for them. In a secret, off-the-record lunch talk, the rather elderly gentleman said, between sips of Earl Grey, that the "long hairs we've hired have the ability to attack computer problems from completely different angles. It would be interesting to take the plans of a stealth bomber and trace back each innovation to the computer it was drawn on. I bet the tie-dyes would win out over the pocket-protectors every time.'' According to him, the company's biggest problem now is finding programmers willing to work for a defense industry contractor. ''They're all against the idea of making weapons. We may not be able to meet our production schedule – we may lose contracts – because we can't get enough of them to work for us.''

Marc de Groot, a programmer and virtual-reality designer from San Francisco, understands why companies in the defense industry might depend on cyberians. ''My question to you is: Which is the less moral of the two propositions: doing drug testing on your employees, or doing defense contracting in the first place? That's the real question: Why are a bunch of acid heads working for a company that makes weapons?'' De Groot's two-bedroom apartment in the hills is modestly appointed with furniture that looks like leftovers from his college dorm room. Trouble is, de Groot didn't go to college. After three tries, he realized he could learn more about computers by working for his university as a programmer than by taking their classes, so he dropped out as a student and dropped back in as an employee.

''I think that people who like to expand their minds with things like higher math and computers and media are fundamentally the same people who would want to expand their minds with anything available. But this is a very bad political climate for talking about all this. You can't mix a thing like drugs with any intellectual endeavor and have it stay as credible.'' Yet, de Groot's apartment – which has one small bedroom dedicated to life's comforts and the rest filled with computer hardware – shows many signs of the alternative culture he prefers to keep out of the public eye. Dan Kottke's fractal Grateful Dead ticket is pinned to the wall next to the computer on which de Groot designed sound systems for VPL, the leading "virtual reality'' interface design firm.

Psychedelics are a given in Silicon Valley. They are an institution as established as Intel, Stanford, marriage, or religion. The infrastructure has accommodated them. Word of which companies are ''cool'' and which are not spreads about as rapidly as Dead tickets. De Groot finds his "user-friendly'' employment opportunities on the WELL, an acronym for Whole Earth `Lectronic Link, or on other bulletin board services (BBSs).

''One of the articles that goes around on a regular basis is a list of all the companies that do urine testing in the Silicon Valley. So you can look it up ahead of time and decide that you don't want to apply. Computer programmers have set up this information service because they know that a lot of their friends and they themselves use these drugs.''

De Groot pauses. He is careful not to implicate himself, but his emotions are running high. ''And even more than that, people who don't use the drugs are outraged because of the invasion of privacy. They just feel like it's an infringement on civil liberties. And I think they're right. I have a friend who applied simultaneously at Sun Micro Systems and Xerox Park, Palo Alto Research Center. And he found out – and he's someone who uses drugs – he found out that Xerox Park was gonna do a urine test so he dried out and he went in and did the urine test and passed and then they offered him the job, and he said, `I'm not taking the job because you people do urine testing and I'm morally opposed to it,' and he went to work for Sun. Sun does not do urine testing. They're very big on not doing it. I think it's great.''

Not surprisingly, Sun Micro Systems' computers run some of the most advanced fractal graphics programs, and Intel – which is also quite ''Deadhead-friendly,'' is an industry leader in experimental technologies like virtual reality. The companies that lead in the Valley of the Nerds are the ones that recognize the popularity of psychedelics among their employees. Still, although they have contributed to or perhaps even created the computer revolution, psychedelics-using cyberians feel like a persecuted sect in an oppressive ancient society that cannot see its own superstitious paranoia. As an engineer at a Microsoft research facility complains, drug testing makes her feel like the "target victim of an ancient voodoo spell.''

From the cyberian perspective, that's exactly what's going on; so computer programmers must learn not to give any hair or bodily fluids to their employers. The confiscated parts are being analyzed in scientific ''rituals'' that look into the employee's past and determine whether she has engaged in her own rituals – like smoking pot – that have been deemed heretical by the dominating religious body. In this case, that dominating body is the defence industry, and the heretics are pot smokers and psychedelics users, who have demonstrated a propensity to question the justifiability of the war machine.



Поделиться книгой:

На главную
Назад