
For example, some hackers believe computer security is an aberration because it restricts access to data.


As renowned hacker Richard Stallman asserts, this is not “free” in the sense of “free beer” but free as in “free speech.” This belief can sometimes get hackers into trouble. The second value of the hacker ethic described by Levy is related to the first: “All information should be free.” A common and related proclamation made by many hackers is that information wants to be free - a saying first articulated by Steward Brand in the aforementioned panel discussion among various hackers in the 1980s following the publication of Steven Levy’s Hackers. This component of the hacker ethic has parallels with other do-it-yourself subcultures present among many punks and anarchist groups. This tendency can lead to creating new or improved systems as well as an ability to manipulate them. Rather than passively consume technology and media, hackers instead choose to study and tinker with systems. This value also indicates a desire to actively engage technology and data, a trait Levy that labels the hands-on imperative. The ability to work directly with technology allows both the hacker and the technology to operate fully - neither can function optimally without the other.

Always yield to the Hands-On Imperative!” While not a complete categorical imperative for all hackers, many believe that access to technology is a fundamental value and even a right that should be afforded to all. The first value is defined as follows: “Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total.

Steven Levy, author of the foundational hacker history Hackers: Heroes of the Computer Revolution, coined the term “the hacker ethic.” Stemming from his interviews with numerous members of the TMRC, HBCC, and others, Levy articulates six core values that underpin this ethic, which, for some, has become the primary gospel of describing hacker culture - or, at the very least, the “golden age” of hacking. The following is an excerpt of Hacked: A Radical Approach to Hacker Culture and Crime, published by New York University Press.
