Philosophy & Technology

, Volume 29, Issue 1, pp 5–19 | Cite as

Hackers in Hiding: a Foucaultian Analysis

  • Ejvind HansenEmail author
Research Article


On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given. In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are the contingent background of the ongoing conflict. By bracketing the analyses of hidden intentional structures, the happy positivist is thus able to facilitate deeper understandings of the prevailing structures of hiding.


Michel Foucault Hiding Hacking Business ethics Open source 


  1. Abbate, J. (2000). Inventing the internet. USA: The MIT Press.Google Scholar
  2. Bedau, H. A. (2002). Civil disobedience in focus. London, New York: Routledge.Google Scholar
  3. Douglas, M. (1992). Risk and blame: essays in cultural theory. New York: Routledge.CrossRefGoogle Scholar
  4. Drew, C., & Shane, S. (2013). Résumé shows snowden honed hacking skills. The New York Times.Google Scholar
  5. Feenberg, A. (1992). Subversive rationalization: technology, power and democracy. Inquiry: An Interdisciplinary Journal of Philosophy, 35(3–4), 301–322.CrossRefGoogle Scholar
  6. Feenberg, A. (2002). Transforming technology: a critical theory revisited. New York: Oxford University Press.Google Scholar
  7. Fine, G. S. (2001). To issue or not to issue: analysis of the business method patent controversy on the internet. Boston College Law Review, 42(5), 1195–1214.Google Scholar
  8. Flynn, B. C. (1987). Foucault and the body politic. Man and World, 20, 65–84.CrossRefGoogle Scholar
  9. Foucault, M. (1977). Cours du 7 et 14 janvier 1976. In D. Defert, F. Ewald, & J. Lagrange (Eds.), Dits et écrits 1954–1988 (pp. 160–189). Paris: Galimard.Google Scholar
  10. Foucault, M. (1969a). L’archéologie du savoir. Paris: Gallimard.Google Scholar
  11. Foucault, M. (1976). La volonté de savoir. Histoire de la sexualité I. Paris: Gallimard.Google Scholar
  12. Foucault, M. (1971). L’ordre du discours: Leçon inaugurale au collège de France prononcée le 2 décembre 1970. Paris: Gallimard.Google Scholar
  13. Foucault, M. (2004). In F. Ewald, A. Fontana, & M. Senellart (Eds.), Naissance de la biopolitique: cours au Collège de France (1978–1979). Paris: Gallimard: Seuil.Google Scholar
  14. Foucault, M. (1963). Naissance de la clinique: une archéologie du regard médical. Paris: Presses Universitaires de France.Google Scholar
  15. Foucault, M. (1990). Qu’est-ce que la critique? (Critique et Aufklarung). Bulletin de la Societe Francaise de Philosophie, 84(2), 35–63.Google Scholar
  16. Foucault, M. (1984). Qu’est-ce que les Lumières? In D. Defert, F. Ewald, & J. Lagrange (Eds.), Dits et écrits 1954–1988 (pp. 562–578). Paris: Galimard.Google Scholar
  17. Foucault, M. (1969b). Qu’est-ce qu’un auteur? In D. Defert, F. Ewald, & J. Lagrange (Eds.), Dits et écrits 1954–1988 (pp. 789–821). Paris: Galimard.Google Scholar
  18. Foucault, M. (1998). The history of sexuality. London: Penguin.Google Scholar
  19. Galloway, A. R. (2004). Protocol: how control exists after decentralization. Cambridge: MIT Press.Google Scholar
  20. Habermas, J. (1985). Der philosophische Diskurs der Moderne: zwölf Vorlesungen. Frankfurt am Main: Suhrkamp.Google Scholar
  21. Hall, B. H. (2003). Business Method Patents, Innovation, and Policy.Google Scholar
  22. Hansen, E. (2005). The foucault-habermas debate: The reflexive and receptive aspects of critique. Telos, 130, 63–83.Google Scholar
  23. Himanen, P. (2001). The hacker ethic and the spirit of the information age. New York: Random House.Google Scholar
  24. Hoglund, G., & Butler, J. (2005). Rootkits: subverting the Windows kernel. Upper Saddle River, NJ: Addison-Wesley.Google Scholar
  25. Ihde, D. (1998). Expanding hermeneutics: visualism in science. Evanston, Ill: Northwestern University Press.Google Scholar
  26. Kelly, M. (1994). Critique and power: recasting the Foucault/Habermas debate. Cambridge: MIT Press.Google Scholar
  27. Klang, M. (2004). Civil disobedience online. Journal of Information, Communication and Ethics in Society, 2(2), 75–83.CrossRefGoogle Scholar
  28. Leigh, D. (2011). Wikileaks: inside Julian Assange’s war on secrecy (1st ed.). New York: Public Affairs.Google Scholar
  29. Lessig, L. (2006). Code: version 2.0. New York: Basic Books.Google Scholar
  30. Perens, B. (1999). The open source definition. In C. DiBona, S. Ockman, & M. Stone (Eds.), Open sources: Voices from the open source revolution (pp. 171–188). Beijing: O’Reilly Media, Inc.Google Scholar
  31. Raymond, E. S. (1999). A brief history of Hackerdom. In C. DiBona, S. Ockman, & M. Stone (Eds.), Open sources: voices from the open source revolution (pp. 19–29). Beijing: O’Reilly Media, Inc.Google Scholar
  32. Raymond, E. S. (2001). The cathedral and the bazaar: musings on Linux and open source by an accidental revolutionary, revised edition 2. Sebastopol: O’Reilly Media, Inc.Google Scholar
  33. Raymond, E. S. (1996). The new hacker’s dictionary. Cambridge, Mass.: MIT Press.Google Scholar
  34. Ross, A. (1991). Hacking away at the counterculture. In C. Penley & A. Ross (Eds.), Technoculture (pp. 107–134). Minnesota: University of Minnesota Press.Google Scholar
  35. Saco, D. (2002). Cybering democracy: public space and the internet. Minneapolis: University of Minnesota Press.Google Scholar
  36. Schwartz, M. (2008). The trolls among us.Google Scholar
  37. Stallman, R. (2005). Patent absurdity.Google Scholar
  38. Stallman, R., 2004. The dangers of software patents.Google Scholar
  39. Stallman, R. (1991). Why software should be free. Available at: [Accessed December 7, 2011].
  40. Stallman, R.M. (2002). Free software, free society: selected essays of Richard M. Stallman J. Gay, ed., Boston, Mass.: GNU Press.Google Scholar
  41. Taylor, P. A. (1999). Hackers: crime in the digital sublime. London: Routledge.CrossRefGoogle Scholar
  42. Thomas, D. (2002). Hacker culture. Minneapolis: University of Minnesota Press.Google Scholar
  43. Vegh, S. (2003) Classifying forms of online activism: The case of cyberprotests against the world bank. In M. McCaughey & M. D. Ayers (Eds.), Cyberactivism: online activism in theory and practice (pp. 71–96) New York: Routledge.Google Scholar
  44. Wark, M. (2004). A hacker manifesto. Cambridge, Mass.: Harvard University Press.Google Scholar
  45. Young, R. (1999). Giving it away. How Red Hat software stumbled across a new economic model and helped improve an industry. In C. DiBona, S. Ockman, & M. Stone (Eds.), Open sources. Voices from the revolution (pp. 113–125). Sebastopol: O’Reilly Media, Inc.Google Scholar
  46. Zittrain, J. (2008). The future of the internet: and how to stop it. New Haven Conn.: Yale University Press.Google Scholar
  47. Zittrain, J. L. (2006). The generative internet. Harvard Law Review, 119, 1974–2040.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Danish School of Media and JournalismAarhusDenmark

Personalised recommendations