TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentralTechCentral
    NEWSLETTER
    • News

      Google’s giant Equiano Internet cable has landed in South Africa

      8 August 2022

      The African tech start-ups eyeing global markets

      8 August 2022

      Karpowership loses bid to overturn environmental ruling

      8 August 2022

      New app launched to tackle potholes in South Africa

      8 August 2022

      Rogue database felled Capitec in its worst-ever IT outage

      7 August 2022
    • World

      Nvidia issues profit warning on slump in demand for graphics cards

      8 August 2022

      Buterin: Mining on Ethereum Classic won’t affect Merge

      8 August 2022

      Musk challenges Twitter CEO to a public debate

      7 August 2022

      Amazon splashes $1.7-billion on Roomba maker iRobot

      5 August 2022

      Nigeria asks Google to block banned groups from YouTube

      5 August 2022
    • In-depth

      The length of Earth’s days has been increasing – and no one knows why

      7 August 2022

      As Facebook fades, the Mad Men of advertising stage a comeback

      2 August 2022

      Crypto breaks the rules. That’s the point

      27 July 2022

      E-mail scams are getting chillingly personal

      17 July 2022

      Webb telescope’s stunning images of the cosmos

      12 July 2022
    • Podcasts

      How South Africa can woo more women into tech

      4 August 2022

      Book and check-in via WhatsApp? FlySafair is on it

      28 July 2022

      Interview: Why Dell’s next-gen PowerEdge servers change the game

      28 July 2022

      Demystifying the complexity of AI – fact vs fiction

      6 July 2022

      How your organisation can triage its information security risk

      22 June 2022
    • Opinion

      SIU seeks to set aside R215-million IT tender

      19 July 2022

      No reason South Africa should have a shortage of electricity: Ramaphosa

      11 July 2022

      Ntshavheni’s bias against the private sector

      8 July 2022

      South Africa can no longer rely on Eskom alone

      4 July 2022

      Has South Africa’s advertising industry lost its way?

      21 June 2022
    • Company Hubs
      • 1-grid
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»In-depth»Computer viruses as an art form

    Computer viruses as an art form

    In-depth By Agency Staff19 February 2016
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    computer-virus-640

    Computer viruses now have their own museum. The recently opened online Malware Museum exhibits samples of early viruses that often include amusing graphics or popular culture references. But the significance of viruses goes beyond funny curiosities from the 1980s and 1990s.

    The practice of creating viruses became an important subculture and part of new sorts of cultural activities, practices and interests. We too often think that all malware is by necessity just vandalism or criminal activity. The actual skills of coding them — even with simple scripts — may be just a hobby for some, but it’s an art form for others. And viruses themselves are cultural objects that tell the story of contemporary security.

    Exhibits in the Malware Museum, which is based on the personal collection of the prominent Finnish virus researcher Mikko Hyppönen, demonstrate how viruses in the 1980s and 1990s crystallised both cultural stories and fears. One program that displayed the words “Frodo lives” on an infected computer’s screen referred directly to the character from JRR Tolkein’s The Lord of The Rings. But it was also a nod to a phrase made popular during the hippie era, reflecting the influence of 1960s counterculture on the nascent tech scene.

    The name of the “Skynet” virus, meanwhile, is a reference to the Terminator films. But it also gives a perhaps tongue-in-cheek reminder of the possibility of artificial intelligence one day surpassing and subjugating or destroying humanity. In this way, computer viruses almost provide their own version of speculative science fiction. They have even been discussed in research on the possibility of creating artificial life.

    The way computer viruses were portrayed in the 1980s and 1990s also reflected contemporary concerns about HIV and Aids. The fear of computer viruses spreading through digital contagion was similar to a fear of touch in many discussions of the era. In the late 1980s, some warned that “[viruses] might do to computers what Aids has done to sex”, and computers had to have their own prophylactics and guidance for safe use.

    Into the mainstream

    The cultural significance of malware and its potential for creativity has also infected the more mainstream art world over the last couple of decades. Artists such as Joseph Nechvatal incorporated viral code into new forms of digital painting to infect and break down the images produced.

    Associated avant-garde art techniques of randomness and variation became part of digital visual culture.

    The custom-programmed Biennale.py virus was released on disc by the Slovenian Pavilion of the 2001 Venice Biennale of 2001. This was not a work of malice but an investigation into how contagion works as part of computer culture and the art world. As well as appearing in viral digital format, the source code was sold on printed t-shirts and CD-ROMs, demonstrating how the commercial art world can turn even potentially malicious software into a saleable commodity. In doing so, the little piece of code also became a socially contagious object in the art market.

    Many net and software art projects dealing with viruses have attempted to debate digital security, and in many cases asked how malware is related to issues of privacy and control. Hacker-artist Luca Lampo, for example, has suggested that the fear of computer viruses and other “monsters” of digital culture was part of a longer history of projected (Western) fears, replacing previous monsters such as Soviet Russia.

    Today we have seen a shift from malware being written predominantly by individuals and hobbyists to its development by organised criminals and state agencies, who are less interested in seeing their creations as art or cultural objects. The most famous piece of malware of recent years is probably the Stuxnet worm, which was discovered in 2010 and targeted Iranian nuclear infrastructure and was supposedly programmed with American-Israeli support.

    This kind of state-sponsored malware compromises security on a wider scale than individual pieces of viral code. As such, information leaks, insecure websites and state surveillance have become a bigger social concern than annoying home-made viruses, particularly discussed after the revelation by Edward Snowden that governments capture and process bulk Internet and other data from their citizens.

    Artworks such as Holly Herndon’s Home song and music video directed by Metahaven describe how our personal relationship with digital culture has been compromised by this kind of surveillance and hacking. Modern cyberwarfare has made us vulnerable to a multitude of technical attacks, including the ones designed by our own governments. The malware museums of the future will have to include the extensive measures taken by state intelligence agencies in the name of cyber defence, with civilian casualties included. The problem is much of that data is likely to be secret, stored in the data centres and server farms of government agencies.The Conversation

    • Jussi Parikka is professor in technological culture and aesthetics, University of Southampton
    • This article was originally published on The Conversation
    Jussi Parikka Malware Museum Mikko Hyppönen
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleMTN warns profits to fall sharply
    Next Article Why Apple is making a stand against the FBI

    Related Posts

    Nvidia issues profit warning on slump in demand for graphics cards

    8 August 2022

    Buterin: Mining on Ethereum Classic won’t affect Merge

    8 August 2022

    Musk challenges Twitter CEO to a public debate

    7 August 2022
    Add A Comment

    Comments are closed.

    Promoted

    You don’t need a call centre to take advantage of call centre technology

    5 August 2022

    Black man, you are still on your own

    5 August 2022

    UC&C interoperability offers businesses operational cost relief in tough times

    4 August 2022
    Opinion

    SIU seeks to set aside R215-million IT tender

    19 July 2022

    No reason South Africa should have a shortage of electricity: Ramaphosa

    11 July 2022

    Ntshavheni’s bias against the private sector

    8 July 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.