Prefiguring the Hacker…and the American Surveillance Society

Perhaps the first piece of fiction to feature a computer-systems hacker is Poul Anderson’s 1953 story Sam HallPlace and date of birth. Parents. Race. Religion. Educational, military, and civilian service records…The total signal goes out over the wires. Accompanies by a thousand others, it shoots down the last cable and into the sorter unit of Central Records. The distorted molecules in a particular spool show the pattern of Citizen Blank, and this is sent back. It enters the comparison unit, to which the incoming signal corresponding to him has also been shunted. The two are perfectly in phase; nothing wrong. Citizen Blank is staying in the town where, last night, he said he would, so he has not had to file a correction.

Thornberg has certain reservations about the totalitarian regime which is now running America, but he is not actively disloyal. His political awakening begins when Jimmy, the son of his second cousin, is arrested on suspicion of treason, and Thornberg remembers some of the forbidden history which he has read.

The intellectuals had been fretful about the Americanization of Europe, the crumbling of old culture before the mechanized barbarism of soft drinks, hard sells, enormous chrome-plated automobiles (dollar grins, the Danes had called them), chewing gum, plastics…None of them had protested the simultaneous Europeanization of America: bloated government, unlimited armament, official nosiness, censors, secret police, chauvinism…

In order to protect the career of his son Jack, an officer in the regime’s military…as well as his own career…Thornberg decides to alter Matilda’s records and delete any relationship with the arrested Jimmy.

Thornberg toiled at the screens and buttons for an hour, erasing, changing. The job was tough; he had to go back several generations, altering lines of descent. But when he was finished, James Obrenowicz had no kinship whatever to the Thornbergs…He slapped the switch that returned the spool to the memory banks. With this act do I disown thee.

Thornberg’s rising bitterness reminds him of an old English ballad:

My name it is Sam Hall
And I hate you one and all

…and he uses his access to Matilda to create records for a fictional citizen by that name, a tough kid who has held a variety of unskilled jobs. Thornberg initially creates Sam Hall only as an outlet for his anger and to prove to himself that he can do it…but when a probably-innocent man is arrested for murder of a security officer…and Thornberg knows the man will be found guilty, whatever the true facts, in order to protect Security’s reputation for infallibility…he decides to establish a trail of records that will implicate the fictional Sam Hall as the murderer.

This is the beginning of Sam Hall’s career of murder and mayhem, as Thornberg repeatedly alters records to identify his fictional citizen as the author of real crimes across the country. Sam Hall is soon promoted to Public Enemy Number One…and his exploits soon inspire a range of copycat crimes against the government, with the attackers identifying themselves as “Sam Hall.”

The “Sam Hall” meme soon grows into a full-scale rebellion against the government. Thornberg helps things along by using his access to Matilda to spread mutual suspicion among government officials, turning the widespread distrust which is a feature of totalitarian societies against the regime itself.

Eventually, the rebels triumph and the totalitarian regime that is ruling America is overthrown. It seems a happy ending. Thornberg looks forward to destroying Matilda (after she is used one last time on behalf of the rebels “to help us find some people rather badly want” and “to transcribe a lot of information..strictly practical facts”) and to retiring Sam Hall to “whatever Valhalla there is for great characters of fiction.”

The story ends with the following sentence:

Unfortunately the conclusion is rugged. Sam Hall never was satisfied.

I wonder what on earth could possibly have reminded me of this old SF story?

1 thought on “Prefiguring the Hacker…and the American Surveillance Society”

Comments are closed.