They became associated with industrial music with the 1980 release of their album White Souls in Black Suits on Industrial Records, although in reality the early material that predates this release is a blend of extreme electronics and frequencies that was heard only by a spartan few, including Jhon Balance and other notaries. (This early archive material, which includes the Sex Works Beyond Entanglement 12" EP (1979) originally planned for release by Cherry Red with the tracks Throbbing Sweeping Obscene/Coil/The Pop Hell, is due for release with a number of other extreme pure-electronic compositions and will readdress the morphology of DVA history.) The album Thirst followed in 1981, by which time Adi Newton and Steven Judd Turner had combined musique concrète techniques with guitar, bass, and drum instrumentation, fused with Newton's unique art direction and existential lyrics and writing.
After the tragic death of Steven Judd Turner, Adi Newton formed a new version of the band in 1983. First releasing the singles Passions Still Aflame and High Holy Disco Mass on the major label Polydor under the name DVA, the group then released the album Advantage (along with several singles). During a European tour a dispute amongst the musicians occurred resulting in Adi Newton disbanding the group. However the remaining musicians attempted an abortive continuation of the tour without him, which resulted in negative reaction from DVA fans appalled by Newton's absence.
After the 1983 breakup of Clock DVA, Adi Newton put in process his original concept of the multimedia arts project The Anti-Group aka T.A.G.C., which staged a number of performances directed and choreographed solely by Adi Newton. T.A.G.C. released a series of films and recordings, namely The Disscussion Anti-Theatre piece/Dual 16mm Film and Soundtrack, Ha/Zulu, ShT, Big Sex, The Ambisonic Album Digitaria, Meontological Recording Record 1, Meontological Recording Record 2 (Teste Tones), Burning Water Film/ Soundtrack, and Iso-Erotic Calibrations.
In 1987 Adi Newton, while still working within TAGC, allowed a reformation of DVA. He was at the time experimenting with computer sound sampling techniques and sequencing and had already created a blueprint for a track originally titled "Diamond Bullet," which later became "The Hacker." This reformed line-up consisted of creative director Adi Newton; vocalist, sound designer, Dean Dennis; and Paul Browse. From this line-up came the album Buried Dreams.
After the release of Buried Dreams and a series of singles taken from the album, a number of problems occurred. Paul Browse left to try to resolve issues with the record label in Berlin but remained in Germany and never returned. As a result, Robert Baker joined the line up, which then released the albums Man-Amplified and Digital Soundtracks. Dean Dennis left to start work on a new project. The album Sign followed during a transitional period in which Adi Newton relocated to Italy, taking Clock DVA/TAGC with him as sole director and reactivating the project in a new direction.
Adi Newton and creative partner Jane Radion Newton are currently working on the remastered release of their whole back catalog, which was set to be released in the autumn of 2008 by Mute records as a box set including a 120-page book. They are also working with invited guest artists on new Clock DVA/TAGC studio albums, which are scheduled for a 2009 release to coincide with a number of key European performances and installations.
Sites: YouTube and http://MySpace.com/ClockDVAauthorized (official)
Hacker / Hacked
Clock DVA Lyrics
Jump to: Overall Meaning ↴ Line by Line Meaning ↴
Programmed by mathematical terrorists
Outside of mortal bounds
Silently hacking
A binary plague
Serving information
This is the time of the hacker
This is the code of the hacker
An algebra of fear
Within the language of machines
Uninfringed my human emotions
Within global systems
Silently moving
A digital maze
Cutting information
This is the way of the hacker
This is the extremity of the hacker
This is the hacker
Protect now or be erased forever
A binary virus
Unleashed by subversive programmers
Inside corporate systems
Silently eating
The endemic wave
Erasing information
This is the sign of the hacker
This is the genius of the hacker
This is the hacker
Learn now
Or be cut down forever
Clock DVA's song "Hacker Hacked" is a commentary on the emergence of hacker culture in the early days of computing. The lyrics describe the digital underworld of mathematical terrorists and subversive programmers who operate outside of mortal bounds, silently hacking into global systems to serve information or erase it forever. The song portrays the hacker as a master of the language of machines, with an algebra of fear and an extremity that is uninfringed by human emotions. The lyrics warn that if we do not protect ourselves from these binary viruses, we will be erased forever.
The song's chorus emphasizes the power of the hacker, stating "This is the time of the hacker, this is the code of the hacker, this is the hacker." The repetition of this phrase creates a sense of urgency, urging the listener to pay attention to the threat posed by hackers. The verses offer glimpses into the inner workings of the digital underworld, describing hackers as masters of a "digital maze" and "cutting information" to suit their needs.
The lyrics also convey a sense of admiration for the hacker's genius, describing them as the "sign of the hacker" and the "genius of the hacker." Clock DVA's use of language in the song creates a sense of mystery and intrigue around the figure of the hacker, depicting them as a fearsome and enigmatic presence in the world of computing.
Line by Line Meaning
A digital murder
A computer-based act of killing or destruction
Programmed by mathematical terrorists
Executed by hackers with an expertise in mathematics to attain their goals
Outside of mortal bounds
The act of hacking is beyond the scope of human limitations
Silently hacking
Hacking being done in secrecy and without any physical noise or disturbance
A binary plague
A malicious and contagious program that replicates and spreads from one system to another in the form of binary code
Serving information
Extracting confidential data for hackers' personal or malicious purposes
This is the time of the hacker
The era of computer technology and internet usage, that has provided a platform for hackers to carry out their activities
This is the code of the hacker
The set of principles and software guidelines developed and shared among hackers to carry out their activities
This is the hacker
Refers to the identity of hackers, who exist as a group in the society of technology
An algebra of fear
Hacking techniques formulated on the foundation of human anxiety and terror
Within the language of machines
Hacking skills improvised and crafted in binary machine language
Uninfringed my human emotions
Hacking being done without any influence from emotions or conscience
Within global systems
The impact of hacking being felt at an international level
Silently moving
Hacker's activity being carried out without being seen or detected
A digital maze
A complex and intricate network of security measures designed for hackers to penetrate
Cutting information
Hacking being done to modify, control, or steal data for the hacker's advantage
This is the way of the hacker
The methodology adapted by hackers to achieve their objectives
This is the extremity of the hacker
The hacker’s activity that is pushed to its outermost limit and danger level
This is the hacker
The term denoting criminals or experts in the field of hacking
Protect now or be erased forever
The warning that all systems and users of technology must take precautions or lose everything
A binary virus
A contagious program that can penetrate and infect computer systems and networks
Unleashed by subversive programmers
The release of viruses being done by programmers with malicious intent
Inside corporate systems
The targeting of business systems and confidential data by hackers
Silently eating
Hacking activity that slowly and secretly erodes the integrity of the victim's system
The endemic wave
The widespread and infectious impact of cyber hacking, like a rising tide or plague
Erasing information
The act of deleting or destroying vital and sensitive information by hackers
This is the sign of the hacker
The indication or evidence of the existence of hackers and their effect on technology and its users
This is the genius of the hacker
The high level of skill and intelligence required for hackers to carry out complex computer-based activities
This is the hacker
The idea of a hacker as a powerful persona, with the capability to wield enormous influence and cause massive damage
Learn now
A cautionary warning for users to educate themselves about protecting their systems and security
Or be cut down forever
A threat that any failures in cybersecurity practices can result in catastrophic outcomes for users and companies alike
Contributed by Allison G. Suggest a correction in the comments below.
@michaelwilloughby1636
I know this album from somewhere
@powerragedeath
hack the information. best beat
@user-ek5zi9cd9x
アナログ盤で聴くべき。脳が浮遊します😵。
@guantino36
Reprogrammed (1) (1) 0:00
Reprogrammed (1) (2) 5:44
Reprogrammed (1) (3) 11:28
durations of tracks in Tempodisc 189
( https://www.discogs.com/CLOCKDVA-Hacker-Hacked/release/352650 ) and in your audio don't match with cover picture in your video.
p.s. on 11 jul 2021; the duration does not even match with the sleeve photo on discogs, which is identical to that of O.P.
@DanielDiaz-tv2nw
Do you know if the vinyl versions of this are the same tunes? duration on vinyl is seven minutes, thanks!
@guantino36
@@DanielDiaz-tv2nw it is a mess!!!
please study all the versions on https://www.discogs.com/it/ClockDVA-The-Hacker/master/5412 and https://www.discogs.com/it/CLOCKDVA-The-Hacker-The-Act/release/191056
@michaelwilloughby1636
I know this album from somewhere
@kineticengineers899
Do you like it ...