802 lines
44 KiB
Plaintext
802 lines
44 KiB
Plaintext
|
|
|||
|
|
|||
|
Computer underground Digest Sun Nov 29, 1992 Volume 4 : Issue 61
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Boffo Idolater: Etaion Shrdlu, Junior
|
|||
|
|
|||
|
CONTENTS, #4.61 (Nov 29, 1992)
|
|||
|
File 1--Crackdown on Reality (Review of THE HACKER CRACKDOWN)
|
|||
|
File 2--Some thoughts on "The Hacker Crackdown"
|
|||
|
File 3--The Hacker Crackdown
|
|||
|
File 4--Hacker Crackdown Review
|
|||
|
File 5--Remembering the Hacker Crackdown
|
|||
|
File 6--Bruce Sterling & Cyberhemian Rhapsodies
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
|||
|
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
|||
|
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
|||
|
libraries; from America Online in the PC Telecom forum under
|
|||
|
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
|
|||
|
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
|
|||
|
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
|
|||
|
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
|
|||
|
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
|
|||
|
in /pub/text/CuD.
|
|||
|
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
|||
|
Back issues also may be obtained from the mail
|
|||
|
server at mailserv@batpad.lgb.ca.us.
|
|||
|
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Some authors do copyright their material, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Tue, 6 Oct 92 19:55:56 MDT
|
|||
|
From: ahawks@NYX.CS.DU.EDU(gogo is insane)
|
|||
|
Subject: File 1--Crackdown on Reality (Review of THE HACKER CRACKDOWN)
|
|||
|
|
|||
|
|
|||
|
CRACKING DOWN ON REALITY
|
|||
|
|
|||
|
A review of Bruce Sterling's THE HACKER CRACKDOWN:
|
|||
|
LAW AND DISORDER ON THE ELECTRONIC FRONTIER
|
|||
|
|
|||
|
by Andy Hawks (ahawks@nyx.cs.du.edu)
|
|||
|
|
|||
|
|
|||
|
THE HACKER CRACKDOWN:
|
|||
|
LAW AND DISORDER ON THE ELECTRONIC FRONTIER
|
|||
|
by Bruce Sterling
|
|||
|
Bantam Books, 1992
|
|||
|
Non-fiction, 328 pp., $23 (hard-cover)
|
|||
|
ISBN 0-553-08058-X
|
|||
|
|
|||
|
My eyeballs are squirming. Squirming out of their sockets.
|
|||
|
Wanna know why? Ok, I'll tell you, but be warned - it is not a
|
|||
|
pleasant experience to have your eyeballs squirm.
|
|||
|
|
|||
|
"Theoretically, the task force had a perfect legal right to
|
|||
|
raid any of these people, and legally < could have seized
|
|||
|
the machines of anybody who < subscribed to Phrack." <
|
|||
|
|
|||
|
Well, I told you so. You can't say I didn't warn you. And, by
|
|||
|
the way, please stop looking at me while your eyeballs are squirming.
|
|||
|
|
|||
|
There is no doubt in my mind that T.S. Eliot was reading Bruce
|
|||
|
Sterling's new non-fiction book entitled THE HACKER CRACKDOWN: LAW
|
|||
|
AND DISORDER ON THE ELECTRONIC FRONTIER when he said "Human kind Can
|
|||
|
not bear very much reality." No doubt, no doubt.
|
|||
|
|
|||
|
I subscribe to Phrack, and I'm sure many of you do as well, or
|
|||
|
have at least pondered and wandered your way through an issue or two
|
|||
|
if you have even any remote connection to the cyberspace underground.
|
|||
|
In case you're lost, I'll fill you in. Phrack is a magazine, but you
|
|||
|
can't buy it at your local newsstand. Phrack might be considered in
|
|||
|
some circles to be the keystone of what we commonly call the computer
|
|||
|
underground - that dark, mysterious, anarchistic domain of rebellion
|
|||
|
occupied by a stereotypically benign group of goggled white faces, 140
|
|||
|
IQs, and Mt. Dew addicts - the hacker. Phrack is also one of the many
|
|||
|
landmarks Bruce Sterling points out on his wonderfully lucid trip
|
|||
|
through this unreal domain dominated by fear, greed, and power.
|
|||
|
|
|||
|
Knowledge is power. Information is knowledge. Information wants
|
|||
|
to be free. Such is the ethos of the hacker. And thus we have laid
|
|||
|
out before us the battleground upon which an incredible struggle of
|
|||
|
superegos is waged. On the one hand we have the computer hacker, the
|
|||
|
teenage boy with a heightened sense of curiosity and the initiative
|
|||
|
enough to take some action to satisfy this incredible hunger. On the
|
|||
|
other end of the keyboard we have the government, the CEOs, the powers
|
|||
|
that be.
|
|||
|
|
|||
|
Computer hacking is just another example of social deviance,
|
|||
|
rebellion, and a desire to make one's reality fit one's personal
|
|||
|
wishes and desires. This is natural. Yet somewhere along the line,
|
|||
|
this natural tendency to rebel took on new meaning, acquired a scope
|
|||
|
of infinite importance, and was thrust into a world where the ability
|
|||
|
to obtain immense power via hacking was real, concrete, and
|
|||
|
threatening.
|
|||
|
|
|||
|
It is this deviance and rebellion that Bruce Sterling shows us in
|
|||
|
THE HACKER CRACKDOWN. Hackers are not an easy thing to explain mind
|
|||
|
you, and to delve into the world of the computer underground is to
|
|||
|
find one's self in a surreal painting filled with confusion and delusion
|
|||
|
concerning the basic moral, ethical, legal, and philosophical
|
|||
|
questions that plague modern society - the information society.
|
|||
|
|
|||
|
It has been attempted before. Cliff Stoll, whom I liken to
|
|||
|
"Sherlock Holmes on acid living in Berkeley" because of his extremely
|
|||
|
inventive and non-conventional line of thought, has shown us the
|
|||
|
computer underground via his first-hand encounters with "the other
|
|||
|
side" and asks himself who "the other side" really is. Cliff Stoll's
|
|||
|
THE CUCKOO'S EGG is rich in adventure and "car-chases in cyberspace",
|
|||
|
yet it fails at even attempting to put "the hacker problem" in
|
|||
|
perspective. In retrospect, the egg is fried. (But fried eggs,
|
|||
|
though not the most wonderfully healthy breakfast choice, are still
|
|||
|
tasty).
|
|||
|
|
|||
|
On the other hand, we have Steven Levy and his classic among the
|
|||
|
computer literate, HACKERS. Yet in the constantly changing
|
|||
|
technocratic society we seem to reside in, Levy may be found sitting
|
|||
|
out on the porchbench, telling his grandson who has just hacked into
|
|||
|
Bellcore, "Why, in my day, you wouldn't be a hacker, you'd simply be a
|
|||
|
criminal! In my day, we didn't want to free information, we wanted to
|
|||
|
create information! Now go away, ya bastard kid....", as he mumbles
|
|||
|
off into the sunset. Levy's book is certainly a necessary part of the
|
|||
|
hacker tradition, but it's just that - tradition. Levy seems to fail
|
|||
|
to acknowledge, let alone accept, the *evolution* of the hacker spirit
|
|||
|
as relevant to today's world. Levy and his followers are the system
|
|||
|
administrators found on countless virtual communities arguing for the
|
|||
|
term 'cracker' to describe today's 'hacker', saying that today's
|
|||
|
'cracker' is not worthy of the term hacker since they lack in
|
|||
|
innovation and excel at regurgitating. Well, all I would have to say
|
|||
|
to that is read Sterling's THE HACKER CRACKDOWN.
|
|||
|
|
|||
|
Then we have a more recent contribution to the book of myths and
|
|||
|
facts surrounding hackers, CYBERPUNK: OUTLAWS AND HACKERS ON THE
|
|||
|
COMPUTER FRONTIER by Katie Hafner and John Markoff. Now, cyberpunk!
|
|||
|
There's a word! In the similarly titled HACKER CRACKDOWN, Bruce
|
|||
|
Sterling, commonly considered to be the co-creator of the cyberpunk
|
|||
|
literary genre along with his pal William Gibson, addresses the
|
|||
|
evolution and transformation of the word he helped create - cyberpunk
|
|||
|
- from a fictional character to a reality hacker. CYBERPUNK by Hafner
|
|||
|
& Markoff is unique in that it takes three very real, very human
|
|||
|
people and attempts to turn them into post-modern science-fictional
|
|||
|
characters, such as Case in William Gibson's legendary NEUROMANCER.
|
|||
|
Throwing "cyberpunk" for all it's literary and cultural significance
|
|||
|
into the realm of the computer underground greatly twists its
|
|||
|
landscape, contorts the stereotypes, and leads us into the
|
|||
|
near/now-future future with a trippy view of "things to come".
|
|||
|
|
|||
|
And then of course came the crackdown. We have myth, we have
|
|||
|
legend, we have history, and we have entertainment, but until now, the
|
|||
|
literary accounts of the computer underground have lacked clear focus,
|
|||
|
cultural significance, and unbiased sociological and psychological
|
|||
|
viewpoints. Bruce Sterling cracks down on the post-modern realities
|
|||
|
of a world based around curiosity and a need for information.
|
|||
|
|
|||
|
For what it's worth let me say that after having read a few of
|
|||
|
Sterling's accounts about writing this book (featured in various
|
|||
|
publications such as Electronic Frontier Foundation newsletters and
|
|||
|
e-magazines, Steve Brown's wonderful Science Fiction Eye magazine
|
|||
|
to which Bruce Sterling contributes regularly, and various other
|
|||
|
resources), my opinions of Mr. Sterling are very enthusiastic. For a
|
|||
|
long time I have admired Bruce Sterling for his wonderful and integral
|
|||
|
contributions to the cyberpunk literary genre of science fiction.
|
|||
|
Let's face it, his MIRRORSHADES anthology helped revolutionize the
|
|||
|
otherwise complacent and all-too-familiar world of science fiction. I
|
|||
|
am a humungous fan of literary cyberpunk and some of Sterling's books
|
|||
|
hold a high place on my bookshelf, next to many literary classics. I
|
|||
|
have always thought of William Gibson and Bruce Sterling as men of a
|
|||
|
truly amazing vision, and with his first non-fiction work, THE HACKER
|
|||
|
CRACKDOWN, Bruce Sterling extends that vision into a phenomena of our
|
|||
|
society very analogous to the societies proposed in cyberpunk fiction.
|
|||
|
|
|||
|
In THE HACKER CRACKDOWN, Sterling acts less as social critic and
|
|||
|
more of social observer. Rather than spew forth opinions regarding
|
|||
|
hackers that we've all heard ad nauseam, he puts everything regarding
|
|||
|
the hacker underground into perspective. Basically, he makes sense of
|
|||
|
those events in the underground that previously resulted only in
|
|||
|
head-scratching confusion. From Abbie Hoffman to the U.S. Secret
|
|||
|
Service, from AT&T to LoD, from the WELL to the courtroom, from the
|
|||
|
dawn of cyberspace to Terminus, Bruce Sterling provides the reader
|
|||
|
with a firm grasp of the events that are shaping our world and that
|
|||
|
will have an incredible influence on the emerging information society
|
|||
|
of the twenty-first century.
|
|||
|
|
|||
|
Included in the book is almost every event you could deem even
|
|||
|
remotely significant to the hurricane instability of cyberspace: the
|
|||
|
genesis and evolution of cyberspace from the telegraph to
|
|||
|
globally-linked real-time virtual communities, the AT&T crash on
|
|||
|
Martin Luther King Day in 1990, Abbie Hoffman and YIPL/TAP, BBSes and
|
|||
|
text philes (phreak/hack/anarchy/credit-card fraud/etc.), the hacker
|
|||
|
"elite" of the mid 80's, the various Legion of Doom activities and
|
|||
|
cases, the E991/Phrack case, Operation Sundevil, Steve Jackson Games,
|
|||
|
RPGs, cyberpunk fiction, the U.S. Secret Service, the Electronic
|
|||
|
Frontier Foundation, the WELL, the Grateful Dead, Phiber Optik and
|
|||
|
Acid Phreak, Craig Neidorf, Shadowhack, NuPrometheus League, the
|
|||
|
Atlanta Three, Mentor, Phoenix Project, Metal Shop, Pirate's Cove,
|
|||
|
Computers Freedom and Privacy, and civil liberties. It's all here.
|
|||
|
|
|||
|
Aside from the extreme volume of information that's bound to
|
|||
|
impress even the most comprehensively informed hacker, Sterling,
|
|||
|
throughout THE HACKER CRACKDOWN and in other statements he's made,
|
|||
|
subliminally asks some vital questions about the ethics, morality, and
|
|||
|
philosophies behind the very idea of cyberspace, forcing the reader to
|
|||
|
(God forbid) *think* about the events in cyberspace in the last
|
|||
|
decade, to think about the creation and evolution of this surreal
|
|||
|
civilization. Bruce Sterling destroys the myths and presents the
|
|||
|
facts. All the facts. To quote U2 THE HACKER CRACKDOWN is "even
|
|||
|
better than the real thing."
|
|||
|
|
|||
|
Bruce Sterling, at least for now, wins the prize. THE HACKER
|
|||
|
CRACKDOWN, in this reader's view, is the definitive word on
|
|||
|
cyberspace. I'd like to read it again, but my eyes are still
|
|||
|
squirming. But on second thought, having your eyes squirm around in
|
|||
|
your brain is a small price to pay for reading THE HACKER CRACKDOWN.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sun, 1 Nov 92 14:06:05 CST
|
|||
|
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
|
|||
|
Subject: File 2--Some thoughts on "The Hacker Crackdown"
|
|||
|
|
|||
|
My first exposure to Bruce Sterling's book "The Hacker Crackdown" was
|
|||
|
a draft of the second chapter. I read it, and found at the end that I
|
|||
|
could not warm to the self-important tone of the crackers and
|
|||
|
prosecutors who were its subject. Names and pseudonyms... These
|
|||
|
people hadn't a straight word to say.
|
|||
|
|
|||
|
The book is out now. I saw my first copy in a book store here in
|
|||
|
Austin. I saw my name in the index. I did not throw the book across
|
|||
|
the store in dismay at seeing my name in print... It was a close
|
|||
|
thing, though. Having read it twice now, I find that I liked the book
|
|||
|
more than I expected to after reading that early chapter.
|
|||
|
|
|||
|
If you've been reading Computer underground Digest for awhile, you may
|
|||
|
find the second and fourth chapters to be old news. Skip to the third
|
|||
|
chapter... "Law and Order". Here Sterling warms to his subject, and
|
|||
|
I found myself wondering if his fascination with the computer cops
|
|||
|
stems from their physical presence... An interesting position for an
|
|||
|
author writing about goings-on in a virtual community to be in.
|
|||
|
Certainly there is more detail for a writer here: A physical place, a
|
|||
|
sense of community... All the things that don't exist in a world
|
|||
|
defined by the boundaries of a CRT screen.
|
|||
|
|
|||
|
I'd really like to see this book re-done as hypertext. The sometimes
|
|||
|
awkward bridges that Sterling constructs to get the reader across
|
|||
|
topical or temporal chasms could then be left out.
|
|||
|
|
|||
|
Bob
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 10 Nov 92 15:01:36 EST
|
|||
|
From: Rich=Gautier%SETA%DRC@S1.DRC.COM
|
|||
|
Subject: File 3--The Hacker Crackdown
|
|||
|
|
|||
|
Amen!
|
|||
|
|
|||
|
Every hacker/phreak, law enforcement weenie, security professional,
|
|||
|
law maker, (and probably a whole bunch of other people!) should be
|
|||
|
FORCED to read this latest book.
|
|||
|
|
|||
|
"The Hacker Crackdown" by Bruce Sterling is an IMPRESSIVE overview of
|
|||
|
everything from cops to bad guys to civil liberty workers in the never
|
|||
|
ending battlefield of cyberspace. Right after the author forgives
|
|||
|
himself for using the word 'HACKER' in the title, the book grabs your
|
|||
|
attention, and it doesn't let go at all.
|
|||
|
|
|||
|
The book provides the reader with a sociological, historical and
|
|||
|
analytical view from one of the most revered men in cyberspace, Bruce
|
|||
|
Sterling. His insights will have you, too, saying "Amen!" to at least
|
|||
|
some of what he has to say in this book. It should provide
|
|||
|
interesting reading to all audiences on both (all three) sides of the
|
|||
|
battlefield in the never ending war for power and control in the area
|
|||
|
of computer and telephone security. He starts the book out with a
|
|||
|
history of the system itself. It doesn't bore you like you thought it
|
|||
|
would, and suddenly you are gripped by the history of the underground,
|
|||
|
the digital underground.
|
|||
|
|
|||
|
This chapter alone could make the book worthwhile. For hackers, it
|
|||
|
would be a fun look back into the good ole days. For security folks,
|
|||
|
it is a great peek into the views and sociological drive of the
|
|||
|
underground enemy. It also covers the history of Operation Sundevil,
|
|||
|
and all the unpleasantness that seems to have followed. This part of
|
|||
|
the book will take you, in Clifford Stoll-like style (wonder if this
|
|||
|
is where he picked up his writing style). One long stream of data
|
|||
|
later, and you're into the next section of the book, "Law and Order".
|
|||
|
|
|||
|
If you aren't one of the people pictured herein, you may find yourself
|
|||
|
learning a great deal more than you hoped. Only someone with ties to
|
|||
|
both sides of this great battle could bring the insight that is so
|
|||
|
needed here. Although I preferred the first two sections of the book,
|
|||
|
I actually found myself liking to find out what the real drive of the
|
|||
|
"money-hungry prosecution" was.
|
|||
|
|
|||
|
The last part of the book, I guess you could call the END RESULT of
|
|||
|
the whole history lesson in the first three parts of the book. Civil
|
|||
|
Liberty as an ACTUAL issue. Even the hackers, (excuse the term)
|
|||
|
should be glad that some of the things they have been screaming about
|
|||
|
for YEARS, actually have a public voice now. This section also
|
|||
|
includes the famous Phrack with the edited E911 document in it. (Just
|
|||
|
in case you missed it).
|
|||
|
|
|||
|
All in all, a good buy...I highly recommend it. I read it from my
|
|||
|
Public Library, and I intend to go out and buy me my own personal copy
|
|||
|
as soon as I can.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: 9 Nov 1992 16:57:51 U
|
|||
|
From: "Steve" <copold@SMTPGATE.TECHRSCS.PANAM.EDU>
|
|||
|
Subject: File 4--Hacker Crackdown Review
|
|||
|
|
|||
|
That "truth is often stranger than fiction" is a time worn and often
|
|||
|
over-used cliche. If anyone has ever doubted its veracity, however,
|
|||
|
all they need do to confirm the accuracy of the phrase is read _The
|
|||
|
Hacker Crackdown_ by Bruce Sterling. It's probably a wise marketing
|
|||
|
decision that the book is being hawked as Sterling's first volume of
|
|||
|
non-fiction. Even the likes of a Clancy or a Le Carre would gasp in
|
|||
|
disbelief at many of the twists and turns in this complex tale.
|
|||
|
|
|||
|
As a part-time dweller in cyberspace, one learns to expect the
|
|||
|
unexpected. It is all too easy to assume that you really have a handle
|
|||
|
on what is happening in, as Sterling calls it, "the un-real estate" of
|
|||
|
the networks. In that regard, _Hacker Crackdown_ can do serious damage
|
|||
|
to one's ego. When I read the teasers on the book's jacket, I actually
|
|||
|
laughed when I got to the quote from Lex Luthor, "I learned a lot from
|
|||
|
this book that I didn't know." Having read quite a few of Lex's
|
|||
|
postings on MindVox, I assumed that this was a touch of hacker humor
|
|||
|
that the publisher had bought into. Little did I know how much I was
|
|||
|
about to learn from _The Hacker Crackdown_.
|
|||
|
|
|||
|
Having been involved, at one level or another, in the electronic
|
|||
|
information business all of my adult life, and after hanging out on
|
|||
|
the nets for the past few years, I had, however foolishly, come to
|
|||
|
consider myself as being relatively "clued." Even though I regularly
|
|||
|
communicate with a number of the people written about in the book, I
|
|||
|
found that I only knew bits and pieces of the story. And to compound
|
|||
|
my arrogant assumption, most of what I did know was woefully
|
|||
|
incomplete and often could not be linked to the other parts of the
|
|||
|
whole. In this sense, _Hacker Crackdown_ was a genuine wake-up call.
|
|||
|
It can be a rude awakening to spend a pleasant weekend having a really
|
|||
|
enjoyable read only to find out that you're actually just another
|
|||
|
"clueless computer geek."
|
|||
|
|
|||
|
Make no mistake, _The Hacker Crackdown_ is a terrific read, but beyond
|
|||
|
that it is the product of a determined effort by Sterling to report in
|
|||
|
an organized and coherent fashion the most confounding, bewildering,
|
|||
|
and downright puzzling collection of rumors and facts imaginable. To
|
|||
|
make his task even more challenging, he found himself dealing with an
|
|||
|
equally unstable collection of subjects that ranged from socially
|
|||
|
maladjusted hackers and phone phreaks, to the paranoid fringes of law
|
|||
|
enforcement, to the "Big Brother" attitudes and often ham-fisted
|
|||
|
behavior of corporations that deal in information...No small task to
|
|||
|
be sure! In this effort he not only succeeds, but succeeds
|
|||
|
brilliantly.
|
|||
|
|
|||
|
In telling the story of the crackdown, Sterling leads us from event to
|
|||
|
event while maintaining an understandable chronology. Many of the
|
|||
|
principle offenses and incidents that occur in this incredibly complex
|
|||
|
chain of happenings are separated by months and, in some cases, more
|
|||
|
than a year. If there is an aspect of the book that makes it a
|
|||
|
challenge, it is in gaining a true grasp on the actual sequence of
|
|||
|
events as they relate to the various elements of the bigger picture of
|
|||
|
cyberspace circa 1990-1991. It is, in fact, a tangled morass that is
|
|||
|
at best difficult to follow even with Sterling acting as guide and
|
|||
|
pathfinder. If there is a side of _The Hacker Crackdown_ that will
|
|||
|
ultimately slow its distribution, it is that it could prove to be near
|
|||
|
inaccessable for the uninitiated.
|
|||
|
|
|||
|
Having said that, let me point to what is in my opinion the best that
|
|||
|
_Hacker Crackdown_ offers the reader. Referring to the subjects of the
|
|||
|
book (all of them...not just the hackers) as a strange and diverse
|
|||
|
group may be the biggest understatement I'll put in print this year.
|
|||
|
They are, in fact, almost incomprehensible to those who live, for lack
|
|||
|
of a better term, within the accepted social norms. Sterling has
|
|||
|
accomplished what megabytes of e-mail and hours of conversation had
|
|||
|
not managed to do...He has given these characters a human face.
|
|||
|
Somewhere in the middle of this highly technical narrative, a great
|
|||
|
number of these folks ceased being handles on a node and started
|
|||
|
taking on a form...a very human form.
|
|||
|
|
|||
|
It would be impossible to mention them all in a short review, so I'll
|
|||
|
make examples of just a few. Perhaps the most glaring of these is
|
|||
|
Terminus. He's a regular contributor on MindVox, and has become good
|
|||
|
friends with a mutual acquaintance. As a result of this, I've had the
|
|||
|
chance to hear a lot of what he has to say. I think I had prejudged
|
|||
|
Terminus, because he had been unfortunate enough to have been caught
|
|||
|
and prosecuted. In _Hacker Crackdown_ we are made privy to a side of
|
|||
|
Terminus that just doesn't register in e-mail or in his postings on
|
|||
|
Vox. Although it is made clear that he probably committed
|
|||
|
transgressions, it is also equally clear that he is not evil, that he
|
|||
|
bore no malice toward anyone, and that he certainly should not have
|
|||
|
gone to prison. Granted that is a personal judgment, but it is one
|
|||
|
that rises from the picture of Terminus painted by Sterling. Whether
|
|||
|
Sterling feels that way or not is immaterial as his writing left me,
|
|||
|
the reader, with that conviction.
|
|||
|
|
|||
|
Not all of the creatures that arose from the printed page were as
|
|||
|
pleasant as Terminus. The best example of this is Emmanuel Goldstein.
|
|||
|
Another early contributor to Vox and the publisher of 2600, Emmanuel
|
|||
|
Goldstein has always been a highly enigmatic figure. Sterling's
|
|||
|
portrait of Goldstein appears to be brutally honest. To put it
|
|||
|
politely, it is an image of an individual that you would not want to
|
|||
|
have for a next-door neighbor. To be fair to Emmanuel, there are not
|
|||
|
many that are mentioned in _The Hacker Crackdown_, including the Feds
|
|||
|
that would be high on my list of desireable neighbors.
|
|||
|
|
|||
|
Then there is Gail Thackeray...Recipient of endless name-calling in
|
|||
|
hacker chatter. Yet, the Gail Thackeray we meet in _Hacker Crackdown_
|
|||
|
is a sympathetic persona that I found very likeable. If she has a
|
|||
|
fault, as Sterling draws her, it is her obsessive nature and her need
|
|||
|
for results...two very hacker-like qualities. The more I read, the
|
|||
|
more I found myself thinking, "Hey, this is a person I would hire in a
|
|||
|
minute!" Suddenly, the hated Gail Thackeray had be come someone I
|
|||
|
could admire and probably call friend. (Let's do lunch Gail!)
|
|||
|
|
|||
|
The last person I wish to mention, but certainly not the least
|
|||
|
significant, is the homeless man in Phoenix. Sterling paints him as an
|
|||
|
icon of the future-disenfranchised. Whether he is addressing some
|
|||
|
looming caste-based society where only those that have one foot in
|
|||
|
cyberspace and the other in the real world will emerge pre-eminent
|
|||
|
must be addressed by the individual reader. It is, however, a truly
|
|||
|
chilling scene he draws of his encounter with this lost soul set
|
|||
|
against the steel and glass backdrop of modern Phoenix. Although
|
|||
|
Phoenix just happened to be where the chance meeting occurred, it is
|
|||
|
ironic that the information society may have to rise from the ashes as
|
|||
|
did the bird of legend. Bruce Sterling - Prophet of Doom - I doubt it,
|
|||
|
but it is food for thought.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 17 Oct 92 21:30:20 CDT
|
|||
|
From: Jim Thomas <cudigest@mindox.phantom.com>
|
|||
|
Subject: File 5--Remembering the Hacker Crackdown
|
|||
|
|
|||
|
Sheldon Zenner, the defense attorney for Craig Neidorf in the June,
|
|||
|
1990 "Phrack" trial, began and ended his opening comments with a
|
|||
|
reminder that wisdom often accompanies reflection on past mistakes:
|
|||
|
|
|||
|
MR ZENNER: What I would have written on there if I could is
|
|||
|
something I got in a fortune cookie that said:
|
|||
|
|
|||
|
"To remember is to understand".
|
|||
|
|
|||
|
I have never forgotten that. To remember what it was to be a
|
|||
|
struggling lawyer makes a good judge. To remember what it was to
|
|||
|
be a student makes a good teacher. To remember what it was to be
|
|||
|
a child makes a good parent.
|
|||
|
*************
|
|||
|
To remember is to understand. To remember what it's like to be
|
|||
|
14, or 15, or 16, or 17, or 18, or 19. To remember what it's
|
|||
|
like to do some stupid things. But stupid things, doing stupid
|
|||
|
things isn't illegal...and a good thing for all of us, I
|
|||
|
suspect.
|
|||
|
|
|||
|
Recent allegations that the U.S. Secret Service has been involved in
|
|||
|
disruption of public gatherings, surveillance of private citizens
|
|||
|
beyond the scope of their authority, and perhaps disseminating
|
|||
|
information to employers of those surveilled, suggests that some
|
|||
|
agents have forgotten the lessons of Sun Devil, of restrictions on
|
|||
|
covert surveillance common during the 1960s, and of resistance to
|
|||
|
abuses of government authority. To remember that Constitutional
|
|||
|
protections extend to cyberspace is to understand that freedom should
|
|||
|
be protected, not subverted, by some over-zealous law enforcement
|
|||
|
agents.
|
|||
|
|
|||
|
In The Hacker Crackdown (THC), science fiction writer Bruce Sterling
|
|||
|
(Islands in the Net, co-author of The Difference Engine) forces us to
|
|||
|
remember, to remember so that we understand. Drawing from interviews
|
|||
|
with hackers and law enforcement officials, participation in the
|
|||
|
activities of each, and available documents, Sterling pulls together a
|
|||
|
concise summary of the context and the events of the U.S. Secret
|
|||
|
Service (USSS) "hacker raids" of early 1990. For both the "hacker"
|
|||
|
community and law enforcement, the crackdowns represented a coming of
|
|||
|
age. Both sides won a little and lost a little, and both sides were
|
|||
|
responsible for helping shed a little more light on the nature of
|
|||
|
cyberspace and the responsibilities and rights of those within it.
|
|||
|
Sterling refreshes our collective memories and provides new insights
|
|||
|
and understandings.
|
|||
|
|
|||
|
The losses of the indiscriminate "hacker crackdown" of the 1990s
|
|||
|
exemplified by the "Bill Cook cases" of Phrack and Len Rose and by
|
|||
|
Operation Sun Devil, have not been calculated: Lost equipment,
|
|||
|
attorney fees, lost time, lost revenues, embarrassment and loss of
|
|||
|
credibility for some prosecutors and the US Secret Service (not to
|
|||
|
mention the potential losses to taxpayers if the Steve Jackson suit
|
|||
|
against them is successful), delay of publication of Steve Jackson's
|
|||
|
GURPS, needless drain on federal resources and taxpayer dollars, and
|
|||
|
emotional and psychological anguish, computer users raided with no
|
|||
|
subsequent indictments, and lives shattered. All this resulted in
|
|||
|
relatively small pay-off of a few minor guilty pleas raise the
|
|||
|
question: WAS THE HACKER CRACKDOWN worth it? My reading of THC
|
|||
|
suggests that the answer is a complex "yes." Part of the inevitable
|
|||
|
process of establishing and protecting rights lies in the continuous
|
|||
|
struggle against abuses. Struggles over rights reflect the social
|
|||
|
tension between freedom and control and helps shape the boundaries of
|
|||
|
responsibility, the limits of public and government behavior, and the
|
|||
|
form and content of what is to be protected and how. The government
|
|||
|
crackdown on hackers can be seen as part of this process. Sterling
|
|||
|
attempts to show the complexity of this struggle.
|
|||
|
|
|||
|
_The Hacker Crackdown_ provides a comprehensive background of the
|
|||
|
events of 1990 that most in the computer community consider a fiasco.
|
|||
|
Sterling avoids taking sides as he describes the context of
|
|||
|
technological and social changes underlying the "hacker" phenomenon
|
|||
|
and law enforcement responses to. His depictions of the participants
|
|||
|
are sometimes flattering, other times not, and he attempts to depict
|
|||
|
the subjective and human element that guides adversaries and others in
|
|||
|
the pursuit of their goals. Most law enforcement agents, Sterling
|
|||
|
reminds us, are dedicated and competent. Others are less so, and some
|
|||
|
are simply incompetent. Likewise, some "hackers" are criminals, some
|
|||
|
are simply curious while others are obnoxious delinquents, and a few,
|
|||
|
such as 2600's Emmanuel Goldstein, are best understood as dissidents
|
|||
|
in the tradition of European gadflies who tweak authority.
|
|||
|
|
|||
|
Those in the computer community tend to see law enforcement and
|
|||
|
telecommunications security personnel in the same one-dimensional
|
|||
|
cartoon stereotypes as those agents perceive the "criminals" they
|
|||
|
chase. One of the subtlest and most pernicious consequences of the
|
|||
|
anti-hacker images is the creation of myths, misunderstanding, and
|
|||
|
fear of those who display considerable techno-competence. An equally
|
|||
|
inaccurate image is the view held by many in the computer community
|
|||
|
all law enforcement agents are techno-illiterate, ill-intentioned, and
|
|||
|
fail to understand the computer culture. There is sufficient evidence
|
|||
|
that both sides have cause for their views. However, as Sterling
|
|||
|
cogently illustrates, both views are simplistic and belie the reality
|
|||
|
of complex and sometimes confused agendas, generally well-intended
|
|||
|
actions gone awry, and legitimate misunderstandings arising that cloud
|
|||
|
the perceptions and actions of all parties. One value of Sterling's
|
|||
|
tome is its attempt to lay bare these intricacies of motive and
|
|||
|
action.
|
|||
|
|
|||
|
Fear of the unknown is a subtle theme in Sterling's interpretation of
|
|||
|
law enforcement responses to "hackers." Buried in the middle of the
|
|||
|
volume (pp. 188-191), Sterling shares his encounter with a large
|
|||
|
homeless man whose contact with reality was suspect. From this
|
|||
|
encounter, he realizes the intertwining of fear and surprise, and how
|
|||
|
both shape our perception of "what's going on." This provides the
|
|||
|
central metaphor for THC: Lack of understanding contributes to fear,
|
|||
|
and fear leads to excess.
|
|||
|
|
|||
|
Sterling begins with a helpful summary of the history of the telephone
|
|||
|
system from its earliest days of implemention and marketing battles
|
|||
|
through the emergence of AT&T as the primary telephony corporate
|
|||
|
monolith. Sterling reminds readers that today's hackers had their
|
|||
|
counterpart in earlier explorers and mischief-makers, and he suggests
|
|||
|
that all that is currently new is the technology by which contemporary
|
|||
|
techophiles operate. By providing a social context for "hacking,"
|
|||
|
Sterling removes the techno-mystique surrounding it. After all, he
|
|||
|
reminds us, when the telephone was first introduced, it inspired fear
|
|||
|
amongst some, was seen as limited in scope, and the technology was
|
|||
|
understood by few. And even the Futurians, a group of famous science
|
|||
|
fiction writings in New York in the 1930s, felt the power of the USSS
|
|||
|
when their wackyness was suspected by neighbors as masking a
|
|||
|
counterfeiting ring. To remember the history of technology and its
|
|||
|
relationship to law enforcement is to understand, and understanding
|
|||
|
reduces our fear of the unknown.
|
|||
|
|
|||
|
>From THC, we understand that most hackers are little more than
|
|||
|
curious, white, middle-class teenagers with considerable computer
|
|||
|
proficiency. We learn that Gail Thackeray, considered the mastermind
|
|||
|
behind Sun Devil, is just a normal person and, behind the scenes,
|
|||
|
attempted to bring an awareness of Constitutional rights to law
|
|||
|
enforcement agents. We learn that the USSS is comprised of
|
|||
|
technologically competent people, but none of them seemed present or
|
|||
|
involved in Sun Devil or the Bill Cook incidents. We learn the
|
|||
|
background behind the formation of EFF, we are reminded of forgotten
|
|||
|
Sun Devil victims such as Charlie Boykin and Rich Andrews and others
|
|||
|
who were caught up in the crackdown, and we are reminded that Craig
|
|||
|
Neidorf's success in his trial was the result of numerous backstage
|
|||
|
players, including John Nagle (who discovered the public nature of the
|
|||
|
supposedly confidential documents Neidorf was accused of reprinting)
|
|||
|
and Dorothy Denning, a computer security expert. Readers of CuD or
|
|||
|
EFFector Online will find little new information in THC. This is of no
|
|||
|
consequence. The major contribution of THC is that it places events
|
|||
|
in chronological order and provides a unifying theme not possible when
|
|||
|
information leaks out sporadically. Sterling crafts the individual
|
|||
|
tiles into a rich mosaic that depicts the primary actors and events
|
|||
|
that eventually brought them together in the crackdowns. Sterling
|
|||
|
helps us to remember in order that we understand.
|
|||
|
|
|||
|
In any work, one can find points to criticize, and although the
|
|||
|
quibbles one might have with THC are minor and in no way detract from
|
|||
|
the significance, they do suggest strategies for a paperback re-write.
|
|||
|
These include a few minor factual discrepancies (indicating in one
|
|||
|
passage that Sun Devil occured on May 9, and in another on May 8); An
|
|||
|
occasional tendency to engage in seemingly gratuitous attention to
|
|||
|
secondary topics such as a long account of The Well public access
|
|||
|
system; an over-long discussion of the proficiency of the Secret
|
|||
|
Service that digresses needlessly; and far too much significance given
|
|||
|
to the role of the Martin Luther Day AT&T crash as a catalyst in the
|
|||
|
crackdowns. Some "hackers" also took minor issue with some of the
|
|||
|
technical details, such as referring on occasion to "switching
|
|||
|
stations" ("there's no such thing," said one). However, some of the
|
|||
|
digressions work: Sterling's account of his own serendipitous attempt
|
|||
|
at "trashing" (mucking through others' trash in search of useful
|
|||
|
information) provides a poignant and vicarious experience for the
|
|||
|
reader as Sterling reconstructs a series of letters written by a woman
|
|||
|
to her former boyfriend.
|
|||
|
|
|||
|
The 35,000 copies of first printing of THC are virtually gone,
|
|||
|
suggesting a second, smaller, printing will follow. Presumably the
|
|||
|
eventual paperback version will allow for revisions that might include
|
|||
|
the following: Sterling's journey through the events of the crackdown
|
|||
|
is limited to 1990. An epilogue would be helpful. It would also be
|
|||
|
valuable to make more visible the many other nameless individuals who
|
|||
|
were raided and never indicted as a way of making more clear the
|
|||
|
extent and futility of the operations. And, one glaring void struck
|
|||
|
CuD editors: Cu Digest receives just a passing reference in a quote
|
|||
|
from a law enforcement agent. CuD was, after all, a direct result of
|
|||
|
the Phrack and Len Rose cases, and it was a primary source of news for
|
|||
|
many during those events, and it made available trial transcripts,
|
|||
|
documents, and detailed the USSS's use of an informant in the Sun
|
|||
|
Devil operation.
|
|||
|
|
|||
|
These cavils aside, Sterling's ambitious attempt at the re-creation of
|
|||
|
Sun Devil events is successful. In emphasizing the emergence of the
|
|||
|
"civil libertarians" from the chaos of the crackdown, he reminds us
|
|||
|
that the struggle for rights is as long as history, and that to see
|
|||
|
the crackdown as little more than law enforcement excess is to fail to
|
|||
|
understand its significance. Sterling's balanced discourse does not
|
|||
|
provide the reader with answers, but in demanding that we remember, he
|
|||
|
prompts us to greater understanding.
|
|||
|
|
|||
|
The central message of The Hacker Crackdown may be summarized by
|
|||
|
Sterling's experience with the homeless Stanley, and the message
|
|||
|
should be read carefully by all sides:
|
|||
|
|
|||
|
In retrospect, it astonishes me to realize how quickly
|
|||
|
poor Stanley became a perceived threat. Surprise and fear
|
|||
|
are closely allied feelings. And the world of computing is
|
|||
|
full of surprises...To know Stanely is to know his demon.
|
|||
|
If you know the other guy's demon, then maybe you'll come
|
|||
|
to know some of your own. You'll be able to separate
|
|||
|
reality from illusion. And then you won't do your cause,
|
|||
|
and yourself, more harm than good (pp 190, 191).
|
|||
|
|
|||
|
*******************
|
|||
|
|
|||
|
After the above was written, allegations that the Secret Service may
|
|||
|
have been instrumental in breaking up a 2600 meeting in Washington,
|
|||
|
D.C. have emerged. If they prove to be true, it suggests that a new
|
|||
|
chapter to THC might be written to address the failure of some law
|
|||
|
enforcement agents to remember or to understand. If the allegations
|
|||
|
are true, perhaps a witch-hunting metaphor might be more appropriate
|
|||
|
to describe the attitude of some federal agents' views of hackers.
|
|||
|
Sterling makes one crucial point in his book worth emphasizing: The
|
|||
|
emergence of the "civil libertarians" from the events of 1990 was the
|
|||
|
result of a number of individuals and groups joining together out of a
|
|||
|
dedication for civil liberties. The current activities of these
|
|||
|
groups--such as the Electronic Frontier Foundation (EFF) and Computer
|
|||
|
Professionals for Social Responsibility (CPSR)--are part of the legacy
|
|||
|
of Sun Devil. Supporting these and similar groups is one way to
|
|||
|
protect against those few agents who fail to understand that the
|
|||
|
electronic frontier, like the rest of society, is subject to
|
|||
|
Constitutional protections and not a frontier town where a few
|
|||
|
gun-slingers can take the law into their own hands.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Sat, 3 Oct 92 05:29:48 GMT
|
|||
|
From: ahawks@nyx.cs.du.edu (scooby dooby doo)
|
|||
|
Subject: File 6--Bruce Sterling & Cyberhemian Rhapsodies
|
|||
|
|
|||
|
"What a Long, Strange Trip It's Been", the all-too familiar
|
|||
|
statement by the Grateful Dead, has probably been heard countless
|
|||
|
times in the echoes of cyberspace. Probably moreso than in any other
|
|||
|
forum aside from Classic-Rock radio stations, and this is no accident.
|
|||
|
|
|||
|
Cyberspace has indeed been a long, strange trip, but more
|
|||
|
appropriately we might rephrase the statement to read "what a long
|
|||
|
strange trip it's going to be if we don't take a step back and look at
|
|||
|
ourselves, damnit."
|
|||
|
|
|||
|
Bruce Sterling, noted cyberpunk author and purveyor of sociological
|
|||
|
possible futures and realities, has begun to take that step back, as
|
|||
|
evident in his recent contribution to SF Eye #10, also appearing in
|
|||
|
EFFector OnLine #3.06. He writes passionately about the current
|
|||
|
states of cyber-realities, about where we seem to be headed, his
|
|||
|
contributions and role in the whole grand scheme of things, and all
|
|||
|
within the deeply moving realm of Sterling's philosophical mind where
|
|||
|
moral questions remain unresolved about all these issues.
|
|||
|
|
|||
|
And well they should. Cyberspace, bohemia that it is, is still
|
|||
|
fairly analogous to any other notable social movement in history. In
|
|||
|
one area of the movement, you have the deeply frightening individuals
|
|||
|
who proclaim to have all the answers. On the other end of the
|
|||
|
spectrum you have, in this case the "cyberpunk" hackers, those
|
|||
|
individuals basically saying "fuck the answers and fuck the
|
|||
|
questions". Rarely, though, do you find those individuals in the
|
|||
|
midst of the movement willing to step back and say "what's it all
|
|||
|
about....what kind of trip are we on, anyways?"
|
|||
|
|
|||
|
This is what Sterling has done in the article, basically presenting
|
|||
|
on paper (or monitor) philosophical questions applicable to any
|
|||
|
society:
|
|||
|
|
|||
|
"What is a 'crime'? What is a moral offense? What actions are evil
|
|||
|
and dishonorable?"
|
|||
|
|
|||
|
Obviously, if a society does not answer these questions, if it does
|
|||
|
not agree upon (at least to some basic extent) these issues, the
|
|||
|
society will die. It is my impression that Mr. Sterling is saying:
|
|||
|
'We, the residents of cyberspace, whether we liken ourselves as punks,
|
|||
|
hackers, hippies, administrators, frontiersman, virus writers,
|
|||
|
programmers, information freaks, our simply by-standers, we are all
|
|||
|
residents of a very large community. We coexist fairly complacently,
|
|||
|
yet we coexist without the degree of self-analysis and self-criticism
|
|||
|
present in most other successful societies.'
|
|||
|
|
|||
|
Now, of course this is my interpretation of the article, and in fact
|
|||
|
I'm probably off in my own little corner of this reality, but, suffice
|
|||
|
to say, whether or not this was Sterling's intent, these are facts we
|
|||
|
must face up to.
|
|||
|
|
|||
|
Bruce Sterling has been fairly outspoken on the question of
|
|||
|
information as commodity, and the idea of knowledge as power. What
|
|||
|
we, the citizens of cyberspace, fail to realize is that we as a
|
|||
|
collective group have the means of storing, analyzing, regurgitating
|
|||
|
more information than ever before. Thus, we should be the richest,
|
|||
|
most powerful community in the world. But of course, being a *fairly*
|
|||
|
democratic reality, whoever might wish to obtain this power is struck
|
|||
|
down by the opposite extreme. Ie: Joe Hacker consciously or
|
|||
|
unconsciously believes he has power via his skills at penetrating
|
|||
|
information until he is taken off to jail by Ms. S.S. Agent. Ms. S.
|
|||
|
S. Agent believes she has power until the hacker community strikes
|
|||
|
back at her individualy, or grows to the point where their values and
|
|||
|
morals infiltrate the norms of the cyber-society to the point where
|
|||
|
they are acceptable to some degree. And so, the debate rages back and
|
|||
|
forth constantly, to no end. One of the victims is information.
|
|||
|
|
|||
|
Bruce Sterling wrote a little note to me in his wonderful collection
|
|||
|
of short stories, _Globalhead_, that says "Information *wants* to be
|
|||
|
free". Information is the battleground upon which we, the entire
|
|||
|
cyberspace student body, wage our war. Sterling writes that he is
|
|||
|
distrustful of a society that seeks to control, encrypt, restrict
|
|||
|
information, likening the results to building a sand castle. What a
|
|||
|
wonderful metaphor, since on the surface the fortress we have created
|
|||
|
seems impenetrable, yet it quickly crumbles under its own weight when
|
|||
|
the uncontrollable forces of nature have their way. Information is
|
|||
|
infinite in scope. It has no end, thus there is no possible way a
|
|||
|
society can really control information to any degree of success.
|
|||
|
Certain information can not be used as commodity, for, as I believe
|
|||
|
Bruce Sterling has himself stated before, if I give you information, I
|
|||
|
am not really losing anything, but you are gaining. In monetary
|
|||
|
terms, it's like giving someone a $20 bill and somehow keeping the
|
|||
|
bill for yourself. Thus, information is infinite and would quickly
|
|||
|
devalue in a world where it is abundant.
|
|||
|
|
|||
|
In our society, we do not realize the abundance of information.
|
|||
|
Each new day, new resources are available to receive various types
|
|||
|
information at a relatively low cost: new television stations,
|
|||
|
newspapers, magazines, radio stations, underground zines, BBSes, FTP
|
|||
|
sites, Usenet newsgroups....
|
|||
|
|
|||
|
When the majority of the inhabitants of the entire global virtual
|
|||
|
community realize this, we can begin to step forward back into the
|
|||
|
realm of cyberspace. We will have analyzed "the hacker problem", seen
|
|||
|
it as a necessary subset of our new society, and to accept it, not
|
|||
|
criticize it, for what it is. We will have set forth standards of
|
|||
|
behavior, folkways and mores, manifestos and constitutions, applicable
|
|||
|
to a society of the future, the society of the infinite realm of
|
|||
|
cyberspace.
|
|||
|
|
|||
|
There is no doubt in my mind that the civilization of cyberspace is
|
|||
|
going to be a long, strange trip. It already has been, and it will
|
|||
|
continue to be. As it stands now, there are few worthy pieces of
|
|||
|
e-literature we can look to as timeless watermarks of this infant
|
|||
|
realm, but I would certainly have to place Bruce Sterling's
|
|||
|
contributions as integral to the healthy development of this society.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #4.61
|
|||
|
************************************
|
|||
|
|
|||
|
|
|||
|
|