913 lines
48 KiB
Plaintext
913 lines
48 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Sep 20, 1992 Volume 4 : Issue 44
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivist: Dan Carosone
|
||
Copy Editor: Etaion Shrdleau, Srr.
|
||
|
||
CONTENTS, #4.44 (Sep 20, 1992)
|
||
File 1--The Cuckoo's Egg Revisited
|
||
File 2--The Egg, Over Easy
|
||
File 3--Cuckoo's Egg and Life
|
||
File 4--The Egg Hatches
|
||
File 5--The Cuckoo's Egg and I
|
||
File 6--Comments on Cuckoo's Egg
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from America Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by
|
||
anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au
|
||
For bitnet users, back issues may be obtained from the mail server at
|
||
mailserv@batpad.lgb.ca.us
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Wed, 29 Jul 92 21:17:34 EST
|
||
From: Gene Spafford <spaf@CS.PURDUE.EDU>
|
||
Subject: File 1--The Cuckoo's Egg Revisited
|
||
|
||
Cuckoo's Egg Revisited
|
||
by Gene Spafford
|
||
|
||
When I first read Cliff's book, in draft manuscript form (Cliff sent
|
||
me an advance copy), I found it gripping. So did my wife. We each
|
||
found that when we started it, we couldn't put it down until we
|
||
finished it -- both of us staying up past 3am on a weeknight to read
|
||
through to the end. We weren't the only ones. When the book was
|
||
published, I bought copies for some friends, several of whom don't use
|
||
computers. Almost all of them had the same reaction: they found the
|
||
book engrossing, entertaining, and informative. Several of them also
|
||
reported spending late nights (and early mornings!) reading to the end.
|
||
|
||
It wasn't that Cliff set down particularly elegant and engrossing
|
||
prose that made the book so captivating, although his writing is
|
||
certainly better than many others evidence. It wasn't because Cliff
|
||
recounted some high-tech adventure either -- many of the readers
|
||
(myself included) already had experience with computer security
|
||
incidents. So why was the book so interesting to us, and to so many
|
||
other people?
|
||
|
||
It wasn't until a few weeks ago, when Jim Thomas asked if I would do a
|
||
short retrospective on the "Cuckoo's Egg" that I thought about this
|
||
question. I even went back and skimmed through parts of the book
|
||
again. Now that I've thought about it, I believe I know why "Cuckoo's
|
||
Egg" had such an impact: it was a honest sincere, personal accounting
|
||
of one person's internal struggle with right and wrong, as well as
|
||
being a challenging mystery story.
|
||
|
||
Cliff's writing portrayed, for many of us, some interesting conflicts
|
||
and value judgments. For instance, having strong opinions about some
|
||
governmental and commercial entities, but finding that they are
|
||
composed of many well-meaning, genuinely nice people. Or discovering
|
||
that not every "harmless" act is really harmless when multiplied
|
||
many-fold. Heroic tales often involve journeys of self-discovery and
|
||
the loss of innocence; we saw Cliff undergo both.
|
||
|
||
To give a more concrete example of this, I consider the anecdote about
|
||
how Cliff "liberated" several printing terminals to track the logins a
|
||
perfect example of how rules, particularly property rules, may
|
||
sometimes be ignored by someone hot on a clever "hack," as Cliff was.
|
||
As the story unfolded, he made choices that I know he would have
|
||
reconsidered later on.
|
||
|
||
I also think that Cliff's account of keeping his system open, and
|
||
observing the cracker break in to other machines through his, is a
|
||
perfect example of how difficult some choices are to make, and how
|
||
they must be reevaluated as time goes on. Was Cliff partially
|
||
responsible for those break-ins? Was his notification of the sites
|
||
sufficient to counter the harm he had done? Is the argument that "the
|
||
bad guys would have used some other route" a valid argument? Seeing
|
||
those conflicts, even if indirectly, made the book something more than
|
||
just entertaining.
|
||
|
||
Cliff started as a well-meaning academic with strong views (almost
|
||
anarchistic, perhaps), and through the course of his personal
|
||
experience became someone with a different view of society. He
|
||
underwent a transformation, on the pages before us, from a
|
||
happy-go-lucky scientist, to someone obsessed with a problem. As he
|
||
recounted his growing awareness of the vast vulnerability our
|
||
increasing reliability on computers and networks presents, he made us
|
||
aware. And with this new awareness, we read about the change in Cliff
|
||
and his view of the world...and how those around him changed their
|
||
view of him.
|
||
|
||
Cliff admits that he second-guesses some of his decisions made during
|
||
the time of his pursuit. He's not sure he did the right thing at
|
||
every step, and he has paid a high price for doing what he felt was
|
||
right -- losing many things he treasured before and after the
|
||
publication of the book. I think that's in the book, too, although
|
||
maybe not explicitly. Or perhaps its because I know Cliff and have
|
||
talked to him about being thrust into the spotlight that makes me see
|
||
those things when I reread parts of the book. He lost some cherished
|
||
possessions in the midst of battling for his principles, and that is
|
||
always a gripping theme.
|
||
|
||
|
||
So, is "Cuckoo's Egg" still worth reading today? I think so. I
|
||
didn't find it so gripping this time as the first time I read it, but
|
||
I saw more of the internal struggle Cliff went through as he pursued
|
||
his investigation. I also saw how little some things have changed in
|
||
the our world of networks.
|
||
|
||
The book is still entertaining, too. Cliff's account of drying his
|
||
sneakers in the microwave oven sounds like something I'd do, and his
|
||
recipe for cookies is still a bonus.
|
||
|
||
If nothing else, "Cuckoo's Egg" is still a good way to expose the
|
||
uninitiated to some of the problems with computer security and
|
||
investigation. For that one reason alone, I think the book will
|
||
continue to have value to us -- as a place to get dialog started, if
|
||
nothing else.
|
||
|
||
I reflect on the world in Cliff's book, where sites were regularly
|
||
broken into without sys administrators knowing about it, where
|
||
security information was difficult to find, and where it was almost
|
||
impossible to get law enforcement to care about what was happening.
|
||
|
||
Then I think back over the past few weeks:
|
||
* I have given several continuing education courses in Unix
|
||
security, here in the US and in Europe, this summer, and turnout
|
||
has been good
|
||
* I've spoken on the phone with people in the FBI and US Attorney's
|
||
office whose full-time job is devoted solely to computer crime issues
|
||
* I've read in the paper about several arrests on computer crime
|
||
charges, in the US and in Europe
|
||
* I've corresponded with representatives of several security
|
||
response teams, charged with helping to deal with computer
|
||
security incidents
|
||
* I've received court papers identifying me as a witness in
|
||
an upcoming trial on computer abuse
|
||
* I've been talking with some law enforcement agents in a (unnamed)
|
||
nearby state who are concerned about how to define laws that help
|
||
them stop the "bad guys" yet don't hurt innocent third parties.
|
||
|
||
How different the world is now from when Cliff began his adventure and
|
||
wrote his book! Although we still have sites run with a cavalier
|
||
attitude towards security, and although there are still people who try
|
||
to penetrate whatever systems they can, the situation is not the same.
|
||
We now have dedicated security officers, a growing security industry,
|
||
new laws and law enforcement efforts, and coordinated responses to
|
||
unauthorized access and malicious behavior. It's far from ideal, but
|
||
awareness is growing.
|
||
|
||
Perhaps "Cuckoo's Egg" has had something to do with those changes? If
|
||
so, we should be grateful, perhaps, that this catalyst was crafted by
|
||
someone whose vision is that computers are useful if only we can
|
||
maintain sufficient trust in each other, and not someone with an urge
|
||
to legislate tight controls. In a way, that is one of the most
|
||
enduring aspects of Cliff's writing. It is clear that he loved some
|
||
aspects of computing. The challenge of tracking his intruder was
|
||
clearly an element of gamesmanship as well as duty.
|
||
|
||
Cliff, like many of us, came to realize that the world came to his
|
||
workstation through the magic of networks and computers. That world
|
||
view, however, is based on a foundation of 1's and 0's that bear no
|
||
definitive stamp of who sent them. The network provides freedoms to
|
||
be free of stereotypes, and to express your thoughts to millions.
|
||
Your thoughts come through, and the reader need never know if you are
|
||
young or old, tall or short, fat or thin, black or red or oriental or
|
||
hispanic or mongrel, male or female, hale or crippled. That same
|
||
freedom, however, requires responsibility to not abuse it, and trust
|
||
that the 1's and 0's aren't carrying lies.
|
||
|
||
It was Cliff's anger at the end of the book -- that his trust in what
|
||
came across his computer was violated -- that really brought home the
|
||
change. His anger, about how the abuse of trust by a few threatens the
|
||
many, clearly came through to me. His concern for our reliance on
|
||
computers also was clear. And the irony of the epilogue, tugging at
|
||
him again, after he said he was giving it all up; "I'm returning to
|
||
astronomy" are his final words in the last chapter. You can't go back
|
||
Cliff. Sadly, none of us can.
|
||
|
||
------------------------------
|
||
|
||
Date: 24 Aug 92 23:27:31 EDT
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 2--The Egg, Over Easy
|
||
|
||
The Egg, Over Easy.
|
||
Gordon R. Meyer, CuD co-moderator
|
||
|
||
It's Thursday, August 20, 1992 and I'm watching the President of the
|
||
U.S. address his loyal minions. "Fall of communism...I did that,"
|
||
"The reunification of Germany...did that too," "Kuwait is free..thanks
|
||
to me," "Events in our country?...blame Congress. It's not my fault".
|
||
The telephone suddenly rings...though semi-catatonic I know, just
|
||
know, it's the Thought Police. Shit, what will I tell them? I was
|
||
listening to the President...honest! You must have me confused with
|
||
someone else. My palms are sweating. The phone is still ringing. I
|
||
pick it up...
|
||
|
||
"Guten abend" I say, in my best German accent, hoping it will throw
|
||
them off the track. "Hey Gordon" Jim says without hesitation. "Jim!
|
||
It's you!" Thank God. I breath easier knowing that it's only Jim
|
||
Thomas, co-founder and Keeper-Of-CuD on the line. I guess I only
|
||
thought it was 1984.
|
||
|
||
Or maybe not. Before I know it Jim is asking me to write a review of
|
||
'The Cuckoo's Egg' for the next issue of CuD. I check my watch...it's
|
||
still ticking. A quick glance at the calendar on the wall...'1992'.
|
||
Hmmmm. Maybe Jim is still in his own RNC-induced trance. "Didn't we
|
||
review Cliff's book about..oh...two and half years ago?," I ask
|
||
quietly, trying not to wake him too abruptly. "Yeah." (It's a full
|
||
sentence for Jim, trust me, he can say a lot in one word.) Admitting
|
||
my confusion, I ask him to explain. "There has been a lot of water
|
||
under the bridge since Cliff's book, it'd be good to take another look
|
||
at it and see what it has to offer now. Besides," he added, "we
|
||
already have retrospectives from lots of other folks." "Nothing like
|
||
good old fashioned peer pressure" I mumble, trying to sound
|
||
enthusiastic. I ask him when he needs the article, knowing the answer
|
||
won't be as far in the future as I'd like, say eight or nine months
|
||
from now. "Wednesday latest, tuesday if you can." Great, so I've got
|
||
around five days to find, then re-read, then review the book. How will
|
||
I convince him it can't be done? I start to voice my objections,
|
||
starting with "I don't have time to read...," when he cuts me off
|
||
before I can finish. "So don't read it again, just review it." Huh?
|
||
No, wait, oddly enough it starts to make some sense. Or least more
|
||
sense than what I could hear coming from the television in the other
|
||
room. We discuss the idea a bit more and hang up with me promising to
|
||
send the article by wednesday, and Jim making me say "By wednesday the
|
||
24th of August 1992 anno Domini, cross my heart and hope to die."
|
||
Sheesh, what a slave driver...
|
||
|
||
I'm determined *not* to refer to my copy of The Cuckoo's Egg (The Egg)
|
||
for this exercise. I really do know where it is though, I can see it
|
||
on the shelf about ten feet away as I write this, but I'm not going to
|
||
cheat and look at it. I don't need to. Well, except to see how the
|
||
hell to spell "Cuckoo," but that doesn't count. There's no need for me
|
||
to tell you what the book says, you know that...or at least you
|
||
should. If you don't know then you haven't read it. Do so. Now.
|
||
End of review. (And if you choose to ignore this advice, and not read
|
||
it, I swear to God you will regret it because the very first
|
||
non-computer person you meet, who finds out about your interest in
|
||
security/hackers, will regale you with an enthusiastic 20-minute
|
||
summation of 'that one hacker book'. So either read it, or never
|
||
_ever_ admit you haven't. Trust me.)
|
||
|
||
Let's look at The Cuckoo's Egg not as a book, but as a landmark...A
|
||
cultural/historical icon that escaped from cyberspace into the 'real'
|
||
world. The Egg, for the most part, was the first to introduce to
|
||
mainstream (i.e., Non-cyberspace) society the concepts, magic,
|
||
implications, and yes, possible dangers, of the networked world. The
|
||
Egg uses popular and familiar "Hollywood" elements (espionage,
|
||
government agents, goofy liberal scientists) , and melds them with the
|
||
unfamiliar and obtuse (networks, Unix). Classical elements,
|
||
fascinating story...It'll sell a zillion copies! And it did. The Egg
|
||
has been in paperback, on Nova, in Congressional hearings, featured on
|
||
the Wily Hacker Trading Cards, retold in JPL Comics, selected as a
|
||
Book-of-the-Month Club Alternate Selection, and the ultimate in
|
||
mainstream acceptance and recognition...condensed for Readers Digest.
|
||
|
||
No, The Egg is certainly not just a book. I want to liken it to
|
||
_Hell's Angels_ by Hunter S. Thompson. But I'm not old enough to do
|
||
so with any credibility. Thompson introduced people to the outlaw
|
||
motorcycle gangs, and showed their lifestyle and organization in a way
|
||
that outsiders had never before seen. We share with HST as he learns
|
||
about the Angels, and we wince when gets beat-up at the end. In The
|
||
Egg, we mock Cliff's obsession with the teeny tiny accounting error
|
||
that leads to the discovery of The Intruder. Then, after enticing us
|
||
with a Brownie Recipe, he gets us caught up in the chase until we
|
||
cheer when the Bundepost gets a trace on the hacker's line. _Hell's
|
||
Angels_ is every bit as much as a 'must read' to be able to converse
|
||
about motorcycle outlaw gangs, as The Egg is to talk about the
|
||
problems of computer security. Only more so, as I don't think Readers
|
||
Digest has ever heard of Hunter Thompson. (Note to Jim: Don't worry,
|
||
I've deleted the discussion of the phallic symbolism of pistols and
|
||
yo-yo's.)
|
||
|
||
The Egg is also important as it documents an era when the FBI, SS,
|
||
CIA, Telco Security, and everyone else would laugh off hackers and/or
|
||
espionage. Those days have ended. In fact, the pendulum has swung so
|
||
far in the other direction that Stoll's experience with the laise-
|
||
faire authorities seems quaint. For researchers, The Egg marks
|
||
somewhat of a transition between Esquire's Cap'n Crunch article, Bill
|
||
Landreth's confessional book, and the ill-directed Operation Sun
|
||
Devil.
|
||
|
||
To my knowledge we've never really heard about the 'national defense'
|
||
impact any of the information Stoll's hacker may have passed on to the
|
||
Soviets. This is regrettable as The Egg has almost certainly had an
|
||
effect on concern about computer espionage. It would be interesting
|
||
to know how this 'classic case' (and oft cited) harmed, or failed to
|
||
harm, our "National Security." Regardless of the affect, it's a
|
||
reasonable assumption that Stoll's work has been used as justification
|
||
for more than one corporate security program sales pitch. The Egg is
|
||
destined to be a part of Bibliography's and "suggested reading" lists
|
||
for many years.
|
||
|
||
Finally The Egg has also given us its author, Cliff Stoll. If it
|
||
wasn't for his book, and his willingness to share it with the world
|
||
(quite literally, I understand, though haven't confirmed, that it has
|
||
been translated into many languages) Stoll might well be known only to
|
||
his fellow Astronomers. That would be a shame, for although I don't
|
||
always agree with Stoll's suggested solutions or characterizations of
|
||
the Computer Underground, I think the computer security community
|
||
would be a bit more boring without him.
|
||
|
||
So there you have it, The Cuckoo's Egg thus far. I'll be interested
|
||
in seeing how the book holds up over the next two or three years. I
|
||
predict it will do just fine, joining the ranks of _Hackers_ and _Soul
|
||
of a New Machine_, as dog-eared after dog-eared copy gets passed
|
||
from one computer enthusiast to another.
|
||
|
||
Postscript: For those who just can't get enough of the saga of the
|
||
egg, a book published in Germany, _Hacker for Moscow_, tells the tale
|
||
as seen from the other side of the terminal. If you were hungry for
|
||
more information about the German/East German connection, and you want
|
||
a more detailed description of the actual methods used to gain access,
|
||
as only the intruder himself can give, check it out. Unfortunately,
|
||
as far as I know, it hasn't been translated into english...outside of
|
||
Langley, VA of course.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 2 Aug 92 18:51:50 PDT
|
||
From: brendan@CYGNUS.COM(Brendan Kehoe)
|
||
Subject: File 3--Cuckoo's Egg and Life
|
||
|
||
Life can take you in any number of directions, some of which may bring
|
||
you through Andy Warhol's proverbial fifteen minutes of fame. Cliff
|
||
Stoll found himself propelled into that limelight, caught quite
|
||
unawares. The tale of a six-bit accounting discrepancy leading to
|
||
spies and intrigue took the world by storm. His life has apparently
|
||
calmed down now, but the results of his experience are still being
|
||
realized by the computing community. Advances in technology, groups
|
||
like CERT and companies with full-time security alert personnel are
|
||
all, in part, testament to the work represented by his book.
|
||
|
||
The cosmopolitan appeal of The Cuckoo's Egg cannot be ignored,
|
||
however. Fully half the importance of a message is its capacity to be
|
||
conveyed to as many people as possible. Cliff accomplished this, in
|
||
spades. Rather than limit the audience to technophiles who would eat
|
||
up the juicy details, The Cuckoo's Egg offered readers an insight into
|
||
how a "diamond in the rough" might go about dealing with what amounted
|
||
to an impossible situation. Following Cliff as he was knocked about
|
||
from pillar to post, finding no help at all from those we would assume
|
||
are paid to investigate such things, made for truly fascinating and,
|
||
sometimes, disturbing reading.
|
||
|
||
Just over two years ago, I spent Christmas with a friend and his
|
||
family, the cost of returning to my native Maine proving prohibitively
|
||
high. While browsing a North Pennsylvania mall, we happened upon The
|
||
Cuckoo's Egg in a bookstore, and my friend chose to buy it as a gift
|
||
for his father. Someone I consider to be the perfect example of a not
|
||
terribly advanced, but quite comfortable, computer user, his dad was
|
||
instantly captured by the engaging story. He literally inhaled it,
|
||
along with dozens of cigarettes, over the course of not more than two
|
||
days. Chapter One on Tuesday, "THE END?" on Thursday evening. A
|
||
flurry of questions hit over the weekend: was the network used at
|
||
Widener University, where we were Computer Science majors, capable of
|
||
these things? had we ever seen anything like what had happened to
|
||
"that astronomer"? wouldn't it be cool to have it happen to us?
|
||
|
||
The notoriety Cliff Stoll gained from what could be termed an ordeal
|
||
was not, in my opinion, the reason The Cuckoo's Egg had to happen.
|
||
Rather, it accomplished precisely what it set out to do: bring the
|
||
concerns of information security into the thoughts and conversations
|
||
of thousands of people. People who would otherwise not have ever
|
||
encountered what may well prove to be one of the most decisive factors
|
||
in our world's future as we fast approach the new millennium.
|
||
|
||
------------------------------
|
||
|
||
Date: Mon, 14 Sep 92 11:14:49 CDT
|
||
From: Jim Thomas <cudigest@mindvox.phantom.com>
|
||
Subject: File 4--An Ideal(istic) Egg
|
||
|
||
Cliff Stoll, the hippy, might appreciate the irony of The Cuckoo's Egg
|
||
(TCE) symbolizing for the "hacker generation" what Altamont did for
|
||
the counter-culture of the sixties. Cliff Stoll, the socially
|
||
committed astronomer would take little pleasure in the prophetic power
|
||
of his observations. For those of the sixties, the free Rolling
|
||
Stones concert at Altamont was seen as a west-coast version of
|
||
Woodstock--a chance to frolic, engage in the excesses of "freedom from
|
||
responsibility," and live out a fantasy inspired by a romantic image
|
||
of the flower-power culture. A beating death by the Hell's Angels
|
||
"peace keepers," seemingly high numbers of drug overdoses, and
|
||
spiritual rain darkened the event.
|
||
|
||
Altamont itself did not kill the "hippy dream" any more than TCE had a
|
||
terminal effect on the hacker counterculture. Nonetheless, the
|
||
experiences recounted in TCE provided an icon for the passing of a
|
||
romantic era of hacking into one in which personal responsibility (or
|
||
lack of it), personal excesses, and increasing abuse without concern
|
||
for the consequences were eroding a culture from within. Like the
|
||
decay of the sixties' culture, the hacker culture of the 1980s was
|
||
invaded by newcomers who lacked the romantic idealism of those who had
|
||
come before them. As access to computers increased, a hoard of
|
||
newcomers moved in, bringing with them the problems that face any
|
||
community in a population explosion. In TCE, Cliff only documents one
|
||
slice of the problem by describing one incident that symbolized the
|
||
problems of a new society when trust and respect for the rights of
|
||
others breaks down.
|
||
|
||
In long-lost correspondence, Eric Smith once suggested that TCE
|
||
represented a turning point for Cliff, for the "hacker community," and
|
||
for computer users who who lived outside the pale of exploratory
|
||
computer use. Cliff's work raised consciousness, a few hackles
|
||
(including my own), praise, and criticism. It was written before
|
||
Operation Sun Devil, but was read by many of us in the context of the
|
||
Legion of Doom and Phrack indictments. It was cited by some law
|
||
enforcement agents in documents and other media as a means of
|
||
exaggerating the "Hacker Menace" as a national security threat to
|
||
justify their excesses in early 1990. As a consequence, it was not a
|
||
work that received many neutral readings. Ironically, much of the
|
||
criticism directed at Cliff and his work reflected the same passion
|
||
that prompted Cliff to write it: Betrayal of trust and opposition to
|
||
injustice and predatory behavior. The metaphors of betrayal and loss
|
||
permeate TCE. Openness, whether in our personal relationships or on
|
||
computer systems, require trust. When that trust is violated, we lose.
|
||
Cliff's persona seeps continually out of the book. One can picture him
|
||
with keyboard in one hand, yoyo in the other, chocolate chip cookie
|
||
crumbs scattered about, and sneakers steaming in the microwave,
|
||
sharing each chapter with the woman he loves with joy and
|
||
anticipation. The intellectual and other rewards he reaped from his
|
||
labor also carried a burden. The nearly three years' experience and
|
||
corresponding time to reflect on events since then cannot but make a
|
||
re-reading of The Cuckoo's Egg a somewhat sad experience. Cliff has
|
||
written elsewhere of his personal losses: Some friends abandoned him,
|
||
he was unfairly criticized, his relationship dissolved, and he found
|
||
himself at the center of controversy not of his own making.
|
||
|
||
What was the cause of all this? By now, most know that TCE was about
|
||
tracking an intruder into UC/Berkeley's computer system who was
|
||
noticed as the result of a miniscule accounting error. Cliff
|
||
discovered that his system was being used by the hacker to access
|
||
other systems, and, like a cyber-bloodhound, followed the intruder
|
||
into other systems and then retraced the steps and ultimately located
|
||
him on a system in Germany. The narrative made a fascinating
|
||
detective story, and when read from the protagonist's perspective, one
|
||
couldn't help root for the detective. Methodologically, patiently,
|
||
painstakingly, the narrator pursued his quarry. Guided by the same
|
||
passion for solving a puzzle that motivates hackers (and researchers)
|
||
and by the feeling that if things are not quite right they should be
|
||
fixed, Cliff combined curiosity and technology in a way that one
|
||
might argue celebrates the original hacker ethos while adamantly
|
||
opposing its excesses.
|
||
|
||
When I first read the Cuckoo's Egg in early 1990, the Legion of Doom,
|
||
Phrack, and Len Rose were facing legal problems. Sun Devil was still a
|
||
few months away. Prosecutors, the media, and others alluded to the
|
||
work to demonstrate the "hacker menace," to raise the spectre of
|
||
threats to national security through espionage or disrupting the
|
||
social fabric, and to generally justify the need to bring the full
|
||
weight of law enforcement down upon teenage joyriders. Although Cliff
|
||
has taken a strong and unequivocal stand on civil liberties and has
|
||
publicly denounced excesses that violate Constitutional rights, he had
|
||
no power of the use of the images that some took from the book. This
|
||
led some at that time, myself included, to associate him with the
|
||
excesses. Ironically he was in a sense victimized by the same law
|
||
enforcement excesses as others in early 1990. By attempting to alert
|
||
us to a problem, he was unwittingly caught up in it, and the messenger
|
||
was mistaken for the message. As a series of posts on
|
||
comp.org.eff.talk indicated this past summer, the mistake lingers.
|
||
|
||
And what *IS* Cliff's message? In TCE and elsewhere, he has made it
|
||
quite clear: Cyberspace must be based on trust. The sixties' idealism
|
||
of a better world through cooperation and respect for others' rights
|
||
is not simply a "PC" perspective, but an ethos that is essential if
|
||
computer technology and its benefits are to be widely shared. Those
|
||
who intrude on others subvert this trust, and virus-planters are akin
|
||
to putting razor blades in the sand at the beach. The attitude of
|
||
some that it's a right to try to hack into systems with impunity
|
||
subverts the freedom of others, and when trust dissolves, so does
|
||
freedom.
|
||
|
||
In some ways, Cliff Stoll *is* The Cuckoo's Egg. His persona has been
|
||
planted in our psyche, his images have become part of our lore, and
|
||
his non-compromising insistance on establishing a culture of trust and
|
||
mutual respect provide a model for teaching young computer users that
|
||
responsibility comes with knowledge. Gordon Meyer provides the best
|
||
summary for the legacy of The Cuckoo's Egg: It has hatched and his
|
||
given us Cliff Stoll and an image of curiosity, decency, and class
|
||
that can help civilize the cyber-frontier. And there aren't many
|
||
books or authors about which that can be said.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 17 Sep 92 23:23:46 EDT
|
||
From: Mike Godwin <mnemonic@EFF.ORG>
|
||
Subject: File 5--The Cuckoo's Egg and I
|
||
|
||
THE CUCKOO'S EGG and I
|
||
By Mike Godwin
|
||
|
||
Copyright (c) 1992, Mike Godwin
|
||
|
||
I won't say that THE CUCKOO'S EGG is *the* book that changed my life,
|
||
but it's certainly *one* of those books. Here's how it happened:
|
||
|
||
In the middle of my last year of law school (1989-90), I was getting
|
||
bored with the local BBS scene in Austin, Texas. So, I decided it was
|
||
finally time to do what I'd been planning for a few years--getting an
|
||
account on a University of Texas system and participating in the huge,
|
||
distributed, free-floating conference system called Usenet.
|
||
|
||
By sheer chance, this decision came at a time when the Net was
|
||
particularly hungry for information about hackers and the law. Usenet
|
||
was still abuzz with discussion about the Internet Worm case, and
|
||
there was also a lot of talk about the so-called "Legion of Doom"
|
||
searches and seizures, which focused on three alleged hackers in
|
||
Atlanta. (As a third-year law student preparing to become a Texas
|
||
prosecutor, I had plenty of answers to the legal questions that
|
||
flooded Usenet newsgroups like misc.legal and comp.dcom.telecom.)
|
||
|
||
And, of course, there were lots of references to a book by some guy
|
||
named Stoll, who apparently had caught some hacker spies. A fellow
|
||
Austin BBSer named Al Evans told me he'd been enthralled by the book,
|
||
and when I saw it listed in the new acquisitions at my law school's
|
||
library, I decided to check it out.
|
||
|
||
The book was a revelation, and it kept me up half the night--I ended
|
||
up reading it in one sitting. The mystery of the Hannover Hacker was
|
||
only part of what fascinated me--the book, almost incidentally,
|
||
included the first *interesting* discussion I'd come across of the
|
||
structure and dynamics of the Internet. The image I formed of the
|
||
Hacker's leaping from network to network helped me begin to appreciate
|
||
the vast, complicated, deeply connected computer and telephone
|
||
networks that crossed the oceans and pierced national borders without
|
||
a pause.
|
||
|
||
I found Cliff's story also to fit well with what I knew, from my own
|
||
associations with researchers, what life can be like for working
|
||
scientists. There is a point in the book where Cliff's curiosity and
|
||
desire to find "the answer" kicks into overdrive--it's then that you
|
||
see why he became an astronomer. For me, one of the most inspiring
|
||
passages in the book is Cliff's account of his discussing the Hacker
|
||
with Nobel Prize-winner Luis Alvarez:
|
||
|
||
"Permission, bah. Funding, forget it. Nobody will pay for
|
||
research; they're only interested in results," Luie said.
|
||
"Sure, you could write a detailed proposal to chase this
|
||
hacker. In fifty pages, you'll describe what you knew, what
|
||
you expected, how much money it would take. Include the names
|
||
of three qualified referees, cost benefit ratios, and what
|
||
papers you've written before. Oh, and don't forget the
|
||
theoretical justification.
|
||
|
||
"Or you could just chase the bastard. Run faster than him.
|
||
Faster than the lab's management. Don't wait for someone
|
||
else, do it yourself. Keep your boss happy, but don't let
|
||
him tie you down. Don't give them a standing target."
|
||
|
||
That's why Luie won the Nobel Prize....
|
||
|
||
And yet, the same singleminded approach that Cliff (and I) found so
|
||
inspiring in Alvarez also inspired a lot of the criticism that Cliff
|
||
has faced from some quarters since the book was published. (More about
|
||
this later.)
|
||
|
||
At the time I read the book, it had not yet come out in paperback.
|
||
When I finished CUCKOO'S EGG, I looked again at the forward and
|
||
discovered that the author had left an e-mail address. Although not
|
||
always swift on the uptake, I managed to deduce from this that Cliff
|
||
wanted feedback from his readers, so, after some hesitation, I sent
|
||
him a letter in e-mail, giving him my reactions, and making a joke
|
||
about a humorous grammar error in Chapter 45 (for the curious, it's in
|
||
the top two lines on page 255 in the Pocket Books paperback).
|
||
|
||
To my surprise, I had mail back from Cliff the next day! He was
|
||
interested to hear my reactions, and was surprised to discover that I
|
||
was a law student--his wife, Martha, had been a Berkeley law student
|
||
during the events chronicled in the book, and was now a clerk for
|
||
Supreme Court Justice Harry Blackmun! We discussed the need for more
|
||
people on the Net with genuine knowledge of the law--few people had
|
||
had more experience than Cliff in running up against the "two
|
||
cultures" division between those representing the legal system (not
|
||
just lawyers, but also the FBI and the Secret Service) on the one
|
||
side, and the programmers, scientists, and students who populated the
|
||
Net on the other.
|
||
|
||
And as our correspondence progressed, we found ourselves talking from
|
||
time to time about the "hacker cases" that were being reported on
|
||
Usenet and in the news media. Cliff had seen what happened when
|
||
well-meaning and informed law-enforcement agents, like Mike Gibbons of
|
||
the FBI, took on a case in which a computer intruder clearly sought to
|
||
steal military secrets and sell them to Eastern Bloc spies. What we
|
||
both were seeing now were cases in which law-enforcement agents and
|
||
prosecutors were making obvious mistakes and damaging people's rights
|
||
in the process. The "Legion of Doom" hackers, for example, were
|
||
accused of stealing the source code for the Emergency 911 System from
|
||
a BellSouth computer--yet to anyone with even basic knowledge of what
|
||
a computer program looks like, the E911 "source code" was nothing more
|
||
than a bureaucratic memorandum of some sort, with a few definitions
|
||
and acronyms thrown in.
|
||
|
||
(The myth that the Legion of Doom defendants had access to the E911
|
||
source code persists to this very day: columnist "Robert Cringely" of
|
||
INFOWORLD once reported the "fact" that the AT&T crash of 1990 was due
|
||
to Legion of Doom sabotage, and that same "fact" appears, along with
|
||
numerous other egregious errors, in the diskette-based press kit for
|
||
the new movie "Sneakers.")
|
||
|
||
My growing interest in these hacker prosecutions, my discussions with
|
||
Cliff and others, and my reflections on THE CUCKOO'S EGG started
|
||
changing my postings on Usenet. Whereas before, I'd limited myself to
|
||
fairly dry and academic dispositions in answer to abstract legal
|
||
questions, I found myself getting emotional about some of these cases.
|
||
The more I learned about how the seizures and prosecutions were
|
||
hurting individuals and chilling free discussion on the Net (I even
|
||
lost an account myself as one sysadmin ended public access to his
|
||
system in order to minimize risk of having his system seized), the
|
||
more I found myself arguing with those whose justified anger at
|
||
computer intruders led them to justify, uncritically, any and all
|
||
overreaching by law enforcement.
|
||
|
||
And then this War On Hackers struck closer to home. On March 1, 1990,
|
||
an Austin BBS, run by the nationally famous role-playing-game
|
||
publisher Steve Jackson Games was seized by the United States Secret
|
||
Service. Although neither Jackson nor his company turned out to be the
|
||
targets of the Secret Service's criminal investigation, Jackson was
|
||
told that the manual for a role-playing game they were about to
|
||
publish (called GURPS Cyberpunk and stored on the hard disk of the
|
||
company's BBS computer) was a "handbook for computer crime."
|
||
|
||
The seizure, which shocked Austin's BBS community, had the potential
|
||
to put Jackson, an innocent third party, out of business. The sheer
|
||
magnitude of the effect on Jackson and his business outraged the
|
||
members of an Austin BBS called "Flight," which numbered both me and
|
||
Jackson among its users. Even more outrageous was the failure of the
|
||
media to pick up on the injustice that had occurred--one Flight user
|
||
pontificated that this was because the mainstream press had no
|
||
interest in BBSs, which publishers saw as nothing more than potential
|
||
competition.
|
||
|
||
I thought this theory was crazy. I had worked as a newspaper
|
||
journalist before I went to law school, and I'd even taken time off
|
||
from law school to edit my university's newspaper. I started arguing
|
||
on Flight that the media hadn't covered the story because they didn't
|
||
know about it. Or, at least, they didn't understand the issues.
|
||
|
||
Then it hit me. Why was I sitting at my terminal *talking* about
|
||
reaching the media, when what I should be doing is making sure that
|
||
the story gets publicized? With something of the same singlemindedness
|
||
I think Alvarez was talking about, I set out to see that the story of
|
||
the Steve Jackson Games raid, and of the other cases, got reported in
|
||
the mainstream press. I gathered together several postings from local
|
||
BBSs and from Usenet, and I drove down to the Austin
|
||
American-Statesman office to talk to a reporter I'd been referred to
|
||
by a friend of mine who worked on the newspaper's copy desk. I took
|
||
with me photocopies of the statutes that give the Secret Service
|
||
jurisdiction over computer crime and lots of phone numbers of
|
||
potential sources. At the same time, I called and modemed materials to
|
||
John Schwartz, a friend and former colleague who was now an editor at
|
||
Newsweek.
|
||
|
||
The story made the front page of the American-Statesman the following
|
||
weekend. And John Schwartz's story, which covered the Steve Jackson
|
||
Games incident as well as the Secret Service's involvement in a
|
||
nationwide computer-crime "dragnet," appeared in Newsweek's April 30
|
||
issue. When the latter story appeared, I realized that (in a much
|
||
smaller way, of course) I'd managed to do to the media what Markus
|
||
Hess had done to Lawrence Berkeley Labs, and what Cliff Stoll had done
|
||
to the puzzle created by Markus Hess: I'd hacked it!
|
||
|
||
And yet, really, I can't take full credit for getting the story of the
|
||
SJG raid out; if I hadn't read THE CUCKOO'S EGG, I'd never have
|
||
started a dialog with Cliff, and I'd never have begun to piece
|
||
together the significance of the wrongheaded hacker prosecutions that
|
||
we heard so much about it 1989 and 1990.
|
||
|
||
That's why it always strikes me as odd, and even offensive, when some
|
||
net.yahoo decides that Cliff's book is responsible for all the
|
||
offenses committed by law-enforcement agents in their efforts to fight
|
||
computer crime. As Cliff himself has remarked,
|
||
|
||
I've found [the book] used to justify increased security,
|
||
raids on bulletin boards, and monitoring of network traffic.
|
||
It's also used to refine legislation, to expand the Internet,
|
||
to better define what constitutes asocial behavior on the
|
||
networks.
|
||
|
||
It started out as a good story, but Cliff has seen it become the
|
||
justification for all sorts of actions, both positive and negative.
|
||
And yet Cliff, because he actually took the leap and tried to explain
|
||
to law enforcement what was going on, often gets much of the blame for
|
||
the negative results, and little of the credit for the positive ones.
|
||
|
||
This shortsighted, "kill the messenger" mentality may explain why a
|
||
few readers have gone so far as to vilify Cliff and his book, saying
|
||
things like "Cliff Stoll is just as much amoral a hacker as Markus
|
||
Hess." Even when those readers are making the criticism in good faith
|
||
(and I think many of them are simply motivated by the common American
|
||
vice of Let's Criticize the Famous), I think they're victims of a
|
||
basic confusion. True, Cliff was as *singleminded* as Markus Hess was.
|
||
(It takes a singular obsession to start wearing a beeper designed to
|
||
go off whenever a certain user logs in.) But the moral and
|
||
philosophical dimension of his actions was far different from those of
|
||
Hess, Pengo, and their associates. Although a few of them justified
|
||
their actions in political terms, for the most part the East German
|
||
hackers cracked systems in order to get money or drugs; in the book
|
||
Cliff tracks the hackers partly in order to solve what had become to
|
||
him a "scientific" problem, but also--as he begins to realize himself
|
||
in the book--in order to restore a community order that has been
|
||
violated and disrupted.
|
||
|
||
It is this same sense of a need to protect this vast, virtual
|
||
community that has led Cliff to change the way he talks about the
|
||
Cuckoo's Egg case over the last few years. I've had the privilege
|
||
several times of seeing Cliff entertain an auditorium full of rapt
|
||
listeners with the story of that tiny accounting error on the LBL
|
||
computer. Nowadays, he ends his presentation on an
|
||
uncharacteristically sober note: he reminds his audience that the need
|
||
to keep computers secure and to instill shared values in our online
|
||
communities *never* justifies the government's violation of the civil
|
||
liberties of individuals.
|
||
|
||
To me, all this casts Cliff and his book in a different light. Even
|
||
now, I can't say I necessarily approve of all the actions Cliff took
|
||
in trying to catch the East German hackers. (It is a measure of how
|
||
much the world has changed since CUCKOO'S EGG that it seems odd to
|
||
write the words "East German.") But when I reflect for a moment and
|
||
try to imagine what kind of people I'd want to share this networked
|
||
community with, it's hard to think of a person better than Cliff
|
||
Stoll--ferociously smart, passionately curious, self-doubting,
|
||
idealistic, and (to his own surprise, perhaps) deeply moral.
|
||
|
||
------------------------------
|
||
|
||
Date: 29 Jun 92 06:11:10 GMT
|
||
From: stoll@ocf.berkeley.edu (Cliff Stoll)
|
||
Subject: File 6--Hatching the Cuckoo's Egg
|
||
|
||
HATCHING THE CUCKOO'S EGG
|
||
|
||
Copyright (c) 1992 by Cliff Stoll
|
||
This version is posted to Usenet; ask me before you repost or
|
||
reprint it. Resend it across networks or archive it on
|
||
servers, but don't include in any digests, publications, or
|
||
on-line forums. Ask me first, and I'll probably say OK.
|
||
|
||
Yes, I'm active on the Usenet, often reading, seldom posting. I
|
||
keep a low profile partly because I'm busy (writing a book about
|
||
astronomy) and because I worry that my opinions are given too
|
||
much attention due to my notoriety.
|
||
|
||
You'll find my e-mail address in the front page of every copy of
|
||
Cuckoo's Egg. I read and reply to all my mail. However, because of
|
||
the huge number (about 18,000 in 3 years), I seldom write more than a
|
||
short answer. Often I get 3 weeks behind in replying to my mail.
|
||
|
||
Letters astonish me with their diversity: some say I'm a villain,
|
||
others a hero. I see myself as neither, but as an astronomer who got
|
||
mixed up in a bizarre computer mystery.
|
||
|
||
I'm now back in Berkeley/Oakland/San Francisco. I've cut down on
|
||
public speaking, mainly because it's exhausting. I'm a member of the
|
||
EFF, ACM, CSPR, BMUG, AAS, ARRL, NSS, pay all my shareware fees, and
|
||
floss nightly.
|
||
|
||
|
||
# Point of the book:
|
||
|
||
I started out by writing a technical summary in the Communications of
|
||
the ACM, 5/88. This article, "Stalking the Wily Hacker" was for
|
||
computer techies ... I wrote it in an academic style, and with more
|
||
technical detail than Cuckoo.
|
||
|
||
*** Before asking for more information ***
|
||
*** about Cuckoo's Egg, please read ***
|
||
*** Stalking the Wily Hacker ***
|
||
|
||
Throughout that article, as well as the book, I emphasized the many
|
||
mistakes I made, the difficult choices I worried about, and the need
|
||
for communities to be built upon trust.
|
||
|
||
I began writing a book about the fundamentals of computer security in
|
||
a networked environment. This was the logical expansion of my CACM
|
||
article. My friend, Guy Consolmagno, read the first 5 chapters and
|
||
said, "Nobody will read this book --it's just about computers and
|
||
bytes. Don't write about things. Write about people."
|
||
|
||
I'd never given it much thought, so I tried writing in first person.
|
||
You know, using "I" and "me". Weird ... kinda like walking around
|
||
nude. It's a lot safer hiding behind the third person passive voice.
|
||
Since I'd never written anything before, I just followed instinct.
|
||
|
||
I began weaving in different threads: a textbook, a mystery, a bit of
|
||
romance, and with my sister's suggestion, a coming of age story.
|
||
Kinda fun to jump from one subject to another.
|
||
|
||
Although I strongly object to anyone breaking into another's system, I
|
||
didn't wish to write a treatise against hackers, crackers, or phone
|
||
phreaks. Rather, I wanted to tell what happened to me and how my
|
||
opinions developed.
|
||
|
||
I wrote the book for fun, not money or fame. These have no value to
|
||
me.
|
||
|
||
# What's happened since then:
|
||
|
||
A year after Cuckoo's Egg was published, operation Sun Devil was
|
||
carried out, Steve Jackson Games was busted by the Secret Service, and
|
||
Craig Neidorff arrested. I knew nothing about these events, and was
|
||
astounded to hear of them.
|
||
|
||
The Cuckoo's Egg has been misused to justify busts of innocuous
|
||
bulletin boards, restrictive new laws, investigations into networked
|
||
activity, and who knows what kind of monitoring by big brother. It's
|
||
also been misused as a cookbook and justification by bd guys to break
|
||
into computers. I disagree with all of these. Strongly disagree.
|
||
|
||
I've repeatedly testified before congress and state legislatures: I
|
||
don't want to lose the friendly sandbox that our usenet has become.
|
||
Our civil rights -- including free speech and privacy -- must be
|
||
preserved on the electronic frontier.
|
||
|
||
At the same time, we must respect each others rights to privacy and
|
||
free speech. This means not writing viruses, breaking into another's
|
||
computer, or posting messages certain to cause flame wars. Just as
|
||
important, it means treating each other with civility, respect, and
|
||
tolerance.
|
||
|
||
# On being notorious:
|
||
|
||
This incident has been good to me in a few ways:
|
||
1) My folks are proud of me. Nothing makes me feel better.
|
||
2) I've made many friends, over networks, at meetings,
|
||
and by mail.
|
||
3) Several old friends have looked me up.
|
||
|
||
And there's a downside:
|
||
1) Alas, but the most important person in my life has left.
|
||
Deep sadness and hurt.
|
||
2) I've become a target of phone phreaks and crackers.
|
||
3) No privacy.
|
||
4) I'm stereotyped and pigeonholed.
|
||
5) Some people become jealous.
|
||
6) Several old friends have hit me up for money.
|
||
|
||
# Answers to specific questions:
|
||
|
||
1) Did Cliff violate Mitre's computers? As written in Cuckoo's Egg,
|
||
chapter 25, I logged into Mitre Washington Computer Centre and
|
||
demonstrated the insecurity of their system. Immediately afterwards,
|
||
I called Mitre and described the problem to them. Up to that point,
|
||
they (and I) didn't know where the problem was coming from. For a
|
||
week prior to touching their system, I was in contact with several
|
||
Mitre officers; we had a working arrangement to try to solve our
|
||
mutual problem. Moreover, I contacted the CEO of Mitre (James
|
||
Schlessinger) who questioned me at length and thanked me.
|
||
|
||
2) Did Cliff run off on his own? At the very start, I contacted three
|
||
attorneys: our general counsel, my local district attorney, and a
|
||
friend at the ACLU. Additionally, I asked several professors of law
|
||
at Boalt Hall and a number of law students. My boss, my lab director,
|
||
and my colleagues knew what was happening. I contacted systems
|
||
managers at Stanford, UC/Berkeley, and military sites. I did my best
|
||
to keep these people in the loop.
|
||
|
||
3) Was Cliff some kind of sheriff of the west, trampling over rights?
|
||
Uh, I never thought of myself that way. Indeed, much of the time, I
|
||
felt this was a chance to do science -- apply simple physics to a
|
||
curious phenomenon and learn about the environment around me. As much
|
||
as possible, I wished to remain invisible to the person breaking into
|
||
my computer, while prodding others to take action. As a system
|
||
manager, I did my best to monitor only the intruder, to keep him from
|
||
hurting others, and to find out why he was in our system.
|
||
|
||
4) Did Cliff track these people to support a political position? No.
|
||
|
||
5) Am I happy at the sentences meted out to the German defendants?
|
||
They received 1-2 years of probation and stiff fines. I don't take
|
||
joy in wrecking another's life -- rather, I'm sad that this entire
|
||
incident happened. I am glad that they did not end up in prison, glad
|
||
that at least one of them has said that he will never again break into
|
||
computers.
|
||
|
||
|
||
-Cliff Stoll 29 June 1992
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.44
|
||
************************************
|
||
|
||
|
||
|