802 lines
44 KiB
Plaintext
802 lines
44 KiB
Plaintext
|
||
|
||
Computer underground Digest Sun Nov 29, 1992 Volume 4 : Issue 61
|
||
|
||
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
Archivist: Brendan Kehoe
|
||
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
Ralph Sims / Jyrki Kuoppala
|
||
Boffo Idolater: Etaion Shrdlu, Junior
|
||
|
||
CONTENTS, #4.61 (Nov 29, 1992)
|
||
File 1--Crackdown on Reality (Review of THE HACKER CRACKDOWN)
|
||
File 2--Some thoughts on "The Hacker Crackdown"
|
||
File 3--The Hacker Crackdown
|
||
File 4--Hacker Crackdown Review
|
||
File 5--Remembering the Hacker Crackdown
|
||
File 6--Bruce Sterling & Cyberhemian Rhapsodies
|
||
|
||
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
|
||
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
|
||
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.
|
||
|
||
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
|
||
libraries; from America Online in the PC Telecom forum under
|
||
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
|
||
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
|
||
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
|
||
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
|
||
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
|
||
in /pub/text/CuD.
|
||
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
|
||
Back issues also may be obtained from the mail
|
||
server at mailserv@batpad.lgb.ca.us.
|
||
European distributor: ComNet in Luxembourg BBS (++352) 466893.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted for non-profit as long
|
||
as the source is cited. Some authors do copyright their material, and
|
||
they should be contacted for reprint permission. It is assumed that
|
||
non-personal mail to the moderators may be reprinted unless otherwise
|
||
specified. Readers are encouraged to submit reasoned articles
|
||
relating to computer culture and communication. Articles are
|
||
preferred to short responses. Please avoid quoting previous posts
|
||
unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: Tue, 6 Oct 92 19:55:56 MDT
|
||
From: ahawks@NYX.CS.DU.EDU(gogo is insane)
|
||
Subject: File 1--Crackdown on Reality (Review of THE HACKER CRACKDOWN)
|
||
|
||
|
||
CRACKING DOWN ON REALITY
|
||
|
||
A review of Bruce Sterling's THE HACKER CRACKDOWN:
|
||
LAW AND DISORDER ON THE ELECTRONIC FRONTIER
|
||
|
||
by Andy Hawks (ahawks@nyx.cs.du.edu)
|
||
|
||
|
||
THE HACKER CRACKDOWN:
|
||
LAW AND DISORDER ON THE ELECTRONIC FRONTIER
|
||
by Bruce Sterling
|
||
Bantam Books, 1992
|
||
Non-fiction, 328 pp., $23 (hard-cover)
|
||
ISBN 0-553-08058-X
|
||
|
||
My eyeballs are squirming. Squirming out of their sockets.
|
||
Wanna know why? Ok, I'll tell you, but be warned - it is not a
|
||
pleasant experience to have your eyeballs squirm.
|
||
|
||
"Theoretically, the task force had a perfect legal right to
|
||
raid any of these people, and legally < could have seized
|
||
the machines of anybody who < subscribed to Phrack." <
|
||
|
||
Well, I told you so. You can't say I didn't warn you. And, by
|
||
the way, please stop looking at me while your eyeballs are squirming.
|
||
|
||
There is no doubt in my mind that T.S. Eliot was reading Bruce
|
||
Sterling's new non-fiction book entitled THE HACKER CRACKDOWN: LAW
|
||
AND DISORDER ON THE ELECTRONIC FRONTIER when he said "Human kind Can
|
||
not bear very much reality." No doubt, no doubt.
|
||
|
||
I subscribe to Phrack, and I'm sure many of you do as well, or
|
||
have at least pondered and wandered your way through an issue or two
|
||
if you have even any remote connection to the cyberspace underground.
|
||
In case you're lost, I'll fill you in. Phrack is a magazine, but you
|
||
can't buy it at your local newsstand. Phrack might be considered in
|
||
some circles to be the keystone of what we commonly call the computer
|
||
underground - that dark, mysterious, anarchistic domain of rebellion
|
||
occupied by a stereotypically benign group of goggled white faces, 140
|
||
IQs, and Mt. Dew addicts - the hacker. Phrack is also one of the many
|
||
landmarks Bruce Sterling points out on his wonderfully lucid trip
|
||
through this unreal domain dominated by fear, greed, and power.
|
||
|
||
Knowledge is power. Information is knowledge. Information wants
|
||
to be free. Such is the ethos of the hacker. And thus we have laid
|
||
out before us the battleground upon which an incredible struggle of
|
||
superegos is waged. On the one hand we have the computer hacker, the
|
||
teenage boy with a heightened sense of curiosity and the initiative
|
||
enough to take some action to satisfy this incredible hunger. On the
|
||
other end of the keyboard we have the government, the CEOs, the powers
|
||
that be.
|
||
|
||
Computer hacking is just another example of social deviance,
|
||
rebellion, and a desire to make one's reality fit one's personal
|
||
wishes and desires. This is natural. Yet somewhere along the line,
|
||
this natural tendency to rebel took on new meaning, acquired a scope
|
||
of infinite importance, and was thrust into a world where the ability
|
||
to obtain immense power via hacking was real, concrete, and
|
||
threatening.
|
||
|
||
It is this deviance and rebellion that Bruce Sterling shows us in
|
||
THE HACKER CRACKDOWN. Hackers are not an easy thing to explain mind
|
||
you, and to delve into the world of the computer underground is to
|
||
find one's self in a surreal painting filled with confusion and delusion
|
||
concerning the basic moral, ethical, legal, and philosophical
|
||
questions that plague modern society - the information society.
|
||
|
||
It has been attempted before. Cliff Stoll, whom I liken to
|
||
"Sherlock Holmes on acid living in Berkeley" because of his extremely
|
||
inventive and non-conventional line of thought, has shown us the
|
||
computer underground via his first-hand encounters with "the other
|
||
side" and asks himself who "the other side" really is. Cliff Stoll's
|
||
THE CUCKOO'S EGG is rich in adventure and "car-chases in cyberspace",
|
||
yet it fails at even attempting to put "the hacker problem" in
|
||
perspective. In retrospect, the egg is fried. (But fried eggs,
|
||
though not the most wonderfully healthy breakfast choice, are still
|
||
tasty).
|
||
|
||
On the other hand, we have Steven Levy and his classic among the
|
||
computer literate, HACKERS. Yet in the constantly changing
|
||
technocratic society we seem to reside in, Levy may be found sitting
|
||
out on the porchbench, telling his grandson who has just hacked into
|
||
Bellcore, "Why, in my day, you wouldn't be a hacker, you'd simply be a
|
||
criminal! In my day, we didn't want to free information, we wanted to
|
||
create information! Now go away, ya bastard kid....", as he mumbles
|
||
off into the sunset. Levy's book is certainly a necessary part of the
|
||
hacker tradition, but it's just that - tradition. Levy seems to fail
|
||
to acknowledge, let alone accept, the *evolution* of the hacker spirit
|
||
as relevant to today's world. Levy and his followers are the system
|
||
administrators found on countless virtual communities arguing for the
|
||
term 'cracker' to describe today's 'hacker', saying that today's
|
||
'cracker' is not worthy of the term hacker since they lack in
|
||
innovation and excel at regurgitating. Well, all I would have to say
|
||
to that is read Sterling's THE HACKER CRACKDOWN.
|
||
|
||
Then we have a more recent contribution to the book of myths and
|
||
facts surrounding hackers, CYBERPUNK: OUTLAWS AND HACKERS ON THE
|
||
COMPUTER FRONTIER by Katie Hafner and John Markoff. Now, cyberpunk!
|
||
There's a word! In the similarly titled HACKER CRACKDOWN, Bruce
|
||
Sterling, commonly considered to be the co-creator of the cyberpunk
|
||
literary genre along with his pal William Gibson, addresses the
|
||
evolution and transformation of the word he helped create - cyberpunk
|
||
- from a fictional character to a reality hacker. CYBERPUNK by Hafner
|
||
& Markoff is unique in that it takes three very real, very human
|
||
people and attempts to turn them into post-modern science-fictional
|
||
characters, such as Case in William Gibson's legendary NEUROMANCER.
|
||
Throwing "cyberpunk" for all it's literary and cultural significance
|
||
into the realm of the computer underground greatly twists its
|
||
landscape, contorts the stereotypes, and leads us into the
|
||
near/now-future future with a trippy view of "things to come".
|
||
|
||
And then of course came the crackdown. We have myth, we have
|
||
legend, we have history, and we have entertainment, but until now, the
|
||
literary accounts of the computer underground have lacked clear focus,
|
||
cultural significance, and unbiased sociological and psychological
|
||
viewpoints. Bruce Sterling cracks down on the post-modern realities
|
||
of a world based around curiosity and a need for information.
|
||
|
||
For what it's worth let me say that after having read a few of
|
||
Sterling's accounts about writing this book (featured in various
|
||
publications such as Electronic Frontier Foundation newsletters and
|
||
e-magazines, Steve Brown's wonderful Science Fiction Eye magazine
|
||
to which Bruce Sterling contributes regularly, and various other
|
||
resources), my opinions of Mr. Sterling are very enthusiastic. For a
|
||
long time I have admired Bruce Sterling for his wonderful and integral
|
||
contributions to the cyberpunk literary genre of science fiction.
|
||
Let's face it, his MIRRORSHADES anthology helped revolutionize the
|
||
otherwise complacent and all-too-familiar world of science fiction. I
|
||
am a humungous fan of literary cyberpunk and some of Sterling's books
|
||
hold a high place on my bookshelf, next to many literary classics. I
|
||
have always thought of William Gibson and Bruce Sterling as men of a
|
||
truly amazing vision, and with his first non-fiction work, THE HACKER
|
||
CRACKDOWN, Bruce Sterling extends that vision into a phenomena of our
|
||
society very analogous to the societies proposed in cyberpunk fiction.
|
||
|
||
In THE HACKER CRACKDOWN, Sterling acts less as social critic and
|
||
more of social observer. Rather than spew forth opinions regarding
|
||
hackers that we've all heard ad nauseam, he puts everything regarding
|
||
the hacker underground into perspective. Basically, he makes sense of
|
||
those events in the underground that previously resulted only in
|
||
head-scratching confusion. From Abbie Hoffman to the U.S. Secret
|
||
Service, from AT&T to LoD, from the WELL to the courtroom, from the
|
||
dawn of cyberspace to Terminus, Bruce Sterling provides the reader
|
||
with a firm grasp of the events that are shaping our world and that
|
||
will have an incredible influence on the emerging information society
|
||
of the twenty-first century.
|
||
|
||
Included in the book is almost every event you could deem even
|
||
remotely significant to the hurricane instability of cyberspace: the
|
||
genesis and evolution of cyberspace from the telegraph to
|
||
globally-linked real-time virtual communities, the AT&T crash on
|
||
Martin Luther King Day in 1990, Abbie Hoffman and YIPL/TAP, BBSes and
|
||
text philes (phreak/hack/anarchy/credit-card fraud/etc.), the hacker
|
||
"elite" of the mid 80's, the various Legion of Doom activities and
|
||
cases, the E991/Phrack case, Operation Sundevil, Steve Jackson Games,
|
||
RPGs, cyberpunk fiction, the U.S. Secret Service, the Electronic
|
||
Frontier Foundation, the WELL, the Grateful Dead, Phiber Optik and
|
||
Acid Phreak, Craig Neidorf, Shadowhack, NuPrometheus League, the
|
||
Atlanta Three, Mentor, Phoenix Project, Metal Shop, Pirate's Cove,
|
||
Computers Freedom and Privacy, and civil liberties. It's all here.
|
||
|
||
Aside from the extreme volume of information that's bound to
|
||
impress even the most comprehensively informed hacker, Sterling,
|
||
throughout THE HACKER CRACKDOWN and in other statements he's made,
|
||
subliminally asks some vital questions about the ethics, morality, and
|
||
philosophies behind the very idea of cyberspace, forcing the reader to
|
||
(God forbid) *think* about the events in cyberspace in the last
|
||
decade, to think about the creation and evolution of this surreal
|
||
civilization. Bruce Sterling destroys the myths and presents the
|
||
facts. All the facts. To quote U2 THE HACKER CRACKDOWN is "even
|
||
better than the real thing."
|
||
|
||
Bruce Sterling, at least for now, wins the prize. THE HACKER
|
||
CRACKDOWN, in this reader's view, is the definitive word on
|
||
cyberspace. I'd like to read it again, but my eyes are still
|
||
squirming. But on second thought, having your eyes squirm around in
|
||
your brain is a small price to pay for reading THE HACKER CRACKDOWN.
|
||
|
||
------------------------------
|
||
|
||
Date: Sun, 1 Nov 92 14:06:05 CST
|
||
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
|
||
Subject: File 2--Some thoughts on "The Hacker Crackdown"
|
||
|
||
My first exposure to Bruce Sterling's book "The Hacker Crackdown" was
|
||
a draft of the second chapter. I read it, and found at the end that I
|
||
could not warm to the self-important tone of the crackers and
|
||
prosecutors who were its subject. Names and pseudonyms... These
|
||
people hadn't a straight word to say.
|
||
|
||
The book is out now. I saw my first copy in a book store here in
|
||
Austin. I saw my name in the index. I did not throw the book across
|
||
the store in dismay at seeing my name in print... It was a close
|
||
thing, though. Having read it twice now, I find that I liked the book
|
||
more than I expected to after reading that early chapter.
|
||
|
||
If you've been reading Computer underground Digest for awhile, you may
|
||
find the second and fourth chapters to be old news. Skip to the third
|
||
chapter... "Law and Order". Here Sterling warms to his subject, and
|
||
I found myself wondering if his fascination with the computer cops
|
||
stems from their physical presence... An interesting position for an
|
||
author writing about goings-on in a virtual community to be in.
|
||
Certainly there is more detail for a writer here: A physical place, a
|
||
sense of community... All the things that don't exist in a world
|
||
defined by the boundaries of a CRT screen.
|
||
|
||
I'd really like to see this book re-done as hypertext. The sometimes
|
||
awkward bridges that Sterling constructs to get the reader across
|
||
topical or temporal chasms could then be left out.
|
||
|
||
Bob
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 10 Nov 92 15:01:36 EST
|
||
From: Rich=Gautier%SETA%DRC@S1.DRC.COM
|
||
Subject: File 3--The Hacker Crackdown
|
||
|
||
Amen!
|
||
|
||
Every hacker/phreak, law enforcement weenie, security professional,
|
||
law maker, (and probably a whole bunch of other people!) should be
|
||
FORCED to read this latest book.
|
||
|
||
"The Hacker Crackdown" by Bruce Sterling is an IMPRESSIVE overview of
|
||
everything from cops to bad guys to civil liberty workers in the never
|
||
ending battlefield of cyberspace. Right after the author forgives
|
||
himself for using the word 'HACKER' in the title, the book grabs your
|
||
attention, and it doesn't let go at all.
|
||
|
||
The book provides the reader with a sociological, historical and
|
||
analytical view from one of the most revered men in cyberspace, Bruce
|
||
Sterling. His insights will have you, too, saying "Amen!" to at least
|
||
some of what he has to say in this book. It should provide
|
||
interesting reading to all audiences on both (all three) sides of the
|
||
battlefield in the never ending war for power and control in the area
|
||
of computer and telephone security. He starts the book out with a
|
||
history of the system itself. It doesn't bore you like you thought it
|
||
would, and suddenly you are gripped by the history of the underground,
|
||
the digital underground.
|
||
|
||
This chapter alone could make the book worthwhile. For hackers, it
|
||
would be a fun look back into the good ole days. For security folks,
|
||
it is a great peek into the views and sociological drive of the
|
||
underground enemy. It also covers the history of Operation Sundevil,
|
||
and all the unpleasantness that seems to have followed. This part of
|
||
the book will take you, in Clifford Stoll-like style (wonder if this
|
||
is where he picked up his writing style). One long stream of data
|
||
later, and you're into the next section of the book, "Law and Order".
|
||
|
||
If you aren't one of the people pictured herein, you may find yourself
|
||
learning a great deal more than you hoped. Only someone with ties to
|
||
both sides of this great battle could bring the insight that is so
|
||
needed here. Although I preferred the first two sections of the book,
|
||
I actually found myself liking to find out what the real drive of the
|
||
"money-hungry prosecution" was.
|
||
|
||
The last part of the book, I guess you could call the END RESULT of
|
||
the whole history lesson in the first three parts of the book. Civil
|
||
Liberty as an ACTUAL issue. Even the hackers, (excuse the term)
|
||
should be glad that some of the things they have been screaming about
|
||
for YEARS, actually have a public voice now. This section also
|
||
includes the famous Phrack with the edited E911 document in it. (Just
|
||
in case you missed it).
|
||
|
||
All in all, a good buy...I highly recommend it. I read it from my
|
||
Public Library, and I intend to go out and buy me my own personal copy
|
||
as soon as I can.
|
||
|
||
------------------------------
|
||
|
||
Date: 9 Nov 1992 16:57:51 U
|
||
From: "Steve" <copold@SMTPGATE.TECHRSCS.PANAM.EDU>
|
||
Subject: File 4--Hacker Crackdown Review
|
||
|
||
That "truth is often stranger than fiction" is a time worn and often
|
||
over-used cliche. If anyone has ever doubted its veracity, however,
|
||
all they need do to confirm the accuracy of the phrase is read _The
|
||
Hacker Crackdown_ by Bruce Sterling. It's probably a wise marketing
|
||
decision that the book is being hawked as Sterling's first volume of
|
||
non-fiction. Even the likes of a Clancy or a Le Carre would gasp in
|
||
disbelief at many of the twists and turns in this complex tale.
|
||
|
||
As a part-time dweller in cyberspace, one learns to expect the
|
||
unexpected. It is all too easy to assume that you really have a handle
|
||
on what is happening in, as Sterling calls it, "the un-real estate" of
|
||
the networks. In that regard, _Hacker Crackdown_ can do serious damage
|
||
to one's ego. When I read the teasers on the book's jacket, I actually
|
||
laughed when I got to the quote from Lex Luthor, "I learned a lot from
|
||
this book that I didn't know." Having read quite a few of Lex's
|
||
postings on MindVox, I assumed that this was a touch of hacker humor
|
||
that the publisher had bought into. Little did I know how much I was
|
||
about to learn from _The Hacker Crackdown_.
|
||
|
||
Having been involved, at one level or another, in the electronic
|
||
information business all of my adult life, and after hanging out on
|
||
the nets for the past few years, I had, however foolishly, come to
|
||
consider myself as being relatively "clued." Even though I regularly
|
||
communicate with a number of the people written about in the book, I
|
||
found that I only knew bits and pieces of the story. And to compound
|
||
my arrogant assumption, most of what I did know was woefully
|
||
incomplete and often could not be linked to the other parts of the
|
||
whole. In this sense, _Hacker Crackdown_ was a genuine wake-up call.
|
||
It can be a rude awakening to spend a pleasant weekend having a really
|
||
enjoyable read only to find out that you're actually just another
|
||
"clueless computer geek."
|
||
|
||
Make no mistake, _The Hacker Crackdown_ is a terrific read, but beyond
|
||
that it is the product of a determined effort by Sterling to report in
|
||
an organized and coherent fashion the most confounding, bewildering,
|
||
and downright puzzling collection of rumors and facts imaginable. To
|
||
make his task even more challenging, he found himself dealing with an
|
||
equally unstable collection of subjects that ranged from socially
|
||
maladjusted hackers and phone phreaks, to the paranoid fringes of law
|
||
enforcement, to the "Big Brother" attitudes and often ham-fisted
|
||
behavior of corporations that deal in information...No small task to
|
||
be sure! In this effort he not only succeeds, but succeeds
|
||
brilliantly.
|
||
|
||
In telling the story of the crackdown, Sterling leads us from event to
|
||
event while maintaining an understandable chronology. Many of the
|
||
principle offenses and incidents that occur in this incredibly complex
|
||
chain of happenings are separated by months and, in some cases, more
|
||
than a year. If there is an aspect of the book that makes it a
|
||
challenge, it is in gaining a true grasp on the actual sequence of
|
||
events as they relate to the various elements of the bigger picture of
|
||
cyberspace circa 1990-1991. It is, in fact, a tangled morass that is
|
||
at best difficult to follow even with Sterling acting as guide and
|
||
pathfinder. If there is a side of _The Hacker Crackdown_ that will
|
||
ultimately slow its distribution, it is that it could prove to be near
|
||
inaccessable for the uninitiated.
|
||
|
||
Having said that, let me point to what is in my opinion the best that
|
||
_Hacker Crackdown_ offers the reader. Referring to the subjects of the
|
||
book (all of them...not just the hackers) as a strange and diverse
|
||
group may be the biggest understatement I'll put in print this year.
|
||
They are, in fact, almost incomprehensible to those who live, for lack
|
||
of a better term, within the accepted social norms. Sterling has
|
||
accomplished what megabytes of e-mail and hours of conversation had
|
||
not managed to do...He has given these characters a human face.
|
||
Somewhere in the middle of this highly technical narrative, a great
|
||
number of these folks ceased being handles on a node and started
|
||
taking on a form...a very human form.
|
||
|
||
It would be impossible to mention them all in a short review, so I'll
|
||
make examples of just a few. Perhaps the most glaring of these is
|
||
Terminus. He's a regular contributor on MindVox, and has become good
|
||
friends with a mutual acquaintance. As a result of this, I've had the
|
||
chance to hear a lot of what he has to say. I think I had prejudged
|
||
Terminus, because he had been unfortunate enough to have been caught
|
||
and prosecuted. In _Hacker Crackdown_ we are made privy to a side of
|
||
Terminus that just doesn't register in e-mail or in his postings on
|
||
Vox. Although it is made clear that he probably committed
|
||
transgressions, it is also equally clear that he is not evil, that he
|
||
bore no malice toward anyone, and that he certainly should not have
|
||
gone to prison. Granted that is a personal judgment, but it is one
|
||
that rises from the picture of Terminus painted by Sterling. Whether
|
||
Sterling feels that way or not is immaterial as his writing left me,
|
||
the reader, with that conviction.
|
||
|
||
Not all of the creatures that arose from the printed page were as
|
||
pleasant as Terminus. The best example of this is Emmanuel Goldstein.
|
||
Another early contributor to Vox and the publisher of 2600, Emmanuel
|
||
Goldstein has always been a highly enigmatic figure. Sterling's
|
||
portrait of Goldstein appears to be brutally honest. To put it
|
||
politely, it is an image of an individual that you would not want to
|
||
have for a next-door neighbor. To be fair to Emmanuel, there are not
|
||
many that are mentioned in _The Hacker Crackdown_, including the Feds
|
||
that would be high on my list of desireable neighbors.
|
||
|
||
Then there is Gail Thackeray...Recipient of endless name-calling in
|
||
hacker chatter. Yet, the Gail Thackeray we meet in _Hacker Crackdown_
|
||
is a sympathetic persona that I found very likeable. If she has a
|
||
fault, as Sterling draws her, it is her obsessive nature and her need
|
||
for results...two very hacker-like qualities. The more I read, the
|
||
more I found myself thinking, "Hey, this is a person I would hire in a
|
||
minute!" Suddenly, the hated Gail Thackeray had be come someone I
|
||
could admire and probably call friend. (Let's do lunch Gail!)
|
||
|
||
The last person I wish to mention, but certainly not the least
|
||
significant, is the homeless man in Phoenix. Sterling paints him as an
|
||
icon of the future-disenfranchised. Whether he is addressing some
|
||
looming caste-based society where only those that have one foot in
|
||
cyberspace and the other in the real world will emerge pre-eminent
|
||
must be addressed by the individual reader. It is, however, a truly
|
||
chilling scene he draws of his encounter with this lost soul set
|
||
against the steel and glass backdrop of modern Phoenix. Although
|
||
Phoenix just happened to be where the chance meeting occurred, it is
|
||
ironic that the information society may have to rise from the ashes as
|
||
did the bird of legend. Bruce Sterling - Prophet of Doom - I doubt it,
|
||
but it is food for thought.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 17 Oct 92 21:30:20 CDT
|
||
From: Jim Thomas <cudigest@mindox.phantom.com>
|
||
Subject: File 5--Remembering the Hacker Crackdown
|
||
|
||
Sheldon Zenner, the defense attorney for Craig Neidorf in the June,
|
||
1990 "Phrack" trial, began and ended his opening comments with a
|
||
reminder that wisdom often accompanies reflection on past mistakes:
|
||
|
||
MR ZENNER: What I would have written on there if I could is
|
||
something I got in a fortune cookie that said:
|
||
|
||
"To remember is to understand".
|
||
|
||
I have never forgotten that. To remember what it was to be a
|
||
struggling lawyer makes a good judge. To remember what it was to
|
||
be a student makes a good teacher. To remember what it was to be
|
||
a child makes a good parent.
|
||
*************
|
||
To remember is to understand. To remember what it's like to be
|
||
14, or 15, or 16, or 17, or 18, or 19. To remember what it's
|
||
like to do some stupid things. But stupid things, doing stupid
|
||
things isn't illegal...and a good thing for all of us, I
|
||
suspect.
|
||
|
||
Recent allegations that the U.S. Secret Service has been involved in
|
||
disruption of public gatherings, surveillance of private citizens
|
||
beyond the scope of their authority, and perhaps disseminating
|
||
information to employers of those surveilled, suggests that some
|
||
agents have forgotten the lessons of Sun Devil, of restrictions on
|
||
covert surveillance common during the 1960s, and of resistance to
|
||
abuses of government authority. To remember that Constitutional
|
||
protections extend to cyberspace is to understand that freedom should
|
||
be protected, not subverted, by some over-zealous law enforcement
|
||
agents.
|
||
|
||
In The Hacker Crackdown (THC), science fiction writer Bruce Sterling
|
||
(Islands in the Net, co-author of The Difference Engine) forces us to
|
||
remember, to remember so that we understand. Drawing from interviews
|
||
with hackers and law enforcement officials, participation in the
|
||
activities of each, and available documents, Sterling pulls together a
|
||
concise summary of the context and the events of the U.S. Secret
|
||
Service (USSS) "hacker raids" of early 1990. For both the "hacker"
|
||
community and law enforcement, the crackdowns represented a coming of
|
||
age. Both sides won a little and lost a little, and both sides were
|
||
responsible for helping shed a little more light on the nature of
|
||
cyberspace and the responsibilities and rights of those within it.
|
||
Sterling refreshes our collective memories and provides new insights
|
||
and understandings.
|
||
|
||
The losses of the indiscriminate "hacker crackdown" of the 1990s
|
||
exemplified by the "Bill Cook cases" of Phrack and Len Rose and by
|
||
Operation Sun Devil, have not been calculated: Lost equipment,
|
||
attorney fees, lost time, lost revenues, embarrassment and loss of
|
||
credibility for some prosecutors and the US Secret Service (not to
|
||
mention the potential losses to taxpayers if the Steve Jackson suit
|
||
against them is successful), delay of publication of Steve Jackson's
|
||
GURPS, needless drain on federal resources and taxpayer dollars, and
|
||
emotional and psychological anguish, computer users raided with no
|
||
subsequent indictments, and lives shattered. All this resulted in
|
||
relatively small pay-off of a few minor guilty pleas raise the
|
||
question: WAS THE HACKER CRACKDOWN worth it? My reading of THC
|
||
suggests that the answer is a complex "yes." Part of the inevitable
|
||
process of establishing and protecting rights lies in the continuous
|
||
struggle against abuses. Struggles over rights reflect the social
|
||
tension between freedom and control and helps shape the boundaries of
|
||
responsibility, the limits of public and government behavior, and the
|
||
form and content of what is to be protected and how. The government
|
||
crackdown on hackers can be seen as part of this process. Sterling
|
||
attempts to show the complexity of this struggle.
|
||
|
||
_The Hacker Crackdown_ provides a comprehensive background of the
|
||
events of 1990 that most in the computer community consider a fiasco.
|
||
Sterling avoids taking sides as he describes the context of
|
||
technological and social changes underlying the "hacker" phenomenon
|
||
and law enforcement responses to. His depictions of the participants
|
||
are sometimes flattering, other times not, and he attempts to depict
|
||
the subjective and human element that guides adversaries and others in
|
||
the pursuit of their goals. Most law enforcement agents, Sterling
|
||
reminds us, are dedicated and competent. Others are less so, and some
|
||
are simply incompetent. Likewise, some "hackers" are criminals, some
|
||
are simply curious while others are obnoxious delinquents, and a few,
|
||
such as 2600's Emmanuel Goldstein, are best understood as dissidents
|
||
in the tradition of European gadflies who tweak authority.
|
||
|
||
Those in the computer community tend to see law enforcement and
|
||
telecommunications security personnel in the same one-dimensional
|
||
cartoon stereotypes as those agents perceive the "criminals" they
|
||
chase. One of the subtlest and most pernicious consequences of the
|
||
anti-hacker images is the creation of myths, misunderstanding, and
|
||
fear of those who display considerable techno-competence. An equally
|
||
inaccurate image is the view held by many in the computer community
|
||
all law enforcement agents are techno-illiterate, ill-intentioned, and
|
||
fail to understand the computer culture. There is sufficient evidence
|
||
that both sides have cause for their views. However, as Sterling
|
||
cogently illustrates, both views are simplistic and belie the reality
|
||
of complex and sometimes confused agendas, generally well-intended
|
||
actions gone awry, and legitimate misunderstandings arising that cloud
|
||
the perceptions and actions of all parties. One value of Sterling's
|
||
tome is its attempt to lay bare these intricacies of motive and
|
||
action.
|
||
|
||
Fear of the unknown is a subtle theme in Sterling's interpretation of
|
||
law enforcement responses to "hackers." Buried in the middle of the
|
||
volume (pp. 188-191), Sterling shares his encounter with a large
|
||
homeless man whose contact with reality was suspect. From this
|
||
encounter, he realizes the intertwining of fear and surprise, and how
|
||
both shape our perception of "what's going on." This provides the
|
||
central metaphor for THC: Lack of understanding contributes to fear,
|
||
and fear leads to excess.
|
||
|
||
Sterling begins with a helpful summary of the history of the telephone
|
||
system from its earliest days of implemention and marketing battles
|
||
through the emergence of AT&T as the primary telephony corporate
|
||
monolith. Sterling reminds readers that today's hackers had their
|
||
counterpart in earlier explorers and mischief-makers, and he suggests
|
||
that all that is currently new is the technology by which contemporary
|
||
techophiles operate. By providing a social context for "hacking,"
|
||
Sterling removes the techno-mystique surrounding it. After all, he
|
||
reminds us, when the telephone was first introduced, it inspired fear
|
||
amongst some, was seen as limited in scope, and the technology was
|
||
understood by few. And even the Futurians, a group of famous science
|
||
fiction writings in New York in the 1930s, felt the power of the USSS
|
||
when their wackyness was suspected by neighbors as masking a
|
||
counterfeiting ring. To remember the history of technology and its
|
||
relationship to law enforcement is to understand, and understanding
|
||
reduces our fear of the unknown.
|
||
|
||
>From THC, we understand that most hackers are little more than
|
||
curious, white, middle-class teenagers with considerable computer
|
||
proficiency. We learn that Gail Thackeray, considered the mastermind
|
||
behind Sun Devil, is just a normal person and, behind the scenes,
|
||
attempted to bring an awareness of Constitutional rights to law
|
||
enforcement agents. We learn that the USSS is comprised of
|
||
technologically competent people, but none of them seemed present or
|
||
involved in Sun Devil or the Bill Cook incidents. We learn the
|
||
background behind the formation of EFF, we are reminded of forgotten
|
||
Sun Devil victims such as Charlie Boykin and Rich Andrews and others
|
||
who were caught up in the crackdown, and we are reminded that Craig
|
||
Neidorf's success in his trial was the result of numerous backstage
|
||
players, including John Nagle (who discovered the public nature of the
|
||
supposedly confidential documents Neidorf was accused of reprinting)
|
||
and Dorothy Denning, a computer security expert. Readers of CuD or
|
||
EFFector Online will find little new information in THC. This is of no
|
||
consequence. The major contribution of THC is that it places events
|
||
in chronological order and provides a unifying theme not possible when
|
||
information leaks out sporadically. Sterling crafts the individual
|
||
tiles into a rich mosaic that depicts the primary actors and events
|
||
that eventually brought them together in the crackdowns. Sterling
|
||
helps us to remember in order that we understand.
|
||
|
||
In any work, one can find points to criticize, and although the
|
||
quibbles one might have with THC are minor and in no way detract from
|
||
the significance, they do suggest strategies for a paperback re-write.
|
||
These include a few minor factual discrepancies (indicating in one
|
||
passage that Sun Devil occured on May 9, and in another on May 8); An
|
||
occasional tendency to engage in seemingly gratuitous attention to
|
||
secondary topics such as a long account of The Well public access
|
||
system; an over-long discussion of the proficiency of the Secret
|
||
Service that digresses needlessly; and far too much significance given
|
||
to the role of the Martin Luther Day AT&T crash as a catalyst in the
|
||
crackdowns. Some "hackers" also took minor issue with some of the
|
||
technical details, such as referring on occasion to "switching
|
||
stations" ("there's no such thing," said one). However, some of the
|
||
digressions work: Sterling's account of his own serendipitous attempt
|
||
at "trashing" (mucking through others' trash in search of useful
|
||
information) provides a poignant and vicarious experience for the
|
||
reader as Sterling reconstructs a series of letters written by a woman
|
||
to her former boyfriend.
|
||
|
||
The 35,000 copies of first printing of THC are virtually gone,
|
||
suggesting a second, smaller, printing will follow. Presumably the
|
||
eventual paperback version will allow for revisions that might include
|
||
the following: Sterling's journey through the events of the crackdown
|
||
is limited to 1990. An epilogue would be helpful. It would also be
|
||
valuable to make more visible the many other nameless individuals who
|
||
were raided and never indicted as a way of making more clear the
|
||
extent and futility of the operations. And, one glaring void struck
|
||
CuD editors: Cu Digest receives just a passing reference in a quote
|
||
from a law enforcement agent. CuD was, after all, a direct result of
|
||
the Phrack and Len Rose cases, and it was a primary source of news for
|
||
many during those events, and it made available trial transcripts,
|
||
documents, and detailed the USSS's use of an informant in the Sun
|
||
Devil operation.
|
||
|
||
These cavils aside, Sterling's ambitious attempt at the re-creation of
|
||
Sun Devil events is successful. In emphasizing the emergence of the
|
||
"civil libertarians" from the chaos of the crackdown, he reminds us
|
||
that the struggle for rights is as long as history, and that to see
|
||
the crackdown as little more than law enforcement excess is to fail to
|
||
understand its significance. Sterling's balanced discourse does not
|
||
provide the reader with answers, but in demanding that we remember, he
|
||
prompts us to greater understanding.
|
||
|
||
The central message of The Hacker Crackdown may be summarized by
|
||
Sterling's experience with the homeless Stanley, and the message
|
||
should be read carefully by all sides:
|
||
|
||
In retrospect, it astonishes me to realize how quickly
|
||
poor Stanley became a perceived threat. Surprise and fear
|
||
are closely allied feelings. And the world of computing is
|
||
full of surprises...To know Stanely is to know his demon.
|
||
If you know the other guy's demon, then maybe you'll come
|
||
to know some of your own. You'll be able to separate
|
||
reality from illusion. And then you won't do your cause,
|
||
and yourself, more harm than good (pp 190, 191).
|
||
|
||
*******************
|
||
|
||
After the above was written, allegations that the Secret Service may
|
||
have been instrumental in breaking up a 2600 meeting in Washington,
|
||
D.C. have emerged. If they prove to be true, it suggests that a new
|
||
chapter to THC might be written to address the failure of some law
|
||
enforcement agents to remember or to understand. If the allegations
|
||
are true, perhaps a witch-hunting metaphor might be more appropriate
|
||
to describe the attitude of some federal agents' views of hackers.
|
||
Sterling makes one crucial point in his book worth emphasizing: The
|
||
emergence of the "civil libertarians" from the events of 1990 was the
|
||
result of a number of individuals and groups joining together out of a
|
||
dedication for civil liberties. The current activities of these
|
||
groups--such as the Electronic Frontier Foundation (EFF) and Computer
|
||
Professionals for Social Responsibility (CPSR)--are part of the legacy
|
||
of Sun Devil. Supporting these and similar groups is one way to
|
||
protect against those few agents who fail to understand that the
|
||
electronic frontier, like the rest of society, is subject to
|
||
Constitutional protections and not a frontier town where a few
|
||
gun-slingers can take the law into their own hands.
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 3 Oct 92 05:29:48 GMT
|
||
From: ahawks@nyx.cs.du.edu (scooby dooby doo)
|
||
Subject: File 6--Bruce Sterling & Cyberhemian Rhapsodies
|
||
|
||
"What a Long, Strange Trip It's Been", the all-too familiar
|
||
statement by the Grateful Dead, has probably been heard countless
|
||
times in the echoes of cyberspace. Probably moreso than in any other
|
||
forum aside from Classic-Rock radio stations, and this is no accident.
|
||
|
||
Cyberspace has indeed been a long, strange trip, but more
|
||
appropriately we might rephrase the statement to read "what a long
|
||
strange trip it's going to be if we don't take a step back and look at
|
||
ourselves, damnit."
|
||
|
||
Bruce Sterling, noted cyberpunk author and purveyor of sociological
|
||
possible futures and realities, has begun to take that step back, as
|
||
evident in his recent contribution to SF Eye #10, also appearing in
|
||
EFFector OnLine #3.06. He writes passionately about the current
|
||
states of cyber-realities, about where we seem to be headed, his
|
||
contributions and role in the whole grand scheme of things, and all
|
||
within the deeply moving realm of Sterling's philosophical mind where
|
||
moral questions remain unresolved about all these issues.
|
||
|
||
And well they should. Cyberspace, bohemia that it is, is still
|
||
fairly analogous to any other notable social movement in history. In
|
||
one area of the movement, you have the deeply frightening individuals
|
||
who proclaim to have all the answers. On the other end of the
|
||
spectrum you have, in this case the "cyberpunk" hackers, those
|
||
individuals basically saying "fuck the answers and fuck the
|
||
questions". Rarely, though, do you find those individuals in the
|
||
midst of the movement willing to step back and say "what's it all
|
||
about....what kind of trip are we on, anyways?"
|
||
|
||
This is what Sterling has done in the article, basically presenting
|
||
on paper (or monitor) philosophical questions applicable to any
|
||
society:
|
||
|
||
"What is a 'crime'? What is a moral offense? What actions are evil
|
||
and dishonorable?"
|
||
|
||
Obviously, if a society does not answer these questions, if it does
|
||
not agree upon (at least to some basic extent) these issues, the
|
||
society will die. It is my impression that Mr. Sterling is saying:
|
||
'We, the residents of cyberspace, whether we liken ourselves as punks,
|
||
hackers, hippies, administrators, frontiersman, virus writers,
|
||
programmers, information freaks, our simply by-standers, we are all
|
||
residents of a very large community. We coexist fairly complacently,
|
||
yet we coexist without the degree of self-analysis and self-criticism
|
||
present in most other successful societies.'
|
||
|
||
Now, of course this is my interpretation of the article, and in fact
|
||
I'm probably off in my own little corner of this reality, but, suffice
|
||
to say, whether or not this was Sterling's intent, these are facts we
|
||
must face up to.
|
||
|
||
Bruce Sterling has been fairly outspoken on the question of
|
||
information as commodity, and the idea of knowledge as power. What
|
||
we, the citizens of cyberspace, fail to realize is that we as a
|
||
collective group have the means of storing, analyzing, regurgitating
|
||
more information than ever before. Thus, we should be the richest,
|
||
most powerful community in the world. But of course, being a *fairly*
|
||
democratic reality, whoever might wish to obtain this power is struck
|
||
down by the opposite extreme. Ie: Joe Hacker consciously or
|
||
unconsciously believes he has power via his skills at penetrating
|
||
information until he is taken off to jail by Ms. S.S. Agent. Ms. S.
|
||
S. Agent believes she has power until the hacker community strikes
|
||
back at her individualy, or grows to the point where their values and
|
||
morals infiltrate the norms of the cyber-society to the point where
|
||
they are acceptable to some degree. And so, the debate rages back and
|
||
forth constantly, to no end. One of the victims is information.
|
||
|
||
Bruce Sterling wrote a little note to me in his wonderful collection
|
||
of short stories, _Globalhead_, that says "Information *wants* to be
|
||
free". Information is the battleground upon which we, the entire
|
||
cyberspace student body, wage our war. Sterling writes that he is
|
||
distrustful of a society that seeks to control, encrypt, restrict
|
||
information, likening the results to building a sand castle. What a
|
||
wonderful metaphor, since on the surface the fortress we have created
|
||
seems impenetrable, yet it quickly crumbles under its own weight when
|
||
the uncontrollable forces of nature have their way. Information is
|
||
infinite in scope. It has no end, thus there is no possible way a
|
||
society can really control information to any degree of success.
|
||
Certain information can not be used as commodity, for, as I believe
|
||
Bruce Sterling has himself stated before, if I give you information, I
|
||
am not really losing anything, but you are gaining. In monetary
|
||
terms, it's like giving someone a $20 bill and somehow keeping the
|
||
bill for yourself. Thus, information is infinite and would quickly
|
||
devalue in a world where it is abundant.
|
||
|
||
In our society, we do not realize the abundance of information.
|
||
Each new day, new resources are available to receive various types
|
||
information at a relatively low cost: new television stations,
|
||
newspapers, magazines, radio stations, underground zines, BBSes, FTP
|
||
sites, Usenet newsgroups....
|
||
|
||
When the majority of the inhabitants of the entire global virtual
|
||
community realize this, we can begin to step forward back into the
|
||
realm of cyberspace. We will have analyzed "the hacker problem", seen
|
||
it as a necessary subset of our new society, and to accept it, not
|
||
criticize it, for what it is. We will have set forth standards of
|
||
behavior, folkways and mores, manifestos and constitutions, applicable
|
||
to a society of the future, the society of the infinite realm of
|
||
cyberspace.
|
||
|
||
There is no doubt in my mind that the civilization of cyberspace is
|
||
going to be a long, strange trip. It already has been, and it will
|
||
continue to be. As it stands now, there are few worthy pieces of
|
||
e-literature we can look to as timeless watermarks of this infant
|
||
realm, but I would certainly have to place Bruce Sterling's
|
||
contributions as integral to the healthy development of this society.
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #4.61
|
||
************************************
|
||
|
||
|
||
|