1298 lines
64 KiB
Plaintext
1298 lines
64 KiB
Plaintext
From: well!barlow@apple.com (John Perry Barlow)
|
||
Subject: Re: Crime and Puzzlement
|
||
|
||
|
||
CRIME AND PUZZLEMENT
|
||
by
|
||
|
||
John Perry Barlow
|
||
barlow@well.sf.ca.us
|
||
|
||
Desperados of the DataSphere
|
||
|
||
So me and my sidekick Howard, we was sitting out in front of the 40 Rod
|
||
Saloon one evening when he all of a sudden says, "Lookee here. What do
|
||
you reckon?" I look up and there's these two strangers riding into town.
|
||
They're young and got kind of a restless, bored way about 'em. A person
|
||
don't need both eyes to see they mean trouble...
|
||
|
||
Well, that wasn't quite how it went. Actually, Howard and I were
|
||
floating blind as cave fish in the electronic barrens of the WELL, so
|
||
the whole incident passed as words on a display screen:
|
||
|
||
Howard: Interesting couple of newusers just signed on. One calls himself
|
||
acid and the other's optik.
|
||
|
||
Barlow: Hmmm. What are their real names?
|
||
|
||
Howard: Check their finger files.
|
||
|
||
And so I typed !finger acid. Several seconds later the WELL's
|
||
Sequent computer sent the following message to my Macintosh in
|
||
Wyoming:
|
||
|
||
Login name: acid In real life: Acid Phreak
|
||
|
||
By this, I knew that the WELL had a new resident and that his
|
||
corporeal analog was supposedly called Acid Phreak. Typing !finger
|
||
optik yielded results of similar insufficiency, including the claim that
|
||
someone, somewhere in the real world, was walking around calling
|
||
himself Phiber Optik. I doubted it.
|
||
|
||
However, associating these sparse data with the knowledge that the
|
||
WELL was about to host a conference on computers and security
|
||
rendered the conclusion that I had made my first sighting of genuine
|
||
computer crackers. As the arrival of an outlaw was a major event to
|
||
the settlements of the Old West, so was the appearance of crackers
|
||
cause for stir on the WELL.
|
||
|
||
The WELL (or Whole Earth 'Lectronic Link) is an example of the
|
||
latest thing in frontier villages, the computer bulletin board. In this
|
||
kind of small town, Main Street is a central minicomputer to which
|
||
(in the case of the WELL) as many as 64 microcomputers may be
|
||
connected at one time by phone lines and little blinking boxes called
|
||
modems.
|
||
|
||
In this silent world, all conversation is typed. To enter it, one
|
||
forsakes both body and place and becomes a thing of words alone.
|
||
You can see what your neighbors are saying (or recently said), but
|
||
not what either they or their physical surroundings look like. Town
|
||
meetings are continuous and discussions rage on everything from
|
||
sexual kinks to depreciation schedules.
|
||
|
||
There are thousands of these nodes in the United States, ranging from
|
||
PC clone hamlets of a few users to mainframe metros like
|
||
CompuServe, with its 550,000 subscribers. They are used by
|
||
corporations to transmit memoranda and spreadsheets, universities
|
||
to disseminate research, and a multitude of factions, from apiarists to
|
||
Zoroastrians, for purposes unique to each.
|
||
|
||
Whether by one telephonic tendril or millions, they are all connected
|
||
to one another. Collectively, they form what their inhabitants call the
|
||
Net. It extends across that immense region of electron states,
|
||
microwaves, magnetic fields, light pulses and thought which sci-fi
|
||
writer William Gibson named Cyberspace.
|
||
|
||
Cyberspace, in its present condition, has a lot in common with the
|
||
19th Century West. It is vast, unmapped, culturally and legally
|
||
ambiguous, verbally terse (unless you happen to be a court
|
||
stenographer), hard to get around in, and up for grabs. Large
|
||
institutions already claim to own the place, but most of the actual
|
||
natives are solitary and independent, sometimes to the point of
|
||
sociopathy. It is, of course, a perfect breeding ground for both
|
||
outlaws and new ideas about liberty.
|
||
|
||
Recognizing this, Harper's Magazine decided in December, 1989 to
|
||
hold one of its periodic Forums on the complex of issues surrounding
|
||
computers, information, privacy, and electronic intrusion or
|
||
"cracking." Appropriately, they convened their conference in
|
||
Cyberspace, using the WELL as the "site."
|
||
|
||
Harper's invited an odd lot of about 40 participants. These included:
|
||
Clifford Stoll, whose book The Cuckoo's Egg details his cunning efforts
|
||
to nab a German cracker. John Draper or "Cap'n Crunch," the grand-
|
||
daddy of crackers whose blue boxes got Wozniak and Jobs into
|
||
consumer electronics. Stewart Brand and Kevin Kelly of Whole Earth
|
||
fame. Steven Levy, who wrote the seminal Hackers. A retired Army
|
||
colonel named Dave Hughes. Lee Felsenstein, who designed the
|
||
Osborne computer and was once called the "Robespierre of
|
||
computing." A UNIX wizard and former hacker named Jeff
|
||
Poskanzer. There was also a score of aging techno-hippies, the
|
||
crackers, and me.
|
||
|
||
What I was doing there was not precisely clear since I've spent most
|
||
of my working years either pushing cows or song-mongering, but I at
|
||
least brought to the situation a vivid knowledge of actual cow-towns,
|
||
having lived in or around one most of my life.
|
||
|
||
That and a kind of innocence about both the technology and morality
|
||
of Cyberspace which was soon to pass into the confusion of
|
||
knowledge.
|
||
|
||
At first, I was inclined toward sympathy with Acid 'n' Optik as well
|
||
as their colleagues, Adelaide, Knight Lightning, Taran King, and
|
||
Emmanuel. I've always been more comfortable with outlaws than
|
||
Republicans, despite having more certain credentials in the latter
|
||
camp.
|
||
|
||
But as the Harper's Forum mushroomed into a boom-town of ASCII
|
||
text (the participants typing 110,000 words in 10 days), I began to
|
||
wonder. These kids were fractious, vulgar, immature, amoral,
|
||
insulting, and too damned good at their work.
|
||
|
||
Worse, they inducted a number of former kids like myself into
|
||
Middle Age. The long feared day had finally come when some
|
||
gunsel would yank my beard and call me, too accurately, an old fart.
|
||
|
||
Under ideal circumstances, the blind gropings of bulletin board
|
||
discourse force a kind of Noh drama stylization on human commerce.
|
||
Intemperate responses, or "flames" as they are called, are common
|
||
even among conference participants who understand one another,
|
||
which, it became immediately clear, the cyberpunks and techno-
|
||
hippies did not.
|
||
|
||
My own initial enthusiasm for the crackers wilted under a steady
|
||
barrage of typed testosterone. I quickly remembered I didn't know
|
||
much about who they were, what they did, or how they did it. I also
|
||
remembered stories about crackers working in league with the Mob,
|
||
ripping off credit card numbers and getting paid for them in (stolen)
|
||
computer equipment.
|
||
|
||
And I remembered Kevin Mitnik. Mitnik, now 25, recently served
|
||
federal time for a variety of computer and telephone related crimes.
|
||
Prior to incarceration, Mitnik was, by all accounts, a dangerous guy
|
||
with a computer. He disrupted phone company operations and
|
||
arbitrarily disconnected the phones of celebrities. Like the kid in
|
||
Wargames, he broke into the North American Defense Command
|
||
computer in Colorado Springs.
|
||
|
||
Unlike the kid in Wargames, he is reputed to have made a practice of
|
||
destroying and altering data. There is even the (perhaps apocryphal)
|
||
story that he altered the credit information of his probation officer
|
||
and other enemies. Digital Equipment claimed that his depredations
|
||
cost them more than $4 million in computer downtime and file
|
||
rebuilding. Eventually, he was turned in by a friend who, after
|
||
careful observation, had decided he was "a menace to society."
|
||
|
||
His spectre began to hang over the conference. After several days of
|
||
strained diplomacy, the discussion settled into a moral debate on the
|
||
ethics of security and went critical.
|
||
|
||
The techno-hippies were of the unanimous opinion that, in Dylan's
|
||
words, one "must be honest to live outside the law." But these
|
||
young strangers apparently lived by no code save those with which
|
||
they unlocked forbidden regions of the Net.
|
||
|
||
They appeared to think that improperly secured systems deserved to
|
||
be violated and, by extension, that unlocked houses ought to be
|
||
robbed. This latter built particular heat in me since I refuse, on
|
||
philosophical grounds, to lock my house.
|
||
|
||
Civility broke down. We began to see exchanges like:
|
||
|
||
Dave Hughes: Clifford Stoll said a wise thing that no one has
|
||
commented on. That networks are
|
||
built on trust. If they aren't, they should be.
|
||
|
||
|
||
Acid Phreak: Yeah. Sure. And we should use the 'honor system' as a
|
||
first line of security against hack attempts.
|
||
|
||
|
||
Jef Poskanzer: This guy down the street from me sometimes leaves his
|
||
back door unlocked. I told him about it once, but he still
|
||
does it. If I had the chance to do it over, I would go in the
|
||
back door, shoot him, and take all his money and
|
||
consumer electronics. It's the only way to get through to
|
||
him.
|
||
|
||
Acid Phreak: Jef Poskanker (Puss? Canker? yechh) Anyway, now
|
||
when did you first start having these delusions where
|
||
computer hacking was even *remotely* similar to
|
||
murder?
|
||
|
||
Presented with such a terrifying amalgam of raw youth and apparent
|
||
power, we fluttered like a flock of indignant Babbitts around the
|
||
Status Quo, defending it heartily. One former hacker howled to the
|
||
Harper's editor in charge of the forum, "Do you or do you not have
|
||
names and addresses for these criminals?" Though they had
|
||
committed no obvious crimes, he was ready to call the police.
|
||
|
||
They finally got to me with:
|
||
|
||
Acid: Whoever said they'd leave the door open to their house...
|
||
where do you live? (the address) Leave it to me in mail if you
|
||
like.
|
||
|
||
I had never encountered anyone so apparently unworthy of my trust
|
||
as these little nihilists. They had me questioning a basic tenet,
|
||
namely that the greatest security lies in vulnerability. I decided it
|
||
was time to put that principal to the test...
|
||
|
||
Barlow: Acid. My house is at 372 North Franklin Street in
|
||
Pinedale, Wyoming. If you're heading north on Franklin,
|
||
you go about two blocks off the main drag before you run
|
||
into hay meadow on the left. I've got the last house before
|
||
the field. The computer is always on...
|
||
|
||
And is that really what you mean? Are you merely just
|
||
the kind of little sneak that goes around looking for easy
|
||
places to violate? You disappoint me, pal. For all your
|
||
James Dean-On-Silicon rhetoric, you're not a cyberpunk.
|
||
You're just a punk.
|
||
|
||
Acid Phreak: Mr. Barlow: Thank you for posting all I need to get your
|
||
credit information and a whole lot more! Now, who is to
|
||
blame? ME for getting it or YOU for being such an idiot?!
|
||
I think this should just about sum things up.
|
||
|
||
|
||
Barlow: Acid, if you've got a lesson to teach me, I hope it's not that
|
||
it's idiotic to trust one's fellow man. Life on those terms
|
||
would be endless and brutal. I'd try to tell you something
|
||
about conscience, but I'd sound like Father O'Flannigan
|
||
trying to reform the punk that's about to gutshoot him.
|
||
For no more reason that to watch him die.
|
||
|
||
But actually, if you take it upon yourself to destroy my
|
||
credit, you might do me a favor. I've been looking for
|
||
something to put the brakes on my burgeoning
|
||
materialism.
|
||
|
||
I spent a day wondering whether I was dealing with another Kevin
|
||
Mitnik before the other shoe dropped:
|
||
|
||
Barlow: ... With crackers like acid and optik, the issue is less
|
||
intelligence than alienation. Trade their modems for
|
||
skateboards and only a slight conceptual shift would
|
||
occur.
|
||
|
||
Optik: You have some pair of balls comparing my talent with
|
||
that of a skateboarder. Hmmm... This was indeed boring,
|
||
but nonetheless:
|
||
|
||
At which point he downloaded my credit history.
|
||
|
||
Optik had hacked the core of TRW, an institution which has made
|
||
my business (and yours) their business, extracting from it an
|
||
abbreviated ( and incorrect) version of my personal financial life.
|
||
With this came the implication that he and Acid could and would
|
||
revise it to my disadvantage if I didn't back off.
|
||
|
||
I have since learned that while getting someone's TRW file is fairly
|
||
trivial, changing it is not. But at that time, my assessment of the
|
||
crackers' black skills was one of superstitious awe. They were digital
|
||
brujos about to zombify my economic soul.
|
||
|
||
To a middle-class American, one's credit rating has become nearly
|
||
identical to his freedom. It now appeared that I was dealing with
|
||
someone who had both the means and desire to hoodoo mine,
|
||
leaving me trapped in a life of wrinkled bills and money order
|
||
queues. Never again would I call the Sharper Image on a whim.
|
||
|
||
I've been in redneck bars wearing shoulder-length curls, police
|
||
custody while on acid, and Harlem after midnight, but no one has
|
||
ever put the spook in me quite as Phiber Optik did at that moment. I
|
||
realized that we had problems which exceeded the human
|
||
conductivity of the WELL's bandwidth. If someone were about to
|
||
paralyze me with a spell, I wanted a more visceral sense of him than
|
||
could fit through a modem.
|
||
|
||
I e-mailed him asking him to give me a phone call. I told him I
|
||
wouldn't insult his skills by giving him my phone number and, with
|
||
the assurance conveyed by that challenge, I settled back and waited
|
||
for the phone to ring. Which, directly, it did.
|
||
|
||
In this conversation and the others that followed I encountered an
|
||
intelligent, civilized, and surprisingly principled kid of 18 who
|
||
sounded, and continues to sound, as though there's little harm in him
|
||
to man or data. His cracking impulses seemed purely exploratory,
|
||
and I've begun to wonder if we wouldn't also regard spelunkers as
|
||
desperate criminals if AT&T owned all the caves.
|
||
|
||
The terrifying poses which Optik and Acid had been striking on
|
||
screen were a media-amplified example of a human adaptation I'd
|
||
seen before: One becomes as he is beheld. They were simply living up to
|
||
what they thought we, and, more particularly, the editors of
|
||
Harper's, expected of them. Like the televised tears of disaster
|
||
victims, their snarls adapted easily to mass distribution.
|
||
|
||
Months later, Harper's took Optik, Acid and me to dinner at a
|
||
Manhattan restaurant which, though very fancy, was appropriately
|
||
Chinese. Acid and Optik, as material beings, were well-scrubbed and
|
||
fashionably-clad. They looked to be dangerous as ducks. But, as
|
||
Harper's and the rest of the media have discovered to their delight,
|
||
the boys had developed distinctly showier personae for their rambles
|
||
through the howling wilderness of Cyberspace.
|
||
|
||
Glittering with spikes of binary chrome, they strode past the kleig
|
||
lights and into the digital distance. There they would be outlaws. It
|
||
was only a matter of time before they started to believe themselves as
|
||
bad as they sounded. And no time at all before everyone else did.
|
||
|
||
In this, they were like another kid named Billy, many of whose feral
|
||
deeds in the pre-civilized West were encouraged by the same dime
|
||
novelist who chronicled them. And like Tom Horn, they seemed to
|
||
have some doubt as to which side of the law they were on. Acid even
|
||
expressed an ambition to work for the government someday, nabbing
|
||
"terrorists and code abusers."
|
||
|
||
There is also a frontier ambiguity to the "crimes" the crackers
|
||
commit. They are not exactly stealing VCR's. Copying a text file
|
||
from TRW doesn't deprive its owner of anything except
|
||
informational exclusivity. (Though it may said that information has
|
||
monetary value only in proportion to its containment.)
|
||
|
||
There was no question that they were making unauthorized use of
|
||
data channels. The night I met them, they left our restaurant table
|
||
and disappeared into the phone booth for a long time. I didn't see
|
||
them marshalling quarters before they went.
|
||
|
||
And, as I became less their adversary and more their scoutmaster, I
|
||
began to get "conference calls" in which six or eight of them would
|
||
crack pay phones all over New York and simultaneously land on my
|
||
line in Wyoming. These deft maneuvers made me think of sky-
|
||
diving stunts where large groups convene geometrically in free fall.
|
||
In this case, the risk was largely legal.
|
||
|
||
Their other favorite risky business is the time-honored adolescent
|
||
sport of trespassing. They insist on going where they don't belong.
|
||
But then teen-age boys have been proceeding uninvited since the
|
||
dawn of human puberty. It seems hard-wired. The only innovation
|
||
is in the new form of the forbidden zone the means of getting in it.
|
||
|
||
In fact, like Kevin Mitnik, I broke into NORAD when I was 17. A
|
||
friend and I left a nearby "woodsie" (as rustic adolescent drunks
|
||
were called in Colorado) and tried to get inside the Cheyenne
|
||
Mountain. The chrome-helmeted Air Force MP's held us for about 2
|
||
hours before letting us go. They weren't much older than us and
|
||
knew exactly our level of national security threat. Had we come
|
||
cloaked in electronic mystery, their alert status certainly would have
|
||
been higher.
|
||
|
||
Whence rises much of the anxiety. Everything is so ill-defined. How
|
||
can you guess what lies in their hearts when you can't see their eyes?
|
||
How can one be sure that, like Mitnik, they won't cross the line from
|
||
trespassing into another adolescent pastime, vandalism? And how
|
||
can you be sure they pose no threat when you don't know what a
|
||
threat might be?
|
||
|
||
And for the crackers some thrill is derived from the metamorphic
|
||
vagueness of the laws themselves. On the Net, their effects are
|
||
unpredictable. One never knows when they'll bite.
|
||
|
||
This is because most of the statutes invoked against the crackers were
|
||
designed in a very different world from the one they explore. For
|
||
example, can unauthorized electronic access can be regarded as the
|
||
ethical equivalent of old-fashioned trespass? Like open range, the
|
||
property boundaries of Cyberspace are hard to stake and harder still
|
||
to defend.
|
||
|
||
Is transmission through an otherwise unused data channel really
|
||
theft? Is the track-less passage of a mind through TRW's mainframe
|
||
the same as the passage of a pickup through my Back 40? What is a
|
||
place if Cyberspace is everywhere? What are data and what is free
|
||
speech? How does one treat property which has no physical form
|
||
and can be infinitely reproduced? Is a computer the same as a
|
||
printing press? Can the history of my business affairs properly
|
||
belong to someone else? Can anyone morally claim to own
|
||
knowledge itself?
|
||
|
||
If such questions were hard to answer precisely, there are those who
|
||
are ready to try. Based on their experience in the Virtual World, they
|
||
were about as qualified to enforce its mores as I am to write the Law
|
||
of the Sea. But if they lacked technical sophistication, they brought to
|
||
this task their usual conviction. And, of course, badges and guns.
|
||
|
||
******
|
||
|
||
|
||
Operation Sun Devil
|
||
|
||
"Recently, we have witnessed an alarming number of young people who, for
|
||
a variety of sociological and psychological reasons, have become attached to
|
||
their computers and are exploiting their potential in a criminal manner.
|
||
Often, a progression of criminal activity occurs which involves
|
||
telecommunications fraud (free long distance phone calls), unauthorized
|
||
access to other computers (whether for profit, fascination, ego, or the
|
||
intellectual challenge), credit card fraud (cash advances and unauthorized
|
||
purchases of goods), and then move on to other destructive activities like
|
||
computer viruses."
|
||
|
||
"Our experience shows that many computer hacker suspects are no longer
|
||
misguided teenagers mischievously playing games with their computers in
|
||
their bedrooms. Some are now high tech computer operators using
|
||
computers to engage in unlawful conduct."
|
||
-- Excerpts from a statement by
|
||
Garry M. Jenkins
|
||
Asst. Director, U. S. Secret Service
|
||
|
||
"The right of the people to be secure in their persons, houses, papers, and
|
||
effects, against unreasonable searches and seizures, shall not be violated, and
|
||
no warrants shall issue but upon probable cause, support by oath or
|
||
affirmation, and particularly describing the place to be searched, and the
|
||
persons or things to be seized."
|
||
-- Amendment IV
|
||
United States Constitution
|
||
|
||
On January 24, 1990, a platoon of Secret Service agents entered the
|
||
apartment which Acid Phreak shares with his mother and 12 year-old
|
||
sister. The latter was the only person home when they burst through
|
||
the door with guns drawn. They managed to hold her at bay for
|
||
about half an hour until their quarry happened home.
|
||
|
||
By then, they were nearly done packing up Acid's worldly goods,
|
||
including his computer, his notes (both paper and magnetic), books,
|
||
and such dubiously dangerous tools as a telephone answering
|
||
machine, a ghetto blaster and his complete collection of audio tapes.
|
||
One agent asked him to define the real purpose of the answering
|
||
machine and was frankly skeptical when told that it answered the
|
||
phone. The audio tapes seemed to contain nothing but music, but
|
||
who knew what dark data Acid might have encoded between the
|
||
notes...
|
||
|
||
When Acid's mother returned from work, she found her apartment a
|
||
scene of apprehended criminality. She asked what, exactly, her son
|
||
had done to deserve all this attention and was told that, among other
|
||
things, he had caused the AT&T system crash several days earlier.
|
||
(Previously AT&T had taken full responsibility.) Thus, the agent
|
||
explained, her darling boy was thought to have caused over a billion
|
||
dollars in damage to the economy of the United States.
|
||
|
||
This accusation was never turned into a formal charge. Indeed, no
|
||
charge of any sort of was filed against Mr. Phreak then and, although
|
||
the Secret Service maintained resolute possession of his hardware,
|
||
software, and data, no c harge had been charged 4 months later.
|
||
|
||
Across town, similar scenes were being played out at the homes of
|
||
Phiber Optik and another colleague code-named Scorpion. Again,
|
||
equipment, notes, disks both hard and soft, and personal effects were
|
||
confiscated. Again no charges were filed.
|
||
|
||
Thus began the visible phase of Operation Sun Devil, a two-year
|
||
Secret Service investigation which involved 150 federal agents,
|
||
numerous local and state law enforcement agencies. and the
|
||
combined security resources of PacBell, AT&T, Bellcore, Bell South
|
||
MCI, U.S. Sprint, Mid-American, Southwestern Bell, NYNEX, U.S.
|
||
West and American Express.
|
||
|
||
The focus of this impressive institutional array was the Legion of
|
||
Doom, a group which never had any formal membership list but was
|
||
thought by the members with whom I spoke to number less than 20,
|
||
nearly all of them in their teens or early twenties.
|
||
|
||
I asked Acid why they'd chosen such a threatening name. "You
|
||
wouldn't want a fairy kind of thing like Legion of Flower Pickers or
|
||
something. But the media ate it up too. Probing the Legion of Doom
|
||
like it was a gang or something, when really it was just a bunch of
|
||
geeks behind terminals."
|
||
|
||
******
|
||
|
||
|
||
Sometime in December 1988, a 21 year-old Atlanta-area Legion of
|
||
Doomster named The Prophet cracked a Bell South computer and
|
||
downloaded a three-page text file which outlined, in bureaucrat-ese
|
||
of surpassing opacity, the administrative procedures and
|
||
responsibilities for marketing, servicing, upgrading, and billing for
|
||
Bell South's 911 system.
|
||
|
||
A dense thicket of acronyms, the document was filled with passages
|
||
like:
|
||
|
||
"In accordance with the basic SSC/MAC strategy for provisioning, the
|
||
SSC/MAC will be Overall Control Office (OCO) for all Notes to PSAP circuits
|
||
(official services) and any other services for this customer. Training must be
|
||
scheduled for all SSC/MAC involved personnel during the pre-service stage
|
||
of the project."
|
||
|
||
And other such.
|
||
|
||
At some risk, I too have a copy of this document. To read the whole
|
||
thing straight through without entering coma requires either a
|
||
machine or a human who has too much practice thinking like one.
|
||
Anyone who can understand it fully and fluidly has altered his
|
||
consciousness beyond the ability to ever again read Blake, Whitman,
|
||
or Tolstoy. It is, quite simply, the worst writing I have ever tried to
|
||
read.
|
||
|
||
Since the document contains little of interest to anyone who is not a
|
||
student of advanced organizational sclerosis...that is, no access codes,
|
||
trade secrets, or proprietary information...I assume The Prophet only
|
||
copied this file as a kind of hunting trophy. He had been to the heart
|
||
of the forest and had returned with this coonskin to nail to the barn
|
||
door.
|
||
|
||
Furthermore, he was proud of his accomplishment, and since such
|
||
trophies are infinitely replicable, he wasn't content to nail it to his
|
||
door alone. Among the places he copied it was a UNIX bulletin
|
||
board (rather like the WELL) in Lockport, Illinois called Jolnet.
|
||
|
||
It was downloaded from there by a 20 year-old hacker and pre-law
|
||
student (whom I had met in the Harper's Forum) who called himself
|
||
Knight Lightning. Though not a member of the Legion of Doom,
|
||
Knight Lightning and a friend, Taran King, also published from St.
|
||
Louis and his fraternity house at the University of Missouri a
|
||
worldwide hacker's magazine called Phrack. (From phone phreak and
|
||
hack.)
|
||
|
||
Phrack was an unusual publication in that it was entirely virtual. The
|
||
only time its articles hit paper was when one of its subscribers
|
||
decided to print out a hard copy. Otherwise, its editions existed in
|
||
Cyberspace and took no physical form.
|
||
|
||
When Knight Lightning got hold of the Bell South document, he
|
||
thought it would amuse his readers and reproduced it in the next
|
||
issue of Phrack. He had little reason to think that he was doing
|
||
something illegal. There is nothing in it to indicate that it contains
|
||
proprietary or even sensitive information. Indeed, it closely
|
||
resembles telco reference documents which have long been publicly
|
||
available.
|
||
|
||
However, Rich Andrews, the systems operator who oversaw the
|
||
operation of Jolnet, thought there might be something funny about
|
||
the document when he first ran across it in his system. To be on the
|
||
safe side, he forwarded a copy of it to AT&T officials. He was
|
||
subsequently contacted by the authorities, and he cooperated with
|
||
them fully. He would regret that later.
|
||
|
||
On the basis of the forgoing, a Grand Jury in Lockport was persuaded
|
||
by the Secret Service in early February to hand down a seven count
|
||
indictment against The Prophet and Knight Lightning, charging
|
||
them, among other things, with interstate transfer of stolen property
|
||
worth more than $5,000. When The Prophet and two of his Georgia
|
||
colleagues were arrested on February 7, 1990, the Atlanta papers
|
||
reported they faced 40 years in prison and a $2 million fine. Knight
|
||
Lightning was arrested on February 15.
|
||
|
||
The property in question was the affore-mentioned blot on the
|
||
history of prose whose full title was A Bell South Standard Practice
|
||
(BSP) 660-225-104SV-Control Office Administration of Enhanced 911
|
||
Services for Special Services and Major Account Centers, March, 1988.
|
||
|
||
And not only was this item worth more than $5,000.00, it was worth,
|
||
according to the indictment and Bell South, precisely $79,449.00. And
|
||
not a penny less. We will probably never know how this figure was
|
||
reached or by whom, though I like to imagine an appraisal team
|
||
consisting of Franz Kafka, Joseph Heller, and Thomas Pynchon...
|
||
|
||
In addition to charging Knight Lightning with crimes for which he
|
||
could go to jail 30 years and be fined $122,000.00, they seized his
|
||
publication, Phrack, along with all related equipment, software and
|
||
data, including his list of subscribers, many of whom would soon lose
|
||
their computers and data for the crime of appearing on it.
|
||
|
||
I talked to Emmanuel Goldstein, the editor of 2600, another hacker
|
||
publication which has been known to publish purloined documents.
|
||
If they could shut down Phrack, couldn't they as easily shut down
|
||
2600?
|
||
|
||
He said, "I've got one advantage. I come out on paper and the
|
||
Constitution knows how to deal with paper."
|
||
|
||
In fact, nearly all publications are now electronic at some point in
|
||
their creation. In a modern newspaper, stories written at the scene
|
||
are typed to screens and then sent by modem to a central computer.
|
||
This computer composes the layout in electronic type and the entire
|
||
product transmitted electronically to the presses. There, finally, the
|
||
bytes become ink.
|
||
|
||
Phrack merely omitted the last step in a long line of virtual events.
|
||
However, that omission, and its insignificant circulation, left it
|
||
vulnerable to seizure based on content. If the 911 document had been
|
||
the Pentagon Papers (another proprietary document) and Phrack the
|
||
New York Times, a completion of the analogy would have seen the
|
||
government stopping publication of the Times and seizing its every
|
||
material possession, from notepads to presses.
|
||
|
||
Not that anyone in the newspaper business seemed particularly
|
||
worried about such implications. They, and the rest of the media
|
||
who bothered to report Knight Lightning's arrest were too obsessed
|
||
by what they portrayed as actual disruptions of emergency service
|
||
and with marvelling at the sociopathy of it. One report expressed
|
||
relief that no one appeared to have died as a result of the
|
||
"intrusions."
|
||
|
||
Meanwhile, in Baltimore, the 911 dragnet snared Leonard Rose, aka
|
||
Terminus. A professional computer consultant who specialized in
|
||
UNIX, Rose got a visit from the government early in February. The
|
||
G-men forcibly detained his wife and children for six hours while
|
||
they interrogated Rose about the 911 document and ransacked his
|
||
system.
|
||
|
||
Rose had no knowledge of the 911 matter. Indeed, his only
|
||
connection had been occasional contact with Knight Lightning over
|
||
several years...and admitted membership in the Legion of Doom.
|
||
However, when searching his hard disk for 911 evidence, they found
|
||
something else. Like many UNIX consultants, Rose did have some
|
||
UNIX source code in his possession. Furthermore, there was
|
||
evidence that he had transmitted some of it to Jolnet and left it there
|
||
for another consultant.
|
||
|
||
UNIX is a ubiquitous operating system, and though its main virtue is
|
||
its openness to amendment at the source level, it is nevertheless the
|
||
property of AT&T. What had been widely d istributed within
|
||
businesses and universities for years was suddenly, in Rose's hands,
|
||
a felonious possession.
|
||
|
||
Finally, the Secret Service rewarded the good citizenship of Rich
|
||
Andrews by confiscating the computer where Jolnet had dwelt, along
|
||
with all the e-mail, read and un-read, which his subscribers had left
|
||
there. Like the many others whose equipment and data were taken
|
||
by the Secret Service subsequently, he wasn't charged with anything.
|
||
Nor is he likely to be. They have already inflicted on him the worst
|
||
punishment a nerd can suffer: data death.
|
||
|
||
Andrews was baffled. "I'm the one that found it, I'm the one that
|
||
turned it in...And I'm the one that's suffering," he said.
|
||
|
||
One wonders what will happen when they find such documents on
|
||
the hard disks of CompuServe. Maybe I'll just upload my copy of
|
||
Bell South Standard Practice (BSP) 660-225-104SV and see...
|
||
|
||
In any case, association with stolen data is all the guilt you need. It's
|
||
quite as if the government could seize your house simply because a
|
||
guest left a stolen VCR in an upstairs bedroom closet. Or confiscate
|
||
all the mail in a post office upon finding a stolen package there. The
|
||
first concept of modern jurisprudence to have arrived in Cyberspace
|
||
seems to have been Zero Tolerance.
|
||
|
||
******
|
||
|
||
|
||
Rich Andrews was not the last to learn about the Secret Service's
|
||
debonair new attitude toward the 4th Amendment's protection
|
||
against unreasonable seizure.
|
||
|
||
Early on March 1, 1990, the offices of a role-playing game publisher in
|
||
Austin, Texas called Steve Jackson Games were visited by agents of
|
||
the United States Secret Service. They ransacked the premises, broke
|
||
into several locked filing cabinets (damaging them irreparably in the
|
||
process) and eventually left carrying 3 computers, 2 laser printers,
|
||
several hard disks, and many boxes of paper and floppy disks.
|
||
|
||
Later in the day, callers to the Illuminati BBS (which Steve Jackson
|
||
Games operated to keep in touch with roll-players around the
|
||
country) encountered the following message:
|
||
|
||
"So far we have not received a clear explanation of what the Secret Service
|
||
was looking for, what they expected to find, or much of anything else. We are
|
||
fairly certain that Steve Jackson Games is not the target of whatever
|
||
investigation is being conducted; in any case, we have done nothing illegal
|
||
and have nothing whatsoever to hide. However, the equipment that was
|
||
seized is apparently considered to be evidence in whatever they're
|
||
investigating, so we aren't likely to get it back any time soon. It could be a
|
||
month, it could be never."
|
||
|
||
It's been three months as I write this, and not only has nothing been
|
||
returned to them, but, according to Steve Jackson, the Secret Service
|
||
will no longer take his calls. He figures that, in the months since the
|
||
raid, his little company has lost an estimated $125,000. With such a
|
||
fiscal hemorrhage, he can't afford a lawyer to take after the Secret
|
||
Service. Both the state and national offices of the ACLU told him to
|
||
"run along" when he solicited their help.
|
||
|
||
He tried to go to the press. As in most other cases, they were
|
||
unwilling to raise the alarm. Jackson theorized, "The conservative
|
||
press is taking the attitude that the suppression of evil hackers is a
|
||
good thing and that anyone who happens to be put out of business in
|
||
the meantime...well, that's just their tough luck."
|
||
|
||
In fact, Newsweek did run a story about the event, portraying it from
|
||
Jackson's perspective, but they were almost alone in dealing with it.
|
||
|
||
What had he done to deserve this nightmare? Role-playing games, of
|
||
which Dungeons and Dragons is the most famous, have been accused
|
||
of creating obsessive involvement in their nerdy young players, but
|
||
no one before had found it necessary to prevent their publication.
|
||
|
||
It seems that Steve Jackson had hired the wrong writer. The
|
||
managing editor of Steve Jackson Games is a former cracker, known
|
||
by his fellows in the Legion of Doom as The Mentor. At the time of
|
||
the raid, he and the rest of Jackson staff had been working for over a
|
||
year on a game called GURPS Cyberpunk, High-Tech Low-Life Role-
|
||
Playing.
|
||
|
||
At the time of the Secret Service raids, the game resided entirely on
|
||
the hard disks they confiscated. Indeed, it was their target. They told
|
||
Jackson that, based on its author's background, they had reason to
|
||
believe it was a "handbook on computer crime." It was therefore
|
||
inappropriate for publication, 1st Amendment or no 1st Amendment.
|
||
|
||
I got a copy of the game from the trunk of The Mentor's car in an
|
||
Austin parking lot. Like the Bell South document, it seemed pretty
|
||
innocuous to me, if a little inscrutable. Borrowing its flavor from the
|
||
works of William Gibson and Austin sci-fi author Bruce Sterling, it is
|
||
filled with silicon brain implants, holodecks, and gauss guns.
|
||
|
||
It is, as the cover copy puts it, "a fusion of the dystopian visions of
|
||
George Orwell and Timothy Leary." Actually, without the gizmos, it
|
||
describes a future kind of like the present its publisher is
|
||
experiencing at the hands of the Secret Service.
|
||
|
||
An unbelievably Byzantine world resides within its 120 large pages
|
||
of small print. (These roll-players must be some kind of idiots
|
||
savants...) Indeed, it's a thing of such complexity that I can't swear
|
||
there's no criminal information in there, but then I can't swear that
|
||
Grateful Dead records don't have satanic messages if played
|
||
backwards. Anything's possible, especially inside something as
|
||
remarkable as Cyberpunk.
|
||
|
||
The most remarkable thing about Cyberpunk is the fact that it was
|
||
printed at all. After much negotiation, Jackson was able to get the
|
||
Secret Service to let him have some of his data back. However, they
|
||
told him that he would be limited to an hour and a half with only one
|
||
of his three computers. Also, according to Jackson, "They insisted
|
||
that all the copies be made by a Secret Service agent who was a two-
|
||
finger typist. So we didn't get much. "
|
||
|
||
In the end, Jackson and his staff had to reconstruct most of the game
|
||
from neural rather than magnetic memory. They did have a few very
|
||
old backups, and they retrieved some scraps which had been passed
|
||
around to game testers. They also had the determination of the
|
||
enraged.
|
||
|
||
Despite government efforts to impose censorship by prior restraint,
|
||
Cyberpunk is now on the market. Presumably, advertising it as "The
|
||
book that was seized by the U.S. Secret Service" will invigorate sales.
|
||
But Steve Jackson Games, the heretofore prosperous publisher of
|
||
more than a hundred role-playing games, has been forced to lay off
|
||
more than half of its employees and may well be mortally wounded.
|
||
|
||
Any employer who has heard this tale will think hard before he hires
|
||
a computer cracker. Which may be, of course, among the effects the
|
||
Secret Service desires.
|
||
|
||
******
|
||
|
||
|
||
On May 8, 1990, Operation Sun Devil, heretofore an apparently
|
||
random and nameless trickle of Secret Service actions, swept down
|
||
on the Legion of Doom and its ilk like a bureaucratic tsunami. On
|
||
that day, the Secret Service served 27 search warrants in 14 cities from
|
||
Plano, Texas to New York, New York.
|
||
|
||
The law had come to Cyberspace. When the day was over, transit
|
||
through the wide open spaces of the Virtual World would be a lot
|
||
trickier.
|
||
|
||
In a press release following the sweep, the Secret Service boasted
|
||
having shut down numerous computer bulletin boards, confiscated
|
||
40 computers, and seized 23,000 disks. They noted in their statement
|
||
that "the conceivable criminal violations of this operation have
|
||
serious implications for the health and welfare of all individuals,
|
||
corporations, and United States Government agencies relying on
|
||
computers and telephones to communicate."
|
||
|
||
It was unclear from their statement whether "this operation" meant
|
||
the Legion of Doom or Operation Sun Devil. There was room to
|
||
interpret it either way.
|
||
|
||
Because the deliciously ironic truth is that, aside from the 3 page Bell
|
||
South document, the hackers had neither removed nor damaged
|
||
anyone's data. Operation Sun Devil, on the other hand, had "serious
|
||
implications" for a number of folks who relied on "computers and
|
||
telephones to communicate." They lost the equivalent of about 5.4
|
||
million pages of information. Not to mention a few computers and
|
||
telephones.
|
||
|
||
And the welfare of the individuals behind those figures was surely in
|
||
jeopardy. Like the story of the single mother and computer
|
||
consultant in Baltimore whose sole means of supporting herself and
|
||
her 18 year old son was stripped away early one morning. Secret
|
||
Service agents broke down her door with sledge hammers, entered
|
||
with guns drawn, and seized all her computer equipment.
|
||
Apparently her son had also been using it...
|
||
|
||
Or the father in New York who opened the door at 6:00 AM and
|
||
found a shotgun at his nose. A dozen agents entered. While one of
|
||
the kept the man's wife in a choke-hold, the rest made ready to shoot
|
||
and entered the bedroom of their sleeping 14 year-old. Before
|
||
leaving, they confiscated every piece of electronic equipment in the
|
||
house, including all the telephones.
|
||
|
||
It was enough to suggest that the insurance companies should start
|
||
writing policies against capricious governmental seizure of circuitry.
|
||
|
||
In fairness, one can imagine the government's problem. This is all
|
||
pretty magical stuff to them. If I were trying to terminate the
|
||
operations of a witch coven, I'd probably seize everything in sight.
|
||
How would I tell the ordinary household brooms from the getaway
|
||
vehicles?
|
||
|
||
But as I heard more and more about the vile injustices being heaped
|
||
on my young pals in the Legion of Doom, not to mention the
|
||
unfortunate folks nearby, the less I was inclined toward such
|
||
temperate thoughts as these. I drifted back into a 60's-style sense of
|
||
the government, thinking it a thing of monolithic and evil efficiency
|
||
and adopting an up-against-the-wall willingness to spit words like
|
||
"pig" or "fascist" into my descriptions.
|
||
|
||
In doing so, I endowed the Secret Service with a clarity of intent
|
||
which no agency of government will ever possess. Despite almost
|
||
every experience I've ever had with federal authority, I keep
|
||
imagining its competence.
|
||
|
||
For some reason, it was easier to invest the Keystone Kapers of
|
||
Operation Sun Devil with malign purpose rather than confront their
|
||
absurdity straight-on. There is, after all, a twisted kind of comfort in
|
||
political paranoia. It provides one such a sense of orderliness to think
|
||
that the government is neither crazy nor stupid and that its plots,
|
||
though wicked, are succinct.
|
||
|
||
I was about to have an experience which would restore both my
|
||
natural sense of unreality and my unwillingness to demean the
|
||
motives of others. I was about to see first hand the disorientation of
|
||
the law in the featureless vastness of Cyberspace.
|
||
|
||
|
||
|
||
|
||
In Search of NuPrometheus
|
||
|
||
|
||
"I pity the poor immigrant..."
|
||
|
||
-- Bob Dylan
|
||
|
||
|
||
Sometime last June, an angry hacker got hold of a chunk of the highly
|
||
secret source code which drives the Apple Macintosh. He then
|
||
distributed it to a variety of addresses, claiming responsibility for this
|
||
act of information terrorism in the name of the Nu Prometheus
|
||
League.
|
||
|
||
Apple freaked. NuPrometheus had stolen, if not the Apple crown
|
||
jewels, at least a stone from them. Worse, NuPrometheus had then
|
||
given this prize away. Repeatedly.
|
||
|
||
All Apple really has to offer the world is the software which lies
|
||
encoded in silicon on the ROM chip of every Macintosh. This set of
|
||
instructions is the cyber-DNA which makes a Macintosh a Macintosh.
|
||
|
||
Worse, much of the magic in this code was put there by people who
|
||
not only do not work for Apple any longer, but might only do so
|
||
again if encouraged with cattle prods. Apple's attitude toward its
|
||
ROM code is a little like that of a rich kid toward his inheritance. Not
|
||
actually knowing how to create wealth himself, he guards what he
|
||
has with hysterical fervor.
|
||
|
||
Time passed, and I forgot about the incident. But one recent May
|
||
morning, I leaned that others had not. The tireless search for the
|
||
spectral heart of NuPrometheus finally reached Pinedale, Wyoming,
|
||
where I was the object of a two hour interview by Special Agent
|
||
Richard Baxter, Jr. of the Federal Bureau of Investigation.
|
||
|
||
Poor Agent Baxter didn't know a ROM chip from a Vise-grip when
|
||
he arrived, so much of that time was spent trying to educate him on
|
||
the nature of the thing which had been stolen. Or whether "stolen"
|
||
was the right term for what had happened to it.
|
||
|
||
You know things have rather jumped the groove when potential
|
||
suspects must explain to law enforcers the nature of their alleged
|
||
perpetrations.
|
||
|
||
I wouldn't swear Agent Baxter ever got it quite right. After I showed
|
||
him some actual source code, gave a demonstration of e-mail in
|
||
action, and downloaded a file from the WELL, he took to rubbing his
|
||
face with both hands, peering up over his finger tips and saying, "It
|
||
sure is something, isn't it" Or, "Whooo-ee."
|
||
|
||
Or "my eight year-old knows more about these things than I do." He
|
||
didn't say this with a father's pride so much as an immigrant's fear of
|
||
a strange new land into which he will be forcibly moved and in
|
||
which his own child is a native. He looked across my keyboard into
|
||
Cyberspace and didn't like what he saw.
|
||
|
||
We could have made it harder for one another, but I think we each
|
||
sensed that the other occupied a world which was as bizarre and
|
||
nonsensical as it could be. We did our mutual best to suppress
|
||
immune response at the border.
|
||
|
||
You'd have thought his world might have been a little more
|
||
recognizable to me. Not so, it turns out. Because in his world, I
|
||
found several unfamiliar features, including these:
|
||
|
||
1. The Hacker's Conference is an underground organization of
|
||
computer outlaws with likely connections to, and almost certainly
|
||
sympathy with, the NuPrometheus League. (Or as Agent Baxter
|
||
repeatedly put it, the "New Prosthesis League.")
|
||
|
||
2. John Draper, the affore-mentioned Cap'n Crunch, in addition to
|
||
being a known member of the Hacker's Conference, is also CEO
|
||
and president of Autodesk, Inc. This is of particular concern to
|
||
the FBI because Autodesk has many top-secret contracts with the
|
||
government to supply Star Wars graphics imaging and
|
||
"hyperspace" technology. Worse, Draper is thought to have
|
||
Soviet contacts.
|
||
|
||
He wasn't making this up. He had lengthy documents from the San
|
||
Francisco office to prove it. And in which Autodesk's address was
|
||
certainly correct.
|
||
|
||
On the other hand, I know John Draper. While, as I say, he may have
|
||
once distinguished himself as a cracker during the Pleistocene, he is
|
||
not now, never has been, and never will be CEO of Autodesk. He did
|
||
work there for awhile last year, but he was let go long before he got
|
||
in a position to take over.
|
||
|
||
Nor is Autodesk, in my experience with it, the Star Wars skunk
|
||
works which Agent Baxter's documents indicated. One could hang
|
||
out there a long time without ever seeing any gold braid.
|
||
|
||
Their primary product is something called AutoCAD, by far the most
|
||
popular computer-aided design software but generally lacking in
|
||
lethal potential. They do have a small development program in
|
||
Cyberspace, which is what they call Virtual Reality. (This, I assume is
|
||
the "hyperspace" to which Agent Baxter's documents referred.)
|
||
|
||
However, Autodesk had reduced its Cyberspace program to a couple
|
||
of programmers. I imagined Randy Walser and Carl Tollander toiling
|
||
away in the dark and lonely service of their country. Didn't work.
|
||
Then I tried to describe Virtual Reality to Agent Baxter, but that
|
||
didn't work either. In fact, he tilted. I took several runs at it, but I
|
||
could tell I was violating our border agreements. These seemed to
|
||
include a requirement that neither of us try to drag the other across
|
||
into his conceptual zone.
|
||
|
||
I fared a little better on the Hacker's Conference. Hardly a
|
||
conspiracy, the Hacker's Conference is an annual convention
|
||
originated in 1984 by the Point Foundation and the editors of Whole
|
||
Earth Review. Each year it invites about a hundred of the most gifted
|
||
and accomplished of digital creators. Indeed, they are the very people
|
||
who have conducted the personal computer revolution. Agent Baxter
|
||
looked at my list of Hacker's Conference attendees and read their
|
||
bios.
|
||
|
||
"These are the people who actually design this stuff, aren't they?" He
|
||
was incredulous. Their corporate addresses didn't fit his model of
|
||
outlaws at all well.
|
||
|
||
Why had he come all the way to Pinedale to investigate a crime he
|
||
didn't understand which had taken place (sort of) in 5 different
|
||
places, none of which was within 500 miles?
|
||
|
||
Well, it seems Apple has told the FBI that they can expect little
|
||
cooperation from Hackers in and around the Silicon Valley, owing to
|
||
virulent anti-Apple sentiment there. They claim this is due to the
|
||
Hacker belief that software should be free combined with festering
|
||
resentment of Apple's commercial success. They advised the FBI to
|
||
question only those Hackers who were as far as possible from the
|
||
twisted heart of the subculture.
|
||
|
||
They did have their eye on some local people though. These
|
||
included a couple of former Apple employees, Grady Ward and
|
||
Water Horat, Chuck Farnham (who has made a living out of
|
||
harassing Apple), Glenn Tenney (the purported leader of the
|
||
Hackers), and, of course, the purported CEO of Autodesk.
|
||
|
||
Other folks Agent Baxter asked me about included Mitch Kapor, who
|
||
wrote Lotus 1-2-3 and was known to have received some this
|
||
mysterious source code. Or whatever. But I had also met Mitch
|
||
Kapor, both on the WELL and in person. A less likely computer
|
||
terrorist would be hard to come by.
|
||
|
||
Actually, the question of the source code was another area where
|
||
worlds but shadow-boxed. Although Agent Baxter didn't know
|
||
source code from Tuesday, he did know that Apple Computer had
|
||
told his agency that what had been stolen and disseminated was the
|
||
complete recipe for a Macintosh computer. The distribution of this
|
||
secret formula might result in the creation of millions of Macintoshes
|
||
not made by Apple. And, of course, the ruination of Apple
|
||
Computer.
|
||
|
||
In my world, NuPrometheus (whoever they, or more likely, he might
|
||
be) had distributed a small portion of the code which related
|
||
specifically to Color QuickDraw. QuickDraw is Apple's name for the
|
||
software which controls the Mac's on-screen graphics. But this was
|
||
another detail which Agent Baxter could not capture. For all he
|
||
knew, you could grow Macintoshes from floppy disks.
|
||
|
||
I explained to him that Apple was alleging something like the ability
|
||
to assemble an entire human being from the recipe for a foot, but
|
||
even he know the analogy was inexact. And trying to get him to
|
||
accept the idea that a corporation could go mad with suspicion was
|
||
quite futile. He had a far different perception of the emotional
|
||
reliability of institutions.
|
||
|
||
When he finally left, we were both dazzled and disturbed. I spent
|
||
some time thinking about Lewis Carroll and tried to return to writing
|
||
about the legal persecution of the Legion of Doom. But my heart
|
||
wasn't in it. I found myself suddenly too much in sympathy with
|
||
Agent Baxter and his struggling colleagues from Operation Sun Devil
|
||
to get back into a proper sort of pig-bashing mode.
|
||
|
||
Given what had happened to other innocent bystanders like Steve
|
||
Jackson, I gave some thought to getting scared. But this was Kafka in
|
||
a clown suit. It wasn't precisely frightening. I also took some
|
||
comfort in a phrase once applied to the administration of Frederick
|
||
the Great: "Despotism tempered by incompetence."
|
||
|
||
Of course, incompetence is a double-edged banana. While we may
|
||
know this new territory better than the authorities, they have us
|
||
literally out-gunned. One should pause before making well-armed
|
||
paranoids feel foolish, no matter how foolish they seem.
|
||
|
||
|
||
******
|
||
|
||
The Fear of White Noise
|
||
|
||
"Neurosis is the inability to tolerate ambiguity."
|
||
|
||
-- Sigmund Freud,
|
||
appearing to me in a dream
|
||
|
||
|
||
I'm a member of that half of the human race which is inclined to
|
||
divide the human race into two kinds of people. My dividing line
|
||
runs between the people who crave certainty and the people who
|
||
trust chance.
|
||
|
||
You can draw this one a number of ways, of course, like Control vs.
|
||
Serendipity, Order vs. Chaos, Hard answers vs. Silly questions, or
|
||
Newton, Descartes & Aquinas vs. Heisenberg, Mandelbrot & the
|
||
Dalai Lama. Etc.
|
||
|
||
Large organizations and their drones huddle on one end of my scale,
|
||
busily trying to impose predictable homogeneity on messy
|
||
circumstance. On the other end, free-lancers and ne'er-do-wells
|
||
cavort about, getting by on luck if they get by at all.
|
||
|
||
However you cast these poles, it comes down to the difference
|
||
between those who see life as a struggle against cosmic peril and
|
||
human infamy and those who believe, without any hard evidence,
|
||
that the universe is actually on our side. Fear vs. Faith.
|
||
|
||
I am of the latter group. Along with Gandhi and Rebecca of
|
||
Sunnybrook Farm, I believe that other human beings will quite
|
||
consistently merit my trust if I'm not doing something which scares
|
||
them or makes them feel bad about themselves. In other words, the
|
||
best defense is a good way to get hurt.
|
||
|
||
In spite of the fact that this system works very reliably for me and my
|
||
kind, I find we are increasingly in the minority. More and more of
|
||
our neighbors live in armed compounds. Alarms blare continuously.
|
||
Potentially happy people give their lives over to the corporate state as
|
||
though the world were so dangerous outside its veil of collective
|
||
immunity that they have no choice.
|
||
|
||
I have a number of theories as to why this is happening. One has to
|
||
do with the opening of Cyberspace. As a result of this development,
|
||
humanity is now undergoing the most profound transformation of its
|
||
history. Coming into the Virtual World, we inhabit Information.
|
||
Indeed, we become Information. Thought is embodied and the Flesh
|
||
is made Word. It's weird as hell.
|
||
|
||
Beginning with the invention of the telegraph and extending through
|
||
television into Virtual Reality, we have been, for a over a century,
|
||
experiencing a terrifying erosion in our sense of both body and place.
|
||
As we begin to realize the enormity of what is happening to us, all
|
||
but the most courageous have gotten scared.
|
||
|
||
And everyone, regardless of his psychic resilience, feels this
|
||
overwhelming sense of strangeness. The world, once so certain and
|
||
tangible and legally precise, has become an infinite layering of
|
||
opinions, perceptions, litigation, camera-angles, data, white noise,
|
||
and, most of all, ambiguities. Those of us who are of the fearful
|
||
persuasion do not like ambiguities.
|
||
|
||
Indeed, if one were a little jumpy to start with, he may now be fairly
|
||
humming with nameless dread. Since no one likes his dread to be
|
||
nameless, the first order of business is to find it some names.
|
||
|
||
For a long time here in the United States, Communism provided a
|
||
kind of catch-all bogeyman. Marx, Stalin and Mao summoned forth
|
||
such a spectre that, to many Americans, annihilation of all life was
|
||
preferable to the human portion's becoming Communist. But as Big
|
||
Red wizened and lost his teeth, we began to cast about for a
|
||
replacement.
|
||
|
||
Finding none of sufficient individual horror, we have draped a
|
||
number of objects with the old black bunting which once shrouded
|
||
the Kremlin. Our current spooks are terrorists, child abductors,
|
||
AIDS, and the underclass. I would say drugs, but anyone who thinks
|
||
that the War on Drugs is not actually the War on the Underclass
|
||
hasn't been paying close enough attention.
|
||
|
||
There are a couple of problems with these Four Horsemen. For one
|
||
thing, they aren't actually very dangerous. For example, only 7
|
||
Americans died in worldwide terrorist attacks in 1987. Fewer than 10
|
||
(out of about 70 million) children are abducted by strangers in the
|
||
U.S. each year. Your chances of getting AIDS if you are neither gay
|
||
nor a hemophiliac nor a junkie are considerably less than your
|
||
chances of getting killed by lightning while golfing. The underclass is
|
||
dangerous, of course, but only, with very few exceptions, if you are a
|
||
member of it.
|
||
|
||
The other problem with these perils is that they are all physical. If we
|
||
are entering into a world in which no one has a body, physical threats
|
||
begin to lose their sting.
|
||
|
||
And now I come to the point of this screed: The perfect bogeyman
|
||
for Modern Times is the Cyberpunk! He is so smart he makes you
|
||
feel even more stupid than you usually do. He knows this complex
|
||
country in which you're perpetually lost. He understands the value
|
||
of things you can't conceptualize long enough to cash in on. He is the
|
||
one-eyed man in the Country of the Blind.
|
||
|
||
In a world where you and your wealth consist of nothing but beeps
|
||
and boops of micro-voltage, he can steal all your assets in
|
||
nanoseconds and then make you disappear.
|
||
|
||
He can even reach back out of his haunted mists and kill you
|
||
physically. Among the justifications for Operation Sun Devil was
|
||
this chilling tidbit:
|
||
|
||
"Hackers had the ability to access and review the files of hospital patients.
|
||
Furthermore, they could have added, deleted, or altered vital patient
|
||
information, possibly causing life- threatening situations."
|
||
|
||
Perhaps the most frightening thing about the Cyberpunk is the
|
||
danger he presents to The Institution, whether corporate or
|
||
governmental. If you are frightened you have almost certainly taken
|
||
shelter by now in one of these collective organisms, so the very last
|
||
thing you want is something which can endanger your heretofore
|
||
unassailable hive.
|
||
|
||
And make no mistake, crackers will become to bureaucratic bodies
|
||
what viruses presently are to human bodies. Thus, Operation Sun
|
||
Devil can be seen as the first of many waves of organizational
|
||
immune response to this new antigen. Agent Baxter was a T-cell.
|
||
Fortunately, he didn't know that himself and I was very careful not to
|
||
show him my own antigenic tendencies.
|
||
|
||
I think that herein lies the way out of what might otherwise become
|
||
an Armageddon between the control freaks and the neo-hip. Those
|
||
who are comfortable with these disorienting changes must do
|
||
everything in our power to convey that comfort to others. In other
|
||
words, we must share our sense of hope and opportunity with those
|
||
who feel that in Cyberspace they will be obsolete eunuchs for sure.
|
||
|
||
It's a tall order. But, my silicon brothers, our self-interest is strong. If
|
||
we come on as witches, they will burn us. If we volunteer to guide
|
||
them gently into its new lands, the Virtual World might be a more
|
||
amiable place for all of us than this one has been.
|
||
|
||
Of course, we may also have to fight.
|
||
|
||
******
|
||
|
||
Defining the conceptual and legal map of Cyberspace before the
|
||
ambiguophobes do it for us (with punitive over-precision) is going to
|
||
require some effort. We can't expect the Constitution to take care of
|
||
itself. Indeed, the precedent for mitigating the Constitutional
|
||
protection of a new medium has already been established. Consider
|
||
what happened to radio in the early part of this century.
|
||
|
||
Under the pretext of allocating limited bandwidth, the government
|
||
established an early right of censorship over broadcast content which
|
||
still seems directly unconstitutional to me. Except that it stuck. And
|
||
now, owing to a large body of case law, looks to go on sticking.
|
||
|
||
New media, like any chaotic system, are highly sensitive to initial
|
||
conditions. Today's heuristical answers of the moment become
|
||
tomorrow's permanent institutions of both law and expectation.
|
||
Thus, they bear examination with that destiny in mind.
|
||
|
||
Earlier in this article, I asked a number of tough questions relating to
|
||
the nature of property, privacy, and speech in the digital domain.
|
||
Questions like: "What are data and what is free speech?" or "How
|
||
does one treat property which has no physical form and can be
|
||
infinitely reproduced?" or "Is a computer the same as a printing
|
||
press." The events of Operation Sun Devil were nothing less than an
|
||
effort to provide answers to these questions. Answers which would
|
||
greatly enhance governmental ability to silence the future's
|
||
opinionated nerds.
|
||
|
||
In over-reaching as extravagantly as they did, the Secret Service may
|
||
actually have done a service for those of us who love liberty. They
|
||
have provided us with a devil. And devils, among their other
|
||
galvanizing virtues, are just great for clarifying the issues and putting
|
||
iron in your spine. In the presence of a devil, it's always easier to
|
||
figure out where you stand.
|
||
|
||
While I previously had felt no stake in the obscure conundra of free
|
||
telecommunication, I was, thanks to Operation Sun Devil, suddenly
|
||
able to plot a trajectory from the current plight of the Legion of Doom
|
||
to an eventual constraint on opinions much dearer to me. I
|
||
remembered Martin Neimoeller, who said:
|
||
|
||
"In Germany they came first for the Communists, and I didn't speak up
|
||
because I wasn't a Communist. Then they came for the Jews, and I didn't
|
||
speak up because I wasn't a Jew. They came for the trade unionists, and I
|
||
didn't speak up because I wasn't a trade unionist. Then they came for the
|
||
Catholics, and I didn't speak up because I was a Protestant. Then they came
|
||
for me, and by that time no one was left to speak up."
|
||
|
||
I decided it was time for me to speak up.
|
||
|
||
The evening of my visit from Agent Baxter, I wrote an account of it
|
||
which I placed on the WELL. Several days later, Mitch Kapor
|
||
literally dropped by for a chat.
|
||
|
||
Also a WELL denizen, he had read about Agent Baxter and had
|
||
begun to meditate on the inappropriateness of leaving our civil
|
||
liberties to be defined by the technologically benighted. A man who
|
||
places great emphasis on face-to-face contact, he wanted to discuss
|
||
this issue with me in person. He had been flying his Canadair bizjet
|
||
to a meeting in California when he realized his route took him
|
||
directly over Pinedale.
|
||
|
||
We talked for a couple of hours in my office while a spring
|
||
snowstorm swirled outside. When I recounted for him what I had
|
||
learned about Operation Sun Devil, he decided it was time for him to
|
||
speak up too.
|
||
|
||
He called a few days later with the phone number of a civil
|
||
libertarian named Harvey Silverglate, who, as evidence of his
|
||
conviction that everyone deserves due process, is currently
|
||
defending Leona Helmsley. Mitch asked me to tell Harvey what I
|
||
knew, with the inference that he would help support the costs which
|
||
are liable to arise whenever you tell a lawyer anything.
|
||
|
||
I found Harvey in New York at the offices of that city's most
|
||
distinguished constitutional law firm, Rabinowitz, Boudin, Standard,
|
||
Krinsky, and Lieberman. These are the folks who made it possible
|
||
for the New York Times to print the Pentagon Papers. (Not to dwell
|
||
on the unwilling notoriety which partner Leonard Boudin achieved
|
||
back in 1970 when his Weathergirl daughter blew up the family
|
||
home...)
|
||
|
||
In the conference call which followed, I could almost hear the skeletal
|
||
click as their jaws dropped. The next day, Eric Lieberman and Terry
|
||
Gross of Rabinowitz, Boudin met with Acid Phreak, Phiber Optik,
|
||
and Scorpion.
|
||
|
||
The maddening trouble with writing this account is that Whole Earth
|
||
Review, unlike, say, Phrack, doesn't publish instantaneously. Events
|
||
are boiling up at such a frothy pace that anything I say about current
|
||
occurrences surely will not obtain by the time you read this. The
|
||
road from here is certain to fork many times. The printed version of
|
||
this will seem downright quaint before it's dry.
|
||
|
||
But as of today (in early June of 1990), Mitch and I are legally
|
||
constituting the Electronic Frontier Foundation, a two (or possibly
|
||
three) man organization which will raise and disburse funds for
|
||
education, lobbying, and litigation in the areas relating to digital
|
||
speech and the extension of the Constitution into Cyberspace.
|
||
|
||
Already, on the strength of preliminary stories about our efforts in
|
||
the Washington Post and the New York Times, Mitch has received an
|
||
offer from Steve Wozniak to match whatever funds he dedicates to
|
||
this effort. (As well as a fair amount of abuse from the more
|
||
institutionalized precincts of the computer industry.)
|
||
|
||
The Electronic Frontier Foundation will fund, conduct, and support
|
||
legal efforts to demonstrate that the Secret Service has exercised prior
|
||
restraint on publications, limited free speech, conducted improper
|
||
seizure of equipment and data, used undue force, and generally
|
||
conducted itself in a fashion which is arbitrary, oppressive, and
|
||
unconstitutional.
|
||
|
||
In addition, we will work with the Computer Professionals for Social
|
||
Responsibility and other organizations to convey to both the public
|
||
and the policy-makers metaphors which will illuminate the more
|
||
general stake in liberating Cyberspace.
|
||
|
||
Not everyone will agree. Crackers are, after all, generally beyond
|
||
public sympathy. Actions on their behalf are not going to be popular
|
||
no matter who else might benefit from them in the long run.
|
||
|
||
Nevertheless, in the litigations and political debates which are certain
|
||
to follow, we will endeavor to assure that their electronic speech is
|
||
protected as certainly as any opinions which are printed or, for that
|
||
matter, screamed. We will make an effort to clarify issues
|
||
surrounding the distribution of intellectual property. And we will
|
||
help to create for America a future which is as blessed by the Bill of
|
||
Rights as its past has been.
|
||
|
||
|
||
|
||
|
||
John Perry Barlow
|
||
barlow@well.sf.ca.us
|
||
Friday, June 8, 1990
|
||
|
||
|
||
|