754 lines
42 KiB
Plaintext
754 lines
42 KiB
Plaintext
|
||
|
||
Computer Underground Digest--Fri Sept 8, 1991 (Vol #3.32)
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
-> SPECIAL ISSUE: REVIEW OF _CYBERPUNK_ <-
|
||
|
||
CONTENTS, #3.32 (September 8, 1991)
|
||
File 1--CYBERPUNK Review
|
||
File 2--Review of _CYBERPUNK_
|
||
File 3--_CYBERPUNK_ Review
|
||
File 4--Newsweek review CYBERPUNK
|
||
File 5--Review of _CYBERPUNK_
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu,
|
||
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 08 Sep 91 15:20:16 EDT
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 1--CYBERPUNK Review
|
||
|
||
((Moderators Note: REVIEWS OF: CYBERPUNK: OUTLAWS AND HACKERS ON THE
|
||
COMPUTER FRONTIER. by Katie Hafner and John Markoff. New York:
|
||
Simon and Schuster. 336 pp. $22.95 pb.
|
||
|
||
The Hafner and Markoff book has not, to our knowledge, received a bad,
|
||
or even mediocre, review, so we invited a few readers to see if the
|
||
hype is justified. It is, but don't take our word for it. Grab a copy
|
||
and read it!))
|
||
|
||
Reviewed by: Gordon R. Meyer
|
||
September 8, 1991
|
||
++++++++++++++++++
|
||
|
||
The promotional materials for _CYBERPUNK_ describe the book using
|
||
these words:
|
||
|
||
A fascinating and revealing account of the world of hackers
|
||
and the threat they pose in the age of computer networks.
|
||
(....)
|
||
With society completely dependent on computer networks,
|
||
Hafner and Markoff reveal how real a threat these hackers
|
||
represent, and address what we should or can do about them.
|
||
|
||
While I certainly agree that _CYBERPUNK_ is fascinating and revealing,
|
||
I found little about "the world of hackers," and even less about what
|
||
should be done about 'them'. I realize authors often have little, if
|
||
any, control over the jacket copy of their books, however as this is a
|
||
mass-market publication the jacket copy does indeed play a role in
|
||
influencing the perception and positioning of this volume in
|
||
marketplace. Also, as an observational aside, it is interesting to
|
||
note the phrase "...what we should or can do about them." A small
|
||
semantic twist that focuses attention on those who engage in the
|
||
behavior, and not the problem itself.
|
||
|
||
_CYBERPUNK_ focuses on three "infamous" computer hackers that have
|
||
risen into the public consciousness in the last few years. The
|
||
stories of Kevin Mitnick, "Pengo," and Robert Morris are presented in
|
||
a fast-paced, narrative manner. It is a very enjoyable romp through
|
||
their lives, and the events that brought them into the public eye.
|
||
|
||
The first chapter of the book concerns Mitnick, and is entitled
|
||
"Kevin: The dark-side hacker." As indicated in the authors' reference
|
||
notes, they were unable to contact Mitnick directly, therefore this
|
||
chapter appears to construct events based on third and second-party
|
||
interviews, and police/court documents. Despite this handicap, Hafner
|
||
and Markoff have created a very intriguing narrative of some of
|
||
Mitnick's activities. It is unfortunate that they were unable to talk
|
||
to Mitnick himself, as a more balanced, or rather "inside,"
|
||
perspective on the events would improve this chapter. In some ways it
|
||
is a bit like reading a historical account of a person who is long
|
||
since dead. Here's hoping that someday Mitnick will himself fill in
|
||
some of the missing parts of the story.
|
||
|
||
It was probably a wise decision to begin the book with the Mitnick
|
||
story. It certainly has the most "common man" angle to it. Mitnick,
|
||
while a skilled computerist, is closer to the average 'man on the
|
||
street' then Pengo, who was involved with the KGB, or Morris, son of a
|
||
computer scientist. Mitnick, excluding his computer related activity,
|
||
is not unlike other young men in many respects. This leads the reader
|
||
to conclude that anyone, perhaps the kid next door, could also be
|
||
involved in Mitnick-like activity. And certainly Mitnick's propensity
|
||
to taking computerized revenge against his 'enemies' will entertain
|
||
those who would daydream of, but never enact, such schemes.
|
||
|
||
This chapter does exhibit one peculiar tendency, that was thankfully
|
||
absent from the rest of the chapters. Specifically, there is somewhat
|
||
of a focus on Kevin's weight, and on the the authors, was an active
|
||
phone phreak/hacker in the early days of the computer underground.
|
||
She plays a prominent role in the first part of the Mitnick story,
|
||
then quickly fades from the scene. This was puzzling, as Hafner and
|
||
Markoff treat us to stories of her days as a prostitute, (and the time
|
||
she was thrown out of drug rehab for fellating a staff member in the
|
||
restroom), then after numerous descriptions of her "unusually large
|
||
hips and buck teeth" she quietly fades from the story, exiting into a
|
||
life of professional tournament poker. While physical descriptions
|
||
are important in helping the reader form mental images of the
|
||
characters, the focus on was a bit too sharp on the physical
|
||
attributes of the actors in Mitnick's story. Luckily this propensity
|
||
was dropped as the book continued. However, I'm still hoping for
|
||
_CYBERPUNK 2: The Return Of Thunder_ .
|
||
|
||
An interesting picture emerges from the story of the police
|
||
investigation into Mitnick. CuD readers will be familiar with the
|
||
steps taken by Secret Service agents executing warrants in the Sun
|
||
Devil investigations. In Mitnick's story we are treated to the image
|
||
of the L.A. Police following Mitnick from classroom to classroom, and
|
||
various fast-food restaurants, using a "tag team" of twelve officers,
|
||
sometimes leaping from roof top to roof top, or driving at speeds in
|
||
excess of one hundred miler per hour, all to ensure they didn't lose
|
||
sight of the evil hacker.
|
||
|
||
Mitnick's story ends with his arrest, by the FBI, in a parking garage.
|
||
While we are later given a brief postscript stating that he currently
|
||
lives in Las Vegas, I would was left wanting more regarding not only
|
||
the trial, but also his wife Bonnie Mitnick, his
|
||
co-hacker-turned-snitch Lenny, and the various other people connected
|
||
with Mitnick's story. Admittedly, I found the section on Mitnick to
|
||
be the most interesting aspect of _CYBERPUNK_, and it left me wanting
|
||
more. Others may be more than satisfied with what is already offered.
|
||
|
||
However, I did not have the same feeling regarding the story of Hans
|
||
Heinrich, "Pengo and Project Equalizer." I felt the story was
|
||
well-covered, with adequate details regarding Pengo's association with
|
||
"Hagbard Celine," all the way up to the ensuing trial, and aftermath.
|
||
|
||
Hafner and Markoff present essentially the same story as Cliff Stoll's
|
||
_The Cuckoo's Egg_, but from the other side of the phone, so to speak.
|
||
It also brings some interesting questions to light regarding the
|
||
interaction of the FBI, CIA, NSA, West German officials, and Laszlo,
|
||
the Philadelphian who ultimately requested Stoll's bogus SDINet
|
||
information. Fascinating stuff, and after reading this section I
|
||
immediately wanted to re-read Stoll's book, just to form a better
|
||
picture of the situation.
|
||
|
||
For anyone wanting to understand what all the fuss was over the
|
||
incident described in _The Cuckoo's Egg_, but not wanting to read
|
||
Stoll's account, _CYBERPUNK_ offers a cogent, and equally compelling
|
||
summary of the events. Anyone who has read Stoll's book, should be
|
||
equally interested in this section as well.
|
||
|
||
The final focus of _CYBERPUNK_ is on Robert T. Morris, author of the
|
||
so-called "Internet Worm." Here the authors' offer some insight into
|
||
the Morris family, and the actions taken by Robert and his associates
|
||
as the Worm was working its way throughout the Internet. As an
|
||
accounting of the trial, and documentation of the questions and issues
|
||
the Justice Department needed to confront in attending to this case,
|
||
it is more than worthwhile reading. There has been much written on
|
||
the actions of the Worm, and the aftermath of its release. Hafner and
|
||
Markoff give us a peek behind the scenes and illustrate that many of
|
||
the questions and issues raised by the actions of Morris, are as of
|
||
yet unanswered.
|
||
|
||
In conclusion, _CYBERPUNK_ is very enjoyable and quite entertaining.
|
||
I highly recommend it to CuD readers, it is worth the minimal time
|
||
required to read it. I found myself disappointed that it offered no
|
||
insights into the computer underground per se, and in fact I would
|
||
argue that it is not a book about the computer underground, or as the
|
||
dust jacket puts it "the computer frontier" at all. It is an
|
||
interesting account of three talented individuals, who each happen to
|
||
have used computers as their tools of choice. Is _CYBERPUNK_ a
|
||
definitive peek into the world of computer hackers? It is not. Does
|
||
it provide insight and raise questions for the student of the computer
|
||
underground? Absolutely. Read it.
|
||
|
||
------------------------------
|
||
|
||
From: joeholms@DORSAI.COM(Joseph Holmes)
|
||
Subject: File 2--Review of _CYBERPUNK_
|
||
Date: Mon, 24 Jun 91 15:38:40 PDT
|
||
|
||
"Cyberpunk: Outlaws and Hackers on the Computer Frontier," is
|
||
journalism's second mainstream book on hackers, although since 1984
|
||
when Steven Levy wrote his "Hackers," the definition has certainly
|
||
changed. Cyberpunk is the story of three groups of "outlaw" hackers --
|
||
Kevin Mitnick, whom the authors call the "darkside" hacker, and his
|
||
friends in California, Pengo and the other West German hackers who
|
||
were pursued by Cliff Stoll in "The Cuckoo's Egg," and Robert Morris,
|
||
the author of the worm that took down the Internet in 1988. The
|
||
authors, Katie Hafner, technology and computer reporter for "Business
|
||
Week," and John Markoff, computer industry reporter for "The New York
|
||
Times," live up to both the best and the worst of journalism.
|
||
|
||
The good news is that they've assembled a ton of new details,
|
||
including the days leading up to Robert Morris's release of his worm
|
||
into the Internet, and lots of information about Pengo, Hagbard
|
||
Celine, and the other West German hackers visiting their Soviet
|
||
connection. For that reason alone, the book is sure to sell well. On
|
||
the other hand, there are passages in the book that leave the reader
|
||
more than a little skeptical about the reporters' accuracy.
|
||
Pittsburgh's Monroeville mall, for example, did not serve as the "set
|
||
for the cult film 'Night of the Living Dead'"--that was "Dawn of the
|
||
Dead." While that's hardly an important detail, such inattention does
|
||
nothing to inspire confidence.
|
||
|
||
And unfortunately, very little of the detail is put to any interesting
|
||
use, since the book offers almost no analysis of the facts. There's no
|
||
suggestion offered as to why Pengo, Mitnick, or Robert Morris did what
|
||
they did (the authors could take a lesson from "The Falcon and the
|
||
Snowman"--the book, that is, not the movie). Instead, Hafner and
|
||
Markoff have apparently drawn their own conclusions about the Mitnick,
|
||
Pengo, and Morris, and they seem to have written Cyberpunk to convince
|
||
us that Kevin Mitnick is a shallow, vindictive, and dangerous genius,
|
||
while Robert Morris is an innocent, misunderstood genius, more
|
||
scapegoat than outlaw. While those conclusions might easily be true,
|
||
we're never trusted to discover that from the facts alone.
|
||
|
||
As they tell about the dangerous pranks and hacks by Mitnick, for
|
||
example, they seem always ready to pass along every scary anecdote
|
||
about his power over everything from computers to the phone company to
|
||
security guards. No matter what the source (and it's usually
|
||
impossible to tell what their sources were), they apparently believe
|
||
every story they're told, even when the stories are obviously the
|
||
bragging of the participants. On the other hand, when they discuss
|
||
Morris, he gets the benefit of every possible doubt as they trace him
|
||
from his loving upbringing through his trial and sentence. They
|
||
mention, for example, Robert Morris's habit of ranging throughout
|
||
various networks and computers using decyphered or stolen passwords,
|
||
and they note, "Robert made a practice of breaking into only the
|
||
computers of people he knew wouldn't mind." Incredibly, this is stated
|
||
without the slightest bit of irony or skepticism. I myself have long
|
||
believe that Morris was something of a scapegoat, but what I'd like to
|
||
learn from a book like Cyberpunk are the facts to help me make up my
|
||
mind about Morris, not apologies and half-baked conclusions.
|
||
|
||
Cyberpunk is ostensibly about the people involved, not the science, so
|
||
computer and science readers will be disappointed to find that it
|
||
avoids explaining how phreaking and hacking works. I sorely miss Cliff
|
||
Stoll's ability to clearly explain to nonprogrammers the technology
|
||
behind all these exploits. Stoll, for example, easily explained how a
|
||
hacker with a dictionary and a little patience could figure out a slew
|
||
of encrypted passwords using simple logic rather than brute force.
|
||
Because Cyberpunk doesn't bother to delve into such details, it misses
|
||
the opportunity to involve the reader more deeply.
|
||
|
||
The writing style will win no awards (Hugh Kenner's review of the book
|
||
in the July Byte calls it "sledgehammer prose"). But of course,
|
||
Cyberpunks will nevertheless be gobbled up by all the
|
||
computer-literates -- the users and the hackers -- as well as a public
|
||
ready to be scared by news of the new evil breed of young computer
|
||
masterminds who are about to take over the world. Or at least the
|
||
world's credit ratings.
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 10 Jul 1991 19:37:22 -0400
|
||
From: Brendan Kehoe <brendan@CS.WIDENER.EDU>
|
||
Subject: File 3--_CYBERPUNK_ Review
|
||
|
||
A capsule & review by Brendan Kehoe.
|
||
|
||
"Cyberpunk", by Katie Hafner and John Markoff, provides the reader
|
||
with a peek inside the very real world of the computer "hacker".
|
||
Labeled members of a "counterculture", these people, generally in
|
||
their teens and early twenties, have added a sharp tint to the
|
||
normally bland design of the computing world.
|
||
|
||
Divided into three contrasting sections, "Cyberpunk" provides an
|
||
insight into what drives a hacker, from the extreme to the accidental.
|
||
(To allay any complaints, I'll use hacker in its common vernacular; as
|
||
Steven Bellovin said a couple of years ago, "the battle is over, and
|
||
the purists have lost." For our purposes, "hacker" will imply
|
||
"criminal".)
|
||
|
||
Kevin Mitnick, a overweight and markedly shy youth, satisfied many of
|
||
the stereotypes that have been developed over the years regarding
|
||
hackers. He ran the full gamut of "evil deeds," from altering credit
|
||
ratings to turning off telephones at will. Remarkably adept at social
|
||
engineering, Mitnick could talk himself into (or out of) nearly any
|
||
situation. In one escapade, Mitnick and his compatriots ("Roscoe",
|
||
"Susan", and a third phreak) managed to enter, raid, and leave a
|
||
PacBell COSMOS center (where much of PacBell's main computing takes
|
||
place for things like billing), leaving with a wealth of door-lock
|
||
codes and, more importantly, manuals. All with the PacBell guard's
|
||
unwitting permission. (They were later turned in by Susan, who is
|
||
described as a very vindictive and dangerous young woman.)
|
||
|
||
All adventure aside, Kevin had a serious problem. He was, by clinical
|
||
definition, addicted to hacking of any sort. It became impossible for
|
||
him to stop. Even after incidents with USC, GTE, Pierce College, and
|
||
the Santa Cruz Operation (makers of SCO Unix), Mitnick kept following
|
||
the endless road of systems to be conquered.
|
||
|
||
He disappeared for a year (purportedly to Israel, but in reality only
|
||
a few miles outside of San Francisco), to return after his warrant for
|
||
the SCO incidents had been dropped. He immediately looked up his
|
||
friend Lenny DiCiccio, who had spent a number of his teenage years
|
||
following Kevin as a trainee might follow a mentor. Lenny found
|
||
himself increasingly unhappy, as the fevered hacker's hold upon him
|
||
returned. Mitnick insisted that he be allowed to come to Lenny's
|
||
office (a small software company) after hours to hack. Under normal
|
||
circumstances, such constant imposition would lead to some sort of
|
||
objection---but Lenny couldn't help himself. Kevin appealed to the
|
||
criminal in him that normally lay dormant. With Kevin, he could do
|
||
things he had previously only schemed about.
|
||
|
||
After a few months, Kevin and Lenny happened upon a virtual gold mine:
|
||
Digital's Star development cluster in Nashua, New Hampshire, where
|
||
their most proprietary systems development takes place. Since DEC's
|
||
VMS operating system was their favorite, they couldn't have been
|
||
happier. Or more greedy. "Kevin had always approached his illicit
|
||
computing as a serious project [ ... his ] project for 1988 was
|
||
downloading Digital's VMS source code."
|
||
|
||
In the course of following Mitnick's tale, Hafner and Markoff do an
|
||
excellent job of drawing the reader into Kevin's never-ending search
|
||
for the "perfect hack." The eventual outcome of their Digital
|
||
exploits, and the end of their (illegal) hacking careers (to slip out
|
||
of the vernacular for just a moment), is nothing short of amazing.
|
||
The authors' depiction is both disturbing as it is riveting.
|
||
|
||
By now, many people are acquainted with the story of the "Wily
|
||
Hacker", the electronic intruder that skyrocketed Cliff Stoll, an
|
||
astronomer by degree who found himself a system manager, into
|
||
wide-spread notoriety as an authority on computer security. Stoll's
|
||
paper in the Communications of the ACM, "Stalking the Wily Hacker",
|
||
graduated to become the book "The Cuckoo's Egg", which was on the best
|
||
seller lists for weeks, and also took the form of a Nova documentary.
|
||
This all, however, was presented from Stoll's point of view. Hafner
|
||
and Markoff now afford people the opportunity to see the "other side"
|
||
of the whole affair---from the world of Markus Hess, Pengo, and the
|
||
German hacking underground.
|
||
|
||
Hans Huebner went by the name "Pengo" in his youth, and is the main
|
||
character in the second part of "Cyberpunk". Pengo grew from a
|
||
Commodore 64 and BASIC programming to a network "cowboy" in a matter
|
||
of months. Video games (including the one that provided his namesake)
|
||
were his first passion---he could spend hours upon hours completely
|
||
engrossed in the tiny world that exposed itself before him. Then a
|
||
friend introduced him to using a modem, and the vast web of computers
|
||
only a phone call or network connection away. He found in hacking an
|
||
excitement and adrenaline rush normal video games could only attempt
|
||
to equal.
|
||
|
||
Pengo's world was strewn with drugs---one of his fellow hackers, Karl
|
||
Koch (nicknamed "Hagbard Celine", for the protagonist in the
|
||
Illuminatus! trilogy), regularly abused hashish and LSD. All members
|
||
of their small group (with the exception of Markus Hess) spent a
|
||
substantial amount of time in a chemical haze.
|
||
|
||
Peter Carl and Dirk-Otto Brzezinski (aka "Dob") also played a major
|
||
role in Germany's hacking scene. It was ultimately Carl who
|
||
introduced a new angle to their computer crimes---the potential for
|
||
making money by selling their knowledge to the Soviets. Starved for
|
||
technology, the pre-Glastnost Russian republic absorbed the booming
|
||
computer industry with relish at every opportunity. Members of the
|
||
KGB worked with agents around the world, smuggling electronics and
|
||
high-tech computers into the Soviet Union. The hackers, particularly
|
||
Carl and Dob, wanted in.
|
||
|
||
Carl approached one KGB agent with an offer to provide the fruits of
|
||
their hacking ventures in exchange for one million German marks.
|
||
After small rewards, it became clear that they would never reach their
|
||
lofty goal---they received at best a few thousand marks for a copy of
|
||
the source code to Berkeley Unix. Often, they sold what was otherwise
|
||
public domain software, much to the Soviets' chagrin.
|
||
|
||
Eventually, internal struggles drew the hackers apart---Pengo, for not
|
||
being able to "produce" often enough for Carl; Hagbard, falling
|
||
further and further into an incoherent world only he knew; Dob, who
|
||
went to prison for weeks because Pengo forgot to pay a bill; and Hess,
|
||
who became increasingly wary about how much he should share with the
|
||
others, until he rarely heard from them.
|
||
|
||
Pengo, growing weary of the entire KGB ordeal, let the secret slip
|
||
during a routine interview with the local media. The German press was
|
||
habitually interested in the darkly intriguing German hackers. When
|
||
the reporters realized the magnitude of the story that Pengo mentioned
|
||
so casually, they felt society draw its breath at the idea that
|
||
espionage, considered inevitable by many, had actually been
|
||
demonstrated in the computer underground.
|
||
|
||
"Cyberpunk" spends a good deal of time describing the aftermath of the
|
||
exposure of the KGB dealings. The arduous ordeal of deciding who was
|
||
responsible for what crime(s), trying to educate a computer illiterate
|
||
court in the intricacies of computer networks and use in general, and
|
||
the conflicting stories of each of the hackers would make a normal
|
||
writer's head spin. Hafner and Markoff demonstrate an ability to
|
||
organize the entire matter into a sensible, and interesting,
|
||
counterplay. At the closing of the final section, we learn of a truly
|
||
unexpected casualty of the entire affair.
|
||
|
||
Finally, probably the most widely known case of computer malfeasance,
|
||
the story of Robert Tappan Morris (aka "RTM") and his Internet worm of
|
||
1988 is described. The section begins in a room at Berkeley called
|
||
the "fishbowl", where Phil Lapsley notices a strange process running
|
||
on his system. It soon becomes clear that many of the computers on
|
||
the campus display similar characteristics to Phil's. They later
|
||
discover that it's not confined to Berkeley---it's happening all over
|
||
the Internet.
|
||
|
||
Morris, a Cornell graduate student in computer science, had written a
|
||
program that would "reproduce" itself from computer to computer, in a
|
||
relatively benign way (inasmuch as it didn't destroy any information).
|
||
He made some careless errors, however, which made the program go out
|
||
of control. He released it on Wednesday afternoon, November 2, 1988.
|
||
Rather than replicate itself only after a long period of time on the
|
||
same system, it did so at a rate so fast that the computer soon became
|
||
unusable. When Morris returned from dinner only an hour later, it had
|
||
already ground hundreds of systems to a halt.
|
||
|
||
It traveled the network by exploiting holes in certain Unix systems'
|
||
software. Teams at Berkeley and MIT spent all night studying a copy
|
||
of his program, trying to return it to its original source form.
|
||
Slowly "patches" for the holes were worked together, and sent out to
|
||
system administrators and posted to the Usenet news network.
|
||
Unfortunately, many systems had completely disconnected themselves
|
||
from the Internet as soon as the worm hit, so they didn't get the
|
||
fixes until days later.
|
||
|
||
Robert Morris, RTM's father and a computer scientist for the National
|
||
Security Agency, stood by his son while he went to trial and faced
|
||
reprimand for the results of his actions. Hafner and Markoff portray
|
||
the young Morris as an extremely bright student who probably only now
|
||
realizes the full effect of his relatively small programming errors.
|
||
What happened behind the scenes of the whole incident completes the
|
||
story given by the news media and various technical and electronic
|
||
journals. (As a note, also included is the story of how the senior
|
||
Morris came to work for the NSA.)
|
||
|
||
"Cyberpunk" brings to the forefront an issue facing computer
|
||
professionals and enthusiasts alike---the legal systems of the world
|
||
are sorely lacking in appropriate investigation and treatment of cases
|
||
like the three detailed in this book. Oftentimes the punishments and
|
||
results of captures are far too harsh--other times, they're lenient
|
||
enough to be laughable. "Do young people who illegally enter
|
||
computers really represent such a menace? We hope that from reading
|
||
the following stories readers will learn that the answer isn't a
|
||
simple one." Throughout the book, the authors never let the reader
|
||
forget that they're describing real people and real consequences, not
|
||
fictional events.
|
||
|
||
In all, I found "Cyberpunk" to be an excellent read (I devoured it in
|
||
about 4 days, coupled with work and other things) that anyone remotely
|
||
connected with computers, or intrigued by the computer underground in
|
||
general, will find truly fascinating.
|
||
As an aside, I think the first section on Kevin Mitnick would make an
|
||
absolutely fantastic docu-drama.
|
||
|
||
------------------------------
|
||
|
||
Date: 04 Aug 91 19:54:15 EDT
|
||
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
||
Subject: File 4--Newsweek review CYBERPUNK
|
||
|
||
"Inside the Head of the Hacker"
|
||
Reviewed by John Schwartz, NEWSWEEK July 29,
|
||
|
||
((Moderators' note: the following is a excerpt/adaptation from
|
||
Schwartz's review. Interested readers should review the complete text
|
||
of the article.))
|
||
|
||
... [ John ] Markoff's story [ on Morris' Internet worm ] was the
|
||
first of a journalistic flood. But for all the ink spilled over the
|
||
Cornell graduate student's case, little insight into his personality
|
||
emerged. Computer-security experts would later try to paint Morris as
|
||
a menacing rebel; Abu Nidal at the keyboard. Some journalists probed
|
||
the irony of a computer-security expert's son-turned-security-threat,
|
||
ham-handedly coming up with a dark psychological portrait, an Oedipus
|
||
Techs.
|
||
|
||
If you ever wanted a clearer picture of the nerd who brought down the
|
||
network, a new book, "Cyberpunk: Outlaws and Hackers on the Computer
|
||
Frontier," delivers him, and the entire Morris family, up in rich
|
||
detail. ...
|
||
|
||
"Cyberpunk" throws a spotlight on two other computer fanatics whose
|
||
acts took them over the line of law. One is Kevin Mitnick, an
|
||
obsessive system cracker... The other, West German Hans Hu%"bner,
|
||
attempted to sell information from his Internet trespasses to the
|
||
KGB... Like the Morris story, each is told in a full context that,
|
||
while not justifying criminal acts, goes a long way toward explaining
|
||
them.
|
||
|
||
Though readers who know a modem from a Model T have a head start, the
|
||
authors offer lucid explanations of just enough technology to make the
|
||
stories work, even for the computer illiterate. If the prose
|
||
sometimes seems a bit workmanlike, there's plenty of juicy detail to
|
||
keep the narrative moving. Hafner and Markoff, like the dedicated,
|
||
intense cyberpunks they illuminate, appear to have stopped at nothing
|
||
to hack their way into the cyberpunk subculture.
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 2 Sep 91 13:31:51 CDT
|
||
From: jthomas@well.sf.ca.us
|
||
Subject: File 5--Review of _CYBERPUNK_
|
||
|
||
(Reviewed by Jim Thomas)
|
||
|
||
I'm always suspicious of books highly praised by competent reviewers
|
||
and _Cyberpunk_ (CP) was no exception. Layfolk and professionals
|
||
alike have found it provocative and accurate, and the closest I've seen
|
||
to criticism is Walter Mosely's review in the NYT Book Review (Aug 11,
|
||
p. 15). He calls it "overlong, a bit melodramatic and repetitive,"
|
||
and adds "If you do't know much about the power of computers, what you
|
||
learn here may frighten you." Mosely's cavil is far overshadowed by
|
||
his praise. Discussions with others who had read the volume range from
|
||
favorable to hysterically enthusiastic. Even though I find John Markoff
|
||
to be a consistently competent and incisive journalist, I refused to
|
||
believe that any book can be *that* good. I was wrong. _Cyberpunk_
|
||
*is* that good. The stories are uneven, some potentially helpful
|
||
detail is omitted, and the book is outrageously mistitled. Yet, it
|
||
remains a captivating volume that, once begun, cannot be put down.
|
||
|
||
Hafner and Markoff are story tellers, but their stories are not simply
|
||
about hackers or the computer underground. The tales of each
|
||
character are used as a prism through which to view human fraility,
|
||
excess, and amoralism. Unlike some prosecutorial accounts that have been
|
||
egocentric and judgmental, Hafner and Markoff let their data do the
|
||
talking, and we no longer see "good guys" and "bad guys," but just an
|
||
array of different personalities caught up in their own agendas for
|
||
their own interests.
|
||
|
||
Most readers find the title objectionable, and I am tentatively
|
||
inclined to agree. My dissatisfaction with "_Cyberpunk_" (as a title)
|
||
is mainly that cyberculture simply isn't what the book is about. In
|
||
the BBS culture, cyberpunk reflects a particular style of activity and
|
||
communication, and the trilogy doesn't mirror the culture of such BBSs
|
||
as Demon Roach Underground, Cyberpunk 'zine, the heavy-metal
|
||
influenced youth boards, or the yippie-like anarchists' disregard of
|
||
social convention. To do that, a strong contextualizing chapter would
|
||
have helped, coupled with conceptual links illustrating how each of
|
||
the subjects served as an exemplar for one thread in the cyberpunk
|
||
mosaic. To consider Hafner and Markoff's' subjects as "cyberpunkers"
|
||
expands the meaning of the term such that any member of the computer
|
||
underground could be included within the ambit of techno-outlaw. My
|
||
concern isn't, as it is for some, that the title distorts the meaning
|
||
of the term cyberpunk, an issue over which it is difficult to generate
|
||
much emotion. By contrast, the definition of "hacker" is important
|
||
because of its use by law enforcement to stigmatize and weave
|
||
guild-laden associative rhetorical threads from a rather strained
|
||
syllogism: "Hackers are evil; you are a hacker; ergo..." This was the
|
||
line used in some of the search affidavits and indictments, and the
|
||
terms "cyberpunk" and "hacker" were used interchangeably by some
|
||
prosecutors. As a consequence, the stakes over precise definitions of
|
||
the term "hacker" are much higher than for "cyberpunk."
|
||
|
||
_Cyberpunk_ isn't even about "hackers and outlaws." This objection
|
||
isn't a quibble about the meaning of words, but about matching a title
|
||
to its contents, and the tendency of marketeers to sacrifice "art" to
|
||
enterprise. The fact that the characters are hackers is incidental to
|
||
the primary subject and sub-themes, which include (in my reading) the
|
||
antinomy between new forms of social meanings (eg, definitions of
|
||
crime, ethics), new ways to express one's individuality (computer
|
||
intrusion), and the ways that "newness" transforms basic existential
|
||
dilemmas into (in this case) self-destructive behaviors.
|
||
|
||
The narratives are about real people, and Hafner and Markoff convey
|
||
all characters as complex, a refreshing change from the cartoon
|
||
characters portrayed by law enforcement and most media. The unifying
|
||
thread binding the characters is an amoral fascination for computer
|
||
technology and the ways in which the intrusion caused by this
|
||
fascination disrupt not only computer systems but the lives of those
|
||
involved.
|
||
|
||
The first story of the trilogy, "Kevin: The Dark-Side Hacker,"
|
||
describes the exploits *as well as the lives* of Kevin Mitnick and his
|
||
associates. Mitnick gained national notoriety through his ability to
|
||
break into almost any system by combining technological prowess with
|
||
social engineering (or "conning"), and for his equal inability to
|
||
restrain himself from hacking, which led one California judge to
|
||
revoke his bail because the "pathology" made Mitnick a major "social
|
||
menace."
|
||
|
||
The "dark-side" subtitle may cause some to wince in recognition that
|
||
it seems to sensationalize the deeds of Mitnick & Co. But as the
|
||
narrative evolves, an alternative reading would interpret "dark-side"
|
||
as refering instead to the psyches, not the behavior, of the drama's
|
||
front-stage characters. Roscoe, a talented but errant phreak, is
|
||
depicted as a self-centered and manipulative twit lusted after by
|
||
Susan Thunder, an equally manipulative lanky and unstable run-away who
|
||
moved through a succession of jobs ranging from prostitution to
|
||
computer security with equal facility. Lenny DiCicco, a compulsive
|
||
button pusher and gadget meddler, seemed to lack a strong persona or
|
||
will of his own and was vulnerable to Mitnick's manipulation. He
|
||
ultimately freed himself by betraying Mitnick to the FBI. Finally,
|
||
Mitnick himself appears center-stage as a talented cracker and phreak
|
||
whose obsession with telephone and computer technology provided the
|
||
existence of this fat, troubled youth with some meaning.
|
||
|
||
If one reads _Cyberpunk_ only for the hacking exploits, the pathos of
|
||
these characters will be lost. In most ways that count, they share a
|
||
fatal flaw: None is able to control their passions or to redirect them
|
||
toward less intrusive actions. Kevin, Lenny, and Susan constantly
|
||
display mutual vindictiveness, jealousy, suspicion, insecurity,
|
||
betrayal, and an amazing inability to step back from situations that
|
||
bring each to the brink of existential disaster. These people are
|
||
neither evil nor dangerous. They are pathetic social nuisances unable
|
||
to utilize their own talents or move beyond the cycle of errant
|
||
behavior that characterizes rebels without a cause. The dark side of
|
||
their behavior lies not in the consequences of their "crimes," but in
|
||
their failure to act in their own or society's interests.
|
||
|
||
_Cyberpunk's_ remaining two narratives are competent, informative, and
|
||
detailed, but they lack the rich texture of the first. The second
|
||
tale relates the escapades of Pengo, Peter Carl, Markus Hess, Hagbard,
|
||
and others, whose most notorious exploit was selling relatively
|
||
worthless information and software to the Russians (although the real
|
||
names of Hagbard and Pengo are given in the book, they are generally
|
||
referred to by their handles). The characters range from reasonably
|
||
normal students leading somewhat normal lives to the totally
|
||
whacked-out Hagbard, who believed he was fighting an international
|
||
conspiracy. The group is loosely-knit, with dramatically different
|
||
individual motivations, skills, ideologies, and intents. The group
|
||
named its self-appointed mission "Project Equalizer" because it was
|
||
believed that a balance of political power--and thus world
|
||
peace--could be obtained by technological parity between the
|
||
super-powers. However, despite the name, none of the members appeared
|
||
to have any coherent political sophistication or interests, and one
|
||
can readily believe that it was the "thrill of game" that provided the
|
||
primary motivation. Peter Carl kept the bulk of the modest sum
|
||
provided by the Russians, sharing relatively little with his friends.
|
||
Although Carl is depicted as the most mercenary of the lot, and both
|
||
he and Hagbard needed funds to support their drug habit, the others
|
||
seemed unaffected by the lure of money.
|
||
|
||
These are not "evil hackers," and unlike the Mitnick saga, these
|
||
people, with the exception of Hagbard, are neither pathetic nor
|
||
particularly unusual. Their passions are controlled if misdirected,
|
||
and most seem to lead reasonably normal lives. Their flaw is not
|
||
felonious predations, but gross lack of perspective and judgement.
|
||
They were engaged in behaviors they did not fully understand and of
|
||
which they were unable to see the consequences.
|
||
|
||
The final tale describes the unleashing of the Internet worm by Robert
|
||
Morris. The most matter-of-fact journalistic account of the trilogy,
|
||
Hafner and Markoff depict a bright college student whose primary crime
|
||
was grossly screwing up an intrusive software program. Son of
|
||
brilliant computer scientist Bob Morris, the junior Morris learned
|
||
computers and programming as a child and was fascinated by computer
|
||
bugs that allowed system entry. The Internet worm was the result of
|
||
an attempt to see how many computers he could reach with a software
|
||
program, and was intended to be a harmless network security probe. Due
|
||
to a minor programming error with major consequences, the worm, once
|
||
inside another computer, wildly replicated itself, slowing down and
|
||
filling up systems, and ultimately causing many to crash, some to be
|
||
brought back up only to crash again.
|
||
|
||
The worm itself did not destroy programs or data, but did disrupt
|
||
system use. Morris intended no harm, but the havoc his program created
|
||
grabbed media attention and raised the visibility of hackers. The
|
||
Morris incident flamed the calls for setting punitive examples to
|
||
these social menaces. Hafner and Markoff cite one national computer
|
||
expert who went so far as to incharitably call for an industry-wide
|
||
boycott of any computer company that would hire Morris. But, Morris
|
||
is not depicted as a nasty, dangerous character in need of punishment.
|
||
On the contrary: He comes across as a frightened young man who
|
||
realizes too late the consequences of his act and is terribly
|
||
concerned about it.
|
||
|
||
Of the primary characters in _Cyberpunk_, only Mitnick served prison
|
||
time (one year in a federal prison and mandatory psychiatric
|
||
counselling). DiCicco pled guilty to one felony count and received a
|
||
sentence of 5 years probation, 750 hours of community service, and a
|
||
$12,000 restitution order to Digital. All charges were dropped
|
||
against Pengo, and his attorney negotiated with DEC to avoid a civil
|
||
suit. Hagbard apparently committed suicide by self-immolation in a
|
||
German forest. Peter Carl received two years and a 3,000 mark fine,
|
||
Hess was was sentenced to 20 months with a 10,000 mark fine, but the
|
||
prison sentences were changed to probation. For the worm, Morris
|
||
received three years probation, a $10,000 fine, and 400 hours of
|
||
community service.
|
||
|
||
Perhaps, on reconsidering, _Cyberpunk_ is aptly named after all. John
|
||
Brunner's 1975 _Shockwave Rider_, generally considered the original
|
||
model for the genre, depicted a world in which technological
|
||
information was used to control the masses, and Nickie Haflinger, the
|
||
protagonist/anti-hero, was both outlaw and savior. He used his talents
|
||
cynically and manipulatively until dramatic events added wisdom and
|
||
maturity to his world vision. The cyberpunk characters possess
|
||
knowledge, but not wisdom. Little distinguishes Pengo, Mitnick or
|
||
Susan Thunder from Case, William Gibson's cybernaut in _Neuromancer_.
|
||
They all share social marginality and the amoral cynicism often found
|
||
among bright, alienated youth short on political consciousness and
|
||
vision, but long on passion for techno-thrills. Like the world Bruce
|
||
Stirling portrays in _Islands in the Net_, contemporary society is
|
||
increasingly dominated by those with the ability to control knowledge,
|
||
global boundaries are dissolving, and computer technology is a form of
|
||
oppression.
|
||
|
||
However, in the cyberpunk genre, the protagonists attain salvation by
|
||
turning techno-power against itself through illegal incursions into
|
||
its realm. They challenge the authority of those who control, unleash
|
||
the potentially emancipating power of chaos, and ultimately save the
|
||
world for a presumably brighter tomorrow. In their own way, each of
|
||
Hafner's and Markoff's characters has done the same. Their actions,
|
||
for better or ill, have raised the question of the relationship of
|
||
information control to social welfare, revealed the gap between law
|
||
and a changing society, and, along with numerous others who live on
|
||
the limits of the cybercrest, through their actions have brought to
|
||
center stage the problems that computer technology poses for
|
||
individual rights of speech, privacy, and property.
|
||
|
||
In Eco's _The Name of the Rose_, Brother William stumbles into a
|
||
monastery mystery during an era when entrenched conventional ideas are
|
||
challenged by a renaissance in knowledge. Confronted with the the
|
||
danger of being labelled a heretic, he painstakingly assembles,
|
||
through interviews and documents, images of a diverse community from
|
||
which he can ultimately make sense of the strange events surrounding
|
||
him. Hafner and Markoff do the same: Their matter-of-fact,
|
||
non-judgmental portrayal may seem heretical to some law-and-order
|
||
advocates, but they neither laud nor condemn, but display each
|
||
character in a naturalistic mirror in which we vicariously re-live the
|
||
events. We see Mitnick's transgressions, Lenny's betrayal, and Morris's
|
||
terror just as we experience the pettiness of FBI agent Joe O'Brien's
|
||
mean-spirited insensitivity toward two witnesses and prosecutor Mark
|
||
Rasch's continued mispronunciation of Morris's name as Robert "Tap-in"
|
||
(instead of "Tappan") Morris.
|
||
|
||
The image of hackers permeating _Cyberpunk_ is not one of dangerous
|
||
predators who should be locked up. They are confused, not-yet-mature,
|
||
and insensitive to the issues in which they were involved. Their
|
||
actions were wrong and the consequences unacceptable. But after
|
||
reading Hafner and Markoff, one doubts the value of punishment and
|
||
wonders if, perhaps, part of the problem might not lie not so much in
|
||
individual transgressors, but rather with a social system that has
|
||
sacrificed casuistry on the alter of technology and materialism.
|
||
|
||
_Cyberpunk_ brought to mind the words of the cynical preacher in
|
||
Steinbeck's _Grapes of Wrath_:
|
||
|
||
"There ain't no sin and there ain't no virtue. There' just stuff
|
||
people do. It's all part of the nice, but that's as far as any
|
||
man got a right to say."
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #3.32
|
||
************************************
|
||
|
||
|