Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 04 Issue 61

  



Computer underground Digest Sun Nov 29, 1992 Volume 4 : Issue 61

Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
Archivist: Brendan Kehoe
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Boffo Idolater: Etaion Shrdlu, Junior

CONTENTS, #4.61 (Nov 29, 1992)
File 1--Crackdown on Reality (Review of THE HACKER CRACKDOWN)
File 2--Some thoughts on "The Hacker Crackdown"
File 3--The Hacker Crackdown
File 4--Hacker Crackdown Review
File 5--Remembering the Hacker Crackdown
File 6--Bruce Sterling & Cyberhemian Rhapsodies

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be
contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at:
Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT
libraries; from America Online in the PC Telecom forum under
"computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; in
Europe from the ComNet in Luxembourg BBS (++352) 466893; and using
anonymous FTP on the Internet from ftp.eff.org (192.88.144.4) in
/pub/cud, red.css.itd.umich.edu (141.211.182.91) in /cud, halcyon.com
(192.135.191.2) in /pub/mirror/cud, and ftp.ee.mu.oz.au (128.250.77.2)
in /pub/text/CuD.
European readers can access the ftp site at: nic.funet.fi pub/doc/cud.
Back issues also may be obtained from the mail
server at mailserv@batpad.lgb.ca.us.
European distributor: ComNet in Luxembourg BBS (++352) 466893.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Some authors do copyright their material, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

----------------------------------------------------------------------

Date: Tue, 6 Oct 92 19:55:56 MDT
From: ahawks@NYX.CS.DU.EDU(gogo is insane)
Subject: File 1--Crackdown on Reality (Review of THE HACKER CRACKDOWN)


CRACKING DOWN ON REALITY

A review of Bruce Sterling's THE HACKER CRACKDOWN:
LAW AND DISORDER ON THE ELECTRONIC FRONTIER

by Andy Hawks (ahawks@nyx.cs.du.edu)


THE HACKER CRACKDOWN:
LAW AND DISORDER ON THE ELECTRONIC FRONTIER
by Bruce Sterling
Bantam Books, 1992
Non-fiction, 328 pp., $23 (hard-cover)
ISBN 0-553-08058-X

My eyeballs are squirming. Squirming out of their sockets.
Wanna know why? Ok, I'll tell you, but be warned - it is not a
pleasant experience to have your eyeballs squirm.

"Theoretically, the task force had a perfect legal right to
raid any of these people, and legally < could have seized
the machines of anybody who < subscribed to Phrack." <

Well, I told you so. You can't say I didn't warn you. And, by
the way, please stop looking at me while your eyeballs are squirming.

There is no doubt in my mind that T.S. Eliot was reading Bruce
Sterling's new non-fiction book entitled THE HACKER CRACKDOWN: LAW
AND DISORDER ON THE ELECTRONIC FRONTIER when he said "Human kind Can
not bear very much reality." No doubt, no doubt.

I subscribe to Phrack, and I'm sure many of you do as well, or
have at least pondered and wandered your way through an issue or two
if you have even any remote connection to the cyberspace underground.
In case you're lost, I'll fill you in. Phrack is a magazine, but you
can't buy it at your local newsstand. Phrack might be considered in
some circles to be the keystone of what we commonly call the computer
underground - that dark, mysterious, anarchistic domain of rebellion
occupied by a stereotypically benign group of goggled white faces, 140
IQs, and Mt. Dew addicts - the hacker. Phrack is also one of the many
landmarks Bruce Sterling points out on his wonderfully lucid trip
through this unreal domain dominated by fear, greed, and power.

Knowledge is power. Information is knowledge. Information wants
to be free. Such is the ethos of the hacker. And thus we have laid
out before us the battleground upon which an incredible struggle of
superegos is waged. On the one hand we have the computer hacker, the
teenage boy with a heightened sense of curiosity and the initiative
enough to take some action to satisfy this incredible hunger. On the
other end of the keyboard we have the government, the CEOs, the powers
that be.

Computer hacking is just another example of social deviance,
rebellion, and a desire to make one's reality fit one's personal
wishes and desires. This is natural. Yet somewhere along the line,
this natural tendency to rebel took on new meaning, acquired a scope
of infinite importance, and was thrust into a world where the ability
to obtain immense power via hacking was real, concrete, and
threatening.

It is this deviance and rebellion that Bruce Sterling shows us in
THE HACKER CRACKDOWN. Hackers are not an easy thing to explain mind
you, and to delve into the world of the computer underground is to
find one's self in a surreal painting filled with confusion and delusion
concerning the basic moral, ethical, legal, and philosophical
questions that plague modern society - the information society.

It has been attempted before. Cliff Stoll, whom I liken to
"Sherlock Holmes on acid living in Berkeley" because of his extremely
inventive and non-conventional line of thought, has shown us the
computer underground via his first-hand encounters with "the other
side" and asks himself who "the other side" really is. Cliff Stoll's
THE CUCKOO'S EGG is rich in adventure and "car-chases in cyberspace",
yet it fails at even attempting to put "the hacker problem" in
perspective. In retrospect, the egg is fried. (But fried eggs,
though not the most wonderfully healthy breakfast choice, are still
tasty).

On the other hand, we have Steven Levy and his classic among the
computer literate, HACKERS. Yet in the constantly changing
technocratic society we seem to reside in, Levy may be found sitting
out on the porchbench, telling his grandson who has just hacked into
Bellcore, "Why, in my day, you wouldn't be a hacker, you'd simply be a
criminal! In my day, we didn't want to free information, we wanted to
create information! Now go away, ya bastard kid....", as he mumbles
off into the sunset. Levy's book is certainly a necessary part of the
hacker tradition, but it's just that - tradition. Levy seems to fail
to acknowledge, let alone accept, the *evolution* of the hacker spirit
as relevant to today's world. Levy and his followers are the system
administrators found on countless virtual communities arguing for the
term 'cracker' to describe today's 'hacker', saying that today's
'cracker' is not worthy of the term hacker since they lack in
innovation and excel at regurgitating. Well, all I would have to say
to that is read Sterling's THE HACKER CRACKDOWN.

Then we have a more recent contribution to the book of myths and
facts surrounding hackers, CYBERPUNK: OUTLAWS AND HACKERS ON THE
COMPUTER FRONTIER by Katie Hafner and John Markoff. Now, cyberpunk!
There's a word! In the similarly titled HACKER CRACKDOWN, Bruce
Sterling, commonly considered to be the co-creator of the cyberpunk
literary genre along with his pal William Gibson, addresses the
evolution and transformation of the word he helped create - cyberpunk
- from a fictional character to a reality hacker. CYBERPUNK by Hafner
& Markoff is unique in that it takes three very real, very human
people and attempts to turn them into post-modern science-fictional
characters, such as Case in William Gibson's legendary NEUROMANCER.
Throwing "cyberpunk" for all it's literary and cultural significance
into the realm of the computer underground greatly twists its
landscape, contorts the stereotypes, and leads us into the
near/now-future future with a trippy view of "things to come".

And then of course came the crackdown. We have myth, we have
legend, we have history, and we have entertainment, but until now, the
literary accounts of the computer underground have lacked clear focus,
cultural significance, and unbiased sociological and psychological
viewpoints. Bruce Sterling cracks down on the post-modern realities
of a world based around curiosity and a need for information.

For what it's worth let me say that after having read a few of
Sterling's accounts about writing this book (featured in various
publications such as Electronic Frontier Foundation newsletters and
e-magazines, Steve Brown's wonderful Science Fiction Eye magazine
to which Bruce Sterling contributes regularly, and various other
resources), my opinions of Mr. Sterling are very enthusiastic. For a
long time I have admired Bruce Sterling for his wonderful and integral
contributions to the cyberpunk literary genre of science fiction.
Let's face it, his MIRRORSHADES anthology helped revolutionize the
otherwise complacent and all-too-familiar world of science fiction. I
am a humungous fan of literary cyberpunk and some of Sterling's books
hold a high place on my bookshelf, next to many literary classics. I
have always thought of William Gibson and Bruce Sterling as men of a
truly amazing vision, and with his first non-fiction work, THE HACKER
CRACKDOWN, Bruce Sterling extends that vision into a phenomena of our
society very analogous to the societies proposed in cyberpunk fiction.

In THE HACKER CRACKDOWN, Sterling acts less as social critic and
more of social observer. Rather than spew forth opinions regarding
hackers that we've all heard ad nauseam, he puts everything regarding
the hacker underground into perspective. Basically, he makes sense of
those events in the underground that previously resulted only in
head-scratching confusion. From Abbie Hoffman to the U.S. Secret
Service, from AT&T to LoD, from the WELL to the courtroom, from the
dawn of cyberspace to Terminus, Bruce Sterling provides the reader
with a firm grasp of the events that are shaping our world and that
will have an incredible influence on the emerging information society
of the twenty-first century.

Included in the book is almost every event you could deem even
remotely significant to the hurricane instability of cyberspace: the
genesis and evolution of cyberspace from the telegraph to
globally-linked real-time virtual communities, the AT&T crash on
Martin Luther King Day in 1990, Abbie Hoffman and YIPL/TAP, BBSes and
text philes (phreak/hack/anarchy/credit-card fraud/etc.), the hacker
"elite" of the mid 80's, the various Legion of Doom activities and
cases, the E991/Phrack case, Operation Sundevil, Steve Jackson Games,
RPGs, cyberpunk fiction, the U.S. Secret Service, the Electronic
Frontier Foundation, the WELL, the Grateful Dead, Phiber Optik and
Acid Phreak, Craig Neidorf, Shadowhack, NuPrometheus League, the
Atlanta Three, Mentor, Phoenix Project, Metal Shop, Pirate's Cove,
Computers Freedom and Privacy, and civil liberties. It's all here.

Aside from the extreme volume of information that's bound to
impress even the most comprehensively informed hacker, Sterling,
throughout THE HACKER CRACKDOWN and in other statements he's made,
subliminally asks some vital questions about the ethics, morality, and
philosophies behind the very idea of cyberspace, forcing the reader to
(God forbid) *think* about the events in cyberspace in the last
decade, to think about the creation and evolution of this surreal
civilization. Bruce Sterling destroys the myths and presents the
facts. All the facts. To quote U2 THE HACKER CRACKDOWN is "even
better than the real thing."

Bruce Sterling, at least for now, wins the prize. THE HACKER
CRACKDOWN, in this reader's view, is the definitive word on
cyberspace. I'd like to read it again, but my eyes are still
squirming. But on second thought, having your eyes squirm around in
your brain is a small price to pay for reading THE HACKER CRACKDOWN.

------------------------------

Date: Sun, 1 Nov 92 14:06:05 CST
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
Subject: File 2--Some thoughts on "The Hacker Crackdown"

My first exposure to Bruce Sterling's book "The Hacker Crackdown" was
a draft of the second chapter. I read it, and found at the end that I
could not warm to the self-important tone of the crackers and
prosecutors who were its subject. Names and pseudonyms... These
people hadn't a straight word to say.

The book is out now. I saw my first copy in a book store here in
Austin. I saw my name in the index. I did not throw the book across
the store in dismay at seeing my name in print... It was a close
thing, though. Having read it twice now, I find that I liked the book
more than I expected to after reading that early chapter.

If you've been reading Computer underground Digest for awhile, you may
find the second and fourth chapters to be old news. Skip to the third
chapter... "Law and Order". Here Sterling warms to his subject, and
I found myself wondering if his fascination with the computer cops
stems from their physical presence... An interesting position for an
author writing about goings-on in a virtual community to be in.
Certainly there is more detail for a writer here: A physical place, a
sense of community... All the things that don't exist in a world
defined by the boundaries of a CRT screen.

I'd really like to see this book re-done as hypertext. The sometimes
awkward bridges that Sterling constructs to get the reader across
topical or temporal chasms could then be left out.

Bob

------------------------------

Date: Tue, 10 Nov 92 15:01:36 EST
From: Rich=Gautier%SETA%DRC@S1.DRC.COM
Subject: File 3--The Hacker Crackdown

Amen!

Every hacker/phreak, law enforcement weenie, security professional,
law maker, (and probably a whole bunch of other people!) should be
FORCED to read this latest book.

"The Hacker Crackdown" by Bruce Sterling is an IMPRESSIVE overview of
everything from cops to bad guys to civil liberty workers in the never
ending battlefield of cyberspace. Right after the author forgives
himself for using the word 'HACKER' in the title, the book grabs your
attention, and it doesn't let go at all.

The book provides the reader with a sociological, historical and
analytical view from one of the most revered men in cyberspace, Bruce
Sterling. His insights will have you, too, saying "Amen!" to at least
some of what he has to say in this book. It should provide
interesting reading to all audiences on both (all three) sides of the
battlefield in the never ending war for power and control in the area
of computer and telephone security. He starts the book out with a
history of the system itself. It doesn't bore you like you thought it
would, and suddenly you are gripped by the history of the underground,
the digital underground.

This chapter alone could make the book worthwhile. For hackers, it
would be a fun look back into the good ole days. For security folks,
it is a great peek into the views and sociological drive of the
underground enemy. It also covers the history of Operation Sundevil,
and all the unpleasantness that seems to have followed. This part of
the book will take you, in Clifford Stoll-like style (wonder if this
is where he picked up his writing style). One long stream of data
later, and you're into the next section of the book, "Law and Order".

If you aren't one of the people pictured herein, you may find yourself
learning a great deal more than you hoped. Only someone with ties to
both sides of this great battle could bring the insight that is so
needed here. Although I preferred the first two sections of the book,
I actually found myself liking to find out what the real drive of the
"money-hungry prosecution" was.

The last part of the book, I guess you could call the END RESULT of
the whole history lesson in the first three parts of the book. Civil
Liberty as an ACTUAL issue. Even the hackers, (excuse the term)
should be glad that some of the things they have been screaming about
for YEARS, actually have a public voice now. This section also
includes the famous Phrack with the edited E911 document in it. (Just
in case you missed it).

All in all, a good buy...I highly recommend it. I read it from my
Public Library, and I intend to go out and buy me my own personal copy
as soon as I can.

------------------------------

Date: 9 Nov 1992 16:57:51 U
From: "Steve" <copold@SMTPGATE.TECHRSCS.PANAM.EDU>
Subject: File 4--Hacker Crackdown Review

That "truth is often stranger than fiction" is a time worn and often
over-used cliche. If anyone has ever doubted its veracity, however,
all they need do to confirm the accuracy of the phrase is read _The
Hacker Crackdown_ by Bruce Sterling. It's probably a wise marketing
decision that the book is being hawked as Sterling's first volume of
non-fiction. Even the likes of a Clancy or a Le Carre would gasp in
disbelief at many of the twists and turns in this complex tale.

As a part-time dweller in cyberspace, one learns to expect the
unexpected. It is all too easy to assume that you really have a handle
on what is happening in, as Sterling calls it, "the un-real estate" of
the networks. In that regard, _Hacker Crackdown_ can do serious damage
to one's ego. When I read the teasers on the book's jacket, I actually
laughed when I got to the quote from Lex Luthor, "I learned a lot from
this book that I didn't know." Having read quite a few of Lex's
postings on MindVox, I assumed that this was a touch of hacker humor
that the publisher had bought into. Little did I know how much I was
about to learn from _The Hacker Crackdown_.

Having been involved, at one level or another, in the electronic
information business all of my adult life, and after hanging out on
the nets for the past few years, I had, however foolishly, come to
consider myself as being relatively "clued." Even though I regularly
communicate with a number of the people written about in the book, I
found that I only knew bits and pieces of the story. And to compound
my arrogant assumption, most of what I did know was woefully
incomplete and often could not be linked to the other parts of the
whole. In this sense, _Hacker Crackdown_ was a genuine wake-up call.
It can be a rude awakening to spend a pleasant weekend having a really
enjoyable read only to find out that you're actually just another
"clueless computer geek."

Make no mistake, _The Hacker Crackdown_ is a terrific read, but beyond
that it is the product of a determined effort by Sterling to report in
an organized and coherent fashion the most confounding, bewildering,
and downright puzzling collection of rumors and facts imaginable. To
make his task even more challenging, he found himself dealing with an
equally unstable collection of subjects that ranged from socially
maladjusted hackers and phone phreaks, to the paranoid fringes of law
enforcement, to the "Big Brother" attitudes and often ham-fisted
behavior of corporations that deal in information...No small task to
be sure! In this effort he not only succeeds, but succeeds
brilliantly.

In telling the story of the crackdown, Sterling leads us from event to
event while maintaining an understandable chronology. Many of the
principle offenses and incidents that occur in this incredibly complex
chain of happenings are separated by months and, in some cases, more
than a year. If there is an aspect of the book that makes it a
challenge, it is in gaining a true grasp on the actual sequence of
events as they relate to the various elements of the bigger picture of
cyberspace circa 1990-1991. It is, in fact, a tangled morass that is
at best difficult to follow even with Sterling acting as guide and
pathfinder. If there is a side of _The Hacker Crackdown_ that will
ultimately slow its distribution, it is that it could prove to be near
inaccessable for the uninitiated.

Having said that, let me point to what is in my opinion the best that
_Hacker Crackdown_ offers the reader. Referring to the subjects of the
book (all of them...not just the hackers) as a strange and diverse
group may be the biggest understatement I'll put in print this year.
They are, in fact, almost incomprehensible to those who live, for lack
of a better term, within the accepted social norms. Sterling has
accomplished what megabytes of e-mail and hours of conversation had
not managed to do...He has given these characters a human face.
Somewhere in the middle of this highly technical narrative, a great
number of these folks ceased being handles on a node and started
taking on a form...a very human form.

It would be impossible to mention them all in a short review, so I'll
make examples of just a few. Perhaps the most glaring of these is
Terminus. He's a regular contributor on MindVox, and has become good
friends with a mutual acquaintance. As a result of this, I've had the
chance to hear a lot of what he has to say. I think I had prejudged
Terminus, because he had been unfortunate enough to have been caught
and prosecuted. In _Hacker Crackdown_ we are made privy to a side of
Terminus that just doesn't register in e-mail or in his postings on
Vox. Although it is made clear that he probably committed
transgressions, it is also equally clear that he is not evil, that he
bore no malice toward anyone, and that he certainly should not have
gone to prison. Granted that is a personal judgment, but it is one
that rises from the picture of Terminus painted by Sterling. Whether
Sterling feels that way or not is immaterial as his writing left me,
the reader, with that conviction.

Not all of the creatures that arose from the printed page were as
pleasant as Terminus. The best example of this is Emmanuel Goldstein.
Another early contributor to Vox and the publisher of 2600, Emmanuel
Goldstein has always been a highly enigmatic figure. Sterling's
portrait of Goldstein appears to be brutally honest. To put it
politely, it is an image of an individual that you would not want to
have for a next-door neighbor. To be fair to Emmanuel, there are not
many that are mentioned in _The Hacker Crackdown_, including the Feds
that would be high on my list of desireable neighbors.

Then there is Gail Thackeray...Recipient of endless name-calling in
hacker chatter. Yet, the Gail Thackeray we meet in _Hacker Crackdown_
is a sympathetic persona that I found very likeable. If she has a
fault, as Sterling draws her, it is her obsessive nature and her need
for results...two very hacker-like qualities. The more I read, the
more I found myself thinking, "Hey, this is a person I would hire in a
minute!" Suddenly, the hated Gail Thackeray had be come someone I
could admire and probably call friend. (Let's do lunch Gail!)

The last person I wish to mention, but certainly not the least
significant, is the homeless man in Phoenix. Sterling paints him as an
icon of the future-disenfranchised. Whether he is addressing some
looming caste-based society where only those that have one foot in
cyberspace and the other in the real world will emerge pre-eminent
must be addressed by the individual reader. It is, however, a truly
chilling scene he draws of his encounter with this lost soul set
against the steel and glass backdrop of modern Phoenix. Although
Phoenix just happened to be where the chance meeting occurred, it is
ironic that the information society may have to rise from the ashes as
did the bird of legend. Bruce Sterling - Prophet of Doom - I doubt it,
but it is food for thought.

------------------------------

Date: Tue, 17 Oct 92 21:30:20 CDT
From: Jim Thomas <cudigest@mindox.phantom.com>
Subject: File 5--Remembering the Hacker Crackdown

Sheldon Zenner, the defense attorney for Craig Neidorf in the June,
1990 "Phrack" trial, began and ended his opening comments with a
reminder that wisdom often accompanies reflection on past mistakes:

MR ZENNER: What I would have written on there if I could is
something I got in a fortune cookie that said:

"To remember is to understand".

I have never forgotten that. To remember what it was to be a
struggling lawyer makes a good judge. To remember what it was to
be a student makes a good teacher. To remember what it was to be
a child makes a good parent.
*************
To remember is to understand. To remember what it's like to be
14, or 15, or 16, or 17, or 18, or 19. To remember what it's
like to do some stupid things. But stupid things, doing stupid
things isn't illegal...and a good thing for all of us, I
suspect.

Recent allegations that the U.S. Secret Service has been involved in
disruption of public gatherings, surveillance of private citizens
beyond the scope of their authority, and perhaps disseminating
information to employers of those surveilled, suggests that some
agents have forgotten the lessons of Sun Devil, of restrictions on
covert surveillance common during the 1960s, and of resistance to
abuses of government authority. To remember that Constitutional
protections extend to cyberspace is to understand that freedom should
be protected, not subverted, by some over-zealous law enforcement
agents.

In The Hacker Crackdown (THC), science fiction writer Bruce Sterling
(Islands in the Net, co-author of The Difference Engine) forces us to
remember, to remember so that we understand. Drawing from interviews
with hackers and law enforcement officials, participation in the
activities of each, and available documents, Sterling pulls together a
concise summary of the context and the events of the U.S. Secret
Service (USSS) "hacker raids" of early 1990. For both the "hacker"
community and law enforcement, the crackdowns represented a coming of
age. Both sides won a little and lost a little, and both sides were
responsible for helping shed a little more light on the nature of
cyberspace and the responsibilities and rights of those within it.
Sterling refreshes our collective memories and provides new insights
and understandings.

The losses of the indiscriminate "hacker crackdown" of the 1990s
exemplified by the "Bill Cook cases" of Phrack and Len Rose and by
Operation Sun Devil, have not been calculated: Lost equipment,
attorney fees, lost time, lost revenues, embarrassment and loss of
credibility for some prosecutors and the US Secret Service (not to
mention the potential losses to taxpayers if the Steve Jackson suit
against them is successful), delay of publication of Steve Jackson's
GURPS, needless drain on federal resources and taxpayer dollars, and
emotional and psychological anguish, computer users raided with no
subsequent indictments, and lives shattered. All this resulted in
relatively small pay-off of a few minor guilty pleas raise the
question: WAS THE HACKER CRACKDOWN worth it? My reading of THC
suggests that the answer is a complex "yes." Part of the inevitable
process of establishing and protecting rights lies in the continuous
struggle against abuses. Struggles over rights reflect the social
tension between freedom and control and helps shape the boundaries of
responsibility, the limits of public and government behavior, and the
form and content of what is to be protected and how. The government
crackdown on hackers can be seen as part of this process. Sterling
attempts to show the complexity of this struggle.

_The Hacker Crackdown_ provides a comprehensive background of the
events of 1990 that most in the computer community consider a fiasco.
Sterling avoids taking sides as he describes the context of
technological and social changes underlying the "hacker" phenomenon
and law enforcement responses to. His depictions of the participants
are sometimes flattering, other times not, and he attempts to depict
the subjective and human element that guides adversaries and others in
the pursuit of their goals. Most law enforcement agents, Sterling
reminds us, are dedicated and competent. Others are less so, and some
are simply incompetent. Likewise, some "hackers" are criminals, some
are simply curious while others are obnoxious delinquents, and a few,
such as 2600's Emmanuel Goldstein, are best understood as dissidents
in the tradition of European gadflies who tweak authority.

Those in the computer community tend to see law enforcement and
telecommunications security personnel in the same one-dimensional
cartoon stereotypes as those agents perceive the "criminals" they
chase. One of the subtlest and most pernicious consequences of the
anti-hacker images is the creation of myths, misunderstanding, and
fear of those who display considerable techno-competence. An equally
inaccurate image is the view held by many in the computer community
all law enforcement agents are techno-illiterate, ill-intentioned, and
fail to understand the computer culture. There is sufficient evidence
that both sides have cause for their views. However, as Sterling
cogently illustrates, both views are simplistic and belie the reality
of complex and sometimes confused agendas, generally well-intended
actions gone awry, and legitimate misunderstandings arising that cloud
the perceptions and actions of all parties. One value of Sterling's
tome is its attempt to lay bare these intricacies of motive and
action.

Fear of the unknown is a subtle theme in Sterling's interpretation of
law enforcement responses to "hackers." Buried in the middle of the
volume (pp. 188-191), Sterling shares his encounter with a large
homeless man whose contact with reality was suspect. From this
encounter, he realizes the intertwining of fear and surprise, and how
both shape our perception of "what's going on." This provides the
central metaphor for THC: Lack of understanding contributes to fear,
and fear leads to excess.

Sterling begins with a helpful summary of the history of the telephone
system from its earliest days of implemention and marketing battles
through the emergence of AT&T as the primary telephony corporate
monolith. Sterling reminds readers that today's hackers had their
counterpart in earlier explorers and mischief-makers, and he suggests
that all that is currently new is the technology by which contemporary
techophiles operate. By providing a social context for "hacking,"
Sterling removes the techno-mystique surrounding it. After all, he
reminds us, when the telephone was first introduced, it inspired fear
amongst some, was seen as limited in scope, and the technology was
understood by few. And even the Futurians, a group of famous science
fiction writings in New York in the 1930s, felt the power of the USSS
when their wackyness was suspected by neighbors as masking a
counterfeiting ring. To remember the history of technology and its
relationship to law enforcement is to understand, and understanding
reduces our fear of the unknown.

>From THC, we understand that most hackers are little more than
curious, white, middle-class teenagers with considerable computer
proficiency. We learn that Gail Thackeray, considered the mastermind
behind Sun Devil, is just a normal person and, behind the scenes,
attempted to bring an awareness of Constitutional rights to law
enforcement agents. We learn that the USSS is comprised of
technologically competent people, but none of them seemed present or
involved in Sun Devil or the Bill Cook incidents. We learn the
background behind the formation of EFF, we are reminded of forgotten
Sun Devil victims such as Charlie Boykin and Rich Andrews and others
who were caught up in the crackdown, and we are reminded that Craig
Neidorf's success in his trial was the result of numerous backstage
players, including John Nagle (who discovered the public nature of the
supposedly confidential documents Neidorf was accused of reprinting)
and Dorothy Denning, a computer security expert. Readers of CuD or
EFFector Online will find little new information in THC. This is of no
consequence. The major contribution of THC is that it places events
in chronological order and provides a unifying theme not possible when
information leaks out sporadically. Sterling crafts the individual
tiles into a rich mosaic that depicts the primary actors and events
that eventually brought them together in the crackdowns. Sterling
helps us to remember in order that we understand.

In any work, one can find points to criticize, and although the
quibbles one might have with THC are minor and in no way detract from
the significance, they do suggest strategies for a paperback re-write.
These include a few minor factual discrepancies (indicating in one
passage that Sun Devil occured on May 9, and in another on May 8); An
occasional tendency to engage in seemingly gratuitous attention to
secondary topics such as a long account of The Well public access
system; an over-long discussion of the proficiency of the Secret
Service that digresses needlessly; and far too much significance given
to the role of the Martin Luther Day AT&T crash as a catalyst in the
crackdowns. Some "hackers" also took minor issue with some of the
technical details, such as referring on occasion to "switching
stations" ("there's no such thing," said one). However, some of the
digressions work: Sterling's account of his own serendipitous attempt
at "trashing" (mucking through others' trash in search of useful
information) provides a poignant and vicarious experience for the
reader as Sterling reconstructs a series of letters written by a woman
to her former boyfriend.

The 35,000 copies of first printing of THC are virtually gone,
suggesting a second, smaller, printing will follow. Presumably the
eventual paperback version will allow for revisions that might include
the following: Sterling's journey through the events of the crackdown
is limited to 1990. An epilogue would be helpful. It would also be
valuable to make more visible the many other nameless individuals who
were raided and never indicted as a way of making more clear the
extent and futility of the operations. And, one glaring void struck
CuD editors: Cu Digest receives just a passing reference in a quote
from a law enforcement agent. CuD was, after all, a direct result of
the Phrack and Len Rose cases, and it was a primary source of news for
many during those events, and it made available trial transcripts,
documents, and detailed the USSS's use of an informant in the Sun
Devil operation.

These cavils aside, Sterling's ambitious attempt at the re-creation of
Sun Devil events is successful. In emphasizing the emergence of the
"civil libertarians" from the chaos of the crackdown, he reminds us
that the struggle for rights is as long as history, and that to see
the crackdown as little more than law enforcement excess is to fail to
understand its significance. Sterling's balanced discourse does not
provide the reader with answers, but in demanding that we remember, he
prompts us to greater understanding.

The central message of The Hacker Crackdown may be summarized by
Sterling's experience with the homeless Stanley, and the message
should be read carefully by all sides:

In retrospect, it astonishes me to realize how quickly
poor Stanley became a perceived threat. Surprise and fear
are closely allied feelings. And the world of computing is
full of surprises...To know Stanely is to know his demon.
If you know the other guy's demon, then maybe you'll come
to know some of your own. You'll be able to separate
reality from illusion. And then you won't do your cause,
and yourself, more harm than good (pp 190, 191).

*******************

After the above was written, allegations that the Secret Service may
have been instrumental in breaking up a 2600 meeting in Washington,
D.C. have emerged. If they prove to be true, it suggests that a new
chapter to THC might be written to address the failure of some law
enforcement agents to remember or to understand. If the allegations
are true, perhaps a witch-hunting metaphor might be more appropriate
to describe the attitude of some federal agents' views of hackers.
Sterling makes one crucial point in his book worth emphasizing: The
emergence of the "civil libertarians" from the events of 1990 was the
result of a number of individuals and groups joining together out of a
dedication for civil liberties. The current activities of these
groups--such as the Electronic Frontier Foundation (EFF) and Computer
Professionals for Social Responsibility (CPSR)--are part of the legacy
of Sun Devil. Supporting these and similar groups is one way to
protect against those few agents who fail to understand that the
electronic frontier, like the rest of society, is subject to
Constitutional protections and not a frontier town where a few
gun-slingers can take the law into their own hands.

------------------------------

Date: Sat, 3 Oct 92 05:29:48 GMT
From: ahawks@nyx.cs.du.edu (scooby dooby doo)
Subject: File 6--Bruce Sterling & Cyberhemian Rhapsodies

"What a Long, Strange Trip It's Been", the all-too familiar
statement by the Grateful Dead, has probably been heard countless
times in the echoes of cyberspace. Probably moreso than in any other
forum aside from Classic-Rock radio stations, and this is no accident.

Cyberspace has indeed been a long, strange trip, but more
appropriately we might rephrase the statement to read "what a long
strange trip it's going to be if we don't take a step back and look at
ourselves, damnit."

Bruce Sterling, noted cyberpunk author and purveyor of sociological
possible futures and realities, has begun to take that step back, as
evident in his recent contribution to SF Eye #10, also appearing in
EFFector OnLine #3.06. He writes passionately about the current
states of cyber-realities, about where we seem to be headed, his
contributions and role in the whole grand scheme of things, and all
within the deeply moving realm of Sterling's philosophical mind where
moral questions remain unresolved about all these issues.

And well they should. Cyberspace, bohemia that it is, is still
fairly analogous to any other notable social movement in history. In
one area of the movement, you have the deeply frightening individuals
who proclaim to have all the answers. On the other end of the
spectrum you have, in this case the "cyberpunk" hackers, those
individuals basically saying "fuck the answers and fuck the
questions". Rarely, though, do you find those individuals in the
midst of the movement willing to step back and say "what's it all
about....what kind of trip are we on, anyways?"

This is what Sterling has done in the article, basically presenting
on paper (or monitor) philosophical questions applicable to any
society:

"What is a 'crime'? What is a moral offense? What actions are evil
and dishonorable?"

Obviously, if a society does not answer these questions, if it does
not agree upon (at least to some basic extent) these issues, the
society will die. It is my impression that Mr. Sterling is saying:
'We, the residents of cyberspace, whether we liken ourselves as punks,
hackers, hippies, administrators, frontiersman, virus writers,
programmers, information freaks, our simply by-standers, we are all
residents of a very large community. We coexist fairly complacently,
yet we coexist without the degree of self-analysis and self-criticism
present in most other successful societies.'

Now, of course this is my interpretation of the article, and in fact
I'm probably off in my own little corner of this reality, but, suffice
to say, whether or not this was Sterling's intent, these are facts we
must face up to.

Bruce Sterling has been fairly outspoken on the question of
information as commodity, and the idea of knowledge as power. What
we, the citizens of cyberspace, fail to realize is that we as a
collective group have the means of storing, analyzing, regurgitating
more information than ever before. Thus, we should be the richest,
most powerful community in the world. But of course, being a *fairly*
democratic reality, whoever might wish to obtain this power is struck
down by the opposite extreme. Ie: Joe Hacker consciously or
unconsciously believes he has power via his skills at penetrating
information until he is taken off to jail by Ms. S.S. Agent. Ms. S.
S. Agent believes she has power until the hacker community strikes
back at her individualy, or grows to the point where their values and
morals infiltrate the norms of the cyber-society to the point where
they are acceptable to some degree. And so, the debate rages back and
forth constantly, to no end. One of the victims is information.

Bruce Sterling wrote a little note to me in his wonderful collection
of short stories, _Globalhead_, that says "Information *wants* to be
free". Information is the battleground upon which we, the entire
cyberspace student body, wage our war. Sterling writes that he is
distrustful of a society that seeks to control, encrypt, restrict
information, likening the results to building a sand castle. What a
wonderful metaphor, since on the surface the fortress we have created
seems impenetrable, yet it quickly crumbles under its own weight when
the uncontrollable forces of nature have their way. Information is
infinite in scope. It has no end, thus there is no possible way a
society can really control information to any degree of success.
Certain information can not be used as commodity, for, as I believe
Bruce Sterling has himself stated before, if I give you information, I
am not really losing anything, but you are gaining. In monetary
terms, it's like giving someone a $20 bill and somehow keeping the
bill for yourself. Thus, information is infinite and would quickly
devalue in a world where it is abundant.

In our society, we do not realize the abundance of information.
Each new day, new resources are available to receive various types
information at a relatively low cost: new television stations,
newspapers, magazines, radio stations, underground zines, BBSes, FTP
sites, Usenet newsgroups....

When the majority of the inhabitants of the entire global virtual
community realize this, we can begin to step forward back into the
realm of cyberspace. We will have analyzed "the hacker problem", seen
it as a necessary subset of our new society, and to accept it, not
criticize it, for what it is. We will have set forth standards of
behavior, folkways and mores, manifestos and constitutions, applicable
to a society of the future, the society of the infinite realm of
cyberspace.

There is no doubt in my mind that the civilization of cyberspace is
going to be a long, strange trip. It already has been, and it will
continue to be. As it stands now, there are few worthy pieces of
e-literature we can look to as timeless watermarks of this infant
realm, but I would certainly have to place Bruce Sterling's
contributions as integral to the healthy development of this society.

------------------------------

End of Computer Underground Digest #4.61
************************************




← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT