<<

THE CRACKDOWN

Law and Disorder on the Electronic Frontier

Texinfo Edition

February

by Bruce Sterling

Literary Freeware Not for Commercial Use

c

Copyright Bruce Sterling bruceswellsfcaus

This is Texinfo edition as of January

created by Jorg Heitkotter jokelsinformatikunidortmundde

The original plain ASCI I les are available electronically by

Gopher from ticcom

Permission is granted to make and distribute verbatim copies of this b o oklet provided the copyright

notice and this p ermission notice are preserved on all copies

Preface to the Electronic Release

Preface to the Electronic Release

January Austin Texas

Hi Im Bruce Sterling the author of this electronic b o ok

Out in the traditional world of print is ISBN X and is

formally catalogued by the Library of Congress as Computer crimes United States

Telephone United States Corrupt practices Programming Electronic computers United

States Corrupt practices Corrupt practices I always get a kick out of that description

Librarians are very ingenious p eople

The pap erback is ISBN X If you go and buy a print version of The Hacker Crack

down an action I encourage heartily you may notice that in the front of the b o ok b eneath the

c

copyright notice Copyright by Bruce Sterling it has this little blo ck of printed legal

b oilerplate from the publisher It says and I quote

No part of this b o ok may b e repro duced or transmitted in any form or by any means electronic

or mechanical including photo copying recording or by any information storage and retrieval sys

tem without p ermission in writing from the publisher For information address Bantam Bo oks

This is a pretty go o d disclaimer as such disclaimers go I collect intellectualprop erty dis

claimers and Ive seen dozens of them and this one is at least pretty straightforward In this

narrow and particular case however it isnt quite accurate Bantam Bo oks puts that disclaimer

on every b o ok they publish but Bantam Bo oks do es not in fact own the electronic rights to this

b o ok I do b ecause of certain extensive contract maneuverings my agent and I went through b e

fore this b o ok was written I want to give those electronic publishing rights away through certain

notforprot channels and Ive convinced Bantam that this is a go o d idea

Since Bantam has seen t to p eacably agree to this scheme of mine Bantam Bo oks is not going

to fuss ab out this Provided you dont try to sell the b o ok they are not going to b other you for

what you do with the electronic copy of this b o ok If you want to check this out p ersonally you can

ask them theyre at Broadway NY NY However if you were so fo olish as to print this

b o ok and start retailing it for money in violation of my copyright and the commercial interests of

Bantam Bo oks then Bantam a part of the gigantic Bertelsmann multinational publishing combine

would roust some of their heavyduty attorneys out of hib ernation and crush you like a bug This

is only to b e exp ected I didnt write this b o ok so that you could make money out of it If anyb o dy

is gonna make money out of this b o ok its gonna b e me and my publisher

My publisher deserves to make money out of this b o ok Not only did the folks at Bantam

Bo oks commission me to write the b o ok and pay me a hefty sum to do so but they bravely

printed in text an electronic do cument the repro duction of which was once alleged to b e a federal

felony Bantam Bo oks and their numerous attorneys were very brave and forthright ab out this

b o ok Furthermore my former editor at Bantam Bo oks Betsy Mitchell genuinely cared ab out this

pro ject and worked hard on it and had a lot of wise things to say ab out the manuscript Betsy

deserves genuine credit for this b o ok credit that editors to o rarely get

The critics were very kind to The Hacker Crackdown and commercially the b o ok has done well

On the other hand I didnt write this b o ok in order to squeeze every last nickel and dime out of the

mitts of imp overished sixteenyearold cyb erpunk highscho olstudents Teenagers dont have any

money no not even enough for the sixdollar Hacker Crackdown pap erback with its attractive

brightred cover and useful index Thats a ma jor reason why teenagers sometimes succumb to

the temptation to do things they shouldnt such as swiping my b o oks out of libraries Kids this

one is all yours all right Go give the print version back

Wellmeaning publicspi rited civil lib ertarians dont have much money either And it seems

almost criminal to snatch cash out of the hands of Americas direly underpaid electronic law en

forcement community

The Hacker Crackdown

If youre a computer cop a hacker or an electronic civil lib erties activist you are the target

audience for this b o ok I wrote this b o ok b ecause I wanted to help you and help other p eople

understand you and your unique uhm problems I wrote this b o ok to aid your activities and to

contribute to the public discussion of imp ortant p olitical issues In giving the text away in this

fashion I am directly contributing to the b o oks ultimate aim to help civilize cyb erspace

Information wants to b e free And the information inside this b o ok longs for freedom with a

p eculiar intensity I genuinely b elieve that the natural habitat of this b o ok is inside an electronic

network That may not b e the easiest direct metho d to generate revenue for the b o oks author but

that do esnt matter this is where this b o ok b elongs by its nature Ive written other b o oks plenty

of other b o oks and Ill write more and I am writing more but this one is sp ecial I am making

The Hacker Crackdown available electronically as widely as I can conveniently manage and if you

like the b o ok and think it is useful then I urge you to do the same with it

You can copy this electronic b o ok Copy the heck out of it b e my guest and give those copies to

anyb o dy who wants them The nascent world of cyb erspace is full of sysadmins teachers trainers

cybrarians netgurus and various sp ecies of cyb ernetic activists If youre one of those p eople

I know ab out you and I know the hassle you go through to try to help p eople learn ab out the

electronic frontier I hop e that p ossessing this b o ok in electronic form will lessen your troubles

Granted this treatment of our electronic so cial sp ectrum is not the ultimate in academic rigor

And p olitically it has something to oend and trouble almost everyone But hey Im told its

readable and at least the price is right You can upload the b o ok onto bulletin b oard systems

or no des or electronic discussion groups Go right ahead and do that I am giving you

express p ermission right now Enjoy yourself

You can put the b o ok on disks and give the disks away as long as you dont take any money

for it

But this b o ok is not public domain You cant copyright it in your own name I own the

copyright Attempts to pirate this b o ok and make money from selling it may involve you in a

serious litigative snarl Believe me for the pittance you might wring out of such an action its

really not worth it This b o ok dont b elong to you In an o dd but very genuine way I feel it

do esnt b elong to me either Its a b o ok ab out the p eople of cyb erspace and distributing it in

this way is the b est way I know to actually make this information available freely and easily to

all the p eople of cyb erspace including p eople far outside the b orders of the United States who

otherwise may never have a chance to see any edition of the b o ok and who may p erhaps learn

something useful from this strange story of distant obscure but p ortentous events in socalled

American cyb erspace

This electronic b o ok is now literary freeware It now b elongs to the emergent realm of alternative

information economics You have no right to make this electronic b o ok part of the conventional

ow of commerce Let it b e part of the ow of knowledge theres a dierence Ive divided the

b o ok into four sections so that it is less ungainly for upload and download if theres a section of

particular relevance to you and your colleagues feel free to repro duce that one and skip the rest

Just make more when you need them and give them to who ever might want them

Now have fun

Bruce Sterling bruceswellsfcaus

Chronology of the Hacker Crackdown

Chronology of the Hacker Crackdown

US Secret Service USSS founded invents

First teenage males ung o phone system by enraged authorities Futurian sciencection

group raided by Secret Service Yippie phone phreaks start YIPLTAP magazine Ram

parts magazine seized in blueb ox ripo scandal Ward Christenson and Randy Suess create

rst p ersonal computer bulletin b oard system coins term cyb erspace

Gang raided ATT dismantled in divestiture Congress passes Compre

hensive Crime Control Act giving USSS jurisdiction over credit card fraud and computer fraud

Legion of Do om formed The Hacker Quarterly founded Whole Earth

Software Catalog published First p olice sting bulletin b oard systems established

Whole Earth Lectronic Link computer conference WELL go es online Computer Fraud and

Abuse Act passed Electronic Communications Privacy Act passed Chicago prosecutors

form Computer Fraud and Abuse Task Force July Secret Service covertly videotap es Sum

merCon hacker convention Septemb er Prophet cracks BellSouth AIMSX

and downloads E Do cument to his own computer and to Jolnet Septemb er ATT Corp o

rate Information Security informed of Prophets action Octob er Bellcore Security informed of

Prophets action January Prophet uploads E Do cument to Knight Lightning February

Knight Lightning publishes E Do cument in electronic newsletter May Chicago

Task Force raids and arrests Kyrie June NuPrometheus League distributes Apple Computer

proprietary software June Florida probation oce crossed with phonesex line in switching

station stunt July Fry Guy raided by USSS and Chicago Computer Fraud and Abuse Task

Force July Secret Service raids Prophet Leftist and Urvile in Georgia January

Martin Luther King Day Crash strikes ATT longdistance network nationwide January

Chicago Task Force raids Knight Lightning in St Louis January USSS and New York State

Police raid Phib er Optik Acid Phreak and Scorpion in New York City February USSS

raids Terminus in Maryland February Chicago Task Force raids Richard Andrews home

February Chicago Task Force raids Richard Andrews business February USSS arrests Ter

minus Prophet Leftist and Urvile February Chicago Task Force arrests Knight Lightning

February ATT Security shuts down publicaccess attctc computer in Dallas February

Chicago Task Force raids Rob ert Izenb erg in Austin March Chicago Task Force raids Steve

Jackson Games Inc Mentor and Erik Blo o daxe in Austin May USSS and Arizona

Organized Crime and Racketeering Bureau conduct Op eration Sundevil raids in Cincinnatti De

troit Los Angeles Miami Newark Pho enix Pittsburgh Richmond Tucson San Diego San Jose

and San Francisco May FBI interviews re NuPrometheus case June Mitch

Kap or and Barlow found Electronic Frontier Foundation Barlow publishes Crime and Puzzlement

manifesto July Trial of Knight Lightning February CPSR Roundtable in Wash

ington DC March Computers Freedom and Privacy conference in San Francisco May

Electronic Frontier Foundation Steve Jackson and others le suit against memb ers of Chicago

Task Force July Switching station phone software crash aects Washington Los Angeles

Pittsburgh San Francisco Septemb er ATT phone crash aects New York City and three airp orts

The Hacker Crackdown

Intro duction

Intro duction

This is a b o ok ab out cops and wild teenage whizkids and lawyers and hairyeyed anarchists

and industrial technicians and hippies and hightech millionaires and game hobbyists and com

puter security exp erts and Secret Service agents and grifters and thieves This b o ok is ab out the

electronic frontier of the s It concerns activities that take place inside computers and over

telephone lines

A science ction writer coined the useful term cyb erspace in But the territory in

question the electronic frontier is ab out a hundred and thirty years old Cyb erspace is the place

where a telephone conversation app ears to o ccur Not inside your actual phone the plastic device

on your desk Not inside the other p ersons phone in some other city The place b etween the

phones The indenite place out there where the two of you two human b eings actually meet and

communicate

Although it is not exactly real cyb erspace is a genuine place Things happ en there that

have very genuine consequences This place is not real but it is serious it is earnest Tens of

thousands of p eople have dedicated their lives to it to the public service of public communication

by wire and electronics

People have worked on this frontier for generations now Some p eople b ecame rich and famous

from their eorts there Some just played in it as hobbyists Others sob erly p ondered it and wrote

ab out it and regulated it and negotiated over it in international forums and sued one another

ab out it in gigantic epic court battles that lasted for years And almost since the b eginning some

p eople have committed crimes in this place

But in the past twenty years this electrical space which was once thin and dark and one

dimensional little more than a narrow sp eakingtub e stretching from phone to phone has ung

itself op en like a gigantic jackintheb ox Light has o o ded up on it the eerie light of the glowing

computer screen This dark electric netherworld has b ecome a vast owering electronic landscap e

Since the s the world of the telephone has crossbred itself with computers and television and

though there is still no substance to cyb erspace nothing you can handle it has a strange kind of

physicality now It makes go o d sense to day to talk of cyb erspace as a place all its own

Because p eople live in it now Not just a few p eople not just a few technicians and eccentrics

but thousands of p eople quite normal p eople And not just for a little while either but for hours

straight over weeks and months and years Cyb erspace to day is a Net a Matrix international

in scop e and growing swiftly and steadily Its growing in size and wealth and p olitical imp ortance

People are making entire careers in mo dern cyb erspace Scientists and technicians of course

theyve b een there for twenty years now But increasingly cyb erspace is lling with journalists and

do ctors and lawyers and artists and clerks Civil servants make their careers there now online

in vast government databanks and so do spies industrial p olitical and just plain sno ops and so

do p olice at least a few of them And there are children living there now

People have met there and b een married there There are entire living communities in cyb erspace

to day chattering gossipping planning conferring and scheming leaving one another voicemail

and electronic mail giving one another big weightless chunks of valuable data b oth legitimate and

illegitimate They busily pass one another computer software and the o ccasional festering computer

virus

We do not really understand how to live in cyb erspace yet We are feeling our way into it

blundering ab out That is not surprising Our lives in the physical world the real world are

also far from p erfect despite a lot more practice Human lives real lives are imp erfect by their

nature and there are human b eings in cyb erspace The way we live in cyb erspace is a funhouse

mirror of the way we live in the real world We take b oth our advantages and our troubles with us

The Hacker Crackdown

This b o ok is ab out trouble in cyb erspace Sp ecically this b o ok is ab out certain strange events

in the year an unprecedented and startling year for the the growing world of computerized

communications

In there came a nationwide crackdown on illicit computer with arrests criminal

charges one dramatic showtrial several guilty pleas and huge conscations of data and equipment

all over the USA

The Hacker Crackdown of was larger b etter organized more delib erate and more resolute

than any previous eort in the brave new world of computer crime The US Secret Service private

telephone security and state and lo cal law enforcement groups across the country all joined forces in

a determined attempt to break the back of Americas electronic underground It was a fascinating

eort with very mixed results

The Hacker Crackdown had another unprecedented eect it spurred the creation within the

computer community of the Electronic Frontier Foundation a new and very o dd interest group

ercely dedicated to the establishment and preservation of electronic civil lib erties The crackdown

remarkable in itself has created a melee of debate over electronic crime punishment freedom of

the press and issues of search and seizure Politics has entered cyb erspace Where p eople go

p olitics follow This is the story of the p eople of cyb erspace

Chapter Crashing The System

Crashing The System

A Brief History of Telephony Bells Golden Vap orware Universal Service Wild Boys

and Wire Women The Electronic Communities The Ungentle Giant The Breakup

In Defense of the System The Crash PostMortem Landslides in Cyb erspace

On January ATTs longdistance telephone switching system crashed

This was a strange dire huge event Sixty thousand p eople lost their telephone service com

pletely During the nine long hours of frantic eort that it to ok to restore service some seventy

million telephone calls went uncompleted

Losses of service known as outages in the telco trade are a known and accepted hazard of the

telephone business Hurricanes hit and phone cables get snapp ed by the thousands Earthquakes

wrench through buried b eroptic lines Switching stations catch re and burn to the ground These

things do happ en There are contingency plans for them and decades of exp erience in dealing with

them But the Crash of January was unprecedented It was unb elievabl y huge and it o ccurred

for no apparent physical reason

The crash started on a Monday afterno on in a single switchingstation in Manhattan But unlike

any merely physical damage it spread and spread Station after station across America collapsed

in a chain reaction until fully half of ATTs network had gone haywire and the remaining half

was hardput to handle the overow

Within nine hours ATT software engineers more or less understo o d what had caused the crash

Replicating the problem exactly p oring over software line by line to ok them a couple of weeks

But b ecause it was hard to understand technically the full truth of the matter and its implications

were not widely and thoroughly aired and explained The ro ot cause of the crash remained obscure

surrounded by rumor and fear The crash was a grave corp orate embarrassment The culprit was

a bug in ATTs own software not the sort of admission the giant wanted

to make esp ecially in the face of increasing comp etition Still the truth was told in the baing

technical terms necessary to explain it

Somehow the explanation failed to p ersuade American law enforcement ocials and even tele

phone corp orate security p ersonnel These p eople were not technical exp erts or software wizards

and they had their own suspicions ab out the cause of this disaster

The p olice and telco security had imp ortant sources of information denied to mere software

engineers They had informants in the computer underground and years of exp erience in dealing

with hightech rascality that seemed to grow ever more sophisticated For years they had b een

exp ecting a direct and savage attack against the American national telephone system And with

the Crash of January the rst month of a new hightech decade their predictions fears and

suspicions seemed at last to have entered the real world A world where the telephone system had

not merely crashed but quite likely b een crashed by hackers

The crash created a large dark cloud of suspicion that would color certain p eoples assumptions

and actions for months The fact that it to ok place in the realm of software was suspicious on its

face The fact that it o ccurred on Martin Luther King Day still the most p olitically touchy of

American holidays made it more suspicious yet

The Crash of January gave the Hacker Crackdown its sense of edge and its sweaty urgency

It made p eople p owerful p eople in p ositions of public authority willing to b elieve the worst

And most fatally it help ed to give investigators a willingness to take extreme measures and the

determination to preserve almost total secrecy An obscure software fault in an aging switching

The Hacker Crackdown

system in New York was to lead to a chain reaction of legal and constitutional trouble all across

the country

Like the crash in the telephone system this chain reaction was ready and waiting to happ en

During the s the American legal system was extensively patched to deal with the novel issues

of computer crime There was for instance the Electronic Communications Privacy Act of

elo quently describ ed as a stinking mess by a prominent law enforcement ocial And there was

the draconian Computer Fraud and Abuse Act of passed unanimously by the United States

Senate which later would reveal a large numb er of aws Extensive wellmeant eorts had b een

made to keep the legal system up to date But in the daytoday grind of the real world even the

most elegant software tends to crumble and suddenly reveal its hidden bugs

Like the advancing telephone system the American legal system was certainly not ruined by

its temp orary crash but for those caught under the weight of the collapsing system life b ecame a

series of blackouts and anomalies

In order to understand why these weird events o ccurred b oth in the world of technology and in

the world of law its not enough to understand the merely technical problems We will get to those

but rst and foremost we must try to understand the telephone and the business of

and the community of human b eings that telephones have created

Technologies have life cycles like cities do like institutions do like laws and governments do

The rst stage of any technology is the Question Mark often known as the Golden Vap orware

stage At this early p oint the technology is only a phantom a mere gleam in the inventors eye

One such inventor was a sp eech teacher and electrical tinkerer named Alexander Graham Bell

Bells early inventions while ingenious failed to move the world In the teenage Bell and

his brother Melville made an articial talking mechanism out of wo o d rubb er guttap ercha and

tin This weird device had a rubb ercovered tongue made of movable wo o den segments with

vibrating rubb er vo cal cords and rubb er lips and cheeks While Melville pued a b ellows

into a tin tub e imitating the lungs young Alec Bell would manipulate the lips teeth and

tongue causing the thing to emit highpitched falsetto gibb erish

Another wouldb e technical breakthrough was the Bell phonautograph of actually made

out of a human cadavers ear Clamp ed into place on a trip o d this grisly gadget drew soundwave

images on smoked glass through a thin straw glued to its vibrating earb ones

By Bell had learned to pro duce audible sounds ugly shrieks and squawks by using

magnets diaphragms and electrical current Most Golden Vap orware technologies go nowhere

But the second stage of technology is the Rising Star or the Go ofy Prototyp e stage The

telephone Bells most ambitious gadget yet reached this stage on March On that

great day Alexander Graham Bell b ecame the rst p erson to transmit intelligibl e human sp eech

electrically As it happ ened young Professor Bell industriously tinkering in his lab had

spattered his trousers with acid His assistant Mr Watson heard his cry for help over Bells

exp erimental audiotelegraph This was an event without precedent

Technologies in their Go ofy Prototyp e stage rarely work very well Theyre exp erimental and

therefore halfbaked and rather frazzled The prototyp e may b e attractive and novel and it do es

lo ok as if it ought to b e go o d for somethingorother But nob o dy including the inventor is quite

sure what Inventors and sp eculators and pundits may have very rm ideas ab out its p otential

use but those ideas are often very wrong

Chapter Crashing The System

The natural habitat of the Go ofy Prototyp e is in trade shows and in the p opular press Infant

technologies need publicity and investment money like a tottering calf need milk This was very

true of Bells machine To raise research and development money Bell toured with his device as a

stage attraction

Contemp orary press rep orts of the stage debut of the telephone showed pleased astonishment

mixed with considerable dread Bells stage telephone was a large wo o den b ox with a crude sp eaker

nozzle the whole contraption ab out the size and shap e of an overgrown Brownie camera Its buzzing

steel soundplate pump ed up by p owerful electromagnets was loud enough to ll an auditorium

Bells assistant Mr Watson who could manage on the keyb oards fairly well kicked in by playing

the organ from distant ro oms and later distant cities This feat was considered marvellous but

very eerie indeed

Bells original notion for the telephone an idea promoted for a couple of years was that it would

b ecome a mass medium We might recognize Bells idea to day as something close to mo dern cable

radio Telephones at a central source would transmit music Sunday sermons and imp ortant

public sp eeches to a paying network of wiredup subscrib ers

At the time most p eople thought this notion made go o d sense In fact Bells idea was work

able In Hungary this philosophy of the telephone was successfully put into everyday practice In

Budap est for decades from until after World War I there was a governmentrun information

c c

service called Telefon Hirmondo Hirmondo was a centralized source of news and entertain

ment and culture including sto ck rep orts plays concerts and novels read aloud At certain hours

of the day the phone would ring you would plug in a loudsp eaker for the use of the family and

c

Telefon Hirmondo would b e on the air or rather on the phone

c c

Hirmondo is dead tech to day but Hirmondo might b e considered a spiritual ancestor of the

mo dern telephoneaccessed computer data services such as CompuServe GEnie or Pro digy The

c

principle b ehind Hirmondo is also not to o far from computer bulletin b oard systems or BBSs

which arrived in the late s spread rapidly across America and will gure largely in this b o ok

We are used to using telephones for individual p ersontop erson sp eech b ecause we are used to

the Bell system But this was just one p ossibility among many Communication networks are very

exible and protean esp ecially when their hardware b ecomes suciently advanced They can b e

put to all kinds of uses And they have b een and they will b e

Bells telephone was b ound for glory but this was a combination of p olitical decisions canny

inghting in court inspired industrial leadership receptive lo cal conditions and outright go o d luck

Much the same is true of communications systems to day

As Bell and his backers struggled to install their newfangled system in the real world of

nineteenthcentury New England they had to ght against skepticism and industrial rivalry There

was already a strong electrical communications network present in America the telegraph The

head of the Western Union telegraph system dismissed Bells prototyp e as an electrical toy and

refused to buy the rights to Bells patent The telephone it seemed might b e all right as a parlor

entertainment but not for serious business

Telegrams unlike mere telephones left a p ermanent physical record of their messages Tele

grams unlike telephones could b e answered whenever the recipient had time and convenience And

the telegram had a much longer distancerange than Bells early telephone These factors made

seem a much more sound and businesslike technology at least to some

The telegraph system was huge and wellentrenched In the United States had

miles of telegraph wire and telegraph oces There were sp ecialized telegraphs for businesses

and sto ck traders government p olice and re departments And Bells toy was b est known as a

stagemagic musical device

The third stage of technology is known as the Cash Cow stage In the cash cow stage a

technology nds its place in the world and matures and b ecomes settled and pro ductive After

The Hacker Crackdown

a year or so Alexander Graham Bell and his capitalist backers concluded that eerie music pip ed

from nineteenthcentury cyb erspace was not the real sellingp oint of his invention Instead the

telephone was ab out sp eech individual p ersonal sp eech the human voice human conversation

and human interaction The telephone was not to b e managed from any centralized broadcast

center It was to b e a p ersonal intimate technology

When you picked up a telephone you were not absorbing the cold output of a machine you

were sp eaking to another human b eing Once p eople realized this their instinctive dread of the

telephone as an eerie unnatural device swiftly vanished A telephone call was not a call from

a telephone itself but a call from another human b eing someone you would generally know and

recognize The real p oint was not what the machine could do for you or to you but what you

yourself a p erson and citizen could do through the machine This decision on the part of the

young Bell Company was absolutely vital

The rst telephone networks went up around Boston mostly among the technically curious

and the welltodo much the same segment of the American p opulace that a hundred years later

would b e buying p ersonal computers Entrenched backers of the telegraph continued to sco

But in January a disaster made the telephone famous A train crashed in Tarriville

Connecticut Forwardlo oking do ctors in the nearby city of Hartford had had Bells sp eaking

telephone installed An alert lo cal druggist was able to telephone an entire community of lo cal

do ctors who rushed to the site to give aid The disaster as disasters do aroused intense press

coverage The phone had proven its usefulness in the real world

After Tarriville the telephone network spread like crabgrass By it was all over New

England By out to Chicago By into Minnesota Nebraska and Texas By it was all

over the continent

The telephone had b ecome a mature technology Professor Bell now generally known as Dr

Bell despite his lack of a formal degree b ecame quite wealthy He lost interest in the tedious day

today business muddle of the b o oming telephone network and gratefully returned his attention to

creatively hackingaround in his various lab oratories which were now much larger b etter ventilated

and gratifyingly b etterequipp ed Bell was never to have another great inventive success though his

sp eculations and prototyp es anticipated b eroptic transmission manned ight sonar hydrofoil

ships tetrahedral construction and Montessori education The decib el the standard scientic

measure of sound intensity was named after Bell

Not all Bells vap orware notions were inspired He was fascinated by human eugenics He also

sp ent many years developing a weird p ersonal system of astrophysics in which gravity did not exist

Bell was a denite eccentric He was something of a hyp o chondriac and throughout his life he

habitually stayed up until four AM refusing to rise b efore no on But Bell had accomplished a

great feat he was an idol of millions and his inuence wealth and great p ersonal charm combined

with his eccentricity made him something of a lo ose cannon on deck Bell maintained a thriving

scientic salon in his winter mansion in Washington DC which gave him considerable backstage

inuence in governmental and scientic circles He was a ma jor nancial backer of the the magazines

Science and National Geographic b oth still ourishing to day as imp ortant organs of the American

scientic establishment Bells companion Thomas Watson similarly wealthy and similarly o dd

b ecame the ardent p olitical disciple of a thcentury sciencection writer and wouldb e so cial

reformer Edward Bellamy Watson also tro d the b oards briey as a Shakesp earian actor

There would never b e another Alexander Graham Bell but in years to come there would b e

surprising numb ers of p eople like him Bell was a prototyp e of the hightech entrepreneur High

tech entrepreneurs will play a very prominent role in this b o ok not merely as technicians and

businessmen but as pioneers of the technical frontier who can carry the p ower and prestige they

derive from hightechnology into the p olitical and so cial arena

Chapter Crashing The System

Like later entrepreneurs Bell was erce in defense of his own technological territory As the

telephone b egan to ourish Bell was so on involved in violent lawsuits in the defense of his patents

Bells Boston lawyers were excellent however and Bell himself as an elecution teacher and gifted

public sp eaker was a devastatingly eective legal witness In the eighteen years of Bells patents

the Bell company was involved in six hundred separate lawsuits The legal records printed lled

volumes The Bell Company won every single suit

After Bells exclusive patents expired rival telephone companies sprang up all over America

Bells company American Bell Telephone was so on in deep trouble In American Bell

Telephone fell into the hands of the rather sinister JP Morgan nancial cartel robb erbaron

sp eculators who dominated Wall Street

At this p oint history might have taken a dierent turn American might well have b een served

forever by a patchwork of lo cally owned telephone companies Many state p oliticians and lo cal

businessmen considered this an excellent solution

But the new Bell holding company American Telephone and Telegraph or ATT put in a

new man at the helm a visionary industrialist named Theo dore Vail Vail a former Post Oce

manager understo o d large organizations and had an innate feeling for the nature of largescale

communications Vail quickly saw to it that ATT seized the technological edge once again The

Pupin and Campb ell loading coil and the deForest audion are b oth extinct technology to day

but in they gave Vails company the b est longdistance lines ever built By controlling long

distance the links b etween and over and ab ove the smaller lo cal phone companies ATT

swiftly gained the whiphand over them and was so on devouring them right and left

Vail plowed the prots back into research and development starting the Bell tradition of huge

scale and brilliant industrial research

Technically and nancially ATT gradually steamrollered the opp osition Indep endent tele

phone companies never b ecame entirely extinct and hundreds of them ourish to day But Vails

ATT b ecame the supreme communications company At one p oint Vails ATT b ought West

ern Union itself the very company that had derided Bells telephone as a toy Vail thoroughly

reformed Western Unions hideb ound business along his mo dern principles but when the federal

government grew anxious at this centralization of p ower Vail p olitely gave Western Union back

This centralizing pro cess was not unique Very similar events had happ ened in American steel

oil and railroads But ATT unlike the other companies was to remain supreme The monop oly

robb erbarons of those other industries were humbled and shattered by government trustbusting

Vail the former Post Oce ocial was quite willing to accommo date the US government in fact

he would forge an active alliance with it ATT would b ecome almost a wing of the American

government almost another Post Oce though not quite ATT would willingly submit to

federal regulation but in return it would use the governments regulators as its own p olice who

would keep out comp etitors and assure the Bell systems prots and preeminence

This was the second birth the p olitical birth of the American telephone system Vails

arrangement was to p ersist with vast success for many decades until His system was

an o dd kind of American industrial so cialism It was b orn at ab out the same time as Leninist

Communism and it lasted almost as long and it must b e admitted to considerably b etter eect

Vails system worked Except p erhaps for aerospace there has b een no technology more thor

oughly dominated by Americans than the telephone The telephone was seen from the b eginning

as a quintessentially American technology Bells p olicy and the p olicy of Theo dore Vail was a

profoundly demo cratic p olicy of universal access Vails famous corp orate slogan One Policy One

System Universal Service was a p olitical slogan with a very American ring to it The American

telephone was not to b ecome the sp ecialized to ol of government or business but a general public

utility At rst it was true only the wealthy could aord private telephones and Bells company

pursued the business markets primarily The American phone system was a capitalist eort meant

to make money it was not a charity But from the rst almost all communities with telephone

The Hacker Crackdown

service had public telephones And many stores esp ecially drugstores oered public use of their

phones You might not own a telephone but you could always get into the system if you really

needed to

There was nothing inevitable ab out this decision to make telephones public and universal

Vails system involved a profound act of trust in the public This decision was a p olitical one

informed by the basic values of the American republic The situation might have b een very dierent

and in other countries under other systems it certainly was

Joseph Stalin for instance veto ed plans for a Soviet phone system so on after the Bolshevik

revolution Stalin was certain that publicly accessible telephones would b ecome instruments of

antiSoviet counterrevolution and conspiracy He was probably right When telephones did

arrive in the Soviet Union they would b e instruments of Party authority and always heavily

tapp ed Alexander Solzhenitsyns prisoncamp novel The First Circle describ es eorts to develop

a phone system more suited to Stalinist purp oses

France with its tradition of rational centralized government had fought bitterly even against

the electric telegraph which seemed to the French entirely to o anarchical and frivolous For

decades nineteenthcentury France communicated via the visual telegraph a nationspanning

governmentowned system of huge stone towers that signalled from hilltops across vast

distances with big windmillli ke arms In one Dr Barbay a semaphore enthusiast mem

orably uttered an early version of what might b e called the security exp erts argument against

the op en media

No the electric telegraph is not a sound invention It will always b e at the mercy of the slightest

disruption wild youths drunkards bums etc::: The electric telegraph meets those destructive

elements with only a few meters of wire over which sup ervision is imp ossible A single man could

without b eing seen cut the telegraph wires leading to Paris and in twentyfour hours cut in ten

dierent places the wires of the same line without b eing arrested The visual telegraph on the

contrary has its towers its high walls its gates wellguarded from inside by strong armed men

Yes I declare substitution of the electric telegraph for the visual one is a dreadful measure a truly

idiotic act

Dr Barbay and his highsecurity stone machines were eventually unsuccessful but his argument

that communication exists for the safety and convenience of the state and must b e carefully

protected from the wild b oys and the gutter rabble who might want to crash the system would

b e heard again and again

When the French telephone system nally did arrive its snarled inadequacy was to b e notorious

Devotees of the American Bell System often recommended a trip to France for skeptics

In Edwardian Britain issues of class and privacy were a ballandchain for telephonic progress It

was considered outrageous that anyone any wild fo ol o the street could simply barge b ellowing

into ones oce or home preceded only by the ringing of a telephone b ell In Britain phones were

tolerated for the use of business but private phones tended b e stued away into closets smoking

ro oms or servants quarters Telephone op erators were resented in Britain b ecause they did not

seem to know their place And no one of breeding would print a telephone numb er on a business

card this seemed a crass attempt to make the acquaintance of strangers

But phone access in America was to b ecome a p opular right something like universal surage

only more so American women could not yet vote when the phone system came through yet

from the b eginning American women doted on the telephone This feminization of the American

telephone was often commented on by foreigners Phones in America were not censored or sti or

formalized they were so cial private intimate and domestic In America Mothers Day is by far

the busiest day of the year for the phone network

The early telephone companies and esp ecially ATT were among the foremost employers of

American women They employed the daughters of the American middleclass in great armies

Chapter Crashing The System

in eight thousand women by almost a quarter of a million Women seemed to enjoy

telephone work it was resp ectable it was steady it paid fairly well as womens work went and not

least it seemed a genuine contribution to the so cial go o d of the community Women found Vails

ideal of public service attractive This was esp ecially true in rural areas where women op erators

running extensive rural partylines enjoyed considerable so cial p ower The op erator knew everyone

on the partyline and everyone knew her

Although Bell himself was an ardent suragist the telephone company did not employ women

for the sake of advancing female lib eration ATT did this for sound commercial reasons The rst

telephone op erators of the Bell system were not women but teenage American b oys They were

telegraphic messenger b oys a group ab out to b e rendered technically obsolescent who swept up

around the phone oce dunned customers for bills and made phone connections on the

b oard all on the cheap

Within the very rst year of op eration Bells company learned a sharp lesson ab out com

bining teenage b oys and telephone switchb oards Putting teenage b oys in charge of the phone

system brought swift and consistent disaster Bells chief engineer describ ed them as Wild In

dians The b oys were op enly rude to customers They talked back to subscrib ers saucing o

uttering facetious remarks and generally giving lip The rascals to ok Saint Patricks Day o with

out p ermission And worst of all they played clever tricks with the switchb oard plugs disconnecting

calls crossing lines so that customers found themselves talking to strangers and so forth

This combination of p ower technical mastery and eective anonymity seemed to act like catnip

on teenage b oys

This wildkidonthewires phenomenon was not conned to the USA from the b eginning the

same was true of the British phone system An early British commentator kindly remarked No

doubt b oys in their teens found the work not a little irksome and it is also highly probable that

under the early conditions of employment the adventurous and inquisitive spirits of which the

average healthy b oy of that age is p ossessed were not always conducive to the b est attention b eing

given to the wants of the telephone subscrib ers

So the b oys were ung o the system or at least deprived of control of the switchb oard But

the adventurous and inquisitive spirits of the teenage b oys would b e heard from in the world of

telephony again and again

The fourth stage in the technological lifecycle is death the Dog dead tech The telephone

has so far avoided this fate On the contrary it is thriving still spreading still evolving and at

increasing sp eed

The telephone has achieved a rare and exalted state for a technological artifact it has b ecome

a household ob ject The telephone like the clo ck like p en and pap er like kitchen utensils and

running water has b ecome a technology that is visible only by its absence The telephone is

technologically transparent The global telephone system is the largest and most complex machine

in the world yet it is easy to use More remarkable yet the telephone is almost entirely physically

safe for the user

For the average citizen in the s the telephone was weirder more sho cking more high

tech and harder to comprehend than the most outrageous stunts of advanced computing for us

Americans in the s In trying to understand what is happ ening to us to day with our bulletin

b oard systems direct overseas dialling b eroptic transmissions computer viruses hacking stunts

and a vivid tangle of new laws and new crimes it is imp ortant to realize that our so ciety has b een

through a similar challenge b efore and that all in all we did rather well by it

Bells stage telephone seemed bizarre at rst But the sensations of weirdness vanished quickly

once p eople b egan to hear the familiar voices of relatives and friends in their own homes on their

own telephones The telephone changed from a fearsome hightech totem to an everyday pillar of

human community

The Hacker Crackdown

This has also happ ened and is still happ ening to computer networks Computer networks

such as NSFnet BITnet JANET are technically advanced intimidating and much

harder to use than telephones Even the p opular commercial computer networks such as GEnie

Pro digy and CompuServe cause much headscratching and have b een describ ed as userhateful

Nevertheless they to o are changing from fancy hightech items into everyday sources of human

community

The words community and communication have the same ro ot Wherever you put a com

munications network you put a community as well And whenever you take away that network

conscate it outlaw it crash it raise its price b eyond aordability then you hurt that community

Communities will ght to defend themselves People will ght harder and more bitterly to

defend their communities than they will ght to defend their own individual selves And this

is very true of the electronic community that arose around computer networks in the s

or rather the various electronic communities in telephony law enforcement computing and the

digital underground that by the year were raiding rallying arresting suing jailing ning

and issuing angry manifestos

None of the events of were entirely new Nothing happ ened in that did not have some

kind of earlier and more understandable precedent What gave the Hacker Crackdown its new sense

of gravity and imp ortance was the feeling the community feeling that the p olitical stakes had

b een raised that trouble in cyb erspace was no longer mere mischief or inconclusive skirmishing

but a genuine ght over genuine issues a ght for community survival and the shap e of the future

These electronic communities having ourished throughout the s were b ecoming aware of

themselves and increasingly b ecoming aware of other rival communities Worries were sprouting

up right and left with complaints rumors uneasy sp eculations But it would take a catalyst

a sho ck to make the new world evident Like Bells great publicity break the Tarriville Rail

Disaster of January it would take a cause celebre

That cause was the ATT Crash of January After the Crash the wounded and

anxious telephone community would come out ghting hard

The community of telephone technicians engineers op erators and researchers is the oldest

community in cyb erspace These are the veterans the most develop ed group the richest the

most resp ectable in most ways the most p owerful Whole generations have come and gone since

Alexander Graham Bells day but the community he founded survives p eople work for the phone

system to day whose greatgrandparents worked for the phone system Its sp ecialty magazines

such as Telephony ATT Technical Journal Telephone Engineer and Management are decades

old they make computer publications like Macworld and PC Week lo ok like amateur johnnycome

latelies

And the phone companies take no back seat in hightechnology either Other companies indus

trial researchers may have won new markets but the researchers of Bell Labs have won seven Nob el

Prizes One p otent device that Bell Labs originated the transistor has created entire groups of

industries Bell Labs are worldfamous for generating a patent a day and have even made vital

discoveries in astronomy physics and cosmology

Throughout its seventyyear history Ma Bell was not so much a company as a way of life

Until the cataclysmic divestiture of the s Ma Bell was p erhaps the ultimate maternalist mega

employer The ATT corp orate image was the gentle giant the voice with a smile a vaguely

so cialistrealist world of cleanshaven linemen in shiny helmets and blandly pretty phonegirls in

headsets and nylons Bell System employees were famous as ro ckribb ed Kiwanis and Rotary

memb ers LittleLeague enthusiasts scho olb oard p eople

Chapter Crashing The System

During the long heyday of Ma Bell the Bell employee corps were nurtured toptob ottom on a

corp orate ethos of public service There was go o d money in Bell but Bell was not ab out money

Bell used public relations but never mere marketeering People went into the Bell System for a

go o d life and they had a go o d life But it was not mere money that led Bell p eople out in the

midst of storms and earthquakes to ght with toppled phonep oles to wade in o o ded manholes to

pull the redeyed graveyardshift over collapsing switchingsystems The Bell ethic was the electrical

equivalent of the p ostmans neither rain nor snow nor glo om of night would stop these couriers

It is easy to b e cynical ab out this as it is easy to b e cynical ab out any p olitical or so cial system

but cynicism do es not change the fact that thousands of p eople to ok these ideals very seriously

And some still do

The Bell ethos was ab out public service and that was gratifying but it was also ab out private

p ower and that was gratifying to o As a corp oration Bell was very sp ecial Bell was privileged

Bell had snuggled up close to the state In fact Bell was as close to government as you could get

in America and still make a whole lot of legitimate money

But unlike other companies Bell was ab ove and b eyond the vulgar commercial fray Through

its regional op erating companies Bell was omnipresent lo cal and intimate all over America but

the central ivory towers at its corp orate heart were the tallest and the ivoriest around

There were other phone companies in America to b e sure the socalled indep endents Rural

co op eratives mostly small fry mostly tolerated sometimes warred up on

For many decades indep endent American phone companies lived in fear and loathing of the

ocial Bell monop oly or the Bell Octopus as Ma Bells nineteenthcentury enemies describ ed

her in many angry newspap er manifestos Some few of these indep endent entrepreneurs while

legally in the wrong fought so bitterly against the Octopus that their illegal phone networks were

cast into the street by Bell agents and publicly burned

The pure technical sweetness of the Bell System gave its op erators inventors and engineers a

deeply satisfying sense of p ower and mastery They had devoted their lives to improving this vast

nationspanning machine over years whole human lives they had watched it improve and grow

It was like a great technological temple They were an elite and they knew it even if others did

not in fact they felt even more p owerful b ecause others did not understand The deep attraction

of this sensation of elite technical p ower should never b e underestimated Technical p ower is not

for everyb o dy for many p eople it simply has no charm at all But for some p eople it b ecomes

the core of their lives For a few it is overwhelming obsessive it b ecomes something close to an

addiction People esp ecially clever teenage b oys whose lives are otherwise mostly p owerless and

putup on love this sensation of secret p ower and are willing to do all sorts of amazing things

to achieve it The technical p ower of electronics has motivated many strange acts detailed in this

b o ok which would otherwise b e inexplicable

So Bell had p ower b eyond mere capitalism The Bell service ethos worked and was often

propagandized in a rather saccharine fashion Over the decades p eople slowly grew tired of this

And then op enly impatient with it By the early s Ma Bell was to nd herself with scarcely a

real friend in the world Vails industrial so cialism had b ecome hop elessly outoffashion p olitically

Bell would b e punished for that And that punishment would fall harshly up on the p eople of the

telephone community

In Ma Bell was dismantled by federal court action The pieces of Bell are now separate

corp orate entities The core of the company b ecame ATT Communications and also ATT

Industries formerly Western Electric Bells manufacturing arm ATT Bell Labs b ecame Bell

Communications Research Bellcore Then there are the Regional Bell Op erating Companies or

RBOCs pronounced arb o cks

The Hacker Crackdown

Bell was a titan and even these regional chunks are gigantic enterprises Fortune companies

with plenty of wealth and p ower b ehind them But the clean lines of One Policy One System

Universal Service have b een shattered apparently forever

The One Policy of the early Reagan Administration was to shatter a system that smacked of

noncomp etitive so cialism Since that time there has b een no real telephone p olicy on the federal

level Despite the breakup the remnants of Bell have never b een set free to comp ete in the op en

marketplace

The RBOCs are still very heavily regulated but not from the top Instead they struggle

p olitically economically and legally in what seems an endless turmoil in a patchwork of overlapping

federal and state jurisdictions Increasingly like other ma jor American corp orations the RBOCs

are b ecoming multinational acquiring imp ortant commercial interests in Europ e Latin America

and the Pacic Rim But this to o adds to their legal and p olitical predicament

The p eople of what used to b e Ma Bell are not happy ab out their fate They feel illused They

might have b een grudgingly willing to make a full transition to the free market to b ecome just

companies amid other companies But this never happ ened Instead ATT and the RBOCS the

Baby Bells feel themselves wrenched from side to side by state regulators by Congress by the

FCC and esp ecially by the federal court of Judge Harold Greene the magistrate who ordered the

Bell breakup and who has b een the de facto czar of American telecommunications ever since

Bell p eople feel that they exist in a kind of paralegal limb o to day They dont understand

whats demanded of them If its service why arent they treated like a public service And if

its money then why arent they free to comp ete for it No one seems to know really Those who

claim to know keep changing their minds Nob o dy in authority seems willing to grasp the nettle

for once and all

Telephone p eople from other countries are amazed by the American telephone system to day

Not that it works so well for nowadays even the French telephone system works more or less They

are amazed that the American telephone system still works at all under these strange conditions

Bells One System of longdistance service is now only ab out eighty p ercent of a system

with the remainder held by Sprint MCI and the midget longdistance companies Ugly wars over

dubious corp orate practices such as slamming an underhanded metho d of snitching clients from

rivals break out with some regularity in the realm of longdistance service The battle to break

Bells longdistance monop oly was long and ugly and since the breakup the battleeld has not

b ecome much prettier ATTs famous shameandblame advertisements which emphasized the

sho ddy work and purp orted ethical shadiness of their comp etitors were much remarked on for their

studied psychological cruelty There is much bad blo o d in this industry and much longtreasured

resentment ATTs p ostbreakup corp orate logo a strip ed sphere is known in the industry

as the Death Star a reference from the movie Star Wars in which the Death Star was the

spherical hightech fortress of the harshbreathing imp erial ultrabaddie Darth Vader Even ATT

employees are less than thrilled by the Death Star A p opular though banned Tshirt among

ATT employees b ears the oldfashioned Bell logo of the Bell System plus the newfangled strip ed

sphere with the b eforeandafter comments This is your brain This is your brain on drugs

ATT made a very wellnanced and determined eort to break into the p ersonal computer market

it was disastrous and telco computer exp erts are derisively known by their comp etitors as the

p oleclimb ers ATT and the Baby Bell arb o cks still seem to have few friends Under conditions

of sharp commercial comp etition a crash like that of January was a ma jor embarrassment

to ATT It was a direct blow against their muchtreasured reputation for reliability Within days

of the crash ATTs Chief Executive Ocer Bob Allen ocially ap ologized in terms of deeply

pained humility ATT had a ma jor service disruption last Monday We didnt live up to our

own standards of quality and we didnt live up to yours Its as simple as that And thats not

acceptable to us Or to you::: We understand how much p eople have come to dep end up on ATT

service so our ATT Bell Lab oratories scientists and our network engineers are doing everything

Chapter Crashing The System

p ossible to guard against a recurrence::: We know theres no way to make up for the inconvenience

this problem may have caused you

Mr Allens op en letter to customers was printed in lavish ads all over the country in the Wall

Street Journal USA To day New York Times Los Angeles Times Chicago Tribune Philadelphia

Inquirer San Francisco Chronicle Examiner Boston Glob e Dallas Morning News Detroit Free

Press Washington Post Houston Chronicle Cleveland Plain Dealer Atlanta Journal Constitution

Minneap olis Star Tribune St Paul Pioneer Press Dispatch Seattle TimesPost Intelligencer

Tacoma News Tribune Miami Herald Pittsburgh Press St Louis Post Dispatch Denver Post

Pho enix Republic Gazette and Tampa Tribune

In another press release ATT went to some pains to suggest that this software glitch might

have happ ened just as easily to MCI although in fact it hadnt MCIs switching software was

quite dierent from ATTs though not necessarily any safer ATT also announced their plans

to oer a rebate of service on Valentines Day to make up for the loss during the Crash

Every technical resource available including Bell Labs scientists and engineers has b een de

voted to assuring it will not o ccur again the public was told They were further assured that

The chances of a recurrence are small a problem of this magnitude never o ccurred b efore

In the meantime however p olice and corp orate security maintained their own suspicions ab out

the chances of recurrence and the real reason why a problem of this magnitude had app eared

seemingly out of nowhere Police and security knew for a fact that hackers of unprecedented so

phistication were illegally entering and reprogramming certain digital switching stations Rumors

of hidden viruses and secret logic b ombs in the ran rampant in the underground with

much chortling over ATTs predicament and idle sp eculation over what unsung hacker genius

was resp onsible for it Some hackers including p olice informants were trying hard to nger one

another as the true culprits of the Crash

Telco p eople found little comfort in ob jectivity when they contemplated these p ossibilitie s It

was just to o close to the b one for them it was embarrassing it hurt so much it was hard even to

talk ab out

There has always b een thieving and misb ehavior in the phone system There has always b een

trouble with the rival indep endents and in the lo cal lo ops But to have such trouble in the core of

the system the longdistance switching stations is a horrifying aair To telco p eople this is all

the dierence b etween nding roaches in your kitchen and big horrid sewerrats in your b edro om

From the outside to the average citizen the telcos still seem gigantic and imp ersonal The

American public seems to regard them as something akin to Soviet apparats Even when the telcos

do their b est corp oratecitizen routine subsidizing magnet highscho ols and sp onsoring newsshows

on public television they seem to win little except public suspicion

But from the inside all this lo oks very dierent Theres harsh comp etition A legal and p olitical

system that seems baed and b ored when not actively hostile to telco interests Theres a loss of

morale a deep sensation of having somehow lost the upp er hand Technological change has caused

a loss of data and revenue to other newer forms of transmission Theres theft and new forms of

theft of growing scale and b oldness and sophistication With all these factors it was no surprise

to see the telcos large and small break out in a litany of bitter complaint

In late and throughout telco representatives grew shrill in their complaints to those few

American law enforcement ocials who make it their business to try to understand what telephone

p eople are talking ab out Telco security ocials had discovered the computerhacker underground

inltrated it thoroughly and b ecome deeply alarmed at its growing exp ertise Here they had found

a target that was not only loathsome on its face but clearly rip e for counterattack

Those bitter rivals ATT MCI and Sprint and a crowd of Baby Bells PacBell Bell South

Southwestern Bell NYNEX USWest as well as the Bell research consortium Bellcore and the

indep endent longdistance carrier MidAmerican all were to have their role in the great hacker

The Hacker Crackdown

dragnet of After years of b eing battered and pushed around the telcos had at least in a

small way seized the initiative again After years of turmoil telcos and government ocials were

once again to work smo othly in concert in defense of the System Optimism blossomed enthusiasm

grew on all sides the prosp ective taste of vengeance was sweet

From the b eginning even b efore the crackdown had a name secrecy was a big problem There

were many go o d reasons for secrecy in the hacker crackdown Hackers and co dethieves were wily

prey slinking back to their b edro oms and basements and destroying vital incriminating evidence

at the rst hint of trouble Furthermore the crimes themselves were heavily technical and dicult

to describ e even to p olice much less to the general public

When such crimes had b een describ ed intelligibl y to the public in the past that very publicity

had tended to increase the crimes enormously Telco ocials while painfully aware of the vul

nerabilities of their systems were anxious not to publicize those weaknesses Exp erience showed

them that those weaknesses once discovered would b e pitilessly exploited by tens of thousands of

p eople not only by professional grifters and by underground hackers and phone phreaks but by

many otherwise moreorless honest everyday folks who regarded stealing service from the faceless

soulless Phone Company as a kind of harmless indo or sp ort When it came to protecting their

interests telcos had long since given up on general public sympathy for the Voice with a Smile

Nowadays the telcos Voice was very likely to b e a computers and the American public showed

much less of the prop er resp ect and gratitude due the ne public service b equeathed them by Dr

Bell and Mr Vail The more ecient hightech computerized and imp ersonal the telcos b ecame

it seemed the more they were met by sullen public resentment and amoral greed

Telco ocials wanted to punish the phonephreak underground in as public and exemplary

a manner as p ossible They wanted to make dire examples of the worst oenders to seize the

ringleaders and intimidate the small fry to discourage and frighten the wacky hobbyists and send

the professional grifters to jail To do all this publicity was vital

Yet op erational secrecy was even more so If word got out that a nationwide crackdown was

coming the hackers might simply vanish destroy the evidence hide their computers go to earth

and wait for the campaign to blow over Even the young hackers were crafty and suspicious and as

for the professional grifters they tended to split for the nearest stateline at the rst sign of trouble

For the crackdown to work well they would all have to b e caught redhanded swept up on suddenly

out of the blue from every corner of the compass And there was another strong motive for secrecy

In the worstcase scenario a blown campaign might leave the telcos op en to a devastating hacker

counterattack If there were indeed hackers lo ose in America who had caused the January

Crash if there were truly gifted hackers lo ose in the nations longdistance switching systems

and enraged or frightened by the crackdown then they might react unpredictably to an attempt

to collar them Even if caught they might have talented and vengeful friends still running around

lo ose Conceivably it could turn ugly Very ugly In fact it was hard to imagine just how ugly

things might turn given that p ossibility Counterattack from hackers was a genuine concern for

the telcos In p oint of fact they would never suer any such counterattack But in months to

come they would b e at some pains to publicize this notion and to utter grim warnings ab out it

Still that risk seemed well worth running Better to run the risk of vengeful attacks than to

live at the mercy of p otential crashers Any cop would tell you that a protection racket had no real

future

And publicity was such a useful thing Corp orate security ocers including telco security

generally work under conditions of great discretion And corp orate security ocials do not make

money for their companies Their job is to prevent the loss of money which is much less glamorous

than actually winning prots If you are a corp orate security ocial and you do your job bril

liantly then nothing bad happ ens to your company at all Because of this you app ear completely

Chapter Crashing The System

sup eruous This is one of the many unattractive asp ects of security work Its rare that these

folks have the chance to draw some healthy attention to their own eorts

Publicity also served the interest of their friends in law enforcement Public ocials including

law enforcement ocials thrive by attracting favorable public interest A brilliant prosecution in

a matter of vital public interest can make the career of a prosecuting attorney And for a p olice

ocer go o d publicity op ens the purses of the legislature it may bring a citation or a promotion

or at least a rise in status and the resp ect of ones p eers

But to have b oth publicity and secrecy is to have ones cake and eat it to o In months to come

as we will show this imp ossible act was to cause great pain to the agents of the crackdown But

early on it seemed p ossible mayb e even likely that the crackdown could successfully combine

the b est of b oth worlds The arrest of hackers would b e heavily publicized The actual deeds of

the hackers which were technically hard to explain and also a security risk would b e left decently

obscured The threat hackers p osed would b e heavily trump eted the likeliho o d of their actually

committing such fearsome crimes would b e left to the publics imagination The spread of the

computer underground and its growing technical sophistication would b e heavily promoted the

actual hackers themselves mostly b esp ectacled middleclass white suburban teenagers would b e

denied any p ersonal publicity

It do es not seem to have o ccurred to any telco ocial that the hackers accused would demand a

day in court that journalists would smile up on the hackers as go o d copy that wealthy hightech

entrepreneurs would oer moral and nancial supp ort to crackdown victims that constitutional

lawyers would show up with briefcases frowning mightily This p ossibility do es not seem to have

ever entered the gameplan

And even if it had it probably would not have slowed the fero cious pursuit of a stolen phone

company do cument melliuously known as Control Oce Administration of Enhanced Ser

vices for Sp ecial Services and Ma jor Account Centers

In the chapters to follow we will explore the worlds of p olice and the computer underground

and the large shadowy area where they overlap But rst we must explore the battleground Before

we leave the world of the telcos we must understand what a switching system actually is and how

your telephone actually works

To the average citizen the idea of the telephone is represented by well a telephone a device

that you talk into

To a telco professional however the telephone itself is known in lordly fashion as a subset

The subset in your house is a mere adjunct a distant nerve ending of the central switching sta

tions which are ranked in levels of hierarchy up to the longdistance electronic switching stations

which are some of the largest computers on earth Let us imagine that it is say b efore

the intro duction of computers when the phone system was simpler and somewhat easier to grasp

Lets further imagine that you are Miss Leticia Luthor a ctional op erator for Ma Bell in New

York City of the s Basically you Miss Luthor are the switching system You are sitting in

front of a large vertical switchb oard known as a cordb oard made of shiny wo o den panels with

ten thousand metalrimmed holes punched in them known as jacks The engineers would have put

more holes into your switchb oard but ten thousand is as many as you can reach without actually

having to get up out of your chair

Each of these ten thousand holes has its own little electric lightbulb known as a lamp and

its own neatly printed numb er co de

With the ease of long habit you are scanning your b oard for litup bulbs This is what you do

most of the time so you are used to it

The Hacker Crackdown

A lamp lights up This means that the phone at the end of that line has b een taken o the

ho ok Whenever a handset is taken o the ho ok that closes a circuit inside the phone which then

signals the lo cal oce ie you automatically There might b e someb o dy calling or then again

the phone might b e simply o the ho ok but this do es not matter to you yet The rst thing you

do is record that numb er in your logb o ok in your ne American publicscho ol handwriting This

comes rst naturally since it is done for billing purp oses

You now take the plug of your answering cord which go es directly to your headset and plug it

into the litup hole Op erator you announce

In op erators classes b efore taking this job you have b een issued a large pamphlet full of canned

op erators resp onses for all kinds of contingencies which you had to memorize You have also b een

trained in a prop er nonregional nonethnic pronunciation and tone of voice You rarely have the

o ccasion to make any sp ontaneous remark to a customer and in fact this is frowned up on except

out on the rural lines where p eople have time on their hands and get up to all kinds of mischief

A toughsounding users voice at the end of the line gives you a numb er Immediately you write

that numb er down in your logb o ok next to the callers numb er which you just wrote earlier You

then lo ok and see if the numb er this guy wants is in fact on your switchb oard which it generally

is since its generally a lo cal call Long distance costs so much that p eople use it sparingly

Only then do you pick up a callingcord from a shelf at the base of the switchb oard This is a

long elastic cord mounted on a kind of reel so that it will zip back in when you unplug it There

are a lot of cords down there and when a bunch of them are out at once they lo ok like a nest of

snakes Some of the girls think there are bugs living in those cableholes Theyre called cable

mites and are supp osed to bite your hands and give you rashes You dont b elieve this yourself

Gripping the head of your callingcord you slip the tip of it deftly into the sleeve of the jack for

the called p erson Not all the way in though You just touch it If you hear a clicking sound that

means the line is busy and you cant put the call through If the line is busy you have to stick the

callingcord into a busytone jack which will give the guy a busytone This way you dont have

to talk to him yourself and absorb his natural human frustration

But the line isnt busy So you p op the cord all the way in Relay circuits in your b oard make

the distant phone ring and if someb o dy picks it up o the ho ok then a phone conversation starts

You can hear this conversation on your answering cord until you unplug it In fact you could listen

to the whole conversation if you wanted but this is sternly frowned up on by management and

frankly when youve overheard one youve pretty much heard em all

You can tell how long the conversation lasts by the glow of the callingcords lamp down on the

callingcords shelf When its over you unplug and the callingcord zips back into place

Having done this stu a few hundred thousand times you b ecome quite go o d at it In fact

youre plugging and connecting and disconnecting ten twenty forty cords at a time Its a

manual handicraft really quite satisfying in a way rather like weaving on an upright lo om

Should a longdistance call come up it would b e dierent but not all that dierent Instead of

connecting the call through your own lo cal switchb oard you have to go up the hierarchy onto the

longdistance lines known as trunklines Dep ending on how far the call go es it may have to work

its way through a whole series of op erators which can take quite a while The caller do esnt wait

on the line while this complex pro cess is negotiated across the country by the gaggle of op erators

Instead the caller hangs up and you call him back yourself when the call has nally worked its

way through

After four or ve years of this work you get married and you have to quit your job this b eing

the natural order of womanho o d in the American s The phone company has to train someb o dy

else mayb e two p eople since the phone system has grown somewhat in the meantime And this

costs money

Chapter Crashing The System

In fact to use any kind of human b eing as a switching system is a very exp ensive prop osition

Eight thousand Leticia Luthors would b e bad enough but a quarter of a million of them is a

militaryscale prop osition and makes drastic measures in automation nancially worthwhile

Although the phone system continues to grow to day the numb er of human b eings employed

by telcos has b een dropping steadily for years Phone op erators now deal with nothing but

unusual contingencies all routine op erations having b een shrugged o onto machines Consequently

telephone op erators are considerably less machinelike nowadays and have b een known to have

accents and actual character in their voices When you reach a human op erator to day the op erators

are rather more human than they were in Leticias day but on the other hand human b eings

in the phone system are much harder to reach in the rst place

Over the rst half of the twentieth century electromechanical switching systems of growing

complexity were cautiously intro duced into the phone system In certain backwaters some of these

hybrid systems are still in use But after the phone system b egan to go completely electronic

and this is by far the dominant mo de to day Electromechanical systems have crossbars and

brushes and other large moving mechanical parts which while faster and cheap er than Leticia

are still slow and tend to wear out fairly quickly

But fully electronic systems are inscrib ed on silicon chips and are lightningfast very cheap and

quite durable They are much cheap er to maintain than even the b est electromechanical systems

and they t into half the space And with every year the silicon chip grows smaller faster and

cheap er yet Best of all automated electronics work around the clo ck and dont have salaries or

health insurance

There are however quite serious drawbacks to the use of computerchips When they do break

down it is a daunting challenge to gure out what the heck has gone wrong with them A broken

cordb oard generally had a problem in it big enough to see A broken chip has invisible microscopic

faults And the faults in bad software can b e so subtle as to b e practically theological If you want

a mechanical system to do something new then you must travel to where it is and pull pieces out

of it and wire in new pieces This costs money However if you want a chip to do something new

all you have to do is change its software which is easy fast and dirtcheap You dont even have to

see the chip to change its program Even if you did see the chip it wouldnt lo ok like much A chip

with program X do esnt lo ok one whit dierent from a chip with program Y With the prop er co des

and sequences and access to sp ecialized phonelines you can change electronic switching systems

all over America from anywhere you please

And so can other p eople If they know how and if they want to they can sneak into a micro chip

via the sp ecial phonelines and diddle with it leaving no physical trace at all If they broke into the

op erators station and held Leticia at gunp oint that would b e very obvious If they broke into a

telco building and went after an electromechanical switch with a to olb elt that would at least leave

many traces But p eople can do all manner of amazing things to computer switches just by typing

on a keyb oard and keyb oards are everywhere to day The extent of this vulnerability is deep dark

broad almost mindb oggling and yet this is a basic primal fact of life ab out any computer on a

network

Security exp erts over the past twenty years have insisted with growing urgency that this basic

vulnerability of computers represents an entirely new level of risk of unknown but obviously dire

p otential to so ciety And they are right

An electronic switching station do es pretty much everything Letitia did except in nanoseconds

and on a much larger scale Compared to Miss Luthors ten thousand jacks even a primitive ESS

switching computer s vintage has a lines And the current ATT system of choice is

the monstrous fthgeneration ESS

An Electronic Switching Station can scan every line on its b oard in a tenth of a second and

it do es this over and over tirelessly around the clo ck Instead of eyes it uses ferro d scanners to

check the condition of lo cal lines and trunks Instead of hands it has signal distributors central

The Hacker Crackdown

pulse distributors magnetic latching relays and reed switches which complete and break the

calls Instead of a brain it has a central pro cessor Instead of an instruction manual it has a

program Instead of a handwritten logb o ok for recording and billing calls it has magnetic tap es

And it never has to talk to anyb o dy Everything a customer might say to it is done by punching

the directdial tone buttons on your subset

Although an Electronic Switching Station cant talk it do es need an interface some way to relate

to its er employers This interface is known as the master control center This interface might

b e b etter known simply as the interface since it do esnt actually control phone calls directly

However a term like Master Control Center is just the kind of rhetoric that telco maintenance

engineers and hackers nd particularly satisfying Using the master control center a phone

engineer can test lo cal and trunk lines for malfunctions He rarely she can check various alarm

displays measure trac on the lines examine the records of telephone usage and the charges for

those calls and change the programming

And of course anyb o dy else who gets into the master control center by remote control can also

do these things if he rarely she has managed to gure them out or more likely has somehow

swip ed the knowledge from p eople who already know

In and one particular RBOC BellSouth which felt particularly troubled sp ent

a purp orted million on Some think it sp ent as much as two million if

you count all the asso ciated costs Two million dollars is still very little compared to the great

costsaving utility of telephonic computer systems

Unfortunately computers are also stupid Unlike human b eings computers p ossess the truly

profound stupidity of the inanimate

In the s in the rst sho cks of spreading computerization there was much easy talk ab out

the stupidity of computers how they could only follow the program and were rigidly required

to do only what they were told There has b een rather less talk ab out the stupidity of computers

since they b egan to achieve grandmaster status in chess tournaments and to manifest many other

impressive forms of apparent cleverness

Nevertheless computers still are profoundly brittle and stupid they are simply vastly more

subtle in their stupidity and brittleness The computers of the s are much more reliable in

their comp onents than earlier computer systems but they are also called up on to do far more

complex things under far more challenging conditions

On a basic mathematical level every single line of a software program oers a chance for some

p ossible screwup Software do es not sit still when it works it runs it interacts with itself and

with its own inputs and outputs By analogy it stretches like putty into millions of p ossible shap es

and conditions so many shap es that they can never all b e successfully tested not even in the

lifespan of the universe Sometimes the putty snaps

The stu we call software is not like anything that human so ciety is used to thinking ab out

Software is something like a machine and something like mathematics and something like language

and something like thought and art and information::: but software is not in fact any of those

other things The protean quality of software is one of the great sources of its fascination It also

makes software very p owerful very subtle very unpredictable and very risky

Some software is bad and buggy Some is robust even bulletpro of The b est software is

that which has b een tested by thousands of users under thousands of dierent conditions over

years It is then known as stable This do es not mean that the software is now awless free of

bugs It generally means that there are plenty of bugs in it but the bugs are wellidentied and

fairly well understo o d

There is simply no way to assure that software is free of aws Though software is mathematical

in nature it cannot b e proven like a mathematical theorem software is more like language with

Chapter Crashing The System

inherent ambiguities with dierent denitions dierent assumptions dierent levels of meaning

that can conict

Human b eings can manage more or less with human language b ecause we can catch the gist

of it

Computers despite years of eort in articial intelligence have proven sp ectacularly bad in

catching the gist of anything at all The tiniest bit of semantic grit may still bring the mightiest

computer tumbling down One of the most hazardous things you can do to a computer program is

try to improve it to try to make it safer Software patches represent new untried unstable

software which is by denition riskier

The mo dern telephone system has come to dep end utterly and irretrievably up on software

And the System Crash of January was caused by an improvement in software Or rather

an attempted improvement

As it happ ened the problem itself the problem p er se to ok this form A piece of telco

software had b een written in C language a standard language of the telco eld Within the C

software was a long do::: while construct The do::: while construct contained a switch

statement The switch statement contained an if clause The if clause contained a break

The break was supp osed to break the if clause Instead the break broke the switch

statement

That was the problem the actual reason why p eople picking up phones on January

could not talk to one another

Or at least that was the subtle abstract cyb erspatial seed of the problem This is how the

problem manifested itself from the realm of programming into the realm of real life

The System software for ATTs ESS switching station the Generic E Central Oce

Switch Software had b een extensively tested and was considered very stable By the end of

eighty of ATTs switching systems nationwide had b een programmed with the new soft

ware Cautiously thirty four stations were left to run the slower lesscapable System b ecause

ATT susp ected there might b e shakedown problems with the new and unprecedently sophisticated

System network

The stations with System were programmed to switch over to a backup net in case of any

problems In midDecemb er however a new highvelo city high security software patch was

distributed to each of the ESS switches that would enable them to switch over even more quickly

making the System network that much more secure

Unfortunately every one of these ESS switches was now in p ossession of a small but deadly

aw

In order to maintain the network switches must monitor the condition of other switches

whether they are up and running whether they have temp orarily shut down whether they are

overloaded and in need of assistance and so forth The new software help ed control this b o okkeeping

function by monitoring the status calls from other switches

It only takes four to six seconds for a troubled ESS switch to rid itself of all its calls drop

everything temp orarily and reb o ot its software from scratch Starting over from scratch will

generally rid the switch of any software problems that may have develop ed in the course of running

the system Bugs that arise will b e simply wip ed out by this pro cess It is a clever idea This

pro cess of automatically reb o oting from scratch is known as the normal fault recovery routine

Since ATTs software is in fact exceptionally stable systems rarely have to go into fault recovery

in the rst place but ATT has always b oasted of its real world reliability and this tactic is a

b eltandsusp enders routine

The ESS switch used its new software to monitor its fellow switches as they recovered from

faults As other switches came back on line after recovery they would send their OK signals to

The Hacker Crackdown

the switch The switch would make a little note to that eect in its status map recognizing that

the fellow switch was back and ready to go and should b e sent some calls and put back to regular

work

Unfortunately while it was busy b o okkeeping with the status map the tiny aw in the brand

new software came into play The aw caused the ESS switch to interacted subtly but drastically

with incoming telephone calls from human users If and only if two incoming phonecalls

happ ened to hit the switch within a hundredth of a second then a small patch of data would b e

garbled by the aw

But the switch had b een programmed to monitor itself constantly for any p ossible damage to

its data When the switch p erceived that its data had b een somehow garbled then it to o would

go down for swift repairs to its software It would signal its fellow switches not to send any more

work It would go into the fault recovery mo de for four to six seconds And then the switch would

b e ne again and would send out its OK ready for work signal

However the OK ready for work signal was the very thing that had caused the switch to

go down in the rst place And all the System switches had the same aw in their statusmap

software As so on as they stopp ed to make the b o okkeeping note that their fellow switch was

OK then they to o would b ecome vulnerable to the slight chance that two phonecalls would hit

them within a hundredth of a second

At approximately pm EST on Monday January one of ATTs ESS toll switching

systems in New York City had an actual legitimate minor problem It went into fault recovery

routines announced Im going down then announced Im back Im OK And this cheery

message then blasted throughout the network to many of its fellow ESS switches Many of the

switches at rst completely escap ed trouble These lucky switches were not hit by the coincidence

of two phone calls within a hundredth of a second Their software did not fail at rst But three

switches in Atlanta St Louis and Detroit were unlucky and were caught with their hands

full And they went down And they came back up almost immediately And they to o b egan to

broadcast the lethal message that they to o were OK again activating the lurking software bug

in yet other switches

As more and more switches did have that bit of bad luck and collapsed the calltrac b ecame

more and more densely packed in the remaining switches which were groaning to keep up with the

load And of course as the calls b ecame more densely packed the switches were much more likely

to b e hit twice within a hundredth of a second It only to ok four seconds for a switch to get well

There was no physical damage of any kind to the switches after all Physically they were working

p erfectly This situation was only a software problem But the ESS switches were leaping up

and down every four to six seconds in a virulent spreading wave all over America in utter manic

mechanical stupidity They kept kno cking one another down with their contagious OK messages

It to ok ab out ten minutes for the chain reaction to cripple the network Even then switches would

p erio dically luckout and manage to resume their normal work Many calls millions of them

were managing to get through But millions werent

The switching stations that used System were not directly aected Thanks to these old

fashioned switches ATTs national system avoided complete collapse This fact also made it

clear to engineers that System was at fault

Bell Labs engineers working feverishly in New Jersey Illinois and Ohio rst tried their entire

rep ertoire of standard network remedies on the malfunctioning System None of the remedies

worked of course b ecause nothing like this had ever happ ened to any phone system b efore

By cutting out the backup safety network entirely they were able to reduce the frenzy of OK

messages by ab out half The system then b egan to recover as the chain reaction slowed By

pm on Monday January sweating engineers on the midnight shift breathed a sigh of relief as

the last switch clearedup

Chapter Crashing The System

By Tuesday they were pulling all the brandnew ESS software and replacing it with an earlier

version of System If these had b een human op erators rather than computers at work someone

would simply have eventually stopp ed screaming It would have b een obvious that the situation was

not OK and common sense would have kicked in Humans p ossess common sense at least to

some extent Computers simply dont On the other hand computers can handle hundreds of calls

p er second Humans simply cant If every single human b eing in America worked for the phone

company we couldnt match the p erformance of digital switches directdialli ng threeway calling

sp eedcalling callwaiting Caller ID all the rest of the cornucopia of digital b ounty Replacing

computers with op erators is simply not an option any more

And yet we still anachronistically exp ect humans to b e running our phone system It is hard

for us to understand that we have sacriced huge amounts of initiative and control to senseless

yet p owerful machines When the phones fail we want someb o dy to b e resp onsible We want

someb o dy to blame

When the Crash of January happ ened the American p opulace was simply not prepared to

understand that enormous landslides in cyb erspace like the Crash itself can happ en and can b e

nob o dys fault in particular It was easier to b elieve mayb e even in some o dd way more reassuring

to b elieve that some evil p erson or evil group had done this to us Hackers had done it With a

virus A tro jan horse A software b omb A dirty plot of some kind People b elieved this resp onsible

p eople In they were lo oking hard for evidence to conrm their heartfelt suspicions

And they would lo ok in a lot of places Come however the outlines of an apparent new

reality would b egin to emerge from the fog

On July and computersoftware collapses in telephone switching stations disrupted

service in Washington DC Pittsburgh Los Angeles and San Francisco Once again seemingly

minor maintenance problems had crippled the digital System Ab out twelve million p eople were

aected in the Crash of July

Said the New York Times Service Telephone company executives and federal regulators said

they were not ruling out the p ossibility of sab otage by computer hackers but most seemed to think

the problems stemmed from some unknown defect in the software running the networks

And sure enough within the week a redfaced software company DSC Communications Corp o

ration of Plano Texas owned up to glitches in the signal transfer p oint software that DSC had

designed for Bell Atlantic and Pacic Bell The immediate cause of the July Crash was a single

mistyp ed character one tiny typ ographical aw in one single line of the software One mistyp ed

letter in one single line had deprived the nations capital of phone service It was not particularly

surprising that this tiny aw had escap ed attention a typical System station requires ten million

lines of co de

On Tuesday Septemb er came the most sp ectacular outage yet This case had nothing

to do with software failures at least not directly Instead a group of ATTs switching stations in

New York City had simply run out of electrical p ower and shut down cold Their backup batteries

had failed Automatic warning systems were supp osed to warn of the loss of battery p ower but

those automatic systems had failed as well

This time Kennedy La Guardia and Newark airp orts all had their voice and data communica

tions cut This horrifying event was particularly ironic as attacks on airp ort computers by hackers

had long b een a standard nightmare scenario much trump eted by computersecurity exp erts who

feared the computer underground There had even b een a Hollywo o d thriller ab out sinister hackers

ruining airp ort computers Die Hard I I

Now ATT itself had crippled airp orts with computer malfunctions not just one airp ort but

three at once some of the busiest in the world

Air trac came to a standstill throughout the Greater New York area causing more than

ights to b e cancelled in a spreading wave all over America and even into Europ e Another or

The Hacker Crackdown

so ights were delayed aecting all in all ab out passengers One of these passengers was

the chairman of the Federal Communications Commission

Stranded passengers in New York and New Jersey were further infuriated to discover that they

could not even manage to make a long distance phone call to explain their delay to loved ones or

business asso ciates Thanks to the crash ab out four and a half million domestic calls and half a

million international calls failed to get through The Septemb er NYC Crash unlike the previous

ones involved not a whisp er of hacker misdeeds On the contrary by ATT itself was

suering much of the vilication that had formerly b een directed at hackers Congressmen were

grumbling So were state and federal regulators And so was the press

For their part ancient rival MCI to ok out snide fullpage newspap er ads in New York oering

their own longdistance services for the next time that ATT go es down You wouldnt nd

a classy company like ATT using such advertising protested ATT Chairman Rob ert Allen

unconvincingly Once again out came the fullpage ATT ap ologies in newspap ers ap ologies for

an inexcusable culmination of b oth human and mechanical failure This time however ATT

oered no discount on later calls Unkind critics suggested that ATT were worried ab out setting

any precedent for refunding the nancial losses caused by telephone crashes

Industry journals asked publicly if ATT was asleep at the switch The telephone network

Americas purp orted marvel of hightech reliabili ty had gone down three times in months

Fortune magazine listed the Crash of Septemb er among the Biggest Business Go ofs of

cruelly paro dying ATTs ad campaign in an article entitled ATT Wants You Back Safely On

the Ground Go d Willing

Why had those New York switching systems simply run out of p ower Because no human b eing

had attended to the alarm system Why did the alarm systems blare automatically without any

human b eing noticing Because the three telco technicians who should have b een listening were

absent from their stations in the p owerro om on another o or of the building attending a training

class A training class ab out the alarm systems for the p ower ro om

Crashing the System was no longer unprecedented by late On the contrary it no

longer even seemed an o ddity By it was clear that all the p olicemen in the world could no

longer protect the phone system from crashes By far the worst crashes the system had ever

had had b een inicted by the system up on itself And this time nob o dy was making co cksure

statements that this was an anomaly something that would never happ en again By the

Systems defenders had met their nebulous Enemy and the Enemy was the System

Chapter The Digital Underground

The Digital Underground

Steal This Phone and Hacking The View From Under the Flo orb oards

Boards Core of the Underground Phile Phun The Rakes Progress Strongholds

of the Elite Sting Boards Hot Potato es War on the Legion Terminus Phile

War Games Real Cyb erpunk

The date was May The Pop e was touring Mexico City Hustlers from the Medellin

Cartel were trying to buy blackmarket Stinger missiles in Florida On the comics page Do onesbury

character Andy was dying of AIDS

And then::: a highly unusual item whose novelty and calculated rhetoric won it headscratching

attention in newspap ers all over America The US Attorneys oce in Pho enix Arizona had

issued a press release announcing a nationwide law enforcement crackdown against illegal computer

hacking activities The sweep was ocially known as Op eration Sundevil

Eight paragraphs in the press release gave the bare facts twentyseven search warrants carried

out on May with three arrests and a hundred and fty agents on the prowl in twelve cities

across America Dierent counts in lo cal press rep orts yielded thirteen fourteen and six

teen cities Ocials estimated that criminal losses of revenue to telephone companies may run

into millions of dollars Credit for the Sundevil investigations was taken by the US Secret Service

Assistant US Attorney Tim Holtzen of Pho enix and the Assistant Attorney General of Arizona

Gail Thackeray

The prepared remarks of Garry M Jenkins app earing in a US Department of Justice press

release were of particular interest Mr Jenkins was the Assistant Director of the US Secret Service

and the highestranking federal ocial to take any direct public role in the hacker crackdown of

To day the Secret Service is sending a clear message to those computer hackers who have decided

to violate the laws of this nation in the mistaken b elief that they can successfully avoid detection

by hiding b ehind the relative anonymity of their computer terminals::: Underground groups

have b een formed for the purp ose of exchanging information relevant to their criminal activities

These groups often communicate with each other through message systems b etween computers

called bulletin b oards Our exp erience shows that many computer hacker susp ects are no longer

misguided teenagers mischievously playing games with their computers in their b edro oms Some

are now high tech computer op erators using computers to engage in unlawful conduct

Who were these underground groups and hightech op erators Where had they come from

What did they want Who were they Were they mischievous Were they dangerous How

had misguided teenagers managed to alarm the United States Secret Service And just how

widespread was this sort of thing Of all the ma jor players in the Hacker Crackdown the phone

companies law enforcement the civil lib ertarians and the hackers themselves the hackers

are by far the most mysterious by far the hardest to understand by far the weirdest

Not only are hackers novel in their activities but they come in a variety of o dd sub cultures

with a variety of languages motives and values

The earliest protohackers were probably those unsung mischievous telegraph b oys who were

summarily red by the Bell Company in

Legitimate hackers those computer enthusiasts who are indep endentminde d but lawabiding

generally trace their spiritual ancestry to elite technical universities esp ecially MIT and Stanford in the s

The Hacker Crackdown

But the genuine ro ots of the mo dern hacker underground can probably b e traced most suc

cessfully to a now muchobscured hippie anarchist movement known as the Yippies The Yippies

who to ok their name from the largely ctional Youth International Party carried out a loud and

lively p olicy of surrealistic subversion and outrageous p olitical mischief Their basic tenets were

agrant sexual promiscuity op en and copious drug use the p olitical overthrow of any p owermonger

over thirty years of age and an immediate end to the war in Vietnam by any means necessary

including the psychic levitation of the Pentagon The two most visible Yippies were Abbie Homan

and Jerry Rubin Rubin eventually b ecame a Wall Street broker Homan ardently sought by

federal authorities went into hiding for seven years in Mexico France and the United States

While on the lam Homan continued to write and publish with help from sympathizers in the

American anarcholeftist underground Mostly Homan survived through false ID and o dd jobs

Eventually he underwent facial plastic surgery and adopted an entirely new identity as one Barry

Freed After surrendering himself to authorities in Homan sp ent a year in prison on a

co caine conviction

Homans worldview grew much darker as the glory days of the s faded In he

purp ortedly committed suicide under o dd and to some rather suspicious circumstances

Abbie Homan is said to have caused the Federal Bureau of Investigation to amass the single

largest investigation le ever op ened on an individual American citizen If this is true it is still

questionable whether the FBI regarded Abbie Homan a serious public threat quite p ossibly

his le was enormous simply b ecause Homan left colorful legendry wherever he went He was

a gifted publicist who regarded electronic media as b oth playground and weap on He actively

enjoyed manipulating network TV and other gullible imagehungry media with various weird lies

mindb oggling rumors imp ersonation scams and other sinister distortions all absolutely guaranteed

to upset cops Presidential candidates and federal judges Homans most famous work was a b o ok

selfreexively known as Steal This Bo ok which publicize d a numb er of metho ds by which young

p enniless hippie agitators might live o the fat of a system supp orted by humorless drones Steal

This Bo ok whose title urged readers to damage the very means of distribution which had put it

into their hands might b e describ ed as a spiritual ancestor of a computer virus

Homan like many a later conspirator made extensive use of payphones for his agitation work

in his case generally through the use of cheap brass washers as coinslugs

During the Vietnam War there was a federal surtax imp osed on telephone service Homan and

his cohorts could and did argue that in systematically stealing phone service they were engaging

in civil disob edience virtuously denying tax funds to an illegal and immoral war But this thin

veil of decency was so on dropp ed entirely Rippingo the System found its own justication in

deep alienation and a basic outlaw contempt for conventional b ourgeois values Ingenious vaguely

p oliticized varieties of ripo which might b e describ ed as anarchy by convenience b ecame very

p opular in Yippie circles and b ecause ripo was so useful it was to survive the Yippie movement

itself In the early s it required fairly limited exp ertise and ingenuity to cheat payphones to

divert free electricity and gas service or to rob vending machines and parking meters for handy

p o cket change It also required a conspiracy to spread this knowledge and the gall and nerve

actually to commit p etty theft but the Yippies had these qualications in plenty In June

Abbie Homan and a telephone enthusiast sarcastically known as Al Bell b egan publishing a

newsletter called Youth International Party Line This newsletter was dedicated to collating and

spreading Yippie ripo techniques esp ecially of phones to the joy of the freewheeling underground

and the insensate rage of all straight p eople

As a p olitical tactic phoneservice theft ensured that Yippie advo cates would always have ready

access to the longdistance telephone as a medium despite the Yippies chronic lack of organization

discipline money or even a steady home address

Party Line was run out of Greenwich Village for a couple of years then Al Bell more or

less defected from the faltering ranks of Yippiedom changing the newsletters name to TAP or

Technical Assistance Program After the Vietnam War ended the steam b egan leaking rapidly out

Chapter The Digital Underground

of American radical dissent But by this time Bell and his dozen or so core contributors had

the bit b etween their teeth and had b egun to derive tremendous gutlevel satisfaction from the

sensation of pure technical p ower

TAP articles once highly p oliticized b ecame pitilessly jargonized and technical in homage or

paro dy to the Bell Systems own technical do cuments which TAP studied closely gutted and

repro duced without p ermission The TAP elite revelled in gloating p ossession of the sp ecialized

knowledge necessary to b eat the system

Al Bell dropp ed out of the game by the late s and Tom Edison to ok over TAP readers

some of them all told now b egan to show more interest in switches and the growing

phenomenon of computer systems In Tom Edison had his computer stolen and his house

set on re by an arsonist This was an eventually mortal blow to TAP though the legendary name

was to b e resurrected in by a young Kentuckian computer outlaw named Predatr

Ever since telephones b egan to make money there have b een p eople willing to rob and defraud

phone companies The legions of p etty phone thieves vastly outnumb er those phone phreaks who

explore the system for the sake of the intellectual challenge The New York metrop olitan area

long in the vanguard of American crime claims over physical attacks on pay telephones

every year Studied carefully a mo dern payphone reveals itself as a little fortress carefully designed

and redesigned over generations to resist coinslugs zaps of electricity chunks of coinshap ed ice

prybars magnets lo ckpicks blasting caps Public payphones must survive in a world of unfriendly

greedy p eople and a mo dern payphone is as exquisitely evolved as a cactus

Because the phone network predates the computer network the scoaws known as phone

phreaks predate the scoaws known as computer hackers In practice to day the line b etween

phreaking and hacking is very blurred just as the distinction b etween telephones and comput

ers has blurred The phone system has b een digitized and computers have learned to talk over

phonelines Whats worse and this was the p oint of the Mr Jenkins of the Secret Service some

hackers have learned to steal and some thieves have learned to hack

Despite the blurring one can still draw a few useful b ehavioral distinctions b etween phreaks

and hackers Hackers are intensely interested in the system p er se and enjoy relating to

machines Phreaks are more so cial manipulating the system in a roughandready fashion in

order to get through to other human b eings fast cheap and under the table

Phone phreaks love nothing so much as bridges illegal conference calls of ten or twelve chatting

conspirators seab oard to seab oard lasting for many hours and running of course on someb o dy

elses tab preferably a large corp orations As phonephreak conferences wear on p eople drop out

or simply leave the phone o the ho ok while they sashay o to work or scho ol or babysitting

and new p eople are phoned up and invited to join in from some other continent if p ossible

Technical trivia b oasts brags lies headtrip deceptions weird rumors and cruel gossip are all

freely exchanged The lowest rung of phonephreaking is the theft of telephone access co des

Charging a phone call to someb o dy elses stolen numb er is of course a pigeasy way of stealing

phone service requiring practically no technical exp ertise This practice has b een very widespread

esp ecially among lonely p eople without much money who are far from home Co de theft has

ourished esp ecially in college dorms military bases and notoriously among roadies for ro ck

bands Of late co de theft has spread very rapidly among Third Worlders in the US who pile up

enormous unpaid longdistance bills to the Caribb ean South America and Pakistan

The simplest way to steal phoneco des is simply to lo ok over a victims shoulder as he punches

in his own co denumb er on a public payphone This technique is known as shouldersurng

and is esp ecially common in airp orts bus terminals and train stations The co de is then sold by

the thief for a few dollars The buyer abusing the co de has no computer exp ertise but calls his

The Hacker Crackdown

Mom in New York Kingston or Caracas and runs up a huge bill with impunity The losses from

this primitive phreaking activity are far far greater than the monetary losses caused by computer

intruding hackers In the midtolate s until the intro duction of sterner telco security measures

computerized co de theft worked like a charm and was virtually omnipresent throughout the digital

underground among phreaks and hackers alike This was accomplished through programming

ones computer to try random co de numb ers over the telephone until one of them worked Simple

programs to do this were widely available in the underground a computer running all night was

likely to come up with a dozen or so useful hits This could b e rep eated week after week until one

had a large library of stolen co des

Nowadays the computerized dialling of hundreds of numb ers can b e detected within hours and

swiftly traced If a stolen co de is rep eatedly abused this to o can b e detected within a few hours

But for years in the s the publication of stolen co des was a kind of elementary etiquette for

edgling hackers The simplest way to establish your b onades as a raider was to steal a co de

through rep eated random dialling and oer it to the community for use Co des could b e b oth

stolen and used simply and easily from the safety of ones own b edro om with very little fear of

detection or punishment

Before computers and their phoneline mo dems entered American homes in gigantic numb ers

phone phreaks had their own sp ecial telecommunications hardware gadget the famous blue b ox

This fraud device now rendered increasingly useless by the digital evolution of the phone sys

tem could trick switching systems into granting free access to longdistance lines It did this by

mimicking the systems own signal a tone of hertz

Steven Jobs and Steve Wozniak the founders of Apple Computer Inc once dabbled in selling

blueb oxes in college dorms in California For many in the early days of phreaking blueb oxing

was scarcely p erceived as theft but rather as a fun if sneaky way to use excess phone capacity

harmlessly After all the longdistance lines were just sitting there ::: Whom did it hurt really

If youre not damaging the system and youre not using up any tangible resource and if nob o dy

nds out what you did then what real harm have you done What exactly have you stolen

anyway If a tree falls in the forest and nob o dy hears it how much is the noise worth Even now

this remains a rather dicey question

Blueb oxing was no joke to the phone companies however Indeed when Ramparts magazine

a radical publication in California printed the wiring schematics necessary to create a mute b ox

in June the magazine was seized by p olice and Pacic Bell phonecompany ocials The

mute b ox a blueb ox variant allowed its user to receive longdistance calls free of charge to the

caller This device was closely describ ed in a Ramparts article wryly titled Regulating the Phone

Company In Your Home Publication of this article was held to b e in violation of Californian

State Penal Co de section which outlaws ownership of wirefraud devices and the selling of

plans or instructions for any instrument apparatus or device intended to avoid telephone toll

charges

Issues of Ramparts were recalled or seized on the newsstands and the resultant loss of income

help ed put the magazine out of business This was an ominous precedent for freeexpression issues

but the telcos crushing of a radicalfringe magazine passed without serious challenge at the time

Even in the freewheeling California s it was widely felt that there was something sacrosanct

ab out what the phone company knew that the telco had a legal and moral right to protect itself

by shutting o the ow of such illicit information Most telco information was so sp ecialized that

it would scarcely b e understo o d by any honest memb er of the public If not published it would

not b e missed To print such material did not seem part of the legitimate role of a free press

In there would b e a similar telcoinspired attack on the electronic phreakhacking mag

azine Phrack The Phrack legal case b ecame a central issue in the Hacker Crackdown and gave

rise to great controversy Phrack would also b e shut down for a time at least but this time b oth

the telcos and their law enforcement allies would pay a much larger price for their actions The

Phrack case will b e examined in detail later

Chapter The Digital Underground

Phonephreaking as a so cial practice is still very much alive at this moment To day phone

phreaking is thriving much more vigorously than the b etterknown and worsefeared practice of

computer hacking New forms of phreaking are spreading rapidly following new vulnerabilities

in sophisticated phone services

Cellular phones are esp ecially vulnerable their chips can b e reprogrammed to present a false

caller ID and avoid billing Doing so also avoids p olice tapping making cellularphone abuse a

favorite among drugdealers Callsell op erations using pirate cellular phones can and have

b een run right out of the backs of cars which move from cell to cell in the lo cal phone

system retailing stolen longdistance service like some kind of demented electronic version of the

neighb orho o d icecream truck

Private branchexchange phone systems in large corp orations can b e p enetrated phreaks dialup

a lo cal company enter its internal phonesystem hack it then use the companys own PBX system

to dial back out over the public network causing the company to b e stuck with the resulting long

distance bill This technique is known as diverting Diverting can b e very costly esp ecially

b ecause phreaks tend to travel in packs and never stop talking Perhaps the worst bypro duct of

this PBX fraud is that victim companies and telcos have sued one another over the nancial

resp onsibility for the stolen calls thus enriching not only shabby phreaks but wellpaid lawyers

Voicemail systems can also b e abused phreaks can seize their own sections of these so

phisticated electronic answering machines and use them for trading co des or knowledge of illegal

techniques Voicemail abuse do es not hurt the company directly but nding supp osedly empty

slots in your companys answering machine all crammed with phreaks eagerly chattering and hey

duding one another in imp enetrable jargon can cause sensations of almost mystical repulsion and

dread

Worse yet phreaks have sometimes b een known to react truculently to attempts to clean up

the voicemail system Rather than humbly acquiescing to b eing thrown out of their playground

they may very well call up the company ocials at work or at home and loudly demand free

voicemail addresses of their very own Such bullying is taken very seriously by sp o oked victims

Acts of phreak revenge against straight p eople are rare but voicemail systems are esp ecially

tempting and vulnerable and an infestation of angry phreaks in ones voicemail system is no joke

They can erase legitimate messages or spy on private messages or harass users with recorded

taunts and obscenities Theyve even b een known to seize control of voicemail security and lo ck

out legitimate users or even shut down the system entirely

Cellular phonecalls cordless phones and shiptoshore telephony can all b e monitored by var

ious forms of radio this kind of passive monitoring is spreading explosively to day Technically

eavesdropping on other p eoples cordless and cellular phonecalls is the fastest growing area in

phreaking to day This practice strongly app eals to the lust for p ower and conveys gratifying sensa

tions of technical sup eriority over the eavesdropping victim Monitoring is rife with all manner of

tempting evil mischief Simple prurient sno oping is by far the most common activity But credit

card numb ers unwarily sp oken over the phone can b e recorded stolen and used And tapping

p eoples phonecalls whether through active telephone taps or passive radio monitors do es lend

itself conveniently to activities like blackmail industrial espionage and p olitical dirty tricks It

should b e rep eated that telecommunications fraud the theft of phone service causes vastly greater

monetary losses than the practice of entering into computers by stealth Hackers are mostly young

suburban American white males and exist in their hundreds but phreaks come from b oth sexes

and from many nationalities ages and ethnic backgrounds and are ourishing in the thousands

The term hacker has had an unfortunate history This b o ok The Hacker Crackdown has little

to say ab out hacking in its ner original sense The term can signify the freewheeling intellectual

The Hacker Crackdown

exploration of the highest and deep est p otential of computer systems Hacking can describ e the

determination to make access to computers and information as free and op en as p ossible Hacking

can involve the heartfelt conviction that b eauty can b e found in computers that the ne aesthetic

in a p erfect program can lib erate the mind and spirit This is hacking as it was dened in Steven

Levys muchpraised history of the pioneer computer milieu Hackers published in

Hackers of all kinds are absolutely soaked through with heroic antibureaucratic sentiment

Hackers long for recognition as a praiseworthy cultural archetyp e the p ostmo dern electronic equiv

alent of the cowb oy and mountain man Whether they deserve such a reputation is something for

history to decide But many hackers including those outlaw hackers who are computer intruders

and whose activities are dened as criminal actually attempt to live up to this technocowb oy rep

utation And given that electronics and telecommunications are still largely unexplored territories

there is simply no telling what hackers might uncover

For some p eople this freedom is the very breath of oxygen the inventive sp ontaneity that makes

life worth living and that ings op en do ors to marvellous p ossibility and individual emp owerment

But for many p eople and increasingly so the hacker is an ominous gure a smart aleck so ciopath

ready to burst out of his basement wilderness and savage other p eoples lives for his own anarchical

convenience

Any form of p ower without resp onsibility without direct and formal checks and balances is

frightening to p eople and reasonably so It should b e frankly admitted that hackers are fright

ening and that the basis of this fear is not irrational Fear of hackers go es well b eyond the fear of

merely criminal activity

Subversion and manipulation of the phone system is an act with disturbing p olitical overtones In

America computers and telephones are p otent symb ols of organized authority and the techno cratic

business elite

But there is an element in American culture that has always strongly reb elled against these

symb ols reb elled against all large industrial computers and all phone companies A certain anar

chical tinge deep in the American soul delights in causing confusion and pain to all bureaucracies

including technological ones

There is sometimes malice and vandalism in this attitude but it is a deep and cherished part

of the American national character The outlaw the reb el the rugged individual the pioneer the

sturdy Jeersonian yeoman the private citizen resisting interference in his pursuit of happiness

these are gures that all Americans recognize and that many will strongly applaud and defend

Many scrupulously lawabiding citizens to day do cuttingedge work with electronics work that

has already had tremendous so cial inuence and will have much more in years to come In all truth

these talented hardworking lawabiding mature adult p eople are far more disturbing to the p eace

and order of the current status quo than any scoaw group of romantic teenage punk kids These

lawabiding hackers have the p ower ability and willingness to inuence other p eoples lives quite

unpredictably They have means motive and opp ortunity to meddle drastically with the American

so cial order When corralled into governments universities or large multinational companies and

forced to follow ruleb o oks and wear suits and ties they at least have some conventional halters

on their freedom of action But when lo osed alone or in small groups and red by imagination

and the entrepreneurial spirit they can move mountains causing landslides that will likely crash

directly into your oce and living ro om

These p eople as a class instinctively recognize that a public p oliticized attack on hackers will

eventually spread to them that the term hacker once demonized might b e used to kno ck their

hands o the levers of p ower and choke them out of existence There are hackers to day who ercely

and publicly resist any b esmirching of the noble title of hacker Naturally and understandably

they deeply resent the attack on their values implicit in using the word hacker as a synonym for computercriminal

Chapter The Digital Underground

This b o ok sadly but in my opinion unavoidably rather adds to the degradation of the term

It concerns itself mostly with hacking in its commonest latterday denition ie intruding into

computer systems by stealth and without p ermission The term hacking is used routinely to day

by almost all law enforcement ocials with any professional interest in computer fraud and abuse

American p olice describ e almost any crime committed with by through or against a computer as

hacking

Most imp ortantly hacker is what computer intruders cho ose to call themselves Nob o dy

who hacks into systems willingly describ es himself rarely herself as a computer intruder

computer trespasser cracker wormer darkside hacker or high tech street gangster

Several other demeaning terms have b een invented in the hop e that the press and public will leave

the original sense of the word alone But few p eople actually use these terms I exempt the

term cyb erpunk which a few hackers and law enforcement p eople actually do use The term

cyb erpunk is drawn from literary criticism and has some o dd and unlikely resonances but like

hacker cyb erpunk to o has b ecome a criminal p ejorative to day

In any case breaking into computer systems was hardly alien to the original hacker tradition

The rst tottering systems of the s required fairly extensive internal surgery merely to function

daybyday Their users invaded the deep est most arcane recesses of their op erating software

almost as a matter of routine Computer security in these early primitive systems was at b est

an afterthought What security there was was entirely physical for it was assumed that anyone

allowed near this exp ensive arcane hardware would b e a fully qualied professional exp ert

In a campus environment though this meant that grad students teaching assistants under

graduates and eventually all manner of drop outs and hangerson ended up accessing and often

running the works

Universities even mo dern universities are not in the business of maintaining security over

information On the contrary universities as institutions predate the information economy by

many centuries and are notforprot cultural entities whose reason for existence purp ortedly

is to discover truth co dify it through techniques of scholarship and then teach it Universities

are meant to pass the torch of civilization not just download data into student skulls and the

values of the academic community are strongly at o dds with those of all wouldb e information

empires Teachers at all levels from kindergarten up have proven to b e shameless and p ersistent

software and data pirates Universities do not merely leak information but vigorously broadcast

free thought

This clash of values has b een fraught with controversy Many hackers of the s rememb er

their professional apprenticeship as a long guerilla war against the uptight mainframecomputer

information priestho o d These computerhungry youngsters had to struggle hard for access to

computing p ower and many of them were not ab ove certain er shortcuts But over the years

this practice freed computing from the sterile reserve of labcoated techno crats and was largely

resp onsible for the explosive growth of computing in general so ciety esp ecially p ersonal computing

Access to technical p ower acted like catnip on certain of these youngsters Most of the basic

techniques of computer intrusion password cracking trap do ors backdo ors tro jan horses were

invented in college environments in the s in the early days of network computing Some o

thecu exp erience at computer intrusion was to b e in the informal resume of most hackers and

many future industry giants Outside of the tiny cult of computer enthusiasts few p eople thought

much ab out the implications of breaking into computers This sort of activity had not yet b een

publicized much less criminalized

In the s denitions of prop erty and privacy had not yet b een extended to cyb erspace

Computers were not yet indisp ensable to so ciety There were no vast databanks of vulnerable

proprietary information stored in computers which might b e accessed copied without p ermission

erased altered or sab otaged The stakes were low in the early days but they grew every year

exp onentially as computers themselves grew

The Hacker Crackdown

By the s commercial and p olitical pressures had b ecome overwhelming and they broke

the so cial b oundaries of the hacking sub culture Hacking had b ecome to o imp ortant to b e left

to the hackers So ciety was now forced to tackle the intangible nature of cyb erspace as prop erty

cyb erspace as privatelyowned unrealestate In the new severe resp onsible highstakes context of

the Information So ciety of the s hacking was called into question

What did it mean to break into a computer without p ermission and use its computational p ower

or lo ok around inside its les without hurting anything What were computerintruding hackers

anyway how should so ciety and the law b est dene their actions Were they just browsers

harmless intellectual explorers Were they voyeurs sno ops invaders of privacy Should they b e

sternly treated as p otential agents of espionage or p erhaps as industrial spies Or were they b est

dened as trespassers a very common teenage misdemeanor Was hacking theft of service After

all intruders were getting someone elses computer to carry out their orders without p ermission

and without paying Was hacking fraud Mayb e it was b est describ ed as imp ersonation The

commonest mo de of computer intrusion was and is to swip e or sno op someb o dy elses password

and then enter the computer in the guise of another p erson who is commonly stuck with the

blame and the bills

Perhaps a medical metaphor was b etter hackers should b e dened as sick as computer

addicts unable to control their irresp onsible compulsive b ehavior

But these weighty assessments meant little to the p eople who were actually b eing judged From

inside the underground world of hacking itself all these p erceptions seem quaint wrongheaded

stupid or meaningless The most imp ortant selfp erception of underground hackers from the

s right through to the present day is that they are an elite The daytoday struggle in

the underground is not over so ciological denitions who cares but for p ower knowledge and

status among ones p eers

When you are a hacker it is your own inner conviction of your elite status that enables you

to break or let us say transcend the rules It is not that all rules go by the b oard The rules

habitually broken by hackers are unimp ortant rules the rules of dop ey greedhead telco bureaucrats

and pigignorant government p ests Hackers have their own rules which separate b ehavior which

is co ol and elite from b ehavior which is ro dentlike stupid and losing These rules however are

mostly unwritten and enforced by p eer pressure and tribal feeling Like all rules that dep end on

the unsp oken conviction that everyb o dy else is a go o d old b oy these rules are rip e for abuse The

mechanisms of hacker p eerpressure teletrials and ostracism are rarely used and rarely work

Backstabbing slander threats and electronic harassment are also freely employed in downand

dirty intrahacker feuds but this rarely forces a rival out of the scene entirely The only real solution

for the problem of an utterly losing treacherous and ro dentlike hacker is to turn him in to the p olice

Unlike the Maa or Medellin Cartel the hacker elite cannot simply execute the bigmouths creeps

and troublemakers among their ranks so they turn one another in with astonishing frequency

There is no tradition of silence or omerta in the hacker underworld Hackers can b e shy even

reclusive but when they do talk hackers tend to brag b oast and strut Almost everything hackers

do is invisible if they dont brag b oast and strut ab out it then nob o dy will ever know If you dont

have something to brag b oast and strut ab out then nob o dy in the underground will recognize

you and favor you with vital co op eration and resp ect

The way to win a solid reputation in the underground is by telling other hackers things that

could only have b een learned by exceptional cunning and stealth Forbidden knowledge therefore

is the basic currency of the digital underground like seashells among Trobriand Islanders Hackers

hoard this knowledge and dwell up on it obsessively and rene it and bargain with it and talk and

talk ab out it Many hackers even suer from a strange obsession to teach to spread the ethos and

the knowledge of the digital underground Theyll do this even when it gains them no particular

advantage and presents a grave p ersonal risk

Chapter The Digital Underground

And when that risk catches up with them they will go right on teaching and preaching to

a new audience this time their interrogators from law enforcement Almost every hacker arrested

tells everything he knows all ab out his friends his mentors his disciples legends threats horror

stories dire rumors gossip hallucinations This is of course convenient for law enforcement

except when law enforcement b egins to b elieve hacker legendry

Phone phreaks are unique among criminals in their willingness to call up law enforcement ocials

in the oce at their homes and give them an extended piece of their mind It is hard not to

interpret this as b egging for arrest and in fact it is an act of incredible fo olhardiness Police are

naturally nettled by these acts of chutzpah and will go well out of their way to bust these aunting

idiots But it can also b e interpreted as a pro duct of a worldview so elitist so closed and hermetic

that electronic p olice are simply not p erceived as p olice but rather as enemy phone phreaks who

should b e scolded into b ehaving decently

Hackers at their most grandilo quent p erceive themselves as the elite pioneers of a new electronic

world Attempts to make them ob ey the demo cratically established laws of contemp orary American

so ciety are seen as repression and p ersecution After all they argue if Alexander Graham Bell

had gone along with the rules of the Western Union telegraph company there would have b een no

telephones If Jobs and Wozniak had b elieved that IBM was the b eall and endall there would

have b een no p ersonal computers If and Thomas Jeerson had tried to work

within the system there would have b een no United States

Not only do hackers privately b elieve this as an article of faith but they have b een known to

write ardent manifestos ab out it Here are some revealing excerpts from an esp ecially vivid hacker

manifesto The TechnoRevolution by Dr Crash which app eared in electronic form in Phrack

Volume Issue Phile

To fully explain the true motives b ehind hacking we must rst take a quick lo ok into the past

In the s a group of MIT students built the rst mo dern computer system This wild reb ellious

group of young men were the rst to b ear the name hackers The systems that they develop ed

were intended to b e used to solve world problems and to b enet all of mankind

As we can see this has not b een the case The computer system has b een solely in the hands of

big businesses and the government The wonderful device meant to enrich life has b ecome a weap on

which dehumanizes p eople To the government and large businesses p eople are no more than disk

space and the government do esnt use computers to arrange aid for the p o or but to control

nuclear death weap ons The average American can only have access to a small micro computer

which is worth only a fraction of what they pay for it The businesses keep the true stateoftheart

equipment away from the p eople b ehind a steel wall of incredibly high prices and bureaucracy It

is b ecause of this state of aairs that hacking was b orn:::

Of course the government do esnt want the monop oly of technology broken so they have

outlawed hacking and arrest anyone who is caught::: The phone company is another example of

technology abused and kept from p eople with high prices:::

Hackers often nd that their existing equipment due to the monop oly tactics of computer

companies is inecient for their purp oses Due to the exorbitantly high prices it is imp ossible to

legally purchase the necessary equipment This need has given still another segment of the ght

Credit Carding Carding is a way of obtaining the necessary go o ds without paying for them It is

again due to the companies stupidity that Carding is so easy and shows that the worlds businesses

are in the hands of those with considerably less technical knowhow than we the hackers :::

Hacking must continue We must train newcomers to the art of hacking::: And whatever you

do continue the ght Whether you know it or not if you are a hacker you are a revolutionary

Dont worry youre on the right side

The defense of carding is rare Most hackers regard creditcard theft as p oison to the

underground a sleazy and immoral eort that worse yet is hard to get away with Nevertheless

manifestos advo cating credit card theft the delib erate crashing of computer systems and even acts

The Hacker Crackdown

of violent physical destruction such as vandalism and arson do exist in the underground These

b oasts and threats are taken quite seriously by the p olice And not every hacker is an abstract

Platonic computer nerd Some few are quite exp erienced at picking lo cks robbing phonetrucks

and breaking and entering buildings

Hackers vary in their degree of hatred for authority and the violence of their rhetoric But at

a b ottom line they are scoaws They dont regard the current rules of electronic b ehavior as

resp ectable eorts to preserve law and order and protect public safety They regard these laws

as immoral eorts by soulless corp orations to protect their prot margins and to crush dissidents

Stupid p eople including p olice businessmen p oliticians and journalists simply have no right

to judge the actions of those p ossessed of genius technorevolutionary intentions and technical

exp ertise

Hackers are generally teenagers and college kids not engaged in earning a living They often

come from fairly welltodo middleclass backgrounds and are markedly antimaterialistic except

that is when it comes to computer equipment Anyone motivated by greed for mere money as

opp osed to the greed for p ower knowledge and status is swiftly writteno as a narrowminded

breadhead whose interests can only b e corrupt and contemptible

Having grown up in the s and s the young Bohemians of the digital underground

regard straight so ciety as awash in pluto cratic corruption where everyone from the President down

is for sale and who ever has the gold makes the rules

Interestingly theres a funhousemirror image of this attitude on the other side of the conict

The p olice are also one of the most markedly antimaterialistic groups in American so ciety mo

tivated not by mere money but by ideals of service justice espritdecorps and of course their

own brand of sp ecialized knowledge and p ower Remarkably the propaganda war b etween cops

and hackers has always involved angry allegations that the other side is trying to make a sleazy

buck Hackers consistently sneer that antiphreak prosecutors are angling for cushy jobs as telco

lawyers and that computer crime p olice are aiming to cash in later as wellpaid computersecurity

consultants in the private sector

For their part p olice publicly conate all hacking crimes with robbing payphones with crowbars

Allegations of monetary losses from computer intrusion are notoriously inated The act of

illicitl y copying a do cument from a computer is morally equated with directly robbing a company

of say half a million dollars The teenage computer intruder in p ossession of this proprietary

do cument has certainly not sold it for such a sum would likely have little idea how to sell it at all

and quite probably do esnt even understand what he has He has not made a cent in prot from

his felony but is still morally equated with a thief who has robb ed the church p o orb ox and lit out

for Brazil

Police want to b elieve that all hackers are thieves It is a tortuous and almost unb earable act

for the American justice system to put p eople in jail b ecause they want to learn things which

are forbidden for them to know In an American context almost any pretext for punishment is

b etter than jailing p eople to protect certain restricted kinds of information Nevertheless p olicing

information is part and parcel of the struggle against hackers

This dilemma is well exemplied by the remarkable activities of Emmanuel Goldstein editor

and publisher of a print magazine known as The Hacker Quarterly Goldstein was an English

ma jor at Long Islands State University of New York in the s when he b ecame involved with

the lo cal college radio station His growing interest in electronics caused him to drift into Yippie

TAP circles and thus into the digital underground where he b ecame a selfdescrib ed technorat

His magazine publishes techniques of computer intrusion and telephone exploration as well as

gloating exp oses of telco misdeeds and governmental failings

Chapter The Digital Underground

Goldstein lives quietly and very privately in a large crumbling Victorian mansion in Setauket

New York The seaside house is decorated with telco decals chunks of driftwo o d and the basic

bricabrac of a hippie crashpad He is unmarried mildly unkempt and survives mostly on TV

dinners and turkeystung eaten straight out of the bag Goldstein is a man of considerable charm

and uency with a brief disarming smile and the kind of pitiless stubb orn thoroughly recidivist

integrity that Americas electronic p olice nd genuinely alarming

Goldstein to ok his nomdeplume or handle from a character in Orwells which may

b e taken correctly as a symptom of the gravity of his so ciop olitical worldview He is not himself

a practicing computer intruder though he vigorously ab ets these actions esp ecially when they are

pursued against large corp orations or governmental agencies Nor is he a thief for he loudly scorns

mere theft of phone service in favor of exploring and manipulating the system He is probably

b est describ ed and understo o d as a dissident

Weirdly Goldstein is living in mo dern America under conditions very similar to those of former

East Europ ean intellectual dissidents In other words he agrantly esp ouses a valuesystem that is

deeply and irrevo cably opp osed to the system of those in p ower and the p olice The values in

are generally expressed in terms that are ironic sarcastic paradoxical or just downright confused

But theres no mistaking their radically antiauthoritarian tenor holds that technical p ower

and sp ecialized knowledge of any kind obtainable b elong by right in the hands of those individuals

brave and b old enough to discover them by whatever means necessary Devices laws or systems

that forbid access and the free spread of knowledge are provo cations that any free and self

resp ecting hacker should relentlessly attack The privacy of governments corp orations and other

soulless techno cratic organizations should never b e protected at the exp ense of the lib erty and free

initiative of the individual technorat

However in our contemp orary workaday world b oth governments and corp orations are very

anxious indeed to p olice information which is secret proprietary restricted condential copy

righted patented hazardous illegal unethical embarrassing or otherwise sensitive This makes

Goldstein p ersona non grata and his philosophy a threat

Very little ab out the conditions of Goldsteins daily life would astonish say Vaclav Havel

We may note in passing that President Havel once had his wordpro cessor conscated by the

Czechoslovak p olice Goldstein lives by samizdat acting semiop enly as a datacenter for the

underground while challenging the p owersthatb e to abide by their own stated rules freedom of

sp eech and the First Amendment

Goldstein thoroughly lo oks and acts the part of technorat with shoulderlength ringlets and

a piratical black shermanscap set at a rakish angle He often shows up like Banquos ghost

at meetings of computer professionals where he listens quietly halfsmiling and taking thorough

notes

Computer professionals generally meet publicly and nd it very dicult to rid themselves of

Goldstein and his ilk without extralegal and unconstitutional actions Sympathizers many of them

quite resp ectable p eople with resp onsible jobs admire Goldsteins attitude and surreptitiously pass

him information An unknown but presumably large prop ortion of Goldsteins plus readership

are telco security p ersonnel and p olice who are forced to subscrib e to to stay abreast of new

developments in hacking They thus nd themselves paying this guys rent while grinding their

teeth in anguish a situation that would have delighted Abbie Homan one of Goldsteins few

idols

Goldstein is probably the b estknown public representative of the hacker underground to day

and certainly the b esthated Police regard him as a Fagin a corrupter of youth and sp eak of him

with untemp ered loathing He is quite an accomplished gady

After the Martin Luther King Day Crash of Goldstein for instance adeptly rubb ed salt

into the wound in the pages of Yeah it was fun for the phone phreaks as we watched

the network crumble he admitted cheerfully But it was also an ominous sign of whats to

The Hacker Crackdown

come::: Some ATT p eople aided by wellmeaning but ignorant media were spreading the notion

that many companies had the same software and therefore could face the same problem someday

Wrong This was entirely an ATT software deciency Of course other companies could face

entirely dierent software problems But then so to o could ATT

After a technical discussion of the systems failings the Long Island technorat went on to oer

thoughtful criticism to the gigantic multinationals hundreds of professionally qualied engineers

What we dont know is how a ma jor force in communications like ATT could b e so sloppy What

happ ened to backups Sure computer systems go down all the time but p eople making phone

calls are not the same as p eople logging on to computers We must make that distinction Its not

acceptable for the phone system or any other essential service to go down If we continue to trust

technology without understanding it we can lo ok forward to many variations on this theme

ATT owes it to its customers to b e prepared to instantly switch to another network if some

thing strange and unpredictable starts o ccurring The news here isnt so much the failure of a

computer program but the failure of ATTs entire structure

The very idea of this::: this p erson::: oering advice ab out ATTs entire structure is more

than some p eople can easily b ear How dare this nearcriminal dictate what is or isnt acceptable

b ehavior from ATT Esp ecially when hes publishing in the very same issue detailed schematic

diagrams for creating various switchingnetwork signalling tones unavailable to the public

See what happ ens when you drop a silver b ox tone or two down your lo cal exchange or through

dierent longdistance service carriers advises contributor Mr Upsetter in How To Build

a Signal Box If you exp eriment systematically and keep go o d records you will surely discover

something interesting

This is of course the scientic metho d generally regarded as a praiseworthy activity and one

of the owers of mo dern civilization One can indeed learn a great deal with this sort of structured

intellectual activity Telco employees regard this mo de of exploration as akin to inging sticks of

dynamite into their p ond to see what lives on the b ottom

has b een published consistently since It has also run a bulletin b oard computer

system printed Tshirts taken calls::: The Spring issue has an interesting an

nouncement on page We just discovered an extra set of wires attached to our fax line and

heading up the p ole Theyve since b een clipp ed Your to us and to anyone else could b e

monitored

In the worldview of the tiny band of technorat brothers rarely sisters are a b eseiged

vanguard of the truly free and honest The rest of the world is a maelstrom of corp orate crime and

highlevel governmental corruption o ccasionally temp ered with wellmeaning ignorance To read a

few issues in a row is to enter a nightmare akin to Solzhenitsyns somewhat temp ered by the fact

that is often extremely funny

Goldstein did not b ecome a target of the Hacker Crackdown though he protested loudly elo

quently and publicly ab out it and it added considerably to his fame It was not that he is not

regarded as dangerous b ecause he is so regarded Goldstein has had brushes with the law in the

past in a bulletin b oard computer was seized by the FBI and some software on it was

formally declared a burglary to ol in the form of a computer program But Goldstein escap ed

direct repression in b ecause his magazine is printed on pap er and recognized as sub ject to

Constitutional freedom of the press protection As was seen in the Ramparts case this is far from

an absolute guarantee Still as a practical matter shutting down by courtorder would create

so much legal hassle that it is simply unfeasible at least for the present Throughout b oth

Goldstein and his magazine were p eevishly thriving

Instead the Crackdown of would concern itself with the computerized version of forbidden

data The crackdown itself rst and foremost was ab out bulletin b oard systems Bulletin Board

Systems most often known by the ugly and unpluralizabl e acronym BBS are the lifeblo o d of

Chapter The Digital Underground

the digital underground Boards were also central to law enforcements tactics and strategy in the

Hacker Crackdown

A bulletin b oard system can b e formally dened as a computer which serves as an information

and messagepassing center for users dialingup over the phonelines through the use of mo dems A

mo dem or mo dulatordemo dulator is a device which translates the digital impulses of computers

into audible analog telephone signals and vice versa Mo dems connect computers to phones and

thus to each other

Largescale mainframe computers have b een connected since the s but p ersonal computers

run by individuals out of their homes were rst networked in the late s The b oard created

by Ward Christensen and Randy Suess in February in Chicago Illinois is generally regarded

as the rst p ersonalcomputer bulletin b oard system worthy of the name Boards run on many

dierent machines employing many dierent kinds of software Early b oards were crude and buggy

and their managers known as system op erators or sysops were hardworking technical exp erts

who wrote their own software But like most everything else in the world of electronics b oards

b ecame faster cheap er b etterdesigned and generally far more sophisticated throughout the s

They also moved swiftly out of the hands of pioneers and into those of the general public By

there were something in the neighb orho o d of b oards in America By it was calculated

vaguely that there were ab out b oards in the US with uncounted thousands overseas

Computer bulletin b oards are unregulated enterprises Running a b oard is a roughandready

catchascatchcan prop osition Basically anyb o dy with a computer mo dem software and a phone

line can start a b oard With secondhand equipment and publicdomain free software the price

of a b oard might b e quite small less than it would take to publish a magazine or even a decent

pamphlet Entrepreneurs eagerly sell bulletinb oard software and will coach nontechnical amateur

sysops in its use

Boards are not presses They are not magazines or libraries or phones or CB radios

or traditional cork bulletin b oards down at the lo cal laundry though they have some passing

resemblance to those earlier media Boards are a new medium they may even b e a large numb er

of new media

Consider these unique characteristics b oards are cheap yet they can have a national even

global reach Boards can b e contacted from anywhere in the global telephone network at no cost

to the p erson running the b oard the caller pays the phone bill and if the caller is lo cal the call is

free Boards do not involve an editorial elite addressing a mass audience The sysop of a b oard

is not an exclusive publisher or writer he is managing an electronic salon where individual s can

address the general public play the part of the general public and also exchange private mail with

other individual s And the conversation on b oards though uid rapid and highly interactive

is not sp oken but written It is also relatively sometimes completely so

And b ecause b oards are cheap and ubiquitous regulations and licensing requirements would

likely b e practically unenforceable It would almost b e easier to regulate insp ect and license

the content of private mail probably more so since the mail system is op erated by the federal

government Boards are run by individuals indep endently entirely at their own whim

For the sysop the cost of op eration is not the primary limiting factor Once the investment in

a computer and mo dem has b een made the only steady cost is the charge for maintaining a phone

line or several phone lines The primary limits for sysops are time and energy Boards require

upkeep New users are generally validated they must b e issued individual passwords and called

at home by voicephone so that their identity can b e veried Obnoxious users who exist in plenty

must b e chided or purged Proliferating messages must b e deleted when they grow old so that the

capacity of the system is not overwhelmed And software programs if such things are kept on the

b oard must b e examined for p ossible computer viruses If there is a nancial charge to use the

b oard increasingly common esp ecially in larger and fancier systems then accounts must b e kept

The Hacker Crackdown

and users must b e billed And if the b oard crashes a very common o ccurrence then repairs

must b e made

Boards can b e distinguished by the amount of eort sp ent in regulating them First we have

the completely op en b oard whose sysop is o chugging brews and watching reruns while his

users generally degenerate over time into p eevish anarchy and eventual silence Second comes the

sup ervised b oard where the sysop breaks in every once in a while to tidy up calm brawls issue

announcements and rid the community of dolts and troublemakers Third is the heavily sup ervised

b oard which sternly urges adult and resp onsible b ehavior and swiftly edits any message consid

ered oensive imp ertinent illegal or irrelevant And last comes the completely edited electronic

publication which is presented to a silent audience which is not allowed to resp ond directly in

any way

Boards can also b e group ed by their degree of anonymity There is the completely anonymous

b oard where everyone uses pseudonyms handles and even the sysop is unaware of the users

true identity The sysop himself is likely pseudonymous on a b oard of this typ e Second and

rather more common is the b oard where the sysop knows or thinks he knows the true names and

addresses of all users but the users dont know one anothers names and may not know his Third

is the b oard where everyone has to use real names and roleplaying and pseudonymous p osturing

are forbidden

Boards can b e group ed by their immediacy Chatlines are b oards linking several users together

over several dierent phonelines simultaneously so that p eople exchange messages at the very

moment that they typ e Many large b oards feature chat capabilities along with other services

Less immediate b oards p erhaps with a single phoneline store messages serially one at a time

And some b oards are only op en for business in daylight hours or on weekends which greatly slows

resp onse A network of b oards such as FidoNet can carry electronic mail from b oard to b oard

continent to continent across huge distances but at a relative snails pace so that a message can

take several days to reach its target audience and elicit a reply

Boards can b e group ed by their degree of community Some b oards emphasize the exchange of

private p ersontop erson electronic mail Others emphasize public p ostings and may even purge

p eople who lurk merely reading p osts but refusing to op enly participate Some b oards are

intimate and neighb orly Others are frosty and highly technical Some are little more than storage

dumps for software where users download and upload programs but interact among themselves

little if at all

Boards can b e group ed by their ease of access Some b oards are entirely public Others are

private and restricted only to p ersonal friends of the sysop Some b oards divide users by status On

these b oards some users esp ecially b eginners strangers or children will b e restricted to general

topics and p erhaps forbidden to p ost Favored users though are granted the ability to p ost as

they please and to stay online as long as they like even to the disadvantage of other p eople

trying to call in Highstatus users can b e given access to hidden areas in the b oard such as o

color topics private discussions andor valuable software Favored users may even b ecome remote

sysops with the p ower to take remote control of the b oard through their own home computers

Quite often remote sysops end up doing all the work and taking formal control of the enterprise

despite the fact that its physically lo cated in someone elses house Sometimes several cosysops

share p ower

And b oards can also b e group ed by size Massive nationwide commercial networks such as

CompuServe Delphi GEnie and Pro digy are run on mainframe computers and are generally not

considered b oards though they share many of their characteristics such as electronic mail

discussion topics libraries of software and p ersistent and growing problems with civillib erties

issues Some private b oards have as many as thirty phonelines and quite sophisticated hardware

And then there are tiny b oards

Chapter The Digital Underground

Boards vary in p opularity Some b oards are huge and crowded where users must claw their way

in against a constant busysignal Others are huge and empty there are few things sadder than a

formerly ourishing b oard where no one p osts any longer and the dead conversations of vanished

users lie ab out gathering digital dust Some b oards are tiny and intimate their telephone numb ers

intentionally kept condential so that only a small numb er can log on

And some b oards are underground

Boards can b e mysterious entities The activities of their users can b e hard to dierentiate

from conspiracy Sometimes they are conspiracies Boards have harb ored or have b een accused of

harb oring all manner of fringe groups and have ab etted or b een accused of ab etting every manner

of frownedup on sleazy radical and criminal activity There are Satanist b oards Nazi b oards

Pornographic b oards Pedophile b oards Drugdealing b oards Anarchist b oards Communist

b oards Gay and Lesbian b oards these exist in great profusion many of them quite lively with

wellestablished histories Religious cult b oards Evangelical b oards Witchcraft b oards hippie

b oards punk b oards skateb oarder b oards Boards for UFO b elievers There may well b e b oards

for serial killers airline terrorists and professional assassins There is simply no way to tell Boards

spring up ourish and disapp ear in large numb ers in most every corner of the develop ed world

Even apparently inno cuous public b oards can and sometimes do harb or secret areas known only

to a few And even on the vast public commercial services private mail is very private and quite

p ossibly criminal

Boards cover most every topic imaginable and some that are hard to imagine They cover a vast

sp ectrum of so cial activity However all b oard users do have something in common their p ossession

of computers and phones Naturally computers and phones are primary topics of conversation on

almost every b oard

And hackers and phone phreaks those utter devotees of computers and phones live by b oards

They swarm by b oards They are bred by b oards By the late s phonephreak groups and

hacker groups united by b oards had proliferated fantastically

As evidence here is a list of hacker groups compiled by the editors of Phrack on August

The Administration Advanced Telecommunications Inc ALIAS American Tone Travelers

Anarchy Inc Apple Maa The Asso ciation Atlantic Pirates Guild

Bad Ass Mother Fuckers Bellcore Bell Sho ck Force Black Bag

Camorra CM Pro ductions Catholics Anonymous Chief Executive

Ocers Circle Of Death Circle Of Deneb Club X Coalition of HiTech Pirates CoastToCoast

Corrupt Computing Custom Retaliations

Damage Inc DB Communications The Dange Gang Dec Hunters Digital Gang DPAK

Eastern Alliance The Elite Hackers Guild Elite Phreakers and Hackers Club The Elite So ciety

Of America EPG Executives Of Crime Extasyy Elite

Fargo A Farmers Of Do om The Federation Feds R Us First Class Five O Five Star Force

Hackers The s

HackATrip Hackers Of America High Mountain Hackers High So ciety The Hitchhikers

IBM Syndicate The Ice Pirates Imp erial Warlords Inner Circle Inner Circle I I Insanity Inc

International Computer Underground Bandits

Justice League of America Kaos Inc Knights Of Shadow Knights Of The Round Table

League Of Adepts Legion Of Do om Legion Of Hackers Lords Of Chaos Lunatic Labs

Unlimited

Master Hackers MAD The Marauders MDPhD Metal Communications Inc MetalliBash

ers Inc MBI Metro Communications Midwest Pirates Guild

The Hacker Crackdown

NASA Elite The NATO Asso ciation Neon Knights Nihilist Order Order Of The Rose OSS

Pacic Pirates Guild Phantom Access Asso ciates PHido PHreaks The Phirm Phlash

PhoneLine Phantoms Phone Phreakers Of America Phortune Phreak Hack Delinquents

Phreak Hack Destroyers Phreakers Hackers And Laundromat Employees Gang PHALSE Gang

Phreaks Against Geeks Phreaks Against Phreaks Against Geeks Phreaks and Hackers of America

Phreaks Anonymous World Wide Pro ject Genesis The Punk Maa The Racketeers Red Dawn

Text Files Rosco e Gang

SABRE Secret Circle of Pirates Secret Service Club Shadow Brotherho o d Sharp Inc

C Elite Sp ectral Force Star League Stowaways StrataCrackers

Team Hackers Team Hackers TeleComputist Newsletter Sta Tribunal Of Knowledge

Triple Entente Turn Over And Die Syndrome TOADS Club Club Club

Club Club AF The United Soft WareZ Force United Technical Underground

Ware Brigade The Warelords WASP

Contemplating this list is an impressive almost humbling business As a cultural artifact the

thing approaches p o etry

Underground groups sub cultures can b e distinguished from indep endent cultures by their

habit of referring constantly to the parent so ciety Undergrounds by their nature constantly must

maintain a membrane of dierentiation Funnydistinctive clothes and hair sp ecialized jargon

sp ecialized ghettoized areas in cities dierent hours of rising working sleeping::: The digital

underground which sp ecializes in information relies very heavily on language to distinguish itself

As can b e seen from this list they make heavy use of paro dy and mo ckery Its revealing to see

who they cho ose to mo ck

First large corp orations We have the Phortune The Chief Executive Ocers Bellcore

IBM Syndicate SABRE a computerized reservation service maintained by airlines The common

use of Inc is telling none of these groups are actual corp orations but take clear delight in

mimicking them

Second governments and p olice NASA Elite NATO Asso ciation Feds R Us and Secret

Service are ne bits of eering b oldness OSS the Oce of Strategic Services was the forerunner

of the CIA

Third criminals Using stigmatizing p ejoratives as a p erverse badge of honor is a timehonored

tactic for sub cultures punks gangs delinquents maas pirates bandits racketeers

Sp ecialized orthography esp ecially the use of ph for f and z for the plural s are instant

recognition symb ols So is the use of the numeral for the letter O computersoftware

orthography generally features a slash through the zero making the distinction obvious

Some terms are p o etically descriptive of computer intrusion the Stowaways the Hitchhikers

the PhoneLine Phantoms CoasttoCoast Others are simple bravado and vainglorious puery

Note the insistent use of the terms elite and master Some terms are blasphemous some

obscene others merely cryptic anything to puzzle oend confuse and keep the straights at bay

Many hacker groups further reencrypt their names by the use of acronyms United Technical

Underground b ecomes UTU Farmers of Do om b ecome FoD the United SoftWareZ Force b ecomes

at its own insistence TuSwF and wo e to the ignorant ro dent who capitalizes the wrong letters

It should b e further recognized that the memb ers of these groups are themselves pseudonymous

If you did in fact run across the PhoneLine Phantoms you would nd them to consist of

Carrier Culprit The Executioner Black Ma jik Egyptian Lover Solid State and Mr

Icom Carrier Culprit will likely b e referred to by his friends as CC as in I got these dialups

from CC of PLP

Chapter The Digital Underground

Its quite p ossible that this entire list refers to as few as a thousand p eople It is not a complete

list of underground groups there has never b een such a list and there never will b e Groups rise

ourish decline share memb ership maintain a cloud of wannab es and casual hangerson People

pass in and out are ostracized get b ored are busted by p olice or are cornered by telco security

and presented with huge bills Many underground groups are software pirates warez ddz

who might break copy protection and pirate programs but likely wouldnt dare to intrude on a

computersystem It is hard to estimate the true p opulation of the digital underground There is

constant turnover Most hackers start young come and go then drop out at age the age of

college graduation And a large ma jority of hackers access pirate b oards adopt a handle swip e

software and p erhaps abuse a phoneco de or two while never actually joining the elite

Some professional informants who make it their business to retail knowledge of the underground

to paymasters in private corp orate security have estimated the hacker p opulation at as high as fty

thousand This is likely highly inated unless one counts every single teenage software pirate and

p etty phoneb o oth thief My b est guess is ab out p eople Of these I would guess that as few

as a hundred are truly elite active computer intruders skilled enough to p enetrate sophisticated

systems and truly to worry corp orate security and law enforcement

Another interesting sp eculation is whether this group is growing or not Young teenage hackers

are often convinced that hackers exist in vast swarms and will so on dominate the cyb ernetic uni

verse Older and wiser veterans p erhaps as wizened as or years old are convinced that the

glory days are long gone that the cops have the undergrounds numb er now and that kids these

days are dirtstupid and just want to play Nintendo

My own assessment is that computer intrusion as a nonprot act of intellectual exploration

and mastery is in slow decline at least in the United States but that electronic fraud esp ecially

crime is growing by leaps and b ounds

One might nd a useful parallel to the digital underground in the drug underground There

was a time now muchobscured by historical revisionism when Bohemians freely shared joints at

concerts and hip smallscale marijuana dealers might turn p eople on just for the sake of enjoying

a long stoned conversation ab out the Do ors and Allen Ginsb erg Now drugs are increasingly

verb oten except in a highstakes highlycriminal world of highly addictive drugs Over years of

disenchantment and p olice harassment a vaguely ideological freewheeling drug underground has

relinquished the business of drugdealing to a far more savage criminal hardcore This is not a

pleasant prosp ect to contemplate but the analogy is fairly comp elling

What do es an underground b oard lo ok like What distinguishes it from a standard b oard It

isnt necessarily the conversation hackers often talk ab out common b oard topics such as hardware

software sex science ction current events p olitics movies p ersonal gossip Underground b oards

can b est b e distinguished by their les or philes precomp osed texts which teach the techniques

and ethos of the underground These are prized reservoirs of forbidden knowledge Some are

anonymous but most proudly b ear the handle of the hacker who has created them and his

group aliation if he has one Here is a partial tableofcontents of philes from an underground

b oard somewhere in the heart of middle America circa The descriptions are mostly self

explanatory

Hacking Bank America BANKAMERZIP

Chilton Hacking CHHACKZIP

Hacking Citibank CITIBANKZIP

Hacking Mtc Credit Company CREDIMTCZIP

Hackers Digest DIGESTZIP

How To Hack HACKZIP

Basics Of Hacking HACKBASZIP

Hackers Dictionary HACKDICTZIP

Hacker Info HACKERZIP

Hackers Manual HACKERMEZIP

The Hacker Crackdown

Hackers Handbook HACKHANDZIP

Hackers Thesis HACKTHESZIP

Hacking Vms Systems HACKVMSZIP

Hacking Macdonalds Home Of The Archs MCDONZIP

Phortune Guide To Unix PUNIXZIP

Radio Hacking RADHACKZIP

Suggestions For Trashing TAOTRASHDOC

Technical Hacking TECHHACKZIP

The les ab ove are doityourself manuals ab out computer intrusion The ab ove is only a small

section of a much larger library of hacking and phreaking techniques and history We now move

into a dierent and p erhaps surprising area

Anarchy

Anarchy Files ANARCZIP

Anarchist Book ANARCHSTZIP

Anarchy At Home ANARCHYZIP

Anarchy No ANARCHYZIP

Anarchy Toys ANARCTOYZIP

Antimodem Weapons ANTIMODMZIP

How To Make An Atom Bomb ATOMZIP

Barbiturate Formula BARBITUAZIP

Black Powder Formulas BLCKPWDRZIP

How To Make Bombs BOMBZIP

Things That Go Boom BOOMZIP

Chlorine Bomb CHLORINEZIP

Anarchy Cook Book COOKBOOKZIP

Destroy Stuff DESTROYZIP

Dust Bomb DUSTBOMBZIP

Electronic Terror ELECTERRZIP

Explosives EXPLOSZIP

More Explosives EXPLOSIVZIP

Ezstealing EZSTEALZIP

Flame Thrower FLAMEZIP

Flashlight Bomb FLASHLTZIP

How To Make An Fm Bug FMBUGZIP

Home Explosives OMEEXPLZIP

How To Break In HOWBRKZIP

Letter Bomb LETTERZIP

How To Pick Locks LOCKZIP

Briefcase Locks MRSHINZIP

Napalm At Home NAPALMZIP

Fun With Nitro NITROZIP

Paramilitary Info PARAMILZIP

Picking Locks PICKINGZIP

Pipe Bomb PIPEBOMBZIP

Formulas With Potassium POTASSZIP

More Pranks To Pull On Idiots PRANKTXT

Revenge Tactics REVENGEZIP

Rockets For Fun ROCKETZIP

How To Smuggle SMUGGLEZIP

Chapter The Digital Underground

Holy Cow The damned thing is full of stu ab out b ombs

What are we to make of this

First it should b e acknowledged that spreading knowledge ab out demolitions to teenagers is a

highly and delib erately antiso cial act

It is not however illegal

Second it should b e recognized that most of these philes were in fact written by teenagers

Most adult American males who can rememb er their teenage years will recognize that the no

tion of building a amethrower in your garage is an incredibly neato idea Actually building a

amethrower in your garage however is fraught with discouraging diculty Stung gunp owder

into a b o obytrapp ed ashlight so as to blow the arm o your highscho ol viceprincipal can b e a

thing of dark b eauty to contemplate Actually committing assault by explosives will earn you the

sustained attention of the federal Bureau of Alcohol Tobacco and Firearms

Some p eople however will actually try these plans A determinedly murderous American

teenager can probably buy or steal a handgun far more easily than he can brew fake napalm in

the kitchen sink Nevertheless if temptation is spread b efore p eople a certain numb er will succumb

and a small minority will actually attempt these stunts A large minority of that small minority

will either fail or quite likely maim themselves since these philes have not b een checked for

accuracy are not the pro duct of professional exp erience and are often highly fanciful But the

gloating menace of these philes is not to b e entirely dismissed

Hackers may not b e serious ab out b ombing if they were we would hear far more ab out

explo ding ashlights homemade bazo okas and gym teachers p oisoned by chlorine and p otassium

However hackers are very serious ab out forbidden knowledge They are p ossessed not merely by

curiosity but by a p ositive lust to know The desire to know what others dont is scarcely new But

the intensity of this desire as manifested by these young technophilic denizens of the Information

Age may in fact b e new and may represent some basic shift in so cial values a harbinger of what

the world may come to as so ciety lays more and more value on the p ossession assimilation and

retailing of information as a basic commo dity of daily life

There have always b een young men with obsessive interests in these topics Never b efore

however have they b een able to network so extensively and easily and to propagandize their

interests with impunity to random passersby Highscho ol teachers will recognize that theres

always one in a crowd but when the one in a crowd escap es control by jumping into the phone

lines and b ecomes a hundred such kids all together on a b oard then trouble is brewing visibly

The urge of authority to do something even something drastic is hard to resist And in

authority did something In fact authority did a great deal

The pro cess by which b oards create hackers go es something like this A youngster b ecomes

interested in computers usually computer games He hears from friends that bulletin b oards

exist where games can b e obtained for free Many computer games are freeware not copyrighted

invented simply for the love of it and given away to the public some of these games are quite

go o d He bugs his parents for a mo dem or quite often uses his parents mo dem

The world of b oards suddenly op ens up Computer games can b e quite exp ensive real budget

breakers for a kid but pirated games stripp ed of copy protection are cheap or free They are also

illegal but it is very rare almost unheard of for a smallscale software pirate to b e prosecuted Once

cracked of its copy protection the program b eing digital data b ecomes innitely repro ducible

Even the instructions to the game any manuals that accompany it can b e repro duced as text les

or photo copied from legitimate sets Other users on b oards can give many useful hints in game

playing tactics And a youngster with an innite supply of free computer games can certainly cut

The Hacker Crackdown

quite a swath among his mo demless friends And b oards are pseudonymous No one need know

that youre fourteen years old with a little practice at subterfuge you can talk to adults ab out

adult things and b e accepted and taken seriously You can even pretend to b e a girl or an old

man or anyb o dy you can imagine If you nd this kind of deception gratifying there is ample

opp ortunity to hone your ability on b oards But lo cal b oards can grow stale And almost every

b oard maintains a list of phonenumb ers to other b oards some in distant tempting exotic lo cales

Who knows what theyre up to in Oregon or Alaska or Florida or California Its very easy to

nd out just order the mo dem to call through its software nothing to this just typing on a

keyb oard the same thing you would do for most any computer game The machine reacts swiftly

and in a few seconds you are talking to a bunch of interesting p eople on another seab oard

And yet the bills for this trivial action can b e staggering Just by going tipp etytap with your

ngers you may have saddled your parents with four hundred bucks in longdistance charges and

gotten chewed out but go o d That hardly seems fair

How horrifying to have made friends in another state and to b e deprived of their company and

their software just b ecause telephone companies demand absurd amounts of money How painful

to b e restricted to b oards in ones own area co de what the heck is an area co de anyway and

what makes it so sp ecial A few grumbles complaints and inno cent questions of this sort will often

elicit a sympathetic reply from another b oard user someone with some stolen co des to hand You

dither a while knowing this isnt quite right then you make up your mind to try them anyhow

and they work Suddenly youre doing something even your parents cant do Six months ago

you were just some kid now youre the Crimson Flash of Area Co de Youre bad youre

nationwide Mayb e youll stop at a few abused co des Mayb e youll decide that b oards arent all

that interesting after all that its wrong not worth the risk but mayb e you wont The next step

is to pick up your own rep eatdialling program to learn to generate your own stolen co des This

was dead easy ve years ago much harder to get away with nowadays but not yet imp ossible

And these dialling programs are not complex or intimidating some are as small as twenty lines of

software Now you to o can share co des You can trade co des to learn other techniques If youre

smart enough to catch on and obsessive enough to want to b other and ruthless enough to start

seriously b ending rules then youll get b etter fast You start to develop a rep You move up to a

heavier class of b oard a b oard with a bad attitude the kind of b oard that naive dop es like your

classmates and your former self have never even heard of You pick up the jargon of phreaking and

hacking from the b oard You read a few of those anarchy philes and man you never realized you

could b e a real outlaw without ever leaving your b edro om

You still play other computer games but now you have a new and bigger game This one will

bring you a dierent kind of status than destroying even eight zillion lousy space invaders

Hacking is p erceived by hackers as a game This is not an entirely unreasonable or so ciopathic

p erception You can win or lose at hacking succeed or fail but it never feels real Its not simply

that imaginative youngsters sometimes have a hard time telling makeb elieve from real life

Cyb erspace is not real Real things are physical ob jects like trees and sho es and cars Hacking

takes place on a screen Words arent physical numb ers even telephone numb ers and credit

card numb ers arent physical Sticks and stones may break my b ones but data will never hurt

me Computers simulate reality like computer games that simulate tank battles or dogghts or

spaceships Simulations are just makeb elieve and the stu in computers is not real

Consider this if hacking is supp osed to b e so serious and reallife and dangerous then how

come nineyearold kids have computers and mo dems You wouldnt give a nine year old his own

car or his own rie or his own chainsaw those things are real

People underground are p erfectly aware that the game is frowned up on by the p owers that b e

Word gets around ab out busts in the underground Publicizi ng busts is one of the primary functions

of pirate b oards but they also promulgate an attitude ab out them and their own idiosyncratic

ideas of justice The users of underground b oards wont complain if some guy is busted for crashing

systems spreading viruses or stealing money by wirefraud They may shake their heads with

Chapter The Digital Underground

a sneaky grin but they wont op enly defend these practices But when a kid is charged with

some theoretical amount of theft for instance b ecause he sneaked into a computer

and copied something and kept it in his house on a oppy disk this is regarded as a sign of

near insanity from prosecutors a sign that theyve drastically mistaken the immaterial game of

computing for their real and b oring everyday world of fatcat corp orate money

Its as if big companies and their suckup lawyers think that computing b elongs to them and

they can retail it with price stickers as if it were b oxes of laundry soap But pricing information

is like trying to price air or price dreams Well anyb o dy on a pirate b oard knows that computing

can b e and ought to b e free Pirate b oards are little indep endent worlds in cyb erspace and they

dont b elong to anyb o dy but the underground Underground b oards arent brought to you by

Pro cter Gamble

To log on to an underground b oard can mean to exp erience lib eration to enter a world where

for once money isnt everything and adults dont have all the answers

Lets sample another vivid Here are some excerpts from The Conscience of

a Hacker by The Mentor from Phrack Volume One Issue Phile

I made a discovery to day I found a computer Wait a second this is co ol It do es what I want

it to If it makes a mistake its b ecause I screwed it up Not b ecause it do esnt like me:::

And then it happ ened::: a do or op ened to a world::: rushing through the phone line like heroin

through an addicts veins an electronic pulse is sent out a refuge from daytoday incomp etencies

is sought::: a b oard is found This is it::: this is where I b elong::: I know everyone here:::

even if Ive never met them never talked to them may never hear from them again::: I know

you all:::::: This is our world now::: the world of the electron and the switch the b eauty of

the baud We make use of a service already existing without paying for what could b e dirtcheap

if it wasnt run by proteering gluttons and you call us criminals We explore::: and you call

us criminals We seek after knowledge::: and you call us criminals We exist without skin color

without nationality without religious bias::: and you call us criminals You build atomic b ombs

you wage wars you murder cheat and lie to us and try to make us b elieve that its for our own

go o d yet were the criminals

Yes I am a criminal My crime is that of curiosity My crime is that of judging p eople by what

they say and think not what they lo ok like My crime is that of outsmarting you something that

you will never forgive me for

There have b een underground b oards almost as long as there have b een b oards One of the rst

was BBS which b ecame a stronghold of the West Coast phonephreak elite After going online in

March BBS sp onsored Susan Thunder and Tuc and most notoriously the Condor

The Condor b ore the singular distinction of b ecoming the most vilied American phreak and

hacker ever Angry underground asso ciates fed up with Condors p eevish b ehavior turned him in

to p olice along with a heaping doublehelping of outrageous hacker legendry As a result Condor

was kept in solitary connement for seven months for fear that he might start World War Three by

triggering missile silos from the prison payphone Having served his time Condor is now walking

around lo ose WWI I I has thus far conspicuously failed to o ccur

The sysop of BBS was an ardent freesp eech enthusiast who simply felt that any attempt to

restrict the expression of his users was unconstitutional and immoral Swarms of the technically

curious entered BBS and emerged as phreaks and hackers until in a friendly BBS alumnus

passed the sysop a new mo dem which had b een purchased by credit card fraud Police to ok this

opp ortunity to seize the entire b oard and remove what they considered an attractive nuisance

The Hacker Crackdown

Plovernet was a p owerful East Coast pirate b oard that op erated in b oth New York and Florida

Owned and op erated by teenage hacker Quasi Moto Plovernet attracted ve hundred eager users

in Emmanuel Goldstein was onetime cosysop of Plovernet along with Lex Luthor

founder of the Legion of Do om group Plovernet b ore the signal honor of b eing the original home

of the Legion of Do om ab out which the reader will b e hearing a great deal so on

Pirate or P run by a sysop known as Scan Man got into the game very early

in Charleston and continued steadily for years P ourished so agrantly that even its most

hardened users b ecame nervous and some slanderously sp eculated that Scan Man must have ties

to corp orate security a charge he vigorously denied

Private was the home b oard for the rst group to attract conspicuous trouble the teenage

Gang whose intrusions into SloanKettering Cancer Center and Los Alamos military com

puters were to b e a ninedays wonder in

At ab out this time the rst software piracy b oards b egan to op en up trading cracked games

for the Atari and the Commo dore C Naturally these b oards were heavily frequented by

teenagers And with the release of the hackerthriller movie War Games the scene explo ded

It seemed that every kid in America had demanded and gotten a mo dem for Christmas Most of

these dabbler wannab es put their mo dems in the attic after a few weeks and most of the remainder

minded their Ps and Qs and stayed well out of hot water But some stubb orn and talented diehards

had this hacker kid in War Games gured for a happ ening dude They simply could not rest until

they had contacted the underground or failing that created their own

In the mids underground b oards sprang up like digital fungi ShadowSpawn Elite Sherwo o d

Forest I I I and I I I Digital Logic Data Service in Florida sysop ed by no less a man than Digital

Logic himself Lex Luthor of the Legion of Do om was prominent on this b oard since it was in his

area co de Lexs own b oard Legion of Do om started in The Neon Knights ran a network

of Applehacker b oards Neon Knights North South East and West Free World II was run by

Ma jor Havo c Lunatic Labs is still in op eration as of this writing Dr Rip co in Chicago an

anythinggo es anarchist b oard with an extensive and raucous history was seized by Secret Service

agents in on Sundevil day but up again almost immediately with new machines and scarcely

diminished vigor

The St Louis scene was not to rank with ma jor centers of American hacking such as New York

and LA But St Louis did rejoice in p ossession of Knight Lightning and Taran King two

of the foremost journalists native to the underground Missouri b oards like Metal Shop Metal

Shop Private Metal Shop Brewery may not have b een the heaviest b oards around in terms of

illicit exp ertise But they b ecame b oards where hackers could exchange so cial gossip and try to

gure out what the heck was going on nationally and internationally Gossip from Metal Shop

was put into the form of news les then assembled into a general electronic publication Phrack

a p ortmanteau title coined from phreak and hack The Phrack editors were as obsessively

curious ab out other hackers as hackers were ab out machines

Phrack b eing free of charge and lively reading b egan to circulate throughout the underground

As Taran King and Knight Lightning left high scho ol for college Phrack b egan to app ear on

mainframe machines linked to BITNET and through BITNET to the Internet that lo ose but

extremely p otent notforprot network where academic governmental and corp orate machines

trade data through the UNIX TCPIP proto col The Internet Worm of Novemb er

created by Cornell grad student Rob ert Morris was to b e the largest and b estpublicize d computer

intrusion scandal to date Morris claimed that his ingenious worm program was meant to harm

lessly explore the Internet but due to bad programming the Worm replicated out of control and

crashed some six thousand Internet computers Smaller scale and less ambitious Internet hacking

was a standard for the underground elite Most any underground b oard not hop elessly lame and

outofit would feature a complete run of Phrack and p ossibly the lesserknown standards of the

underground the Legion of Do om Technical Journal the obscene and raucous Cult of the Dead Cow

Chapter The Digital Underground

les PHUN magazine Pirate the Syndicate Rep orts and p erhaps the highly anarchop olitical

Activist Times Incorp orated

Possession of Phrack on ones b oard was prima facie evidence of a bad attitude Phrack was

seemingly everywhere aiding ab etting and spreading the underground ethos And this did not

escap e the attention of corp orate security or the p olice

We now come to the touchy sub ject of p olice and b oards Police do in fact own b oards In

there were p olicesp onsored b oards in California Colorado Florida Georgia Idaho Michi

gan Missouri Texas and Virginia b oards such as Crime Bytes Crimestopp ers All Points

and BulletNBoard Police ocers as private computer enthusiasts ran their own b oards in

Arizona California Colorado Connecticut Florida Missouri Maryland New Mexico North Car

olina Ohio Tennessee and Texas Police b oards have often proved helpful in community relations

Sometimes crimes are rep orted on p olice b oards

Sometimes crimes are committed on p olice b oards This has sometimes happ ened by accident

as naive hackers blunder onto p olice b oards and blithely b egin oering telephone co des Far more

often however it o ccurs through the now almosttraditional use of sting b oards The rst p olice

stingb oards were established in Underground Tunnel in Austin Texas whose sysop Sgt

Rob ert Ansley called himself Pluto The Phone Company in Pho enix Arizona run by Ken

MacLeo d of the Maricopa County Sheri s oce and Sgt Dan Pasquales b oard in Fremont

California Sysops p osed as hackers and swiftly garnered coteries of ardent users who p osted

co des and loaded pirate software with abandon and came to a sticky end

Sting b oards like other b oards are cheap to op erate very cheap by the standards of undercover

p olice op erations Once accepted by the lo cal underground sysops will likely b e invited into

other pirate b oards where they can compile more dossiers And when the sting is announced

and the worst oenders arrested the publicity is generally gratifying The resultant paranoia in

the underground p erhaps more justly describ ed as a deterrence eect tends to quell lo cal

lawbreaking for quite a while

Obviously p olice do not have to b eat the underbrush for hackers On the contrary they can go

trolling for them Those caught can b e grilled Some b ecome useful informants They can lead the

way to pirate b oards all across the country

And b oards all across the country showed the sticky ngerprints of Phrack and of that loudest

and most agrant of all underground groups the Legion of Do om

The term Legion of Do om came from comic b o oks The Legion of Do om a conspiracy of

costumed sup ervillain s headed by the chromedomed criminal ultramastermind Lex Luthor gave

Sup erman a lot of fourcolor graphic trouble for a numb er of decades Of course Sup erman that

exemplar of Truth Justice and the American Way always won in the long run This didnt matter

to the hacker Do omsters Legion of Do om was not some thunderous and evil Satanic reference it

was not meant to b e taken seriously Legion of Do om came from funnyb o oks and was supp osed

to b e funny Legion of Do om did have a go o d mouthlling ring to it though It sounded

really co ol Other groups such as the Farmers of Do om closely allied to LoD recognized this

grandilo quent quality and made fun of it There was even a called Justice League

of America named after Sup ermans club of trueblue crimeghting sup erheros

But they didnt last the Legion did The original Legion of Do om hanging out on Quasi Motos

Plovernet b oard were phone phreaks They werent much into computers Lex Luthor himself

who was under eighteen when he formed the Legion was a COSMOS exp ert COSMOS b eing

the Central System for Mainframe Op erations a telco internal computer network Lex would

eventually b ecome quite a dab hand at breaking into IBM mainframes but although everyone liked

Lex and admired his attitude he was not considered a truly accomplished computer intruder Nor

was he the mastermind of the Legion of Do om LoD were never big on formal leadership As

a regular on Plovernet and sysop of his Legion of Do om BBS Lex was the Legions cheerleader

and recruiting ocer

The Hacker Crackdown

Legion of Do om b egan on the ruins of an earlier phreak group The Knights of Shadow Later

LoD was to subsume the p ersonnel of the hacker group Tribunal of Knowledge People came and

went constantly in LoD groups split up or formed osho ots

Early on the LoD phreaks b efriended a few computerintrusion enthusiasts who b ecame the

asso ciated Legion of Hackers Then the two groups conated into the Legion of Do omHackers

or LoDH When the original hacker wing Messrs CompuPhreak and Phucked Agent

found other matters to o ccupy their time the extra H slowly atrophied out of the name but by

this time the phreak wing Messrs Lex Luthor Blue Archer Gary Seven Kerrang Khan

Master of Impact Silver Spy The Marauder and The Videosmith had picked up a

plethora of intrusion exp ertise and had b ecome a force to b e reckoned with

LoD memb ers seemed to have an instinctive understanding that the way to real p ower in the

underground lay through covert publicity LoD were agrant Not only was it one of the earliest

groups but the memb ers to ok pains to widely distribute their illici t knowledge Some LoD memb ers

like The Mentor were close to evangelical ab out it Legion of Do om Technical Journal b egan to

show up on b oards throughout the underground

LoD Technical Journal was named in cruel paro dy of the ancient and honored ATT Technical

Journal The material in these two publications was quite similar much of it adopted from public

journals and discussions in the telco community And yet the predatory attitude of LoD made

even its most inno cuous data seem deeply sinister an outrage a clear and present danger

To see why this should b e lets consider the following invented paragraphs as a kind of thought

exp eriment

A W Fred Brown ATT Vice President for Advanced Technical Development testied

May at a Washington hearing of the National Telecommunications and Information Administra

tion NTIA regarding Bellcores GARDEN pro ject GARDEN Generalized Automatic Remote

Distributed Electronic Network is a telephoneswitch programming to ol that makes it p ossible

to develop new telecom services including holdonhold and customized message transfers from

any keypad terminal within seconds The GARDEN prototyp e combines centrex lines with a

minicomputer using UNIX op erating system software

B Crimson Flash of the Centrex Mobsters rep orts Ddz you wouldnt b elieve this

GARDEN bullshit Bellcores just come up with Now you dont even need a lousy Commo dore to

reprogram a switch just log on to GARDEN as a technician and you can reprogram switches

right o the keypad in any public phone b o oth You can give yourself holdonhold and customized

message transfers and b est of all the thing is run o notoriously insecure centrex lines using

get this standard UNIX software Ha ha ha ha

Message A couched in typical technobureaucratese app ears tedious and almost unreadable

A scarcely seems threatening or menacing Message B on the other hand is a dreadful thing

prima facie evidence of a dire conspiracy denitely not the kind of thing you want your teenager

reading The information however is identical It is public information presented b efore the

federal government in an op en hearing It is not secret It is not proprietary It is not even

condential On the contrary the development of advanced software systems is a matter of great

public pride to Bellcore However when Bellcore publicly announces a pro ject of this kind it

exp ects a certain attitude from the public something along the lines of gosh wow you guys are

great keep that up whatever it is certainly not cruel mimickry oneupmanship and outrageous

sp eculations ab out p ossible security holes

Now put yourself in the place of a p oliceman confronted by an outraged parent or telco ocial

with a copy of Version B This wellmeaning citizen to his horror has discovered a lo cal bulletin

b oard carrying outrageous stu like B which his son is examining with a deep and unhealthy

interest If B were printed in a b o ok or magazine you as an American law enforcement ocer

would know that it would take a hell of a lot of trouble to do anything ab out it but it do esnt

Chapter The Digital Underground

take technical genius to recognize that if theres a computer in your area harb oring stu like B

theres going to b e trouble

In fact if you ask around any computerliterate cop will tell you straight out that b oards with

stu like B are the source of trouble And the worst source of trouble on b oards are the ringleaders

inventing and spreading stu like B If it werent for these jokers there wouldnt b e any trouble

And Legion of Do om were on b oards like nob o dy else Plovernet The Legion of Do om Board

The Farmers of Do om Board Metal Shop OSUNY Blottoland Private Sector Atlantis Digital

Logic Hell Phrozen Over

LoD memb ers also ran their own b oards Silver Spy started his own b oard Catch

considered one of the heaviest around So did Mentor with his Pho enix Pro ject When they

didnt run b oards themselves they showed up on other p eoples b oards to brag b oast and strut

And where they themselves didnt go their philes went carrying evil knowledge and an even more

evil attitude As early as the p olice were under the vague impression that everyone in the

underground was Legion of Do om LoD was never that large considerably smaller than either

Metal Communications or The Administration for instance but LoD got tremendous press

Esp ecially in Phrack which at times read like an LoD fan magazine and Phrack was everywhere

esp ecially in the oces of telco security You couldnt get busted as a phone phreak a hacker or

even a lousy co des kid or warez do o d without the cops asking if you were LoD

This was a dicult charge to deny as LoD never distributed memb ership badges or laminated

ID cards If they had they would likely have died out quickly for turnover in their memb ership

was considerable LoD was less a hightech streetgang than an ongoing state of mind LoD was

the Gang That Refused to Die By LoD had ruled for ten years and it seemed weird to p olice

that they were continually busting p eople who were only sixteen years old All these teenage small

timers were pleading the tiresome hacker litany of just curious no criminal intent Somewhere

at the center of this conspiracy there had to b e some serious adult masterminds not this seemingly

endless supply of myopic suburban white kids with high SATs and funny haircuts

There was no question that most any American hacker arrested would know LoD They

knew the handles of contributors to LoD Tech Journal and were likely to have learned their craft

through LoD b oards and LoD activism But theyd never met anyone from LoD Even some of

the rotating cadre who were actually and formally in LoD knew one another only by b oardmail

and pseudonyms This was a highly unconventional prole for a criminal conspiracy Computer

networking and the rapid evolution of the digital underground made the situation very diuse

and confusing

Furthermore a big reputation in the digital underground did not coincide with ones willingness

to commit crimes Instead reputation was based on cleverness and technical mastery As a result

it often seemed that the heavier the hackers were the less likely they were to have committed any

kind of common easily prosecutable crime There were some hackers who could really steal And

there were hackers who could really hack But the two groups didnt seem to overlap much if at

all For instance most p eople in the underground lo oked up to Emmanuel Goldstein of as

a hacker demigo d But Goldsteins publishing activities were entirely legal Goldstein just printed

do dgy stu and talked ab out p olitics he didnt even hack When you came right down to it

Goldstein sp ent half his time complaining that computer security wasnt strong enough and ought

to b e drastically improved across the b oard

Truly heavyduty hackers those with serious technical skills who had earned the resp ect of the

underground never stole money or abused credit cards Sometimes they might abuse phoneco des

but often they seemed to get all the free phonetime they wanted without leaving a trace of any

kind

The b est hackers the most p owerful and technically accomplished were not professional fraud

sters They raided computers habitually but wouldnt alter anything or damage anything They

didnt even steal computer equipment most had dayjobs messing with hardware and could get all

The Hacker Crackdown

the cheap secondhand equipment they wanted The hottest hackers unlike the teenage wannab es

werent snobs ab out fancy or exp ensive hardware Their machines tended to b e raw secondhand

digital hotro ds full of custom addons that theyd cobbled together out of chickenwire memory

chips and spit Some were adults computer software writers and consultants by trade and making

quite go o d livings at it Some of them actually worked for the phone company and for those the

hackers actually found under the skirts of Ma Bell there would b e little mercy in

It has long b een an article of faith in the underground that the b est hackers never get caught

Theyre far to o smart supp osedly They never get caught b ecause they never b oast brag or strut

These demigo ds may read underground b oards with a condescending smile but they never say

anything there The b est hackers according to legend are adult computer professionals such as

mainframe system administrators who already know the ins and outs of their particular brand of

security Even the b est hacker cant break in to just any computer at random the knowledge of

security holes is to o sp ecialized varying widely with dierent software and hardware But if p eople

are employed to run say a UNIX mainframe or a VAXVMS machine then they tend to learn

security from the inside out Armed with this knowledge they can lo ok into most anyb o dy elses

UNIX or VMS without much trouble or risk if they want to And according to hacker legend of

course they want to so of course they do They just dont make a big deal of what theyve done

So nob o dy ever nds out

It is also an article of faith in the underground that professional telco p eople phreak like crazed

weasels Of course they spy on Madonnas phone calls I mean wouldnt you Of course they give

themselves free longdistance why the hell should they pay theyre running the whole shebang

It has as a third matter long b een an article of faith that any hacker caught can escap e serious

punishment if he confesses how he did it Hackers seem to b elieve that governmental agencies and

large corp orations are blundering ab out in cyb erspace like eyeless jellysh or cave salamanders

They feel that these large but pathetically stupid organizations will proer up genuine gratitude

and p erhaps even a security p ost and a big salary to the hotshot intruder who will deign to reveal

to them the supreme genius of his mo dus op erandi In the case of longtime LoD memb er Control

C this actually happ ened more or less ControlC had led Michigan Bell a merry chase and

when captured in he turned out to b e a bright and apparently physically harmless young

fanatic fascinated by phones There was no chance in hell that ControlC would actually repay

the enormous and largely theoretical sums in longdistance service that he had accumulated from

Michigan Bell He could always b e indicted for fraud or computerintrusion but there seemed little

real p oint in this he hadnt physically damaged any computer Hed just plead guilty and hed

likely get the usual slaponthewrist and in the meantime it would b e a big hassle for Michigan

Bell just to bring up the case But if kept on the payroll he might at least keep his fellow hackers

at bay

There were uses for him For instance a contrite ControlC was featured on Michigan Bell

internal p osters sternly warning employees to shred their trash Hed always gotten most of his

b est inside info from trashing raiding telco dumpsters for useful data indiscreetly thrown away

He signed these p osters to o ControlC had b ecome something like a Michigan Bell mascot And

in fact ControlC did keep other hackers at bay Little hackers were quite scared of ControlC and

his heavyduty Legion of Do om friends And big hackers were his friends and didnt want to screw

up his cushy situation

No matter what one might say of LoD they did stick together When Wasp an apparently

genuinely malicious New York hacker b egan crashing Bellcore machines ControlC received swift

volunteer help from the Mentor and the Georgia LoD wing made up of The Prophet Urvile

and Leftist Using Mentors Pho enix Pro ject b oard to co ordinate the Do omsters help ed telco

security to trap Wasp by luring him into a machine with a tap and linetrace installed Wasp lost

LoD won And my did they brag

Urvile Prophet and Leftist were wellqualied for this activity probably more so even than the

quite accomplished ControlC The Georgia b oys knew all ab out phone switchingstations Though

Chapter The Digital Underground

relative johnnycomelatelies in the Legion of Do om they were considered some of LoDs heaviest

guys into the hairiest systems around They had the go o d fortune to live in or near Atlanta home

of the sleepy and apparently tolerant BellSouth RBOC

As RBOC security went BellSouth were cake US West of Arizona the Ro ckies and the

Pacic Northwest were tough and aggressive probably the heaviest RBOC around Pacic Bell

Californias PacBell were sleek hightech and longtime veterans of the LA phonephreak wars

NYNEX had the misfortune to run the New York City area and were warily prepared for most

anything Even Michigan Bell a division of the Ameritech RBOC at least had the elementary

sense to hire their own hacker as a useful scarecrow But BellSouth even though their corp orate

PR pro claimed them to have Everything You Exp ect From a Leader were pathetic

When rumor ab out LoDs mastery of Georgias switching network got around to BellSouth

through Bellcore and telco security scuttlebutt they at rst refused to b elieve it If you paid

serious attention to every rumor out and ab out these hacker kids you would hear all kinds of

wacko saucernut nonsense that the monitored all American phone

calls that the CIA and DEA tracked trac on bulletinb oards with wordanalysis programs that

the Condor could start World War I I I from a payphone

If there were hackers into BellSouth switching stations then how come nothing had happ ened

Nothing had b een hurt BellSouths machines werent crashing BellSouth wasnt suering esp e

cially badly from fraud BellSouths customers werent complaining BellSouth was headquartered

in Atlanta ambitious metrop olis of the new hightech Sunb elt and BellSouth was upgrading its

network by leaps and b ounds digitizing the works left right and center They could hardly b e

considered sluggish or naive BellSouths technical exp ertise was second to none thank you kindly

But then came the Florida business

On June callers to the Palm Beach County Probation Department in Delray Beach

Florida found themselves involved in a remarkable discussion with a phone sex worker named

Tina in New York State Somehow any call to this probation oce near Miami was instantly

and magically transp orted across state lines at no extra charge to the user to a p ornographic

phone sex hotline hundreds of miles away

This practical joke may seem utterly hilarious at rst hearing and indeed there was a go o d deal

of chuckling ab out it in phone phreak circles including the Autumn issue of But for

Southern Bell the division of the BellSouth RBOC supplying lo cal service for Florida Georgia

North Carolina and South Carolina this was a smoking gun For the rst time ever a computer

intruder had broken into a BellSouth central oce switching station and reprogrammed it

Or so BellSouth thought in June Actually LoD memb ers had b een frolicking harmlessly

in BellSouth switches since Septemb er The stunt of June callforwarding a numb er

through manipulation of a switching station was childs play for hackers as accomplished as the

Georgia wing of LoD Switching calls interstate sounded like a big deal but it to ok only four lines

of co de to accomplish this An easy yet more discreet stunt would b e to callforward another

numb er to your own house If you were careful and considerate and changed the software back

later then not a soul would know

Except you And who ever you had bragged to ab out it

As for BellSouth what they didnt know wouldnt hurt them Except now someb o dy had

blown the whole thing wide op en and BellSouth knew A now alerted and considerably paranoid

BellSouth b egan searching switches right and left for signs of impropriety in that hot summer of

No fewer than fortytwo BellSouth employees were put on hour shifts twentyfour hours

a day for two solid months p oring over records and monitoring computers for any sign of phony

access These fortytwo overworked exp erts were known as BellSouths Intrusion Task Force

What the investigators found astounded them Proprietary telco databases had b een manipu

lated phone numb ers had b een created out of thin air with no users names and no addresses

The Hacker Crackdown

And p erhaps worst of all no charges and no records of use The new digital ReMOB Remote

Observation diagnostic feature had b een extensively tamp ered with hackers had learned to re

program ReMOB software so that they could listen in on any switchrouted call at their leisure

They were using telco prop erty to spy

The electrifying news went out throughout law enforcement in It had never really o ccurred

to anyone at BellSouth that their prized and brandnew digital switchingstations could b e re

programmed People seemed utterly amazed that anyone could have the nerve Of course these

switching stations were computers and everyb o dy knew hackers liked to break into computers

but telephone p eoples computers were dierent from normal p eoples computers

The exact reason why these computers were dierent was rather illdened It certainly wasnt

the extent of their security The security on these BellSouth computers was lousy the AIMSX

computers for instance didnt even have passwords But there was no question that BellSouth

strongly felt that their computers were very dierent indeed And if there were some criminals out

there who had not gotten that message BellSouth was determined to see that message taught

After all a ESS switching station was no mere b o okkeeping system for some lo cal chain of

orists Public service dep ended on these stations Public safety dep ended on these stations

And hackers lurking in there callforwarding or ReMobbing could spy on anyb o dy in the lo cal

area They could spy on telco ocials They could spy on p olice stations They could spy on lo cal

oces of the Secret Service:::

In electronic cops and hackertrackers b egan using scramblerphones and secured lines

It only made sense There was no telling who was into those systems Who ever they were they

sounded scary This was some new level of antiso cial daring Could b e West German hackers in the

pay of the KGB That to o had seemed a weird and farfetched notion until Cliord Stoll had p oked

and pro dded a sluggish Washington law enforcement bureaucracy into investigating a computer

intrusion that turned out to b e exactly that hackers in the pay of the KGB Stoll the systems

manager for an Internet lab in Berkeley California had ended up on the front page of the New

York Times pro claimed a national hero in the rst true story of international computer espionage

Stolls counterspy eorts which he related in a b estselling b o ok The Cucko os Egg in had

established the credibility of hacking as a p ossible threat to national security The United States

Secret Service do esnt mess around when it susp ects a p ossible action by a foreign intelligence

apparat The Secret Service scramblerphones and secured lines put a tremendous kink in law

enforcements ability to op erate freely to get the word out co op erate prevent misunderstandings

Nevertheless scarcely seemed the time for halfmeasures If the p olice and Secret Service

themselves were not op erationally secure then how could they reasonably demand measures of

security from private enterprise At least the inconvenience made p eople aware of the seriousness

of the threat

If there was a nal spur needed to get the p olice o the dime it came in the realization that

the emergency system was vulnerable The system has its own sp ecialized software but

it is run on the same digital switching systems as the rest of the telephone network is not

physically dierent from normal telephony But it is certainly culturally dierent b ecause this is

the area of telephonic cyb erspace reserved for the p olice and emergency services Your average

p oliceman may not know much ab out hackers or phonephreaks Computer p eople are weird even

computer cops are rather weird the stu they do is hard to gure out But a threat to the

system is anything but an abstract threat If the system go es p eople can die

Imagine b eing in a carwreck staggering to a phoneb o oth punching and hearing Tina

pick up the phonesex line somewhere in New York The situations no longer comical somehow

And was it p ossible No question Hackers had attacked systems b efore Phreaks can

maxout systems just by siccing a bunch of computermo dems on them in tandem dialling

them over and over until they clog Thats very crude and lowtech but its still a serious business

Chapter The Digital Underground

The time had come for action It was time to take stern measures with the underground It

was time to start picking up the dropp ed threads the lo ose edges the bits of braggado cio here and

there it was time to get on the stick and start putting serious casework together Hackers werent

invisible They thought they were invisible but the truth was they had just b een tolerated to o

long

Under sustained p olice attention in the summer of the digital underground b egan to unravel

as never b efore

The rst big break in the case came very early on July the following month The

p erp etrator of the Tina switch was caught and confessed His name was Fry Guy a year

old in Indiana Fry Guy had b een a very wicked young man

Fry Guy had earned his handle from a stunt involving French fries Fry Guy had lched the

login of a lo cal MacDonalds manager and had loggedon to the MacDonalds mainframe on the

Sprint Telenet system Posing as the manager Fry Guy had altered MacDonalds records and

given some teenage hamburgeripping friends of his generous raises He had not b een caught

Emb oldened by success Fry Guy moved on to credit card abuse Fry Guy was quite an accom

plished talker with a gift for so cial engineering If you can do so cial engineering fasttalk

fakeouts imp ersonation conning scamming then card abuse comes easy Getting away with

it in the long run is another question Fry Guy had run across Urvile of the Legion of Do om

on the ALTOS Chat b oard in Bonn Germany ALTOS Chat was a sophisticated b oard accessible

through glob espanning computer networks like BITnet Tymnet and Telenet ALTOS was much

frequented by memb ers of Germanys Chaos Computer Club Two Chaos hackers who hung out

on ALTOS Jaeger and Pengo had b een the central villains of Cliord Stolls CUCKOOS

EGG case consorting in East Berlin with a spymaster from the KGB and breaking into Ameri

can computers for hire through the Internet When LoD memb ers learned the story of Jaegers

depredations from Stolls b o ok they were rather less than impressed technically sp eaking On

LoDs own favorite b oard of the moment Black Ice LoD memb ers bragged that they themselves

could have done all the Chaos breakins in a week at Nevertheless LoD were grudgingly im

pressed by the Chaos rep the sheer hairyeyed daring of hashsmoking anarchist hackers who had

rubb ed shoulders with the fearsome bigb oys of international Communist espionage LoD memb ers

sometimes traded bits of knowledge with friendly German hackers on ALTOS phone numb ers for

vulnerable VAXVMS computers in Georgia for instance Dutch and British phone phreaks and

the Australian clique of Pho enix Nom and Electron were ALTOS regulars to o In under

ground circles to hang out on ALTOS was considered the sign of an elite dude a sophisticated

hacker of the international digital jetset

Fry Guy quickly learned how to raid information from credit card consumerrep orting agencies

He had over a hundred stolen credit card numb ers in his noteb o oks and upwards of a thousand

swip ed longdistance access co des He knew how to get onto ALTOS and how to talk the talk of

the underground convincingly He now wheedled knowledge of switchingstation tricks from Urvile

on the ALTOS system

Combining these two forms of knowledge enabled Fry Guy to b o otstrap his way up to a new

form of wirefraud First hed snitched credit card numb ers from creditcompany computers The

data he copied included names addresses and phone numb ers of the random cardholders

Then Fry Guy imp ersonating a cardholder called up Western Union and asked for a cash

advance on his credit card Western Union as a security guarantee would call the customer

back at home to verify the transaction

But just as he had switched the Florida probation oce to Tina in New York Fry Guy

switched the cardholders numb er to a lo cal payphone There he would lurk in wait muddying his

trail by routing and rerouting the call through switches as far away as Canada When the call

came through he would b oldly so cialengineer or con the Western Union p eople pretending to

b e the legitimate cardholder Since hed answered the prop er phone numb er the deception was

The Hacker Crackdown

not very hard Western Unions money was then shipp ed to a confederate of Fry Guys in his home

town in Indiana

Fry Guy and his cohort using LoD techniques stole six thousand dollars from Western Union

b etween Decemb er and July They also dabbled in ordering delivery of stolen go o ds

through cardfraud Fry Guy was intoxicated with success The sixteenyearold fantasized wildly

to hacker rivals b oasting that hed used ripo money to hire himself a big limousine and had

driven outofstate with a groupie from his favorite heavymetal band Motley Crue Armed with

knowledge p ower and a gratifying stream of free money Fry Guy now to ok it up on himself to call

lo cal representatives of Indiana Bell security to brag b oast strut and utter tormenting warnings

that his p owerful friends in the notorious Legion of Do om could crash the national telephone

network Fry Guy even named a date for the scheme the Fourth of July a national holiday

This egregious example of the b eggingforarrest syndrome was shortly followed by Fry Guys

arrest After the Indiana telephone company gured out who he was the Secret Service had DNRs

Dialed Numb er Recorders installed on his home phone lines These devices are not taps and

cant record the substance of phone calls but they do record the phone numb ers of all calls going

in and out Tracing these numb ers showed Fry Guys longdistance co de fraud his extensive ties

to pirate bulletin b oards and numerous p ersonal calls to his LoD friends in Atlanta By July

Prophet Urvile and Leftist also had Secret Service DNR p en registers installed on their

own lines

The Secret Service showed up in force at Fry Guys house on July to the horror

of his unsusp ecting parents The raiders were led by a sp ecial agent from the Secret Services

Indianap olis oce However the raiders were accompanied and advised by Timothy M Foley of

the Secret Services Chicago oce a gentleman ab out whom we will so on b e hearing a great deal

Following federal computer crime techniques that had b een standard since the early s the

Secret Service searched the house thoroughly and seized all of Fry Guys electronic equipment and

noteb o oks All Fry Guys equipment went out the do or in the custo dy of the Secret Service which

put a swift end to his depredations

The USSS interrogated Fry Guy at length His case was put in the charge of Deb orah Daniels the

federal US Attorney for the Southern District of Indiana Fry Guy was charged with eleven counts

of computer fraud unauthorized computer access and wire fraud The evidence was thorough and

irrefutable For his part Fry Guy blamed his corruption on the Legion of Do om and oered to

testify against them

Fry Guy insisted that the Legion intended to crash the phone system on a national holiday

And when ATT crashed on Martin Luther King Day this lent a credence to his claim that

genuinely alarmed telco security and the Secret Service Fry Guy eventually pled guilty on May

On Septemb er he was sentenced to fortyfour months probation and four hundred

hours community service He could have had it much worse but it made sense to prosecutors

to take it easy on this teenage minor while zeroing in on the notorious kingpins of the Legion of

Do om But the case against LoD had nagging aws Despite the b est eort of investigators it was

imp ossible to prove that the Legion had crashed the phone system on January b ecause they in

fact hadnt done so The investigations of did show that certain memb ers of the Legion of

Do om had achieved unprecedented p ower over the telco switching stations and that they were in

active conspiracy to obtain more p ower yet Investigators were privately convinced that the Legion

of Do om intended to do awful things with this knowledge but mere evil intent was not enough to

put them in jail

And although the Atlanta Three Prophet Leftist and esp ecially Urvile had taught Fry Guy

plenty they were not themselves creditcard fraudsters The only thing theyd stolen was long

distance service and since theyd done much of that through phoneswitch manipulation there

was no easy way to judge how much theyd stolen or whether this practice was even theft of

any easily recognizable kind

Chapter The Digital Underground

Fry Guys theft of longdistance co des had cost the phone companies plenty The theft of long

distance service may b e a fairly theoretical loss but it costs genuine money and genuine time to

delete all those stolen co des and to reissue new co des to the inno cent owners of those corrupted

co des The owners of the co des themselves are victimized and lose time and money and p eace of

mind in the hassle And then there were the creditcard victims to deal with to o and Western

Union When it came to ripo Fry Guy was far more of a thief than LoD It was only when it

came to actual computer exp ertise that Fry Guy was small p otato es

The Atlanta Legion thought most rules of cyb erspace were for ro dents and losers but they

did have rules They never crashed anything and they never to ok money These were rough rules

ofthumb and rather dubious principles when it comes to the ethical subtleties of cyb erspace but

they enabled the Atlanta Three to op erate with a relatively clear conscience though never with

p eace of mind

If you didnt hack for money if you werent robbing p eople of actual funds money in the bank

that is then nob o dy really got hurt in LoDs opinion Theft of service was a b ogus issue

and intellectual prop erty was a bad joke But LoD had only elitist contempt for ripo artists

leechers thieves They considered themselves clean

In their opinion if you didnt smashup or crash any systems well not on purp ose anyhow

accidents can happ en just ask Rob ert Morris then it was very unfair to call you a vandal or

a cracker When you were hanging out online with your pals in telco security you could face

them down from the higher plane of hacker morality And you could mo ck the p olice from the

sup ercilious heights of your hackers quest for pure knowledge

But from the p oint of view of law enforcement and telco security however Fry Guy was not

really dangerous The Atlanta Three were dangerous It wasnt the crimes they were committing

but the danger the p otential hazard the sheer technical p ower LoD had accumulated that had

made the situation untenable

Fry Guy was not LoD Hed never laid eyes on anyone in LoD his only contacts with them had

b een electronic Core memb ers of the Legion of Do om tended to meet physically for conventions

every year or so to get drunk give each other the hacker highsign send out for pizza and ravage

hotel suites Fry Guy had never done any of this Deb orah Daniels assessed Fry Guy accurately as

an LoD wannab e

Nevertheless Fry Guys crimes would b e directly attributed to LoD in much future p olice propa

ganda LoD would b e describ ed as a closely knit group involved in numerous illegal activities

including stealing and mo difying individual credit histories and fraudulently obtaining money

and prop erty Fry Guy did this but the Atlanta Three didnt they simply werent into theft but

rather intrusion This caused a strange kink in the prosecutions strategy LoD were accused of

disseminating information ab out attacking computers to other computer hackers in an eort to

shift the fo cus of law enforcement to those other hackers and away from the Legion of Do om

This last accusation taken directly from a press release by the Chicago Computer Fraud and

Abuse Task Force sounds particularly farfetched One might conclude at this p oint that investiga

tors would have b een welladvised to go ahead and shift their fo cus from the Legion of Do om

Mayb e they should concentrate on those other hackers the ones who were actually stealing

money and physical ob jects

But the Hacker Crackdown of was not a simple p olicing action It wasnt meant just to

walk the b eat in cyb erspace it was a crackdown a delib erate attempt to nail the core of the

op eration to send a dire and p otent message that would settle the hash of the digital underground

for go o d

By this reasoning Fry Guy wasnt much more than the electronic equivalent of a cheap street

corner dop e dealer As long as the masterminds of LoD were still agrantly op erating pushing their

The Hacker Crackdown

mountains of illicit knowledge right and left and whipping up enthusiasm for blatant lawbreaking

then there would b e an innite supply of Fry Guys

Because LoD were agrant they had left trails everywhere to b e picked up by law enforcement

in New York Indiana Florida Texas Arizona Missouri even Australia But s war on the

Legion of Do om was led out of Illinois by the Chicago Computer Fraud and Abuse Task Force

The Computer Fraud and Abuse Task Force led by federal prosecutor William J Co ok had

started in and had swiftly b ecome one of the most aggressive lo cal dedicated computer crime

units Chicago was a natural home for such a group The worlds rst computer bulletin b oard

system had b een invented in Illinois The state of Illinois had some of the nations rst and sternest

computer crime laws Illinois State Police were markedly alert to the p ossibilities of whitecollar

crime and electronic fraud

And William J Co ok in particular was a rising star in electronic crimebusting He and his fellow

federal prosecutors at the US Attorneys oce in Chicago had a tight relation with the Secret

Service esp ecially gogetting Chicagobased agent Timothy Foley While Co ok and his Department

of Justice colleagues plotted strategy Foley was their man on the street

Throughout the s the federal government had given prosecutors an armory of new untried

legal to ols against computer crime Co ok and his colleagues were pioneers in the use of these new

statutes in the reallife cutandthrust of the federal courtro om

On Octob er the US Senate had passed the Computer Fraud and Abuse Act unani

mously but there were pitifully few convictions under this statute Co oks group to ok their name

from this statute since they were determined to transform this p owerful but rather theoretical Act

of Congress into a reallife engine of legal destruction against computer fraudsters and scoaws

It was not a question of merely discovering crimes investigating them and then trying and

punishing their p erp etrators The Chicago unit like most everyone else in the business already

knew who the bad guys were the Legion of Do om and the writers and editors of Phrack The task

at hand was to nd some legal means of putting these characters away

This approach might seem a bit dubious to someone not acquainted with the gritty realities of

prosecutorial work But prosecutors dont put p eople in jail for crimes they have committed they

put p eople in jail for crimes they have committed that can b e proved in court Chicago federal

p olice put Al Cap one in prison for incometax fraud Chicago is a big town with a roughandready

bareknuckle tradition on b oth sides of the law

Fry Guy had broken the case wide op en and alerted telco security to the scop e of the problem

But Fry Guys crimes would not put the Atlanta Three b ehind bars much less the wacko un

derground journalists of Phrack So on July the same day that Fry Guy was raided in

Indiana the Secret Service descended up on the Atlanta Three

This was likely inevitable By the summer of law enforcement were closing in on the

Atlanta Three from at least six directions at once First there were the leads from Fry Guy which

had led to the DNR registers b eing installed on the lines of the Atlanta Three The DNR evidence

alone would have nished them o so oner or later But second the Atlanta lads were already

wellknown to ControlC and his telco security sp onsors LoDs contacts with telco security had

made them overcondent and even more b oastful than usual they felt that they had p owerful

friends in high places and that they were b eing op enly tolerated by telco security But BellSouths

Intrusion Task Force were hot on the trail of LoD and sparing no eort or exp ense

The Atlanta Three had also b een identied by name and listed on the extensive antihacker les

maintained and retailed for pay by private security op erative John Maxeld of Detroit Maxeld

Chapter The Digital Underground

who had extensive ties to telco security and many informants in the underground was a b ete noire

of the Phrack crowd and the dislike was mutual

The Atlanta Three themselves had written articles for Phrack This b oastful act could not

p ossibly escap e telco and law enforcement attention

Knightmare a highscho ol age hacker from Arizona was a close friend and disciple of Atlanta

LoD but he had b een nabb ed by the formidable Arizona Organized Crime and Racketeering Unit

Knightmare was on some of LoDs favorite b oards Black Ice in particular and was privy to

their secrets And to have Gail Thackeray the Assistant Attorney General of Arizona on ones

trail was a dreadful p eril for any hacker

And p erhaps worst of all Prophet had committed a ma jor blunder by passing an illicitly copied

BellSouth computerle to Knight Lightning who had published it in Phrack This as we will see

was an act of dire consequence for almost everyone concerned

On July the Secret Service showed up at the Leftists house where he lived with his

parents A massive squad of some twenty ocers surrounded the building Secret Service federal

marshals lo cal p olice p ossibly BellSouth telco security it was hard to tell in the crush Leftists

dad at work in his basement oce rst noticed a muscular stranger in plain clothes crashing

through the back yard with a drawn pistol As more strangers p oured into the house Leftists dad

naturally assumed there was an armed robb ery in progress

Like most hacker parents Leftists mom and dad had only the vaguest notions of what their son

had b een up to all this time Leftist had a dayjob repairing computer hardware His obsession

with computers seemed a bit o dd but harmless enough and likely to pro duce a wellpaying career

The sudden overwhelming raid left Leftists parents traumatized

The Leftist himself had b een out after work with his coworkers surrounding a couple of pitchers

of margaritas As he came trucking on tequilanumb ed feet up the pavement toting a bag full of

oppydisks he noticed a large numb er of unmarked cars parked in his driveway All the cars

sp orted tiny microwave antennas

The Secret Service had kno cked the front do or o its hinges almost attening his Mom

Inside Leftist was greeted by Sp ecial Agent James Co ol of the US Secret Service Atlanta oce

Leftist was abb ergasted Hed never met a Secret Service agent b efore He could not imagine

that hed ever done anything worthy of federal attention Hed always gured that if his activities

b ecame intolerable one of his contacts in telco security would give him a private phonecall and

tell him to kno ck it o

But now Leftist was patsearched for weap ons by grim professionals and his bag of oppies was

quickly seized He and his parents were all shepherded into separate ro oms and grilled at length as

a score of ocers scoured their home for anything electronic

Leftist was horried as his treasured IBM AT p ersonal computer with its fortymeg hard disk

and his recently purchased IBMclone with a whopping hundredmeg hard disk b oth went

swiftly out the do or in Secret Service custo dy They also seized all his disks all his noteb o oks and

a tremendous b o oty in dogeared telco do cuments that Leftist had snitched out of trash dumpsters

Leftist gured the whole thing for a big misunderstanding Hed never b een into military

computers He wasnt a spy or a Communist He was just a go o d ol Georgia hacker and now he

just wanted all these p eople out of the house But it seemed they wouldnt go until he made some

kind of statement

And so he levelled with them And that Leftist said later from his federal prison camp in

Talladega Alabama was a big mistake

The Atlanta area was unique in that it had three memb ers of the Legion of Do om who actually

o ccupied more or less the same physical lo cality Unlike the rest of LoD who tended to asso ciate

The Hacker Crackdown

by phone and computer Atlanta LoD actually were tightly knit It was no real surprise that the

Secret Service agents apprehending Urvile at the computerlabs at Georgia Tech would discover

Prophet with him as well

Urvile a yearold Georgia Tech student in p olymer chemistry p osed quite a puzzling case

for law enforcement Urvile also known as Necron as well as other handles for he tended

to change his coveralias ab out once a month was b oth an accomplished hacker and a fanatic

simulationgamer

Simulation games are an unusual hobby but then hackers are unusual p eople and their favorite

pastimes tend to b e somewhat out of the ordinary The b estknown American simulation game is

probably Dungeons Dragons a multiplayer parlor entertainment played with pap er maps

p encils statistical tables and a variety of o ddlyshap ed dice Players pretend to b e heroic characters

exploring a whollyinvented fantasy world The fantasy worlds of simulation gaming are commonly

pseudomedieval involving swords and sorcery sp ellcasting wizards knights in armor unicorns

and dragons demons and goblins

Urvile and his fellow gamers preferred their fantasies highly technological They made use of

a game known as GURPS the Generic Universal Role Playing System published by a

company called Steve Jackson Games SJG

GURPS served as a framework for creating a wide variety of articial fantasy worlds Steve

Jackson Games published a smorgasb oard of b o oks full of detailed information and gaming hints

which were used to eshout many dierent fantastic backgrounds for the basic GURPS framework

Urvile made extensive use of two SJG b o oks called GURPS HighTech and GURPS Sp ecial Ops

In the articial fantasyworld of GURPS Sp ecial Ops players entered a mo dern fantasy of

intrigue and international espionage On b eginning the game players started small and p owerless

p erhaps as minorleague CIA agents or p ennyante arms dealers But as players p ersisted through

a series of game sessions game sessions generally lasted for hours over long elab orate campaigns

that might b e pursued for months on end then they would achieve new skills new knowledge new

p ower They would acquire and hone new abilities such as marksmanship karate wiretapping

or Watergate burglary They could also win various kinds of imaginary b o oty like Berettas or

martini shakers or fast cars with ejection seats and machineguns under the headlights As might

b e imagined from the complexity of these games Urviles gaming notes were very detailed and

extensive Urvile was a dungeonmaster inventing scenarios for his fellow gamers giant simulated

adventurepuzzles for his friends to unravel Urviles game notes covered dozens of pages with all

sorts of exotic lunacy all ab out ninja raids on Libya and breakins on encrypted Red Chinese

sup ercomputers His notes were written on scrappap er and kept in lo oseleaf binders

The handiest scrap pap er around Urviles college digs were the many p ounds of BellSouth

printouts and do cuments that he had snitched out of telco dumpsters His notes were written

on the back of misappropriated telco prop erty Worse yet the gaming notes were chaotically

intersp ersed with Urviles handscrawled records involving actual computer intrusions that he had

committed

Not only was it next to imp ossible to tell Urviles fantasy gamenotes from cyb erspace reality

but Urvile himself barely made this distinction Its no exaggeration to say that to Urvile it was all

a game Urvile was very bright highly imaginative and quite careless of other p eoples notions of

propriety His connection to reality was not something to which he paid a great deal of attention

Hacking was a game for Urvile It was an amusement he was carrying out it was something he was

doing for fun And Urvile was an obsessive young man He could no more stop hacking than he

could stop in the middle of a jigsaw puzzle or stop in the middle of reading a Stephen Donaldson

fantasy trilogy The name Urvile came from a b estselling Donaldson novel

Urviles airy bulletpro of attitude seriously annoyed his interrogators First of all he didnt

consider that hed done anything wrong There was scarcely a shred of honest remorse in him

On the contrary he seemed privately convinced that his p olice interrogators were op erating in a

Chapter The Digital Underground

demented fantasyworld all their own Urvile was to o p olite and wellb ehaved to say this straightout

but his reactions were askew and disquieting For instance there was the business ab out LoDs

ability to monitor phonecalls to the p olice and Secret Service Urvile agreed that this was quite

p ossible and p osed no big problem for LoD In fact he and his friends had kicked the idea around

on the Black Ice b oard much as they had discussed many other nifty notions such as building

p ersonal amethrowers and juryrigging stfulls of blastingcaps They had hundreds of dialup

numb ers for government agencies that theyd gotten through scanning Atlanta phones or had

pulled from raided VAXVMS mainframe computers

Basically theyd never gotten around to listening in on the cops b ecause the idea wasnt in

teresting enough to b other with Besides if theyd b een monitoring Secret Service phone calls

obviously theyd never have b een caught in the rst place Right

The Secret Service was less than satised with this rapierlike hacker logic

Then there was the issue of crashing the phone system No problem Urvile admitted sunnily

Atlanta LoD could have shut down phone service all over Atlanta any time they liked Even the

service Nothing sp ecial ab out that Urvile explained patiently Bring the switch to its knees with

say the UNIX makedir bug and go es down to o as a matter of course The system wasnt

very interesting frankly It might b e tremendously interesting to cops for o dd reasons of their

own but as technical challenges went the service was yawnsville So of course the Atlanta

Three could crash service They probably could have crashed service all over BellSouth territory

if theyd worked at it for a while But Atlanta LoD werent crashers Only losers and ro dents were

crashers LoD were elite

Urvile was privately convinced that sheer technical exp ertise could win him free of any kind

of problem As far as he was concerned elite status in the digital underground had placed him

p ermanently b eyond the intellectual grasp of cops and straights Urvile had a lot to learn

Of the three LoD stalwarts Prophet was in the most direct trouble Prophet was a UNIX

programming exp ert who burrowed in and out of the Internet as a matter of course Hed started

his hacking career at around age meddling with a UNIX mainframe system at the University

of North Carolina

Prophet himself had written the handy Legion of Do om le UNIX Use and Security From

the Ground Up UNIX pronounced younicks is a p owerful exible computer op erating

system for multiuser multitasking computers In when UNIX was created in Bell Labs

such computers were exclusive to large corp orations and universities but to day UNIX is run on

thousands of p owerful home machines UNIX was particularly wellsuited to telecommunications

programming and had b ecome a standard in the eld Naturally UNIX also b ecame a standard

for the elite hacker and phone phreak

Lately Prophet had not b een so active as Leftist and Urvile but Prophet was a recidivist In

when he was eighteen Prophet had b een convicted of unauthorized access to a computer

network in North Carolina Hed b een discovered breaking into the Southern Bell Data Network

a UNIXbased internal telco network supp osedly closed to the public Hed gotten a typical hacker

sentence six months susp ended hours community service and three years probation

After that humiliating bust Prophet had gotten rid of most of his tonnage of illici t phreak

and hacker data and had tried to go straight He was after all still on probation But by the

autumn of the temptations of cyb erspace had proved to o much for young Prophet and he

was shouldertoshoulder with Urvile and Leftist into some of the hairiest systems around

In early Septemb er hed broken into BellSouths centralized automation system AIMSX

or Advanced Information Management System AIMSX was an internal business network for

BellSouth where telco employees stored electronic mail databases memos and calendars and did

text pro cessing Since AIMSX did not have public dialups it was considered utterly invisible to

the public and was not wellsecured it didnt even require passwords Prophet abused an account

The Hacker Crackdown

known as waa the p ersonal account of an unsusp ecting telco employee Disguised as the owner

of waa Prophet made ab out ten visits to AIMSX

Prophet did not damage or delete anything in the system His presence in AIMSX was harmless

and almost invisible But he could not rest content with that

One particular piece of pro cessed text on AIMSX was a telco do cument known as Bell South

Standard Practice SV Control Oce Administration of Enhanced Services for Sp e

cial Services and Ma jor Account Centers dated March

Prophet had not b een lo oking for this do cument It was merely one among hundreds of similar

do cuments with imp enetrable titles However having blundered over it in the course of his illicit

wanderings through AIMSX he decided to take it with him as a trophy It might prove very useful

in some future b oasting bragging and strutting session So some time in Septemb er Prophet

ordered the AIMSX mainframe computer to copy this do cument henceforth called simply called

the E Do cument and to transfer this copy to his home computer

No one noticed that Prophet had done this He had stolen the E Do cument in some sense

but notions of prop erty in cyb erspace can b e tricky BellSouth noticed nothing wrong b ecause

BellSouth still had their original copy They had not b een robb ed of the do cument itself Many

p eople were supp osed to copy this do cument sp ecically p eople who worked for the nineteen

BellSouth sp ecial services and ma jor account centers scattered throughout the Southeastern

United States That was what it was for why it was present on a computer network in the rst

place so that it could b e copied and read by telco employees But now the data had b een copied

by someone who wasnt supp osed to lo ok at it

Prophet now had his trophy But he further decided to store yet another copy of the E

Do cument on another p ersons computer This unwitting p erson was a computer enthusiast named

Richard Andrews who lived near Joliet Illinois Richard Andrews was a UNIX programmer by

trade and ran a p owerful UNIX b oard called Jolnet in the basement of his house

Prophet using the handle Rob ert Johnson had obtained an account on Richard Andrews

computer And there he stashed the E Do cument by storing it in his own private section of

Andrews computer

Why did Prophet do this If Prophet had eliminated the E Do cument from his own computer

and kept it hundreds of miles away on another machine under an alias then he might have b een

fairly safe from discovery and prosecution although his sneaky action had certainly put the

unsusp ecting Richard Andrews at risk

But like most hackers Prophet was a packrat for illici t data When it came to the crunch he

could not b ear to part from his trophy When Prophets place in Decatur Georgia was raided in

July there was the E Do cument a smoking gun And there was Prophet in the hands of

the Secret Service doing his b est to explain

Our story now takes us away from the Atlanta Three and their raids of the Summer of We

must leave Atlanta Three co op erating fully with their numerous investigators And all three of

them did co op erate as their Sentencing Memorandum from the US District Court of the Northern

Division of Georgia explained just b efore all three of them were sentenced to various federal

prisons in Novemb er

We must now catch up on the other asp ects of the war on the Legion of Do om The war on

the Legion was a war on a network in fact a network of three networks which intertwined and

interrelated in a complex fashion The Legion itself with Atlanta LoD and their hangeron Fry Guy

were the rst network The second network was Phrack magazine with its editors and contributors

The third network involved the electronic circle around a hacker known as Terminus

The war against these hacker networks was carried out by a law enforcement network Atlanta

LoD and Fry Guy were pursued by USSS agents and federal prosecutors in Atlanta Indiana and

Chapter The Digital Underground

Chicago Terminus found himself pursued by USSS and federal prosecutors from Baltimore and

Chicago And the war against Phrack was almost entirely a Chicago op eration

The investigation of Terminus involved a great deal of energy mostly from the Chicago Task

Force but it was to b e the leastknown and leastpublicized of the Crackdown op erations Terminus

who lived in Maryland was a UNIX programmer and consultant fairly well known under his given

name in the UNIX community as an acknowledged exp ert on ATT minicomputers Terminus

idolized ATT esp ecially Bellcore and longed for public recognition as a UNIX exp ert his highest

ambition was to work for Bell Labs

But Terminus had o dd friends and a sp otted history Terminus had once b een the sub ject of

an admiring interview in Phrack Volume I I Issue Phile dated May In this article

Phrack coeditor Taran King describ ed Terminus as an electronics engineer brownhaired

b orn in at years old quite mature for a hacker

Terminus had once b een sysop of a phreakhack underground b oard called MetroNet which

ran on an Apple I I Later hed replaced MetroNet with an underground b oard called MegaNet

sp ecializin g in IBMs In his younger days Terminus had written one of the very rst and most

elegant co descanning programs for the IBMPC This program had b een widely distributed in the

underground Uncounted legions of PCowning phreaks and hackers had used Terminuss scanner

program to ripo telco co des This feat had not escap ed the attention of telco security it hardly

could since Terminuss earlier handle Terminal Technician was proudly written right on the

program

When he b ecame a fulltime computer professional sp ecializing in telecommunications program

ming he adopted the handle Terminus meant to indicate that he had reached the nal p oint

of b eing a procient hacker Hed moved up to the UNIXbased Netsys b oard on an ATT

computer with four phone lines and an impressive megs of storage Netsys carried complete

issues of Phrack and Terminus was quite friendly with its publishers Taran King and Knight

Lightning

In the early s Terminus had b een a regular on Plovernet Pirate Sherwo o d Forest and

Shadowland all wellknown pirate b oards all heavily frequented by the Legion of Do om As it

happ ened Terminus was never ocially in LoD b ecause hed never b een given the ocial LoD

highsign and backslap by Legion maven Lex Luthor Terminus had never physically met anyone

from LoD But that scarcely mattered much the Atlanta Three themselves had never b een ocially

vetted by Lex either As far as law enforcement was concerned the issues were clear Terminus

was a fulltime adult computer professional with particular skills at ATT software and hardware

but Terminus reeked of the Legion of Do om and the underground

On February half a month after the Martin Luther King Day Crash USSS agents

Tim Foley from Chicago and Jack Lewis from the Baltimore oce accompanied by ATT security

ocer Jerry Dalton travelled to Middle Town Maryland There they grilled Terminus in his home

to the stark terror of his wife and small children and in their customary fashion hauled his

computers out the do or

The Netsys machine proved to contain a plethora of arcane UNIX software proprietary source

co de formally owned by ATT Software such as UNIX System Five Release UNIX SV

Release UUCP communications software KORN SHELL RFS IWB WWB DWB the C

programming language PMON TOOL CHEST QUEST DACT and S FIND

In the longestablished piratical tradition of the underground Terminus had b een trading this

illicitl y copied software with a small circle of fellow UNIX programmers Very unwisely he had

stored seven years of his electronic mail on his Netsys machine which do cumented all the friendly

arrangements he had made with his various colleagues Terminus had not crashed the ATT phone

system on January He was however blithely running a notforprot ATT softwarepiracy

ring This was not an activity ATT found amusing ATT security ocer Jerry Dalton valued

this stolen prop erty at over three hundred thousand dollars

The Hacker Crackdown

ATTs entry into the tussle of free enterprise had b een complicated by the new vague

groundrules of the information economy Until the breakup of Ma Bell ATT was forbidden

to sell computer hardware or software Ma Bell was the phone company Ma Bell was not allowed

to use the enormous revenue from telephone utilities in order to nance any entry into the computer

market

ATT nevertheless invented the UNIX op erating system And somehow ATT managed to

make UNIX a minor source of income Weirdly UNIX was not sold as computer software but

actually retailed under an obscure regulatory exemption allowing sales of surplus equipment and

scrap Any b older attempt to promote or retail UNIX would have aroused angry legal opp osition

from computer companies Instead UNIX was licensed to universities at mo dest rates where the

acids of academic freedom ate away steadily at ATTs proprietary rights

Come the breakup ATT recognized that UNIX was a p otential goldmine By now large

chunks of UNIX co de had b een created that were not ATTs and were b eing sold by others An

entire rival UNIXbased op erating system had arisen in Berkeley California one of the worlds

great founts of ideological hackerdom To day hackers commonly consider Berkeley UNIX to

b e technically sup erior to ATTs System V UNIX but ATT has not allowed mere technical

elegance to intrude on the realworld business of marketing proprietary software ATT has made

its own co de delib erately incompatible with other folks UNIX and has written co de that it can

prove is copyrightable even if that co de happ ens to b e somewhat awkward kludgey ATT

UNIX user licenses are serious business agreements replete with very clear copyright statements

and nondisclosure clauses

ATT has not exactly kept the UNIX cat in the bag but it kept a grip on its scru with

some success By the rampant explosive standards of software piracy ATT UNIX source co de

is heavily copyrighted wellguarded welllicensed UNIX was traditionally run only on mainframe

machines owned by large groups of suitandtie professionals rather than on b edro om machines

where p eople can get up to easy mischief

And ATT UNIX source co de is serious highlevel programming The numb er of skilled UNIX

programmers with any actual motive to swip e UNIX source co de is small Its tiny compared to

the tens of thousands prepared to ripo say entertaining PC games like Leisure Suit Larry

But by the warezdd underground in the p ersons of Terminus and his friends was

gnawing at ATT UNIX And the prop erty in question was not sold for twenty bucks over the

counter at the lo cal branch of Babbages or Eggheads this was massive sophisticated multiline

multiauthor corp orate co de worth tens of thousands of dollars

It must b e recognized at this p oint that Terminuss purp orted ring of UNIX software pirates

had not actually made any money from their susp ected crimes The dollar gure bandied

ab out for the contents of Terminuss computer did not mean that Terminus was in actual illicit

p ossession of three hundred thousand of ATTs dollars Terminus was shipping software back and

forth privately p erson to p erson for free He was not making a commercial business of piracy He

hadnt asked for money he didnt take money He lived quite mo destly

ATT employees as well as freelance UNIX consultants like Terminus commonly worked

with proprietary ATT software b oth in the oce and at home on their private machines

ATT rarely sent security ocers out to comb the hard disks of its consultants Cheap freelance

UNIX contractors were quite useful to ATT they didnt have health insurance or retirement

programs much less union memb ership in the Communication Workers of America They were

humble digital drudges wandering with mop and bucket through the Great Technological Temple

of ATT but when the Secret Service arrived at their homes it seemed they were eating with

company silverware and sleeping on company sheets Outrageously they b ehaved as if the things

they worked with every day b elonged to them

And these were no mere hacker teenagers with their hands full of trashpap er and their noses

pressed to the corp orate windowpane These guys were UNIX wizards not only carrying ATT

Chapter The Digital Underground

data in their machines and their heads but eagerly networking ab out it over machines that were

far more p owerful than anything previously imagined in private hands How do you keep p eople

disp osable yet assure their awestruck resp ect for your prop erty It was a dilemma

Much UNIX co de was publicdomain available for free Much proprietary UNIX co de had

b een extensively rewritten p erhaps altered so much that it b ecame an entirely new pro duct

or p erhaps not Intellectual prop erty rights for software develop ers were and are extraordinarily

complex and confused And software piracy like the private copying of videos is one of the most

widely practiced crimes in the world to day The USSS were not exp erts in UNIX or familiar

with the customs of its use The United States Secret Service considered as a b o dy did not have

one single p erson in it who could program in a UNIX environment no not even one The Secret

Service were making extensive use of exp ert help but the exp erts they had chosen were ATT

and Bellcore security ocials the very victims of the purp orted crimes under investigation the

very p eople whose interest in ATTs proprietary software was most pronounced

On February Terminus was arrested by Agent Lewis Eventually Terminus would b e

sent to prison for his illicit use of a piece of ATT software

The issue of pirated ATT software would bubble along in the background during the war

on the Legion of Do om Some halfdozen of Terminuss online acquaintances including p eople

in Illinois Texas and California were grilled by the Secret Service in connection with the illicit

copying of software Except for Terminus however none were charged with a crime None of them

shared his p eculiar prominence in the hacker underground

But that did not meant that these p eople would or could stay out of trouble The transferral

of illici t data in cyb erspace is hazy and illdened business with paradoxical dangers for every

one concerned hackers signal carriers b oard owners cops prosecutors even random passersby

Sometimes wellmeant attempts to avert trouble or punish wrongdoing bring more trouble than

would simple ignorance indierence or impropriety

Terminuss Netsys b oard was not a common or garden bulletin b oard system though it had

most of the usual functions of a b oard Netsys was not a standalone machine but part of the

glob espanning UUCP co op erative network The UUCP network uses a set of Unix software

programs called UnixtoUnix Copy which allows Unix systems to throw data to one another at

high sp eed through the public telephone network UUCP is a radically decentralized notforprot

network of UNIX computers There are tens of thousands of these UNIX machines Some are

small but many are p owerful and also link to other networks UUCP has certain arcane links

to ma jor networks such as JANET EasyNet BITNET JUNET VNET DASnet PeaceNet and

FidoNet as well as the gigantic Internet The socalled Internet is not actually a network itself

but rather an internetwork connections standard that allows several glob espanning computer

networks to communicate with one another Readers fascinated by the weird and intricate tangles

of mo dern computer networks may enjoy John S Quartermans authoritative page explication

The Matrix Digital Press

A skilled user of Terminus UNIX machine could send and receive electronic mail from almost

any ma jor computer network in the world Netsys was not called a b oard p er se but rather a

no de No des were larger faster and more sophisticated than mere b oards and for hackers

to hang out on internationallyconnected no des was quite the step up from merely hanging out

on lo cal b oards Terminuss Netsys no de in Maryland had a numb er of direct links to other

similar UUCP no des run by p eople who shared his interests and at least something of his free

wheeling attitude One of these no des was Jolnet owned by Richard Andrews who like Terminus

was an indep endent UNIX consultant Jolnet also ran UNIX and could b e contacted at high

sp eed by mainframe machines from all over the world Jolnet was quite a sophisticated piece of

work technically sp eaking but it was still run by an individual as a private notforprot hobby

Jolnet was mostly used by other UNIX programmers for mail storage and access to networks

Jolnet supplied access network access to ab out two hundred p eople as well as a lo cal junior college

Among its various features and services Jolnet also carried Phrack magazine

The Hacker Crackdown

For reasons of his own Richard Andrews had b ecome suspicious of a new user called Rob ert

Johnson Richard Andrews to ok it up on himself to have a lo ok at what Rob ert Johnson was

storing in Jolnet And Andrews found the E Do cument

Rob ert Johnson was the Prophet from the Legion of Do om and the E Do cument was

illicitl y copied data from Prophets raid on the BellSouth computers

The E Do cument a particularly illicit piece of digital prop erty was ab out to resume its long

complex and disastrous career

It struck Andrews as shy that someone not a telephone employee should have a do cument

referring to the Enhanced System Besides the do cument itself b ore an obvious warning

WARNING NOT FOR USE OR DISCLOSURE OUTSIDE BELLSOUTH OR ANY OF ITS

SUBSIDIARIES EXCEPT UNDER WRITTEN AGREEMENT

These standard nondisclosure tags are often app ended to all sorts of corp orate material Telcos

as a sp ecies are particularly notorious for stamping most everything in sight as not for use or

disclosure Still this particular piece of data was ab out the System That sounded bad to

Rich Andrews

Andrews was not prepared to ignore this sort of trouble He thought it would b e wise to pass the

do cument along to a friend and acquaintance on the UNIX network for consultation So around

Septemb er Andrews sent yet another copy of the E Do cument electronically to an ATT

employee one Charles Boykin who ran a UNIXbased no de called attctc in Dallas Texas

Attctc was the prop erty of ATT and was run from ATTs Customer Technology Center in

Dallas hence the name attctc Attctc was b etterknown as Killer the name of the machine

that the system was running on Killer was a hefty p owerful ATT B mo del a multi

user multitasking UNIX platform with meg of memory and a mindb oggling Gigabytes

of storage When Killer had rst arrived in Texas in the B had b een one of ATTs

great white hop es for going headtohead with IBM for the corp orate computerhardware market

Killer had b een shipp ed to the Customer Technology Center in the Dallas Infomart essentially

a hightechnology mall and there it sat a demonstration mo del

Charles Boykin a veteran ATT hardware and digital communications exp ert was a lo cal

technical backup man for the ATT B system As a display mo del in the Infomart mall Killer

had little to do and it seemed a shame to waste the systems capacity So Boykin ingeniously wrote

some UNIX bulletinb oard software for Killer and plugged the machine in to the lo cal phone

network Killers debut in late made it the rst publicly available UNIX site in the state of

Texas Anyone who wanted to play was welcome

The machine immediately attracted an electronic community It joined the UUCP network and

oered network links to over eighty other computer sites all of which b ecame dep endent on Killer

for their links to the greater world of cyb erspace And it wasnt just for the big guys p ersonal

computer users also stored freeware programs for the Amiga the Apple the IBM and the Macintosh

on Killers vast meg archives At one time Killer had the largest library of publicdomain

Macintosh software in Texas

Eventually Killer attracted ab out users all busily communicating uploading and down

loading getting mail gossipping and linking to arcane and distant networks

Boykin received no pay for running Killer He considered it go o d publicity for the ATT

B system whose sales were somewhat less than stellar but he also simply enjoyed the vibrant

community his skill had created He gave away the bulletinb oard UNIX software he had written

free of charge

In the UNIX programming community Charlie Boykin had the reputation of a warm op en

hearted levelheaded kind of guy In a group of Texan UNIX professionals voted Boykin

System Administrator of the Year He was considered a fellow you could trust for go o d advice

Chapter The Digital Underground

In Septemb er without warning the E Do cument came plunging into Boykins life for

warded by Richard Andrews Boykin immediately recognized that the Do cument was hot prop erty

He was not a voice communications man and knew little ab out the ins and outs of the Baby Bells

but he certainly knew what the System was and he was angry to see condential data ab out

it in the hands of a nogo o dnik This was clearly a matter for telco security So on Septemb er

Boykin made yet another copy of the E Do cument and passed this one along to a

professional acquaintance of his one Jerome Dalton from ATT Corp orate Information Security

Jerry Dalton was the very fellow who would later raid Terminuss house From ATTs security

division the E Do cument went to Bellcore Bellcore or BELL COmmunications REsearch had

once b een the central lab oratory of the Bell System Bell Labs employees had invented the UNIX

op erating system Now Bellcore was a quasiindep ende nt jointly owned company that acted as the

research arm for all seven of the Baby Bell RBOCs Bellcore was in a go o d p osition to coordinate

security technology and consultation for the RBOCs and the gentleman in charge of this eort was

Henry M Kluepfel a veteran of the Bell System who had worked there for twentyfour years

On Octob er Dalton passed the E Do cument to Henry Kluepfel Kluepfel a veteran

exp ert witness in telecommunications fraud and computerfraud cases had certainly seen worse

trouble than this He recognized the do cument for what it was a trophy from a hacker breakin

However whatever harm had b een done in the intrusion was presumably old news At this p oint

there seemed little to b e done Kluepfel made a careful note of the circumstances and shelved the

problem for the time b eing

Whole months passed

February arrived The Atlanta Three were living it up in Bell Souths switches and had

not yet met their comeuppance The Legion was thriving So was Phrack magazine A go o d six

months had passed since Prophets AIMSX breakin Prophet as hackers will grew weary of sitting

on his laurels Knight Lightning and Taran King the editors of Phrack were always b egging

Prophet for material they could publish Prophet decided that the heat must b e o by this time

and that he could safely brag b oast and strut

So he sent a copy of the E Do cument yet another one from Rich Andrews Jolnet machine

to Knight Lightnings BITnet account at the University of Missouri Lets review the fate of the

do cument so far

The original E Do cument This in the AIMSX system on a mainframe computer in

Atlanta available to hundreds of p eople but all of them presumably BellSouth employees An

unknown numb er of them may have their own copies of this do cument but they are all professionals

and all trusted by the phone company

Prophets illici t copy at home on his own computer in Decatur Georgia

Prophets backup copy stored on Rich Andrews Jolnet machine in the basement of Rich

Andrews house near Joliet Illinois

Charles Boykins copy on Killer in Dallas Texas sent by Rich Andrews from Joliet

Jerry Daltons copy at ATT Corp orate Information Security in New Jersey sent from

Charles Boykin in Dallas

Henry Kluepfels copy at Bellcore security headquarters in New Jersey sent by Dalton

Knight Lightnings copy sent by Prophet from Rich Andrews machine and now in Columbia

Missouri

We can see that the security situation of this proprietary do cument once dug out of AIMSX

swiftly b ecame bizarre Without any money changing hands without any particular sp ecial eort

this data had b een repro duced at least six times and had spread itself all over the continent By

far the worst however was yet to come

The Hacker Crackdown

In February Prophet and Knight Lightning bargained electronically over the fate of this

trophy Prophet wanted to b oast but at the same time scarcely wanted to b e caught

For his part Knight Lightning was eager to publish as much of the do cument as he could manage

Knight Lightning was a edgling p oliticalsci ence ma jor with a particular interest in freedomof

information issues He would gladly publish most anything that would reect glory on the prowess

of the underground and embarrass the telcos However Knight Lightning himself had contacts in

telco security and sometimes consulted them on material hed received that might b e to o dicey for

publication

Prophet and Knight Lightning decided to edit the E Do cument so as to delete most of

its identifying traits First of all its large NOT FOR USE OR DISCLOSURE warning had

to go Then there were other matters For instance it listed the oce telephone numb ers of

several BellSouth sp ecialists in Florida If these phone numb ers were published in Phrack the

BellSouth employees involved would very likely b e hassled by phone phreaks which would anger

BellSouth no end and p ose a denite op erational hazard for b oth Prophet and Phrack

So Knight Lightning cut the Do cument almost in half removing the phone numb ers and some

of the touchier and more sp ecic information He passed it back electronically to Prophet Prophet

was still nervous so Knight Lightning cut a bit more They nally agreed that it was ready to go

and that it would b e published in Phrack under the pseudonym The Eavesdropp er

And this was done on February

The twentyfourth issue of Phrack featured a chatty interview with coed phonephreak Chanda

Leir three articles on BITNET and its links to other computer networks an article on and

numb ers by Unknown User VaxCats article on telco basics slyly entitled Lifting Ma

Bells Veil of Secrecy and the usual Phrack World News

The News section with painful irony featured an extended account of the sentencing of Shad

owhawk an eighteenyearold Chicago hacker who had just b een put in federal prison by William

J Co ok himself

And then there were the two articles by The Eavesdropp er The rst was the edited E

Do cument now titled Control Oce Administration Of Enhanced Services for Sp ecial Services

and Ma jor Account Centers Eavesdropp ers second article was a glossary of terms explaining the

blizzard of telco acronyms and buzzwords in the E Do cument

The hapless do cument was now distributed in the usual Phrack routine to a go o d one hundred

and fty sites Not a hundred and fty p eople mind you a hundred and fty sites some of these

sites linked to UNIX no des or bulletin b oard systems which themselves had readerships of tens

dozens even hundreds of p eople

This was February Nothing happ ened immediately Summer came and the Atlanta crew

were raided by the Secret Service Fry Guy was apprehended Still nothing whatever happ ened to

Phrack Six more issues of Phrack came out in all more or less on a monthly schedule Knight

Lightning and coeditor Taran King went untouched

Phrack tended to duck and cover whenever the heat came down During the summer busts of

hacker busts tended to cluster in summer p erhaps b ecause hackers were easier to nd at

home than in college Phrack had ceased publication for several months and laid low Several

LoD hangerson had b een arrested but nothing had happ ened to the Phrack crew the premiere

gossips of the underground In Phrack had b een taken over by a new editor Crimson

Death a raucous youngster with a taste for anarchy les

however lo oked like a b ounty year for the underground Knight Lightning and his co

editor Taran King to ok up the reins again and Phrack ourished throughout Atlanta LoD

went down hard in the summer of but Phrack rolled merrily on Prophets E Do cument

seemed unlikely to cause Phrack any trouble By January it had b een available in Phrack

Chapter The Digital Underground

for almost a year Kluepfel and Dalton ocers of Bellcore and ATT security had p ossessed the

do cument for sixteen months in fact theyd had it even b efore Knight Lightning himself and

had done nothing in particular to stop its distribution They hadnt even told Rich Andrews or

Charles Boykin to erase the copies from their UNIX no des Jolnet and Killer But then came the

monster Martin Luther King Day Crash of January

A at three days later on January four agents showed up at Knight Lightnings fraternity

house One was Timothy Foley the second Barbara Golden b oth of them Secret Service agents

from the Chicago oce Also along was a University of Missouri security ocer and Reed Newlin

a security man from Southwestern Bell the RBOC having jurisdiction over Missouri Foley accused

Knight Lightning of causing the nationwide crash of the phone system

Knight Lightning was aghast at this allegation On the face of it the suspicion was not entirely

implausible though Knight Lightning knew that he himself hadnt done it Plenty of hotdog

hackers had bragged that they could crash the phone system however Shadowhawk for instance

the Chicago hacker whom William Co ok had recently put in jail had several times b oasted on

b oards that he could shut down ATTs public switched network And now this event or

something that lo oked just like it had actually taken place The Crash had lit a re under the

Chicago Task Force And the former fencesitters at Bellcore and ATT were now ready to roll

The consensus among telco security already horried by the skill of the BellSouth intruders was

that the digital underground was out of hand LoD and Phrack must go

And in publishing Prophets E Do cument Phrack had provided law enforcement with what

app eared to b e a p owerful legal weap on Foley confronted Knight Lightning ab out the E Do c

ument

Knight Lightning was cowed He immediately b egan co op erating fully in the usual tradition

of the digital underground

He gave Foley a complete run of Phrack printed out in a set of threering binders He handed

over his electronic mailing list of Phrack subscrib ers Knight Lightning was grilled for four hours

by Foley and his cohorts Knight Lightning admitted that Prophet had passed him the E

Do cument and he admitted that he had known it was stolen b o oty from a hacker raid on a

telephone company Knight Lightning signed a statement to this eect and agreed in writing to

co op erate with investigators

Next day January a Friday the Secret Service returned with a search warrant

and thoroughly searched Knight Lightnings upstairs ro om in the fraternity house They to ok

all his oppy disks though interestingly they left Knight Lightning in p ossession of b oth his

computer and his mo dem The computer had no hard disk and in Foleys judgement was not

a store of evidence But this was a very minor bright sp ot among Knight Lightnings rapidly

multiplying troubles By this time Knight Lightning was in plenty of hot water not only with

federal p olice prosecutors telco investigators and university security but with the elders of his

own campus fraternity who were outraged to think that they had b een unwittingly harb oring a

federal computercriminal

On Monday Knight Lightning was summoned to Chicago where he was further grilled by Foley

and USSS veteran agent Barbara Golden this time with an attorney present And on Tuesday he

was formally indicted by a federal grand jury

The trial of Knight Lightning which o ccurred on July was the crucial showtrial

of the Hacker Crackdown We will examine the trial at some length in Part Four of this b o ok In

the meantime we must continue our dogged pursuit of the E Do cument

It must have b een clear by January that the E Do cument in the form Phrack had

published it back in February had gone o at the sp eed of light in at least a hundred and fty

dierent directions To attempt to put this electronic genie back in the b ottle was atly imp ossible

The Hacker Crackdown

And yet the E Do cument was still stolen prop erty formally and legally sp eaking Any

electronic transference of this do cument by anyone unauthorized to have it could b e interpreted

as an act of wire fraud Interstate transfer of stolen prop erty including electronic prop erty was a

federal crime

The Chicago Computer Fraud and Abuse Task Force had b een assured that the E Do cument

was worth a hefty sum of money In fact they had a precise estimate of its worth from BellSouth

security p ersonnel A sum of this scale seemed to warrant vigorous prosecution Even

if the damage could not b e undone at least this large sum oered a go o d legal pretext for stern

punishment of the thieves It seemed likely to impress judges and juries And it could b e used in

court to mop up the Legion of Do om

The Atlanta crowd was already in the bag by the time the Chicago Task Force had gotten

around to Phrack But the Legion was a hydraheaded thing In late a brandnew Legion of

Do om b oard Pho enix Pro ject had gone up in Austin Texas Pho enix Pro ject was sysop ed by

no less a man than the Mentor himself ably assisted by University of Texas student and hardened

Do omster Erik Blo o daxe As we have seen from his Phrack manifesto the Mentor was a hacker

zealot who regarded computer intrusion as something close to a moral duty Pho enix Pro ject was

an ambitious eort intended to revive the digital underground to what Mentor considered the

full ower of the early s The Pho enix b oard would also b oldly bring elite hackers facetoface

with the telco opp osition On Pho enix Americas cleverest hackers would supp osedly shame

the telco squareheads out of their stickinthemud attitudes and p erhaps convince them that the

Legion of Do om elite were really an allright crew The premiere of Pho enix Pro ject was heavily

trump eted by Phrack and Pho enix Pro ject carried a complete run of Phrack issues including

the E Do cument as Phrack had published it

Pho enix Pro ject was only one of many p ossibly hundreds of no des and b oards all over

America that were in guilty p ossession of the E Do cument But Pho enix was an outright

unashamed Legion of Do om b oard Under Mentors guidance it was aunting itself in the face of

telco security p ersonnel Worse yet it was actively trying to win them over as sympathizers for

the digital underground elite Pho enix had no cards or co des on it Its hacker elite considered

Pho enix at least technically legal But Pho enix was a corrupting inuence where hacker anarchy

was eating away like digital acid at the underb elly of corp orate propriety The Chicago Computer

Fraud and Abuse Task Force now prepared to descend up on Austin Texas

Oddly not one but two trails of the Task Forces investigation led toward Austin The city of

Austin like Atlanta had made itself a bulwark of the Sunb elts with a strong uni

versity research presence and a numb er of cuttingedge electronics companies including Motorola

Dell CompuAdd IBM Sematech and MCC

Where computing machinery went hackers generally followed Austin b oasted not only

Pho enix Pro ject currently LoDs most agrant underground b oard but a numb er of UNIX

no des

One of these no des was Elephant run by a UNIX consultant named Rob ert Izenb erg Izenb erg

in search of a relaxed Southern lifestyle and a lowered costofliving had recently migrated to Austin

from New Jersey In New Jersey Izenb erg had worked for an indep endent contracting company

programming UNIX co de for ATT itself Terminus had b een a frequent user on Izenb ergs

privately owned Elephant no de

Having interviewed Terminus and examined the records on Netsys the Chicago Task Force were

now convinced that they had discovered an underground gang of UNIX software pirates who were

demonstrably guilty of interstate tracking in illici tly copied ATT source co de Izenb erg was

swept into the dragnet around Terminus the selfpro claimed ultimate UNIX hacker

Izenb erg in Austin had settled down into a UNIX job with a Texan branch of IBM Izenb erg

was no longer working as a contractor for ATT but he had friends in New Jersey and he still

logged on to ATT UNIX computers back in New Jersey more or less whenever it pleased him

Chapter The Digital Underground

Izenb ergs activities app eared highly suspicious to the Task Force Izenb erg might well b e breaking

into ATT computers swiping ATT software and passing it to Terminus and other p ossible

confederates through the UNIX no de network And this data was worth not merely but

hundreds of thousands of dollars

On February Rob ert Izenb erg arrived home from work at IBM to nd that all the

computers had mysteriously vanished from his Austin apartment Naturally he assumed that he

had b een robb ed His Elephant no de his other machines his noteb o oks his disks his tap es

all gone However nothing much else seemed disturb ed the place had not b een ransacked The

puzzle b ecaming much stranger some ve minutes later Austin U S Secret Service Agent Al Soliz

accompanied by University of Texas campussecurity ocer Larry Coutorie and the ubiquitous Tim

Foley made their app earance at Izenb ergs do or They were in plain clothes slacks p olo shirts

They came in and Tim Foley accused Izenb erg of b elonging to the Legion of Do om

Izenb erg told them that he had never heard of the Legion of Do om And what ab out a certain

stolen E Do cument that p osed a direct threat to the p olice emergency lines Izenb erg claimed

that hed never heard of that either

His interrogators found this dicult to b elieve Didnt he know Terminus

Who

They gave him Terminuss real name Oh yes said Izenb erg He knew that guy all right he

was leading discussions on the Internet ab out ATT computers esp ecially the ATT B

ATT had thrust this machine into the marketplace but like many of ATTs ambitious

attempts to enter the computing arena the B pro ject had something less than a glittering

success Izenb erg himself had b een a contractor for the division of ATT that supp orted the B

The entire division had b een shut down Nowadays the cheap est and quickest way to get help with

this fractious piece of machinery was to join one of Terminuss discussion groups on the Internet

where friendly and knowledgeable hackers would help you for free

Naturally the remarks within this group were less than attering ab out the Death Star::: was

that the problem

Foley told Izenb erg that Terminus had b een acquiring hot software through his Izenb ergs

machine

Izenb erg shrugged this o A go o d eight megabytes of data owed through his UUCP site every

day UUCP no des sp ewed data like re hoses Elephant had b een directly linked to Netsys not

surprising since Terminus was a B exp ert and Izenb erg had b een a B contractor Izenb erg

was also linked to attctc and the University of Texas Terminus was a wellknown UNIX exp ert

and might have b een up to all manner of hijinks on Elephant Nothing Izenb erg could do ab out

that That was physically imp ossible Needle in a haystack

In a fourhour grilling Foley urged Izenb erg to come clean and admit that he was in conspiracy

with Terminus and a memb er of the Legion of Do om Izenb erg denied this He was no weirdo

teenage hacker he was thirtytwo years old and didnt even have a handle Izenb erg was a

former TV technician and electronics sp ecialist who had drifted into UNIX consulting as a full

grown adult Izenb erg had never met Terminus physically Hed once b ought a cheap highsp eed

mo dem from him though

Foley told him that this mo dem a Telenet T which ran at kilobaud and which had

just gone out Izenb ergs do or in Secret Service custo dy was likely hot prop erty Izenb erg was

taken aback to hear this but then again most of Izenb ergs equipment like that of most freelance

professionals in the industry was discounted passed handtohand through various kinds of barter

and graymarket There was no pro of that the mo dem was stolen and even if it was Izenb erg

hardly saw how that gave them the right to take every electronic item in his house

The Hacker Crackdown

Still if the United States Secret Service gured they needed his computer for national secu

rity reasons or whatever then Izenb erg would not kick He gured he would somehow make

the sacrice of his twenty thousand dollars worth of professional equipment in the spirit of full

co op eration and go o d citizenship

Rob ert Izenb erg was not arrested Izenb erg was not charged with any crime His UUCP no de

full of some megabytes of the les mail and data of himself and his dozen or so entirely

inno cent users went out the do or as evidence Along with the disks and tap es Izenb erg had

lost ab out megabytes of data

Six months would pass b efore Izenb erg decided to phone the Secret Service and ask how the

case was going That was the rst time that Rob ert Izenb erg would ever hear the name of William

Co ok As of January a full two years after the seizure Izenb erg still not charged with any

crime would b e struggling through the morass of the courts in hop e of recovering his thousands

of dollars worth of seized equipment

In the meantime the Izenb erg case received absolutely no press coverage The Secret Service had

walked into an Austin home removed a UNIX bulletin b oard system and met with no op erational

diculties whatso ever

Except that word of a crackdown had p ercolated through the Legion of Do om The Mentor

voluntarily shut down The Pho enix Pro ject It seemed a pity esp ecially as telco security em

ployees had in fact shown up on Pho enix just as he had hop ed along with the usual motley

crowd of LoD heavies hangerson phreaks hackers and wannab es There was Sandy Sandquist

from US SPRINT security and some guy named Henry Kluepfel from Bellcore itself Kluepfel

had b een trading friendly banter with hackers on Pho enix since January th two weeks after the

Martin Luther King Day Crash The presence of such a stellar telco ocial seemed quite the coup

for Pho enix Pro ject

Still Mentor could judge the climate Atlanta in ruins Phrack in deep trouble something weird

going on with UNIX no des discretion was advisable Pho enix Pro ject went oline

Kluepfel of course had b een monitoring this LoD bulletin b oard for his own purp oses and

those of the Chicago unit As far back as June Kluepfel had logged on to a Texas under

ground b oard called Phreak Klass There hed discovered an Chicago youngster named

Shadowhawk strutting and b oasting ab out riing ATT computer les and bragging of his

ambitions to riddle ATTs Bellcore computers with tro jan horse programs Kluepfel had passed

the news to Co ok in Chicago Shadowhawks computers had gone out the do or in Secret Service

custo dy and Shadowhawk himself had gone to jail

Now it was Pho enix Pro jects turn Pho enix Pro ject p ostured ab out legality and merely

intellectual interest but it reeked of the underground It had Phrack on it It had the E

Do cument It had a lot of dicey talk ab out breaking into systems including some b old and reckless

stu ab out a supp osed decryption service that Mentor and friends were planning to run to help

crack encrypted passwords o of hacked systems

Mentor was an adult There was a bulletin b oard at his place of work as well Kleupfel logged

onto this b oard to o and discovered it to b e called Illuminati It was run by some company

called Steve Jackson Games On March the Austin crackdown went into high gear

On the morning of March a Thursday yearold University of Texas student Erik

Blo o daxe cosysop of Pho enix Pro ject and an avowed memb er of the Legion of Do om was wakened

by a p olice revolver levelled at his head

Blo o daxe watched jittery as Secret Service agents appropriated his baud terminal and

riing his les discovered his treasured sourceco de for Rob ert Morriss notorious Internet Worm

But Blo o daxe a wily op erator had susp ected that something of the like might b e coming All his

b est equipment had b een hidden away elsewhere The raiders to ok everything electronic however

Chapter The Digital Underground

including his telephone They were stymied by his hefty arcadestyle PacMan game and left it in

place as it was simply to o heavy to move

Blo o daxe was not arrested He was not charged with any crime A go o d two years later the

p olice still had what they had taken from him however

The Mentor was less wary The dawn raid rousted him and his wife from b ed in their underwear

and six Secret Service agents accompanied by an Austin p oliceman and Henry Kluepfel himself

made a rich haul O went the works into the agents white Chevrolet minivan an IBM PCAT

clone with meg of RAM and a meg hard disk a HewlettPackard LaserJet I I printer a com

pletely legitimate and highly exp ensive SCOXenix op erating system Pagemaker disks and

do cumentation and the Microsoft Word wordpro cessing program Mentors wife had her incom

plete academic thesis stored on the harddisk that went to o and so did the couples telephone

As of two years later all this prop erty remained in p olice custo dy

Mentor remained under guard in his apartment as agents prepared to raid Steve Jackson Games

The fact that this was a business headquarters and not a private residence did not deter the agents

It was still very early no one was at work yet The agents prepared to break down the do or but

Mentor eavesdropping on the Secret Service walkietalkie trac b egged them not to do it and

oered his key to the building

The exact details of the next events are unclear The agents would not let anyone else into

the building Their search warrant when pro duced was unsigned Apparently they breakfasted

from the lo cal Whataburger as the litter from hamburgers was later found inside They also

extensively sampled a bag of jellyb eans kept by an SJG employee Someone tore a Dukakis for

President sticker from the wall

SJG employees diligently showing up for the days work were met at the do or and briey ques

tioned by US Secret Service agents The employees watched in astonishment as agents wielding

crowbars and screwdrivers emerged with captive machines They attacked outdo or storage units

with b oltcutters The agents wore blue nylon windbreakers with SECRET SERVICE stencilled

across the back with runningsho es and jeans

Jacksons company lost three computers several harddisks hundred of oppy disks two mon

itors three mo dems a laser printer various p owercords cables and adapters and o ddly a small

bag of screws b olts and nuts The seizure of Illuminati BBS deprived SJG of all the programs

text les and private email on the b oard The loss of two other SJG computers was a severe

blow as well since it caused the loss of electronically stored contracts nancial pro jections ad

dress directories mailing lists p ersonnel les business corresp ondence and not least the drafts

of forthcoming games and gaming b o oks

No one at Steve Jackson Games was arrested No one was accused of any crime No charges

were led Everything appropriated was ocially kept as evidence of crimes never sp ecied

After the Phrack showtrial the Steve Jackson Games scandal was the most bizarre and ag

gravating incident of the Hacker Crackdown of This raid by the Chicago Task Force on a

sciencection gaming publisher was to rouse a swarming host of civil lib erties issues and gave

rise to an enduring controversy that was still recomplicating itself and growing in the scop e of its

implications a full two years later

The pursuit of the E Do cument stopp ed with the Steve Jackson Games raid As we have seen

there were hundreds p erhaps thousands of computer users in America with the E Do cument

in their p ossession Theoretically Chicago had a p erfect legal right to raid any of these p eople

and could have legally seized the machines of anyb o dy who subscrib ed to Phrack However there

was no copy of the E Do cument on Jacksons Illuminati b oard And there the Chicago raiders

stopp ed dead they have not raided anyone since It might b e assumed that Rich Andrews and

Charlie Boykin who had brought the E Do cument to the attention of telco security might b e

The Hacker Crackdown

spared any ocial suspicion But as we have seen the willingness to co op erate fully oers little

if any assurance against federal antihacker prosecution

Richard Andrews found himself in deep trouble thanks to the E Do cument Andrews lived

in Illinois the native stomping grounds of the Chicago Task Force On February and b oth his

home and his place of work were raided by USSS His machines went out the do or to o and he

was grilled at length though not arrested Andrews proved to b e in purp ortedly guilty p ossession

of UNIX SVR UNIX SVR UUCP PMON WWB IWB DWB NROFF KORN SHELL

C and QUEST among other items Andrews had received this proprietary co de which

ATT ocially valued at well over through the UNIX network much of it supplied to

him as a p ersonal favor by Terminus Perhaps worse yet Andrews admitted to returning the favor

by passing Terminus a copy of ATT proprietary STARLAN source co de

Even Charles Boykin himself an ATT employee entered some very hot water By hed

almost forgotten ab out the E problem hed rep orted in Septemb er in fact since that date

hed passed two more security alerts to Jerry Dalton concerning matters that Boykin considered

far worse than the E Do cument

But by year of the crackdown ATT Corp orate Information Security was fed up with

Killer This machine oered no direct income to ATT and was providing aid and comfort to

a cloud of suspicious yokels from outside the company some of them actively malicious toward

ATT its prop erty and its corp orate interests Whatever go o dwill and publicity had b een won

among Killers devoted users was considered no longer worth the security risk On February

Jerry Dalton arrived in Dallas and simply unplugged the phone jacks to the puzzled

alarm of Killers many Texan users Killer went p ermanently oline with the loss of vast archives

of programs and huge quantities of electronic mail it was never restored to service ATT showed

no particular regard for the prop erty of these p eople Whatever prop erty the users had

b een storing on ATTs computer simply vanished completely

Boykin who had himself rep orted the E problem now found himself under a cloud of sus

picion In a weird privatesecurity replay of the Secret Service seizures Boykins own home was

visited by ATT Security and his own machines were carried out the do or

However there were marked sp ecial features in the Boykin case Boykins disks and his p ersonal

computers were swiftly examined by his corp orate employers and returned p olitely in just two days

unlike Secret Service seizures which commonly take months or years Boykin was not charged

with any crime or wrongdoing and he kept his job with ATT though he did retire from ATT

in Septemb er at the age of

Its interesting to note that the US Secret Service somehow failed to seize Boykins Killer no de

and carry ATTs own computer out the do or Nor did they raid Boykins home They seemed

p erfectly willing to take the word of ATT Security that ATTs employee and ATTs Killer

no de were free of hacker contraband and on the upandup

Its digital waterunderthebridge at this p oint as Killers megabytes of Texan electronic

community were erased in and Killer itself was shipp ed out of the state

But the exp eriences of Andrews and Boykin and the users of their systems remained side issues

They did not b egin to assume the so cial p olitical and legal imp ortance that gathered slowly but

inexorably around the issue of the raid on Steve Jackson Games

We must now turn our attention to Steve Jackson Games itself and explain what SJG was

what it really did and how it had managed to attract this particularly o dd and virulent kind of

trouble The reader may recall that this is not the rst but the second time that the company has

app eared in this narrative a Steve Jackson game called GURPS was a favorite pastime of Atlanta

Chapter The Digital Underground

hacker Urvile and Urviles sciencectional gaming notes had b een mixed up promiscuously with

notes ab out his actual computer intrusions

First Steve Jackson Games Inc was not a publisher of computer games SJG published

simulation games parlor games that were played on pap er with p encils and dice and printed

guideb o oks full of rules and statistics tables There were no computers involved in the games

themselves When you b ought a Steve Jackson Game you did not receive any software disks

What you got was a plastic bag with some cardb oard game tokens mayb e a few maps or a deck of

cards Most of their pro ducts were b o oks

However computers were deeply involved in the Steve Jackson Games business Like almost all

mo dern publishers Steve Jackson and his fteen employees used computers to write text to keep

accounts and to run the business generally They also used a computer to run their ocial bulletin

b oard system for Steve Jackson Games a b oard called Illuminati On Illuminati simulation gamers

who happ ened to own computers and mo dems could asso ciate trade mail debate the theory and

practice of gaming and keep up with the companys news and its pro duct announcements

Illuminati was a mo destly p opular b oard run on a small computer with limited storage only

one phoneline and no ties to largescale computer networks It did however have hundreds of

users many of them dedicated gamers willing to call from outofstate

Illuminati was not an underground b oard It did not feature hints on computer intrusion

or anarchy les or illicitl y p osted credit card numb ers or longdistance access co des Some of

Illuminatis users however were memb ers of the Legion of Do om And so was one of Steve Jacksons

senior employees the Mentor The Mentor wrote for Phrack and also ran an underground b oard

Pho enix Pro ject but the Mentor was not a computer professional The Mentor was the managing

editor of Steve Jackson Games and a professional game designer by trade These LoD memb ers

did not use Illuminati to help their hacking activities They used it to help their gameplaying

activities and they were even more dedicated to simulation gaming than they were to hacking

Illuminati got its name from a cardgame that Steve Jackson himself the companys founder

and sole owner had invented This multiplayer cardgame was one of Mr Jacksons b estknown

most successful most technically innovative pro ducts Illuminati was a game of paranoiac con

spiracy in which various antiso cial cults warred covertly to dominate the world Illuminati was

hilarious and great fun to play involving ying saucers the CIA the KGB the phone companies

the Ku Klux Klan the South American Nazis the co caine cartels the Boy Scouts and dozens of

other splinter groups from the twisted depths of Mr Jacksons professionally fervid imagination

For the uninitiated any public discussion of the Illuminati cardgame sounded by turns utterly

menacing or completely insane

And then there was SJGs Car Wars in which soup edup armored hotro ds with ro cket

launchers and heavy machineguns did battle on the American highways of the future The lively

Car Wars discussion on the Illuminati b oard featured many meticulous painstaking discussions of

the eects of grenades landmines amethrowers and napalm It sounded like hacker anarchy les

run amuck

Mr Jackson and his coworkers earned their daily bread by supplying p eople with makeb elieve

adventures and weird ideas The more farout the b etter

Simulation gaming is an unusual pastime but gamers have not generally had to b eg the p ermis

sion of the Secret Service to exist Wargames and roleplaying adventures are an old and honored

pastime much favored by professional military strategists Once little known these games are now

played by hundreds of thousands of enthusiasts throughout North America Europ e and Japan

Gamingb o oks once restricted to hobby outlets now commonly app ear in chainstores like B

Daltons and Waldenb o oks and sell vigorously

Steve Jackson Games Inc of Austin Texas was a games company of the middle rank In

SJG grossed ab out a million dollars Jackson himself had a go o d reputation in his industry as a

The Hacker Crackdown

talented and innovative designer of rather unconventional games but his company was something

less than a titan of the eld certainly not like the multimilli ondoll ar TSR Inc or Britains

gigantic Games Workshop

SJGs Austin headquarters was a mo dest twostory brick ocesuite cluttered with phones

photo copiers fax machines and computers It bustled with semiorganized activity and was littered

with glossy promotional bro chures and dogeared sciencection novels Attached to the oces was

a large tinro ofed warehouse piled twenty feet high with cardb oard b oxes of games and b o oks

Despite the weird imaginings that went on within it the SJG headquarters was quite a quotidian

everyday sort of place It lo oked like what it was a publishers digs Both Car Wars and

Illuminati were wellknown p opular games But the mainstay of the Jackson organization was

their Generic Universal RolePlaying System GURPS The GURPS system was considered

solid and welldesigned an asset for players But p erhaps the most p opular feature of the GURPS

system was that it allowed gamingmasters to design scenarios that closely resembled wellknown

b o oks movies and other works of fantasy Jackson had licensed and adapted works from many

science ction and fantasy authors There was GURPS Conan GURPS Riverworld GURPS

Horseclans GURPS Witch World names eminently familiar to sciencection readers And there

was GURPS Sp ecial Ops from the world of espionage fantasy and unconventional warfare

And then there was GURPS Cyb erpunk

Cyb erpunk was a term given to certain science ction writers who had entered the genre

in the s Cyb erpunk as the lab el implies had two general distinguishing features First

its writers had a comp elling interest in information technology an interest closely akin to science

ctions earlier fascination with space travel And second these writers were punks with all the

distinguishing features that that implies Bohemian artiness youth run wild an air of delib erate

reb ellion funny clothes and hair o dd p olitics a fondness for abrasive ro ck and roll in a word

trouble

The cyb erpunk SF writers were a small group of mostly collegeeducated white middleclass

litterateurs scattered through the US and Canada Only one Rudy Rucker a professor of com

puter science in Silicon Valley could rank with even the humblest computer hacker But except

for Professor Rucker the cyb erpunk authors were not programmers or hardware exp erts they

considered themselves artists as indeed did Professor Rucker However these writers all owned

computers and to ok an intense and public interest in the so cial ramications of the information

industry

The cyb erpunks had a strong following among the global generation that had grown up in a

world of computers multinational networks and Their outlo ok was considered

somewhat morbid cynical and dark but then again so was the outlo ok of their generational p eers

As that generation matured and increased in strength and inuence so did the cyb erpunks As

sciencection writers went they were doing fairly well for themselves By the late s their

work had attracted attention from gaming companies including Steve Jackson Games which was

planning a cyb erpunk simulation for the ourishing GURPS gaming system

The time seemed rip e for such a pro duct which had already b een proven in the marketplace

The rst games company out of the gate with a pro duct b oldly called Cyb erpunk in deance of

p ossible infringement of copyright suits had b een an upstart group called R Talsorian Talsorians

Cyb erpunk was a fairly decent game but the mechanics of the simulation system left a lot to b e

desired Commercially however the game did very well

The next cyb erpunk game had b een the even more successful Shadowrun by FASA Corp oration

The mechanics of this game were ne but the scenario was rendered moronic by sappy fantasy

elements like elves trolls wizards and dragons all highly ideologicallyin correct according to the

hardedged hightech standards of cyb erpunk science ction

Other game designers were champing at the bit Prominent among them was the Mentor a

gentleman who like most of his friends in the Legion of Do om was quite the cyb erpunk devotee

Chapter The Digital Underground

Mentor reasoned that the time had come for a real cyb erpunk gamingb o ok one that the princes

of computermischief in the Legion of Do om could play without laughing themselves sick This

b o ok GURPS Cyb erpunk would reek of culturally online authenticity

Mentor was particularly wellqualied for this task Naturally he knew far more ab out computer

intrusion and digital skullduggery than any previously published cyb erpunk author Not only

that but he was go o d at his work A vivid imagination combined with an instinctive feeling for

the working of systems and esp ecially the lo opholes within them are excellent qualities for a

professional game designer

By March st GURPS Cyb erpunk was almost complete ready to print and ship Steve Jackson

exp ected vigorous sales for this item which he hop ed would keep the company nancially aoat

for several months GURPS Cyb erpunk like the other GURPS mo dules was not a game like

a Monop oly set but a b o ok a b ound pap erback b o ok the size of a glossy magazine with a slick

color cover and pages full of text illustrations tables and fo otnotes It was advertised as a game

and was used as an aid to gameplaying but it was a b o ok with an ISBN numb er published in

Texas copyrighted and sold in b o okstores And now that b o ok stored on a computer had gone

out the do or in the custo dy of the Secret Service

The day after the raid Steve Jackson visited the lo cal Secret Service headquarters with a lawyer

in tow There he confronted Tim Foley still in Austin at that time and demanded his b o ok

back But there was trouble GURPS Cyb erpunk alleged a Secret Service agent to astonished

businessman Steve Jackson was a manual for computer crime

Its science ction Jackson said

No this is real This statement was rep eated several times by several agents Jacksons

ominously accurate game had passed from pure obscure smallscale fantasy into the impure highly

publicized largescale fantasy of the Hacker Crackdown No mention was made of the real reason for

the search According to their search warrant the raiders had exp ected to nd the E Do cument

stored on Jacksons bulletin b oard system But that warrant was sealed a pro cedure that most

law enforcement agencies will use only when lives are demonstrably in danger The raiders true

motives were not discovered until the Jackson searchwarrant was unsealed by his lawyers many

months later The Secret Service and the Chicago Computer Fraud and Abuse Task Force said

absolutely nothing to Steve Jackson ab out any threat to the p olice System They said nothing

ab out the Atlanta Three nothing ab out Phrack or Knight Lightning nothing ab out Terminus

Jackson was left to b elieve that his computers had b een seized b ecause he intended to publish

a science ction b o ok that law enforcement considered to o dangerous to see print

This misconception was rep eated again and again for months to an everwidening public audi

ence It was not the truth of the case but as months passed and this misconception was publicly

printed again and again it b ecame one of the few publicly known facts ab out the mysterious

Hacker Crackdown The Secret Service had seized a computer to stop the publication of a cyb er

punk science ction b o ok

The second section of this b o ok The Digital Underground is almost nished now We have

b ecome acquainted with all the ma jor gures of this case who actually b elong to the underground

milieu of computer intrusion We have some idea of their history their motives their general mo dus

op erandi We now know I hop e who they are where they came from and more or less what they

want In the next section of this b o ok Law and Order we will leave this milieu and directly

enter the world of Americas computer crime p olice At this p oint however I have another gure

to intro duce myself

My name is Bruce Sterling I live in Austin Texas where I am a science ction writer by trade

sp ecically a cyb erpunk science ction writer

Like my cyb erpunk colleagues in the US and Canada Ive never b een entirely happy with

this literary lab el esp ecially after it b ecame a synonym for computer criminal But I did once edit

The Hacker Crackdown

a b o ok of stories by my colleagues called MIRRORSHADES the Cyb erpunk Anthology and Ive

long b een a writer of literarycritical cyb erpunk manifestos I am not a hacker of any description

though I do have readers in the digital underground

When the Steve Jackson Games seizure o ccurred I naturally to ok an intense interest If cy

b erpunk b o oks were b eing banned by federal p olice in my own home town I reasonably wondered

whether I myself might b e next Would my computer b e seized by the Secret Service At the time

I was in p ossession of an aging Apple I Ie without so much as a hard disk If I were to b e raided

as an author of computer crime manuals the loss of my feeble wordpro cessor would likely provoke

more snickers than sympathy

Id known Steve Jackson for many years We knew one another as colleagues for we frequented

the same lo cal sciencection conventions Id played Jackson games and recognized his cleverness

but he certainly had never struck me as a p otential mastermind of computer crime

I also knew a little ab out computer bulletin b oard systems In the mids I had taken an

active role in an Austin b oard called SMOFBBS one of the rst b oards dedicated to science

ction I had a mo dem and on o ccasion Id logged on to Illuminati which always lo oked entertainly

wacky but certainly harmless enough

At the time of the Jackson seizure I had no exp erience whatso ever with underground b oards

But I knew that no one on Illuminati talked ab out breaking into systems illegally or ab out robbing

phone companies Illuminati didnt even oer pirated computer games Steve Jackson like many

creative artists was markedly touchy ab out theft of intellectual prop erty

It seemed to me that Jackson was either seriously susp ected of some crime in which case he

would b e charged so on and would have his day in court or else he was inno cent in which case

the Secret Service would quickly return his equipment and everyone would have a go o d laugh I

rather exp ected the go o d laugh The situation was not without its comic side The raid known as

the Cyb erpunk Bust in the science ction community was winning a great deal of free national

publicity b oth for Jackson himself and the cyb erpunk science ction writers generally

Besides science ction p eople are used to b eing misinterpreted Science ction is a colorful

disreputable slipsho d o ccupation full of unlikely o ddballs which of course is why we like it

Weirdness can b e an o ccupational hazard in our eld People who wear Halloween costumes are

sometimes mistaken for monsters

Once up on a time back in in New York City science ction and the US Secret

Service collided in a comic case of mistaken identity This weird incident involved a literary group

quite famous in science ction known as the Futurians whose memb ership included such future

genre greats as Isaac Asimov Frederik Pohl and Damon Knight The Futurians were every bit as

ob eat and wacky as any of their spiritual descendants including the cyb erpunks and were given

to communal living sp ontaneous group renditions of light op era and midnight fencing exhibitions

on the lawn The Futurians didnt have bulletin b oard systems but they did have the technological

equivalent in mimeographs and a private printing press These were in steady use pro ducing

a stream of sciencection fan magazines literary manifestos and weird articles which were picked

up in inksticky bundles by a succession of strange gangly sp otty young men in fedoras and

overcoats

The neighb ors grew alarmed at the antics of the Futurians and rep orted them to the Secret

Service as susp ected counterfeiters In the winter of a squad of USSS agents with drawn

guns burst into Futurian House prepared to conscate the forged currency and illici t printing

presses There they discovered a slumb ering science ction fan named George Hahn a guest of the

Futurian commune who had just arrived in New York George Hahn managed to explain himself

and his group and the Secret Service agents left the Futurians in p eace henceforth Alas Hahn

died in just b efore I had discovered this astonishing historical parallel and just b efore I could

interview him for this b o ok

Chapter The Digital Underground

But the Jackson case did not come to a swift and comic end No quick answers came his way

or mine no swift reassurances that all was right in the digital world that matters were well in

hand after all Quite the opp osite In my alternate role as a sometime p opscience journalist I

interviewed Jackson and his sta for an article in a British magazine The strange details of the

raid left me more concerned than ever Without its computers the company had b een nancially

and op erationally crippled Half the SJG workforce a group of entirely inno cent p eople had b een

sorrowfully red deprived of their liveliho o ds by the seizure It b egan to dawn on me that authors

American writers might well have their computers seized under sealed warrants without any

criminal charge and that as Steve Jackson had discovered there was no immediate recourse for

this This was no joke this wasnt science ction this was real

I determined to put science ction aside until I had discovered what had happ ened and where

this trouble had come from It was time to enter the purp ortedly real world of electronic free

expression and computer crime Hence this b o ok Hence the world of the telcos and the world of

the digital underground and next the world of the p olice

The Hacker Crackdown

Chapter Law And Order

Law And Order

Cro oked Boards The Worlds Biggest Hacker Bust Teach Them a Lesson The US

Secret Service The Secret Service Battles the Bo o dlers A Walk Downtown FCIC

The CuttingEdge Mess Cyb erspace Rangers FLETC Training the HackerTrackers

Of the various antihacker activities of Op eration Sundevil had by far the highest public

prole The sweeping nationwide computer seizures of May were unprecedented in scop e

and highly if rather selectively publicized

Unlike the eorts of the Chicago Computer Fraud and Abuse Task Force Op eration Sundevil

was not intended to combat hacking in the sense of computer intrusion or sophisticated raids

on telco switching stations Nor did it have anything to do with hacker misdeeds with ATTs

software or with Southern Bells proprietary do cuments

Instead Op eration Sundevil was a crackdown on those traditional scourges of the digital

underground credit card theft and telephone co de abuse The ambitious activities out of Chicago

and the somewhat lesserknown but vigorous antihacker actions of the New York State Police in

were never a part of Op eration Sundevil p er se which was based in Arizona

Nevertheless after the sp ectacular May raids the public misled by p olice secrecy hacker

panic and a puzzled national presscorps conated all asp ects of the nationwide crackdown in

under the blanket term Op eration Sundevil Sundevil is still the b estknown synonym

for the crackdown of But the Arizona organizers of Sundevil did not really deserve this

reputation any more for instance than all hackers deserve a reputation as hackers

There was some justice in this confused p erception though For one thing the confusion was

ab etted by the Washington oce of the Secret Service who resp onded to Freedom of Information

Act requests on Op eration Sundevil by referring investigators to the publicly known cases of

Knight Lightning and the Atlanta Three And Sundevil was certainly the largest asp ect of

the Crackdown the most delib erate and the b estorganized As a crackdown on electronic fraud

Sundevil lacked the frantic pace of the war on the Legion of Do om on the contrary Sundevils

targets were picked out with co ol delib eration over an elab orate investigation lasting two full years

And once again the targets were bulletin b oard systems

Boards can b e p owerful aids to organized fraud Underground b oards carry lively extensive de

tailed and often quite agrant discussions of lawbreaking techniques and lawbreaking activities

Discussing crime in the abstract or discussing the particulars of criminal cases is not illegal

but there are stern state and federal laws against coldblo o dedly conspiring in groups in order to

commit crimes

In the eyes of p olice p eople who actively conspire to break the law are not regarded as clubs

debating salons users groups or free sp eech advo cates Rather such p eople tend to nd

themselves formally indicted by prosecutors as gangs racketeers corrupt organizations and

organized crime gures

Whats more the illicit data contained on outlaw b oards go es well b eyond mere acts of sp eech

andor p ossible criminal conspiracy As we have seen it was common practice in the digital

underground to p ost purloined telephone co des on b oards for any phreak or hacker who cared to

abuse them Is p osting digital b o oty of this sort supp osed to b e protected by the First Amendment

Hardly though the issue like most issues in cyb erspace is not entirely resolved Some theorists

argue that to merely recite a numb er publicly is not illegal only its use is illegal But antihacker

p olice p oint out that magazines and newspap ers more traditional forms of free expression never

publish stolen telephone co des even though this might well raise their circulation

The Hacker Crackdown

Stolen credit card numb ers b eing riskier and more valuable were less often publicly p osted on

b oards but there is no question that some underground b oards carried carding trac generally

exchanged through private mail

Underground b oards also carried handy programs for scanning telephone co des and raiding

credit card companies as well as the usual obnoxious galaxy of pirated software cracked passwords

blueb ox schematics intrusion manuals anarchy les p orn les and so forth

But b esides their nuisance p otential for the spread of illicit knowledge bulletin b oards have

another vitally interesting asp ect for the professional investigator Bulletin b oards are cramfull of

evidence All that busy trading of electronic mail all those hacker b oasts brags and struts even

the stolen co des and cards can b e neat electronic realtime recordings of criminal activity As an

investigator when you seize a pirate b oard you have scored a coup as eective as tapping phones

or intercepting mail However you have not actually tapp ed a phone or intercepted a letter The

rules of evidence regarding phonetaps and mail interceptions are old stern and well understo o d

by p olice prosecutors and defense attorneys alike The rules of evidence regarding b oards are new

waing and understo o d by nob o dy at all

Sundevil was the largest crackdown on b oards in world history On May and ab out

fortytwo computer systems were seized Of those fortytwo computers ab out twentyve actually

were running b oards The vagueness of this estimate is attributable to the vagueness of a what

a computer system is and b what it actually means to run a b oard with one or with two

computers or with three

Ab out twentyve b oards vanished into p olice custo dy in May As we have seen there are

an estimated b oards in America to day If we assume that one b oard in a hundred is up to no

go o d with co des and cards which rather atters the honesty of the b oardusing community then

that would leave outlaw b oards untouched by Sundevil Sundevil seized ab out one tenth of

one p ercent of all computer bulletin b oards in America Seen ob jectively this is something less than

a comprehensive assault In Sundevils organizers the team at the Pho enix Secret Service

oce and the Arizona Attorney Generals oce had a list of at least three hundred b oards that

they considered fully deserving of search and seizure warrants The twentyve b oards actually

seized were merely among the most obvious and egregious of this much larger list of candidates

All these b oards had b een examined b eforehand either by informants who had passed printouts

to the Secret Service or by Secret Service agents themselves who not only come equipp ed with

mo dems but know how to use them

There were a numb er of motives for Sundevil First it oered a chance to get ahead of the curve

on wirefraud crimes Tracking back credit card ripos to their p erp etrators can b e appallingly

dicult If these miscreants have any kind of electronic sophistication they can snarl their tracks

through the phone network into a mindb oggling untraceable mess while still managing to reach

out and rob someone Boards however full of brags and b oasts co des and cards oer evidence

in the handy congealed form

Seizures themselves the mere physical removal of machines tends to take the pressure o

During Sundevil a large numb er of co de kids warez ddz and credit card thieves would b e

deprived of those b oards their means of community and conspiracy in one swift blow As for

the sysops themselves commonly among the b oldest oenders they would b e directly stripp ed of

their computer equipment and rendered digitally mute and blind

And this asp ect of Sundevil was carried out with great success Sundevil seems to have b een a

complete tactical surprise unlike the fragmentary and continuing seizures of the war on the Legion

of Do om Sundevil was precisely timed and utterly overwhelming At least forty computers were

seized during May and in Cincinnati Detroit Los Angeles Miami Newark Pho enix

Tucson Richmond San Diego San Jose Pittsburgh and San Francisco Some cities saw multiple

raids such as the ve separate raids in the New York City environs Plano Texas essentially a

suburb of the DallasFort Worth metroplex and a hub of the telecommunications industry saw

Chapter Law And Order

four computer seizures Chicago ever in the forefront saw its own lo cal Sundevil raid briskly

carried out by Secret Service agents Timothy Foley and Barbara Golden

Many of these raids o ccurred not in the cities prop er but in asso ciated whitemiddle class

suburbs places like Mount Lebanon Pennsylvania and Clark Lake Michigan There were a few

raids on oces most to ok place in p eoples homes the classic hacker basements and b edro oms

The Sundevil raids were searches and seizures not a group of mass arrests There were only

four arrests during Sundevil Tony the Trashman a longtime teenage b ete noire of the Arizona

Racketeering unit was arrested in Tucson on May Dr Rip co sysop of an outlaw b oard with

the misfortune to exist in Chicago itself was also arrested on illegal weap ons charges Lo cal

units also arrested a yearold female phone phreak named Electra in Pennsylvania and a

male juvenile in California Federal agents however were not seeking arrests but computers

Hackers are generally not indicted if at all until the evidence in their seized computers is

evaluated a pro cess that can take weeks months even years When hackers are arrested on the

sp ot its generally an arrest for other reasons Drugs andor illegal weap ons show up in a go o d

third of antihacker computer seizures though not during Sundevil That scoaw teenage hackers

or their parents should have marijuana in their homes is probably not a sho cking revelation

but the surprisingly common presence of illegal rearms in hacker dens is a bit disquieting A

Personal Computer can b e a great equalizer for the technocowb oy much like that more traditional

American Great Equalizer the Personal Sixgun Mayb e its not all that surprising that some

guy obsessed with p ower through illicit technology would also have a few illicit highvelo cityimpact

devices around An element of the digital underground particularly dotes on those anarchy philes

and this element tends to shade into the crackp ot milieu of survivalists gunnuts anarcholeftists

and the ultralib ertarian rightwing

This is not to say that hacker raids to date have uncovered any ma jor crackdens or illegal

arsenals but Secret Service agents do not regard hackers as just kids They regard hackers

as unpredictable p eople bright and slipp ery It do esnt help matters that the hacker himself has

b een hiding b ehind his keyb oard all this time Commonly p olice have no idea what he lo oks

like This makes him an unknown quantity someone b est treated with prop er caution

To date no hacker has come out sho oting though they do sometimes brag on b oards that they

will do just that Threats of this sort are taken seriously Secret Service hacker raids tend to b e

swift comprehensive wellmanned even overmanned and agents generally burst through every

do or in the home at once sometimes with drawn guns Any p otential resistance is swiftly quelled

Hacker raids are usually raids on p eoples homes It can b e a very dangerous business to raid an

American home p eople can panic when strangers invade their sanctum Statistically sp eaking the

most dangerous thing a p oliceman can do is to enter someones home The second most dangerous

thing is to stop a car in trac People have guns in their homes More cops are hurt in homes

than are ever hurt in biker bars or massage parlors

But in any case no one was hurt during Sundevil or indeed during any part of the Hacker

Crackdown

Nor were there any allegations of any physical mistreatment of a susp ect Guns were p ointed

interrogations were sharp and prolonged but no one in claimed any act of brutality by any

crackdown raider

In addition to the forty or so computers Sundevil reap ed oppy disks in particularly great

abundance an estimated of them which naturally included every manner of illegitimate

data pirated games stolen co des hot credit card numb ers the complete text and software of

entire pirate bulletinb oards These oppy disks which remain in p olice custo dy to day oer a

gigantic almost embarrassingly rich source of p ossible criminal indictments These oppy

disks also include a thusfar unknown quantity of legitimate computer games legitimate software

purp ortedly private mail from b oards business records and p ersonal corresp ondence of all kinds

The Hacker Crackdown

Standard computer crime search warrants lay great emphasis on seizing written do cuments as

well as computers sp ecically including photo copies computer printouts telephone bills address

b o oks logs notes memoranda and corresp ondence In practice this has meant that diaries

gaming magazines software do cumentation nonction b o oks on hacking and computer security

sometimes even science ction novels have all vanished out the do or in p olice custo dy A wide

variety of electronic items have b een known to vanish as well includin g telephones televisions

answering machines Sony Walkmans desktop printers compact disks and audiotap es

No fewer than memb ers of the Secret Service were sent into the eld during Sundevil

They were commonly accompanied by squads of lo cal andor state p olice Most of these ocers

esp ecially the lo cals had never b een on an antihacker raid b efore This was one go o d reason in

fact why so many of them were invited along in the rst place Also the presence of a uniformed

p olice ocer assures the raidees that the p eople entering their homes are in fact p olice Secret

Service agents wear plain clothes So do the telco security exp erts who commonly accompany the

Secret Service on raids and who make no particular eort to identify themselves as mere employees

of telephone companies

A typical hacker raid go es something like this First p olice storm in rapidly through every

entrance with overwhelming force in the assumption that this tactic will keep casualties to a

minimum Second p ossible susp ects are immediately removed from the vicinity of any and all

computer systems so that they will have no chance to purge or destroy computer evidence Susp ects

are herded into a ro om without computers commonly the living ro om and kept under guard not

armed guard for the guns are swiftly holstered but under guard nevertheless They are presented

with the search warrant and warned that anything they say may b e held against them Commonly

they have a great deal to say esp ecially if they are unsusp ecting parents

Somewhere in the house is the hot sp ot a computer tied to a phone line p ossibly several

computers and several phones Commonly its a teenagers b edro om but it can b e anywhere in the

house there may b e several such ro oms This hot sp ot is put in charge of a twoagent team the

nder and the recorder The nder is computertrained commonly the case agent who has

actually obtained the search warrant from a judge He or she understands what is b eing sought

and actually carries out the seizures unplugs machines op ens drawers desks les oppydisk

containers etc The recorder photographs all the equipment just as it stands esp ecially the

tangle of wired connections in the back which can otherwise b e a real nightmare to restore The

recorder will also commonly photograph every ro om in the house lest some wily criminal claim that

the p olice had robb ed him during the search Some recorders carry video cams or tap e recorders

however its more common for the recorder to simply take written notes Ob jects are describ ed

and numb ered as the nder seizes them generally on standard preprinted p olice inventory forms

Even Secret Service agents were not and are not exp ert computer users They have not

made and do not make judgements on the y ab out p otential threats p osed by various forms of

equipment They may exercise discretion they may leave Dad his computer for instance but they

dont have to Standard computer crime search warrants which date back to the early s use a

sweeping language that targets computers most anything attached to a computer most anything

used to op erate a computer most anything that remotely resembles a computer plus most any

and all written do cuments surrounding it Computer crime investigators have strongly urged agents

to seize the works

In this sense Op eration Sundevil app ears to have b een a complete success Boards went down

all over America and were shipp ed en masse to the computer investigation lab of the Secret Service

in Washington DC along with the oppy disks and unknown quantities of printed material

But the seizure of twentyve b oards and the multimegabyte mountains of p ossibly useful

evidence contained in these b oards and in their owners other computers also out the do or were

far from the only motives for Op eration Sundevil An unprecedented action of great ambition and

size Sundevils motives can only b e describ ed as p olitical It was a publicrelations eort meant

Chapter Law And Order

to pass certain messages meant to make certain situations clear b oth in the mind of the general

public and in the minds of various constituencies of the electronic community

First and this motivation was vital a message would b e sent from law enforcement to the

digital underground This very message was recited in so many words by Garry M Jenkins the

Assistant Director of the US Secret Service at the Sundevil press conference in Pho enix on May

immediately after the raids In brief hackers were mistaken in their fo olish b elief that they

could hide b ehind the relative anonymity of their computer terminals On the contrary they

should fully understand that state and federal cops were actively patrolling the b eat in cyb erspace

that they were on the watch everywhere even in those sleazy and secretive dens of cyb ernetic

vice the underground b oards

This is not an unusual message for p olice to publicly convey to cro oks The message is a standard

message only the context is new In this resp ect the Sundevil raids were the digital equivalent of

the standard vicesquad crackdown on massage parlors p orno b o okstores headshops or oating

crapgames There may b e few or no arrests in a raid of this sort no convictions no trials no

interrogations In cases of this sort p olice may well walk out the do or with many p ounds of sleazy

magazines Xrated videotap es sex toys gambling equipment baggies of marijuana:::

Of course if something truly horrendous is discovered by the raiders there will b e arrests and

prosecutions Far more likely however there will simply b e a brief but sharp disruption of the

closed and secretive world of the nogo o dniks There will b e street hassle Heat Deterrence

And of course the immediate loss of the seized go o ds It is very unlikely that any of this seized

material will ever b e returned Whether charged or not whether convicted or not the p erp etrators

will almost surely lack the nerve ever to ask for this stu to b e given back

Arrests and trials putting p eople in jail may involve all kinds of formal legalities but dealing

with the justice system is far from the only task of p olice Police do not simply arrest p eople They

dont simply put p eople in jail That is not how the p olice p erceive their jobs Police protect and

serve Police keep the p eace they keep public order Like other forms of public relations

keeping public order is not an exact science Keeping public order is something of an artform

If a group of toughlo oking teenage ho o dlums was loitering on a streetcorner no one would b e

surprised to see a streetcop arrive and sternly order them to break it up On the contrary the

surprise would come if one of these neerdowells stepp ed briskly into a phoneb o oth called a civil

rights lawyer and instituted a civil suit in defense of his Constitutional rights of free sp eech and

free assembly But something much along this line was one of the many anomalous outcomes of

the Hacker Crackdown

Sundevil also carried useful messages for other constituents of the electronic community These

messages may not have b een read aloud from the Pho enix p o dium in front of the press corps but

there was little mistaking their meaning There was a message of reassurance for the primary victims

of co ding and carding the telcos and the credit companies Sundevil was greeted with joy by the

security ocers of the electronic business community After years of hightech harassment and

spiralling revenue losses their complaints of rampant outlawry were b eing taken seriously by law

enforcement No more headscratching or dismissive shrugs no more feeble excuses ab out lack

of computertrained ocers or the low priority of victimless whitecollar telecommunication

crimes

Computer crime exp erts have long b elieved that computerrelated oenses are drastically under

rep orted They regard this as a ma jor op en scandal of their eld Some victims are reluctant to

come forth b ecause they b elieve that p olice and prosecutors are not computerliterate and can

and will do nothing Others are embarrassed by their vulnerabilities and will take strong measures

to avoid any publicity this is esp ecially true of banks who fear a loss of investor condence should

an emb ezzlementcase or wirefraud surface And some victims are so helplessly confused by their

own high technology that they never even realize that a crime has o ccurred even when they have

b een eeced to the b one

The Hacker Crackdown

The results of this situation can b e dire Criminals escap e apprehension and punishment The

computer crime units that do exist cant get work The true scop e of computer crime its size its

real nature the scop e of its threats and the legal remedies for it all remain obscured Another

problem is very little publicized but it is a cause of genuine concern Where there is p ersistent crime

but no eective p olice protection then vigilantism can result Telcos banks credit companies

the ma jor corp orations who maintain extensive computer networks vulnerable to hacking these

organizations are p owerful wealthy and p olitically inuential They are disinclin ed to b e pushed

around by cro oks or by most anyone else for that matter They often maintain wellorganized

private security forces commonly run by exp erienced veterans of military and p olice units who

have left public service for the greener pastures of the private sector For p olice the corp orate

security manager can b e a p owerful ally but if this gentleman nds no allies in the p olice and the

pressure is on from his b oardofdirectors he may quietly take certain matters into his own hands

Nor is there any lack of disp osable hiredhelp in the corp orate security business Private security

agencies the security business generally grew explosively in the s To day there are sp o oky

gumsho ed armies of security consultants rentacops private eyes outside exp erts every

manner of shady op erator who retails in results and discretion Of course many of these gentle

men and ladies may b e paragons of professional and moral rectitude But as anyone who has read

a hardb oiled detective novel knows p olice tend to b e less than fond of this sort of privatesector

comp etition

Companies in search of computersecurity have even b een known to hire hackers Police shudder

at this prosp ect

Police treasure go o d relations with the business community Rarely will you see a p oliceman

so indiscreet as to allege publicly that some ma jor employer in his state or city has succumb ed

to paranoia and gone o the rails Nevertheless p olice and computer p olice in particular are

aware of this p ossibility computer crime p olice can and do sp end up to half of their business hours

just doing public relations seminars dog and p ony shows sometimes with parents groups or

computer users but generally with their core audience the likely victims of hacking crimes These

of course are telcos credit card companies and large computerequipp ed corp orations The p olice

strongly urge these p eople as go o d citizens to rep ort oenses and press criminal charges they pass

the message that there is someone in authority who cares understands and b est of all will take

useful action should a computer crime o ccur But reassuring talk is cheap Sundevil oered action

The nal message of Sundevil was intended for internal consumption by law enforcement Sun

devil was oered as pro of that the community of American computer crime p olice had come of age

Sundevil was pro of that enormous things like Sundevil itself could now b e accomplished Sundevil

was pro of that the Secret Service and its lo cal law enforcement allies could act like a well oiled ma

chine despite the hamp ering use of those scrambled phones It was also pro of that the Arizona

Organized Crime and Racketeering Unit the sparkplug of Sundevil ranked with the b est in the

world in ambition organization and sheer conceptual daring

And as a nal llip Sundevil was a message from the Secret Service to their longtime rivals

in the Federal Bureau of Investigation By Congressional at b oth USSS and FBI formally share

jurisdiction over federal computer crimebusting activities Neither of these groups has ever b een

remotely happy with this muddled situation It seems to suggest that Congress cannot make up

its mind as to which of these groups is b etter qualied And there is scarcely a Gman or a Sp ecial

Agent anywhere without a very rm opinion on that topic

For the neophyte one of the most puzzling asp ects of the crackdown on hackers is why the

United States Secret Service has anything at all to do with this matter

Chapter Law And Order

The Secret Service is b est known for its primary public role its agents protect the President

of the United States They also guard the Presidents family the Vice President and his family

former Presidents and Presidential candidates They sometimes guard foreign dignitaries who are

visiting the United States esp ecially foreign heads of state and have b een known to accompany

American ocials on diplomatic missions overseas

Sp ecial Agents of the Secret Service dont wear uniforms but the Secret Service also has two

uniformed p olice agencies Theres the former White House Police now known as the Secret

Service Uniformed Division since they currently guard foreign embassies in Washington as well as

the White House itself And theres the uniformed Treasury Police Force

The Secret Service has b een charged by Congress with a numb er of littleknown duties They

guard the precious metals in Treasury vaults They guard the most valuable historical do cuments

of the United States originals of the Constitution the Declaration of Indep endence Lincolns

Second Inaugural Address an Americanowned copy of the Magna Carta and so forth Once they

were assigned to guard the Mona Lisa on her American tour in the s

The entire Secret Service is a division of the Treasury Department Secret Service Sp ecial Agents

there are ab out of them are b o dyguards for the President et al but they all work for the

Treasury And the Treasury through its divisions of the US Mint and the Bureau of Engraving

and Printing prints the nations money

As Treasury p olice the Secret Service guards the nations currency it is the only federal law

enforcement agency with direct jurisdiction over counterfeiting and forgery It analyzes do cuments

for authenticity and its ght against fake cash is still quite lively esp ecially since the skilled

counterfeiters of Medellin Columbia have gotten into the act Government checks b onds and

other obligations which exist in untold millions and are worth untold billions are common targets

for forgery which the Secret Service also battles It even handles forgery of p ostage stamps But

cash is fading in imp ortance to day as money has b ecome electronic As necessity b eckoned the

Secret Service moved from ghting the counterfeiting of pap er currency and the forging of checks

to the protection of funds transferred by wire

From wirefraud it was a simple skipandjump to what is formally known as access device

fraud Congress granted the Secret Service the authority to investigate access device fraud

under Title of the United States Co de USC Section

The term access device seems intuitively simple Its some kind of hightech gizmo you use to

get money with It makes go o d sense to put this sort of thing in the charge of counterfeiting and

wirefraud exp erts

However in Section the term access device is very generously dened An access device

is any card plate co de account numb er or other means of account access that can b e used

alone or in conjunction with another access device to obtain money go o ds services or any other

thing of value or that can b e used to initiate a transfer of funds

Access device can therefore b e construed to include credit cards themselves a p opular forgery

item nowadays It also includes credit card account numb ers those standards of the digital

underground The same go es for telephone charge cards an increasingly p opular item with telcos

who are tired of b eing robb ed of p o cket change by phoneb o oth thieves And also telephone access

co des those other standards of the digital underground Stolen telephone co des may not obtain

money but they certainly do obtain valuable services which is sp ecically forbidden by Section

We can now see that Section already pits the United States Secret Service directly against

the digital underground without any mention at all of the word computer

Standard phreaking devices like blue b oxes used to steal phone service from oldfashioned

mechanical switches are unquestionably counterfeit access devices Thanks to Sec it is

not only illegal to use counterfeit access devices but it is even illegal to build them Pro ducing

The Hacker Crackdown

designing duplicating or assembling blue b oxes are all federal crimes to day and if you do

this the Secret Service has b een charged by Congress to come after you

Automatic Teller Machines which replicated all over America during the s are denitely

access devices to o and an attempt to tamp er with their punchin co des and plastic bank cards

falls directly under Sec

Section is remarkably elastic Supp ose you nd a computer password in someb o dys trash

That password might b e a co de its certainly a means of account access Now supp ose you

log on to a computer and copy some software for yourself Youve certainly obtained service

computer service and a thing of value the software Supp ose you tell a dozen friends ab out

your swip ed password and let them use it to o Now youre tracking in unauthorized access

devices And when the Prophet a memb er of the Legion of Do om passed a stolen telephone

company do cument to Knight Lightning at Phrack magazine they were b oth charged under Sec

There are two limitations on Section First the oense must aect interstate or foreign

commerce in order to b ecome a matter of federal jurisdiction The term aecting commerce

is not well dened but you may take it as a given that the Secret Service can take an interest if

youve done most anything that happ ens to cross a state line State and lo cal p olice can b e touchy

ab out their jurisdictions and can sometimes b e mulish when the feds show up But when it comes

to computer crime the lo cal p olice are pathetically grateful for federal help in fact they complain

that they cant get enough of it If youre stealing longdistance service youre almost certainly

crossing state lines and youre denitely aecting the interstate commerce of the telcos And if

youre abusing credit cards by ordering stu out of glossy catalogs from say Vermont youre in for

it The second limitation is money As a rule the feds dont pursue p ennyante oenders Federal

judges will dismiss cases that app ear to waste their time Federal crimes must b e serious Section

sp ecies a minimum loss of a thousand dollars We now come to the very next section of Title

which is Section Fraud and related activity in connection with computers This statute

gives the Secret Service direct jurisdiction over acts of computer intrusion On the face of it the

Secret Service would now seem to command the eld Section however is nowhere near so

ductile as Section The rst annoyance is Section d which reads

d The United States Secret Service shall in addition to any other agency having such au

thority have the authority to investigate oenses under this section Such authority of the United

States Secret Service shall b e exercised in accordance with an agreement which shall b e entered

into by the Secretary of the Treasury and the Attorney General Authors italics

The Secretary of the Treasury is the titular head of the Secret Service while the Attorney

General is in charge of the FBI In Section d Congress shrugged o resp onsibility for the computer

crime turfbattle b etween the Service and the Bureau and made them ght it out all by themselves

The result was a rather dire one for the Secret Service for the FBI ended up with exclusive

jurisdiction over computer breakins having to do with national security foreign espionage federally

insured banks and US military bases while retaining joint jurisdiction over all the other computer

intrusions Essentially when it comes to Section the FBI not only gets the real glamor stu

for itself but can p eer over the shoulder of the Secret Service and barge in to meddle whenever

it suits them The second problem has to do with the dicey term Federal interest computer

Section a makes it illegal to access a computer without authorization if that computer

b elongs to a nancial institution or an issuer of credit cards fraud cases in other words Congress

was quite willing to give the Secret Service jurisdiction over moneytransferring computers but

Congress balked at letting them investigate any and all computer intrusions Instead the USSS

had to settle for the money machines and the Federal interest computers A Federal interest

computer is a computer which the government itself owns or is using Large networks of interstate

computers linked over state lines are also considered to b e of Federal interest This notion of

Federal interest is legally rather foggy and has never b een clearly dened in the courts The

Chapter Law And Order

Secret Service has never yet had its hand slapp ed for investigating computer breakins that were

not of Federal interest but conceivably someday this might happ en

So the Secret Services authority over unauthorized access to computers covers a lot of terri

tory but by no means the whole ball of cyb erspatial wax If you are for instance a lo cal computer

retailer or the owner of a lo cal bulletin b oard system then a malicious lo cal intruder can break

in crash your system trash your les and scatter viruses and the US Secret Service cannot do a

single thing ab out it

At least it cant do anything directly But the Secret Service will do plenty to help the lo cal

p eople who can

The FBI may have dealt itself an ace o the b ottom of the deck when it comes to Section

but thats not the whole story thats not the street What Congress thinks is one thing and

Congress has b een known to change its mind The real turfstruggle is out there in the streets where

its happ ening If youre a lo cal streetcop with a computer problem the Secret Service wants you

to know where you can nd the real exp ertise While the Bureau crowd are o having their favorite

sho es p olished wingtips and making derisive fun of the Services favorite sho es pansyass

tassels the tasseltoting Secret Service has a crew of readyandable hackertrackers installed in

the capital of every state in the Union Need advice Theyll give you advice or at least p oint you

in the right direction Need training They can see to that to o

If youre a lo cal cop and you call in the FBI the FBI as is widely and slanderously rumored

will order you around like a co olie take all the credit for your busts and mop up every p ossible

scrap of reected glory The Secret Service on the other hand do esnt brag a lot Theyre the

quiet typ es Very quiet Very co ol Ecient Hightech Mirrorshades icy stares radio earplugs

an Uzi machinepistol tucked somewhere in that wellcut jacket American samurai sworn to give

their lives to protect our President The granite agents Trained in martial arts absolutely

fearless Every single one of em has a topsecret security clearance Something go es a little wrong

youre not gonna hear any whining and moaning and p olitical buckpassing out of these guys

The facade of the granite agent is not of course the reality Secret Service agents are human

b eings And the real glory in Service work is not in battling computer crime not yet anyway

but in protecting the President The real glamour of Secret Service work is in the White House

Detail If youre at the Presidents side then the kids and the wife see you on television you rub

shoulders with the most p owerful p eople in the world Thats the real heart of Service work the

numb er one priority More than one computer investigation has stopp ed dead in the water when

Service agents vanished at the Presidents need

Theres romance in the work of the Service The intimate access to circles of great p ower the

esprit de corps of a highly trained and disciplin ed elite the high resp onsibility of defending the

Chief Executive the fulllment of a patriotic duty And as p olice work go es the pays not bad

But theres squalor in Service work to o You may get spat up on by protesters howling abuse

and if they get violent if they get to o close sometimes you have to kno ck one of them down

discreetly

The real squalor in Service work is drudgery such as the quarterlies traipsing out four times

a year year in year out to interview the various pathetic wretches many of them in prisons and

asylums who have seen t to threaten the Presidents life And then theres the grinding stress of

searching all those faces in the endless bustling crowds lo oking for hatred lo oking for psychosis

lo oking for the tight nervous face of an Arthur Bremer a Squeaky Fromme a Lee Harvey Oswald

Its watching all those grasping waving hands for sudden movements while your ears strain at

your radio headphone for the longrehearsed cry of Gun

Its p oring in grinding detail over the biographies of every rotten loser who ever shot at a

President Its the unsung work of the Protective Research Section who study scrawled anonymous

death threats with all the meticulous to ols of antiforgery techniques

The Hacker Crackdown

And its maintaining the hefty computerized les on anyone who ever threatened the Presidents

life Civil lib ertarians have b ecome increasingly concerned at the Governments use of computer

les to track American citizens but the Secret Service le of p otential Presidential assassins

which has upward of twenty thousand names rarely causes a p eep of protest If you ever state

that you intend to kill the President the Secret Service will want to know and record who you are

where you are what you are and what youre up to If youre a serious threat if youre ocially

considered of protective interest then the Secret Service may well keep tabs on you for the rest

of your natural life

Protecting the President has rst call on all the Services resources But theres a lot more to

the Services traditions and history than standing guard outside the Oval Oce The Secret Service

is the nations oldest general federal law enforcement agency Compared to the Secret Service the

FBI are newhires and the CIA are temps The Secret Service was founded way back in at the

suggestion of Hugh McCullo ch Abraham Lincolns Secretary of the Treasury McCullo ch wanted

a sp ecialized Treasury p olice to combat counterfeiting Abraham Lincoln agreed that this seemed

a go o d idea and with a terrible irony Abraham Lincoln was shot that very night by John Wilkes

Bo oth

The Secret Service originally had nothing to do with protecting Presidents They didnt take

this on as a regular assignment until after the Gareld assassination in

And they didnt get any Congressional money for it until President McKinley was shot in

The Service was originally designed for one purp ose destroying counterfeiters

There are interesting parallels b etween the Services nineteenthcentury entry into counterfeiting

and Americas twentiethcentury entry into computer crime

In Americas pap er currency was a terrible muddle Security was drastically bad Currency

was printed on the sp ot by lo cal banks in literally hundreds of dierent designs No one really knew

what the heck a dollar bill was supp osed to lo ok like Bogus bills passed easily If some joker told

you that a onedollar bill from the Railroad Bank of Lowell Massachusetts had a woman leaning

on a shield with a lo comotive a cornucopia a compass various agricultural implements a railroad

bridge and some factories then you pretty much had to take his word for it And in fact he was

telling the truth

Sixteen hundred lo cal American banks designed and printed their own pap er currency and there

were no general standards for security Like a badly guarded no de in a computer network badly

designed bills were easy to fake and p osed a security hazard for the entire monetary system

No one knew the exact extent of the threat to the currency There were panicked estimates that

as much as a third of the entire national currency was faked Counterfeiters known as b o o dlers

in the underground slang of the time were mostly technically skilled printers who had gone to the

bad Many had once worked printing legitimate currency Bo o dlers op erated in rings and gangs

Technical exp erts engraved the b ogus plates commonly in basements in New York City Smo oth

condence men passed large wads of highquality high denomination fakes includin g the really

sophisticated stu government b onds sto ck certicates and railway shares Cheap er b otched

fakes were sold or sharewared to lowlevel gangs of b o o dler wannab es The really cheesy lowlife

b o o dlers merely upgraded real bills by altering face values changing ones to ves tens to hundreds

and so on The techniques of b o o dling were littleknown and regarded with a certain awe by the

midnineteenthcentury public The ability to manipulate the system for ripo seemed diab olically

clever As the skill and daring of the b o o dlers increased the situation b ecame intolerable The

federal government stepp ed in and b egan oering its own federal currency which was printed in

fancy green ink but only on the back the original greenbacks And at rst the improved

security of the welldesigned wellprinted federal greenbacks seemed to solve the problem but then

Chapter Law And Order

the counterfeiters caught on Within a few years things were worse than ever a centralized system

where all security was bad

The lo cal p olice were helpless The Government tried oering blo o d money to p otential infor

mants but this met with little success Banks plagued by b o o dling gave up hop e of p olice help

and hired private security men instead Merchants and bankers queued up by the thousands to

buy privatelyprinted manuals on currency security slim little b o oks like Laban Heaths Infallible

Government Counterfeit Detector The back of the b o ok oered Laban Heaths patent microscop e

for ve bucks Then the Secret Service entered the picture The rst agents were a rough and ready

crew Their chief was one William P Wo o d a former guerilla in the Mexican War whod won a

reputation busting contractor fraudsters for the War Department during the Civil War Wo o d who

was also Keep er of the Capital Prison had a sideline as a counterfeiting exp ert bagging b o o dlers

for the federal b ounty money

Wo o d was named Chief of the new Secret Service in July There were only ten Secret

Service agents in all Wo o d himself a handful whod worked for him in the War Department and

a few former private investigators counterfeiting exp erts whom Wo o d had won over to public

service The Secret Service of was much the size of the Chicago Computer Fraud Task Force

or the Arizona Racketeering Unit of These ten Op eratives had an additional twenty or

so Assistant Op eratives and Informants Besides salary and p er diem each Secret Service

employee received a whopping twentyve dollars for each b o o dler he captured

Wo o d himself publicly estimated that at least half of Americas currency was counterfeit a p er

haps pardonable p erception Within a year the Secret Service had arrested over counterfeiters

They busted ab out two hundred b o o dlers a year for four years straight

Wo o d attributed his success to travelling fast and light hitting the badguys hard and avoiding

bureaucratic baggage Because my raids were made without military escort and I did not ask the

assistance of state ocers I surprised the professional counterfeiter

Wo o ds so cial message to the onceimpudent b o o dlers b ore an eerie ring of Sundevil It was

also my purp ose to convince such characters that it would no longer b e healthy for them to ply

their vo cation without b eing handled roughly a fact they so on discovered

William P Wo o d the Secret Services guerilla pioneer did not end well He succumb ed to the

lure of aiming for the really big score The notorious Bro ckway Gang of New York City headed by

William E Bro ckway the King of the Counterfeiters had forged a numb er of government b onds

Theyd passed these brilliant fakes on the prestigious Wall Street investment rm of Jay Co oke and

Company The Co oke rm were frantic and oered a huge reward for the forgers plates

Lab oring diligently Wo o d conscated the plates though not Mr Bro ckway and claimed the

reward But the Co oke company treacherously reneged Wo o d got involved in a downanddirty

lawsuit with the Co oke capitalists Wo o ds b oss Secretary of the Treasury McCullo ch felt that

Wo o ds demands for money and glory were unseemly and even when the reward money nally

came through McCullo ch refused to pay Wo o d anything Wo o d found himself mired in a seemingly

endless round of federal suits and Congressional lobbying

Wo o d never got his money And he lost his job to b o ot He resigned in

Wo o ds agents suered to o On May the second Chief of the Secret Service to ok over

and almost immediately red most of Wo o ds pioneer Secret Service agents Op eratives Assistants

and Informants alike The practice of receiving p er cro ok was ab olished And the Secret Service

b egan the long uncertain pro cess of thorough professionalization

Wo o d ended badly He must have felt stabb ed in the back In fact his entire organization was mangled

The Hacker Crackdown

On the other hand William P Wo o d was the rst head of the Secret Service William Wo o d

was the pioneer People still honor his name Who rememb ers the name of the second head of the

Secret Service

As for William Bro ckway also known as Colonel Sp encer he was nally arrested by the

Secret Service in He did ve years in prison got out and was still b o o dling at the age of

seventyfour

Anyone with an interest in Op eration Sundevil or in American computer crime generally

could scarcely miss the presence of Gail Thackeray Assistant Attorney General of the State of

Arizona computer crime training manuals often cited Thackerays group and her work she was

the highestranking state ocial to sp ecialize in computerrelated oenses Her name had b een on

the Sundevil press release though mo destly ranked well after the lo cal federal prosecuting attorney

and the head of the Pho enix Secret Service oce As public commentary and controversy b egan

to mount ab out the Hacker Crackdown this Arizonan state ocial b egan to take a higher and

higher public prole Though uttering almost nothing sp ecic ab out the Sundevil op eration itself

she coined some of the most striking soundbites of the growing propaganda war Agents are

op erating in go o d faith and I dont think you can say that for the hacker community was one

Another was the memorable I am not a mad dog prosecutor Houston Chronicle Sept

In the meantime the Secret Service maintained its usual extreme discretion the Chicago Unit

smarting from the backlash of the Steve Jackson scandal had gone completely to earth

As I collated my growing pile of newspap er clippings Gail Thackeray ranked as a comparative

fount of public knowledge on p olice op erations

I decided that I had to get to know Gail Thackeray I wrote to her at the Arizona Attorney

Generals Oce

Not only did she kindly reply to me but to my astonishment she knew very well what cyb er

punk science ction was

Shortly after this Gail Thackeray lost her job And I temp orarily misplaced my own career as

a sciencection writer to b ecome a fulltime computer crime journalist In early March I

ew to Pho enix Arizona to interview Gail Thackeray for my b o ok on the hacker crackdown

Credit cards didnt use to cost anything to get says Gail Thackeray Now they cost forty

bucks and thats all just to cover the costs from ripo artists

Electronic nuisance criminals are parasites One by one theyre not much harm no big deal

But they never come just one by one They come in swarms heaps legions sometimes whole

sub cultures And they bite Every time we buy a credit card to day we lose a little nancial

vitality to a particular sp ecies of blo o dsucker What in her exp ert opinion are the worst forms

of electronic crime I ask consulting my notes Is it credit card fraud Breaking into ATM bank

machines Phonephreaking Computer intrusions Software viruses Accessco de theft Records

tamp ering Software piracy Pornographic bulletin b oards Satellite TV piracy Theft of cable

service Its a long list By the time I reach the end of it I feel rather depressed Oh no says Gail

Thackeray leaning forward over the table her whole b o dy gone sti with energetic indignation the

biggest damage is telephone fraud Fake sweepstakes fake charities Boilerro om con op erations

You could pay o the national debt with what these guys steal::: They target old p eople they

get hold of credit ratings and demographics they rip o the old and the weak The words come

tumbling out of her

Chapter Law And Order

Its lowtech stu your everyday b oilerro om fraud Grifters conning p eople out of money over

the phone have b een around for decades This is where the word phony came from

Its just that its so much easier now horribly facilitated by advances in technology and the

byzantine structure of the mo dern phone system The same professional fraudsters do it over and

over Thackeray tells me they hide b ehind dense onionshells of fake companies::: fake holding

corp orations nine or ten layers deep registered all over the map They get a phone installed under

a false name in an empty safehouse And then they callforward everything out of that phone

to yet another phone a phone that may even b e in another state And they dont even pay the

charges on their phones after a month or so they just split Set up somewhere else in another

Po dunkville with the same seedy crew of veteran phonecro oks They buy or steal commercial

credit card rep orts slap them on the PC have a program pick out p eople over sixtyve who pay

a lot to charities A whole sub culture living o this merciless folks on the con

The lightbulbs for the blind p eople Thackeray muses with a sp ecial loathing Theres

just no end to them

Were sitting in a downtown diner in Pho enix Arizona Its a tough town Pho enix A state

capital seeing some hard times Even to a Texan like myself Arizona state p olitics seem rather

baro que There was and remains endless trouble over the Martin Luther King holiday the sort

of stinecked fo otsho oting incident for which Arizona p olitics seem famous There was Evan

Mecham the eccentric Republican millionaire governor who was imp eached after reducing state

government to a ludicrous shambles Then there was the national Keating scandal involving

Arizona savings and loans in which b oth of Arizonas US senators DeConcini and McCain

played sadly prominent roles

And the very latest is the bizarre AzScam case in which state legislators were videotap ed

eagerly taking cash from an informant of the Pho enix city p olice department who was p osing as a

Vegas mobster

Oh says Thackeray cheerfully These p eople are amateurs here they thought they were

nally getting to play with the big b oys They dont have the least idea how to take a brib e Its

not institutional corruption Its not like back in Philly

Gail Thackeray was a former prosecutor in Philadelphia Now shes a former assistant attorney

general of the State of Arizona Since moving to Arizona in she had worked under the aegis

of Steve Twist her b oss in the Attorney Generals oce Steve Twist wrote Arizonas pioneering

computer crime laws and naturally to ok an interest in seeing them enforced It was a snug niche

and Thackerays Organized Crime and Racketeering Unit won a national reputation for ambition

and technical knowledgeability::: Until the latest election in Arizona Thackerays b oss ran for

the top job and lost The victor the new Attorney General apparently went to some pains to

eliminate the bureaucratic traces of his rival including his p et group Thackerays group Twelve

p eople got their walking pap ers

Now Thackerays painstakingly assembled computer lab sits gathering dust somewhere in the

glassandconcrete Attorney Generals HQ on Washington Street Her computer crime b o oks

her painstakingly garnered back issues of phreak and hacker zines all b ought at her own exp ense

are piled in b oxes somewhere The State of Arizona is simply not particularly interested in

electronic racketeering at the moment

At the moment of our interview Gail Thackeray ocially unemployed is working out of the

county sheri s oce living on her savings and prosecuting several cases working hour weeks

just as always for no pay at all Im trying to train p eople she mutters

Half her life seems to b e sp ent training p eople merely p ointing out to the naive and incredulous

such as myself that this stu is actually going on out there Its a small world computer crime A

young world Gail Thackeray a trim blonde Baby Bo omer who favors Grand Canyon whitewater

rafting to kill some slow time is one of the worlds most senior most veteran hackertrackers

The Hacker Crackdown

Her mentor was Donn Parker the California thinktank theorist who got it all started way back

in the mids the grandfather of the eld the great bald eagle of computer crime

And what she has learned Gail Thackeray teaches Endlessly Tirelessly To anyb o dy To

Secret Service agents and state p olice at the Glynco Georgia federal training center To lo cal

p olice on roadshows with her slide pro jector and noteb o ok To corp orate security p ersonnel To

journalists To parents

Even cro oks lo ok to Gail Thackeray for advice Phonephreaks call her at the oce They

know very well who she is They pump her for information on what the cops are up to how much

they know Sometimes whole crowds of phone phreaks hanging out on illegal conference calls will

call Gail Thackeray up They taunt her And as always they b oast Phonephreaks real stone

phonephreaks simply cannot shut up They natter on for hours

Left to themselves they mostly talk ab out the intricacies of rippingo phones its ab out as

interesting as listening to hotro dders talk ab out susp ension and distributorcaps They also gossip

cruelly ab out each other And when talking to Gail Thackeray they incriminate themselves I

have tap es Thackeray says co olly

Phone phreaks just talk like crazy DialTone out in Alabama has b een known to sp end half

an hour simply reading stolen phoneco des aloud into voicemail answering machines Hundreds

thousands of numb ers recited in a monotone without a break an eerie phenomenon When

arrested its a rare phone phreak who do esnt inform at endless length on everyb o dy he knows

Hackers are no b etter What other group of criminals she asks rhetorically publishes newsletters

and holds conventions She seems deeply nettled by the sheer brazenness of this b ehavior though to

an outsider this activity might make one wonder whether hackers should b e considered criminals

at all Skateb oarders have magazines and they trespass a lot Hot ro d p eople have magazines and

they break sp eed limits and sometimes kill p eople:::

I ask her whether it would b e any loss to so ciety if phone phreaking and computer hacking as

hobbies simply dried up and blew away so that nob o dy ever did it again She seems surprised

No she says swiftly Mayb e a little::: in the old days::: the MIT stu::: But theres a lot of

wonderful legal stu you can do with computers now you dont have to break into someb o dy elses

just to learn You dont have that excuse You can learn all you like Did you ever hack into a

system I ask

The trainees do it at Glynco Just to demonstrate system vulnerabilities Shes co ol to the

notion Genuinely indierent What kind of computer do you have

A Compaq LE she mutters

What kind do you wish you had

At this question the unmistakable light of true hackerdom ares in Gail Thackerays eyes

She b ecomes tense animated the words p our out An Amiga with an IBM card and Mac

emulation The most common hacker machines are Amigas and Commo dores And Apples If

she had the Amiga she enthuses she could run a whole galaxy of seized computerevidence disks

on one convenient multifunctional machine A cheap one to o Not like the old Attorney General

lab where they had an ancient CPM machine assorted Amiga avors and Apple avors a couple

IBMs all the utility software::: but no Commo dores The workstations down at the Attorney

Generals are Wang dedicated wordpro cessors Lame machines tied in to an oce net though at

least they get online to the Lexis and Westlaw legal data services I dont say anything I recognize

the syndrome though This computerfever has b een running through segments of our so ciety for

years now Its a strange kind of lust Khunger Meghunger but its a shared disease it can kill

parties dead as conversation spirals into the deep est and most deviant recesses of software releases

and exp ensive p eripherals::: The mark of the hacker b east I have it to o The whole electronic

community whatever the hell that is has it Gail Thackeray has it Gail Thackeray is a hacker

cop My immediate reaction is a strong rush of indignant pity why do esnt someb o dy buy this

Chapter Law And Order

woman her Amiga Its not like shes asking for a Cray XMP sup ercomputer mainframe an

Amigas a sweet little co okieb ox thing Were losing zillions in organized fraud prosecuting and

defending a single hacker case in court can cost a hundred grand easy How come nob o dy can come

up with four lousy grand so this woman can do her job For a hundred grand we could buy every

computer cop in America an Amiga There arent that many of em

Computers The lust the hunger for computers The loyalty they inspire the intense sense

of p ossessiveness The culture they have bred I myself am sitting in downtown Pho enix Arizona

b ecause it suddenly o ccurred to me that the p olice might just might come and take away my

computer The prosp ect of this the mere implied threat was unb earable It literally changed my

life It was changing the lives of many others Eventually it would change everyb o dys life

Gail Thackeray was one of the top computer crime p eople in America And I was just some

novelist and yet I had a b etter computer than hers Practically everyb o dy I knew had a b etter

computer than Gail Thackeray and her feeble laptop It was like sending the sheri in to clean

up Do dge City and arming her with a slingshot cut from an old rubb er tire

But then again you dont need a howitzer to enforce the law You can do a lot just with a badge

With a badge alone you can basically wreak havo c take a terrible vengeance on wrongdo ers Ninety

p ercent of computer crime investigation is just crime investigation names places dossiers

mo dus op erandi search warrants victims complainants informants:::

What will computer crime lo ok like in ten years Will it get b etter Did Sundevil send em

reeling back in confusion

Itll b e like it is now only worse she tells me with p erfect conviction Still there in the back

ground ticking along changing with the times the criminal underworld Itll b e like drugs are

Like our problems with alcohol All the cops and laws in the world never solved our problems with

alcohol If theres something p eople want a certain p ercentage of them are just going to take it

Fifteen p ercent of the p opulace will never steal Fifteen p ercent will steal most anything not nailed

down The battle is for the hearts and minds of the remaining seventy p ercent

And criminals catch on fast If theres not to o steep a learning curve if it do esnt require a

baing amount of exp ertise and practice then criminals are often some of the rst through the

gate of a new technology Esp ecially if it helps them to hide They have tons of cash criminals The

new communications tech like cellular phones faxes Federal Express were pioneered by

rich corp orate p eople and by criminals In the early years of pagers and b eep ers dop e dealers were

so enthralled this technology that owing a b eep er was practically prima facie evidence of co caine

dealing CB radio explo ded when the sp eed limit hit and breaking the highway law b ecame a

national pastime Dop e dealers send cash by Federal Express despite or p erhaps b ecause of the

warnings in Fed Ex oces that tell you never to try this Fed Ex uses Xrays and dogs on their

mail to stop drug shipments That do esnt work very well

Drug dealers went wild over cellular phones There are simple metho ds of faking ID on cellular

phones making the lo cation of the call mobile free of charge and eectively untraceable Now

victimized cellular companies routinely bring in vast tolllists of calls to Colombia and Pakistan

Judge Greenes fragmentation of the phone company is driving law enforcement nuts Four

thousand telecommunications companies Fraud skyro cketing Every temptation in the world

available with a phone and a credit card numb er Criminals untraceable A galaxy of new neat

rotten things to do

If there were one thing Thackeray would like to have it would b e an eective legal endrun

through this new fragmentation mineeld

It would b e a new form of electronic search warrant an electronic letter of marque to b e

issued by a judge It would create a new category of electronic emergency Like a wiretap its use

would b e rare but it would cut across state lines and force swift co op eration from all concerned

Cellular phone laser computer network PBXes ATT Baby Bells longdistance entrepreneurs

The Hacker Crackdown

packet radio Some do cument some mighty courtorder that could slice through four thousand

separate forms of corp orate redtap e and get her at once to the source of calls the source of email

threats and viruses the sources of b omb threats kidnapping threats From now on she says

the Lindb erg baby will always die

Something that would make the Net sit still if only for a moment Something that would get her

up to sp eed Seven league b o ots Thats what she really needs Those guys move in nanoseconds

and Im on the Pony Express And then to o theres the coming international angle Electronic

crime has never b een easy to lo calize to tie to a physical jurisdiction And phone phreaks and

hackers loathe b oundaries they jump them whenever they can The English The Dutch And the

Germans esp ecially the ubiquitous Chaos Computer Club The Australians Theyve all learned

phonephreaking from America Its a growth mischief industry The multinational networks are

global but governments and the p olice simply arent Neither are the laws Or the legal frameworks

for citizen protection

One language is global though English Phone phreaks sp eak English its their native tongue

even if theyre Germans English may have started in England but now its the Net language it

might as well b e called CNNese

Asians just arent much into phone phreaking Theyre the world masters at organized software

piracy The French arent into phonephreaking either The French are into computerized industrial

espionage

In the old days of the MIT righteous hackerdom crashing systems didnt hurt anyb o dy Not

all that much anyway Not p ermanently Now the players are more venal Now the consequences

are worse Hacking will b egin killing p eople so on Already there are metho ds of stacking calls

onto systems annoying the p olice and p ossibly causing the death of some p o or soul calling in

with a genuine emergency Hackers in Amtrak computers or airtrac control computers will kill

someb o dy someday Mayb e a lot of p eople Gail Thackeray exp ects it

And the viruses are getting nastier The Scud virus is the latest one out It wip es harddisks

According to Thackeray the idea that phonephreaks are Robin Ho o ds is a fraud They dont

deserve this repute Basically they pick on the weak ATT now protects itself with the fearsome

ANI Automatic Numb er Identication trace capability When ATT wised up and tightened

security generally the phreaks drifted into the Baby Bells The Baby Bells lashed out in and

so the phreaks switched to smaller longdistance entrepreneurs To day they are moving into

lo cally owned PBXes and voicemail systems which are full of security holes dreadfully easy to

hack These victims arent the moneybags Sheri of Nottingham or Bad King John but small

groups of inno cent p eople who nd it hard to protect themselves and who really suer from these

depredations Phone phreaks pick on the weak They do it for p ower If it were legal they wouldnt

do it They dont want service or knowledge they want the thrill of p owertripping Theres plenty

of knowledge or service around if youre willing to pay Phone phreaks dont pay they steal Its

b ecause it is illegal that it feels like p ower that it graties their vanity

I leave Gail Thackeray with a handshake at the do or of her oce building a vast International

Style oce building downtown The Sheri s oce is renting part of it I get the vague impression

that quite a lot of the building is empty real estate crash In a Pho enix sp orts apparel store

in a downtown mall I meet the Sun Devil himself He is the carto on mascot of Arizona State

University whose fo otball stadium Sundevil is near the lo cal Secret Service HQ hence the

name Op eration Sundevil The Sun Devil himself is named Sparky Sparky the Sun Devil is

maro on and bright yellow the scho ol colors Sparky brandishes a threetined yellow pitchfork He

has a small mustache p ointed ears a barb ed tail and is dashing forward jabbing the air with the

pitchfork with an expression of devilish glee

Pho enix was the home of Op eration Sundevil The Legion of Do om ran a hacker bulletin b oard

called The Pho enix Pro ject An Australian hacker named Pho enix once burrowed through the

Chapter Law And Order

Internet to attack Cli Stoll then bragged and b oasted ab out it to The New York Times This net

of coincidence is b oth o dd and meaningless

The headquarters of the Arizona Attorney General Gail Thackerays former workplace is on

Washington Avenue Many of the downtown streets in Pho enix are named after prominent

American presidents Washington Jeerson Madison:::

After dark all the employees go home to their suburbs Washington Jeerson and Madison

what would b e the Pho enix inner city if there were an inner city in this sprawling automobile

bred town b ecome the haunts of transients and derelicts The homeless The sidewalks along

Washington are lined with orange trees Rip e fallen fruit lies scattered like cro quet balls on the

sidewalks and gutters No one seems to b e eating them I try a fresh one It tastes unb earably

bitter

The Attorney Generals oce built in during the Babbitt administration is a long low two

story building of white cement and wallsized sheets of curtainglass Behind each glass wall is a

lawyers oce quite op en and visible to anyone strolling by Across the street is a dour government

building lab elled simply ECONOMIC SECURITY something that has not b een in great supply in

the American Southwest lately

The oces are ab out twelve feet square They feature tall wo o den cases full of redspined

lawb o oks Wang computer monitors telephones Postit notes galore Also framed law diplomas

and a general excess of bad Western landscap e art Ansel Adams photos are a big favorite p erhaps

to comp ensate for the dismal sp ecter of the parking lot two acres of strip ed black asphalt which

features gravel landscaping and some sicklylo oking barrel cacti

It has grown dark Gail Thackeray has told me that the p eople who work late here are afraid

of muggings in the parking lot It seems cruelly ironic that a woman tracing electronic racketeers

across the interstate labyrinth of Cyb erspace should fear an assault by a homeless derelict in the

parking lot of her own workplace

Perhaps this is less than coincidence Perhaps these two seemingly disparate worlds are somehow

generating one another The p o or and disenfranchised take to the streets while the rich and

computerequipp ed safe in their b edro oms chatter over their mo dems Quite often the derelicts

kick the glass out and break in to the lawyers oces if they see something they need or want

badly enough I cross the parking lot to the street b ehind the Attorney Generals oce A pair of

young tramps are b edding down on attened sheets of cardb oard under an alcove stretching over

the sidewalk One tramp wears a glittercovered Tshirt reading CALIFORNIA in Co caCola

cursive His nose and cheeks lo ok chafed and swollen they glisten with what seems to b e Vaseline

The other tramp has a ragged longsleeved shirt and lank brown hair parted in the middle They

b oth wear blue jeans coated in grime They are b oth drunk You guys crash here a lot I ask

them

They lo ok at me warily I am wearing black jeans a black pinstrip ed suit jacket and a black

silk tie I have o dd sho es and a funny haircut

Its our rst time here says the rednosed tramp unconvincingly There is a lot of cardb oard

stacked here More than any two p eople could use

We usually stay at the Vinnies down the street says the brownhaired tramp pung a

Marlb oro with a meditative air as he sprawls with his head on a blue nylon backpack The Saint

Vincents You know who works in that building over there I ask p ointing The brownhaired

tramp shrugs Some kind of attorneys it says

We urge one another to take it easy I give them ve bucks A blo ck down the street I meet a

vigorous workman who is wheeling along some kind of industrial trolley it has what app ears to b e

a tank of propane on it

We make eye contact We no d p olitely I walk past him Hey Excuse me sir he says

The Hacker Crackdown

Yes I say stopping and turning

Have you seen the guy says rapidly a black guy ab out scars on b oth his cheeks like

this he gestures wears a black baseball cap on backwards wandering around here anyplace

Sounds like I dont much want to meet him I say

He to ok my wallet says my new acquaintance To ok it this morning Yknow some p eople

would b e scared of a guy like that But Im not scared Im from Chicago Im gonna hunt him

down We do things like that in Chicago

Yeah

I went to the cops and now hes got an APB out on his ass he says with satisfaction You

run into him you let me know Okay I say What is your name sir

Stanley:::

And how can I reach you

Oh Stanley says in the same rapid voice you dont have to reach uh me You can just

call the cops Go straight to the cops He reaches into a p o cket and pulls out a greasy piece of

pasteb oard See heres my rep ort on him

I lo ok The rep ort the size of an index card is lab elled PROACT Pho enix Residents

Opp osing Active Crime Threat::: or is it Organized Against Crime Threat In the darkening

street its hard to read Some kind of vigilante group Neighb orho o d watch I feel very puzzled

Are you a p olice ocer sir

He smiles seems very pleased by the question

No he says

But you are a Pho enix Resident

Would you b elieve a homeless p erson Stanley says

Really But whats with the::: For the rst time I take a close lo ok at Stanleys trolley Its a

rubb erwheeled thing of industrial metal but the device I had mistaken for a tank of propane is in

fact a waterco oler Stanley also has an Army duelbag stued tight as a sausage with clothing

or p erhaps a tent and at the base of his trolley a cardb oard b ox and a battered leather briefcase

I see I say quite at a loss For the rst time I notice that Stanley has a wallet He has not

lost his wallet at all It is in his back p o cket and chained to his b elt Its not a new wallet It seems

to have seen a lot of wear

Well you know how it is brother says Stanley Now that I know that he is homeless a

p ossible threat my entire p erception of him has changed in an instant His sp eech which once

seemed just bright and enthusiastic now seems to have a dangerous tang of mania I have to

do this he assures me Track this guy down::: Its a thing I do::: you know::: to keep myself

together He smiles no ds lifts his trolley by its decaying rubb er handgrips

Gotta work together yknow Stanley b o oms his face alight with cheerfulness the p olice

cant do everything

The gentlemen I met in my stroll in downtown Pho enix are the only computer illiterates in this

b o ok To regard them as irrelevant however would b e a grave mistake

As computerization spreads across so ciety the p opulace at large is sub jected to wave after wave

of future sho ck But as a necessary converse the computer community itself is sub jected to

wave after wave of incoming computer illiterates How will those currently enjoying Americas

digital b ounty regard and treat all this teeming refuse yearning to breathe free Will the elec

Chapter Law And Order

tronic frontier b e another Land of Opp ortunity or an armed and monitored enclave where the

disenfranchised snuggle on their cardb oard at the lo cked do ors of our houses of justice

Some p eople just dont get along with computers They cant read They cant typ e They

just dont have it in their heads to master arcane instructions in wireb ound manuals Somewhere

the pro cess of computerization of the p opulace will reach a limit Some p eople quite decent

p eople mayb e who might have thrived in any other situation will b e left irretrievably outside the

b ounds Whats to b e done with these p eople in the bright new shiny electroworld How will they

b e regarded by the mousewhizzing masters of cyb erspace With contempt Indierence Fear

In retrosp ect it astonishes me to realize how quickly p o or Stanley b ecame a p erceived threat

Surprise and fear are closely allied feelings And the world of computing is full of surprises

I met one character in the streets of Pho enix whose role in those b o ok is supremely and di

rectly relevant That p ersonage was Stanleys giant thieving scarred phantom This phantasm is

everywhere in this b o ok He is the sp ecter haunting cyb erspace

Sometimes hes a maniac vandal ready to smash the phone system for no sane reason at all

Sometimes hes a fascist fed coldly programming his mighty mainframes to destroy our Bill of

Rights Sometimes hes a telco bureaucrat covertly conspiring to register all mo dems in the service

of an Orwellian surveillance regime Mostly though this fearsome phantom is a hacker Hes

strange he do esnt b elong hes not authorized he do esnt smell right hes not keeping his prop er

place hes not one of us The fo cus of fear is the hacker for much the same reasons that Stanleys

fancied assailant is black

Stanleys demon cant go away b ecause he do esnt exist Despite singleminded and tremendous

eort he cant b e arrested sued jailed or red The only constructive way to do anything ab out

him is to learn more ab out Stanley himself This learning pro cess may b e rep ellent it may b e ugly

it may involve grave elements of paranoiac confusion but its necessary Knowing Stanley requires

something more than classcrossing condescension It requires more than steely legal ob jectivity It

requires human compassion and sympathy To know Stanley is to know his demon If you know the

other guys demon then mayb e youll come to know some of your own Youll b e able to separate

reality from illusion And then you wont do your cause and yourself more harm than go o d Like

p o or damned Stanley from Chicago did

The Federal Computer Investigations Committee FCIC is the most imp ortant and inuential

organization in the realm of American computer crime Since the p olice of other countries have

largely taken their computer crime cues from American metho ds the FCIC might well b e called

the most imp ortant computer crime group in the world

It is also by federal standards an organization of great unortho doxy State and lo cal investiga

tors mix with federal agents Lawyers nancial auditors and computersecurity programmers trade

notes with street cops Industry vendors and telco security p eople show up to explain their gadgetry

and plead for protection and justice Private investigators thinktank exp erts and industry pundits

throw in their two cents worth The FCIC is the antithesis of a formal bureaucracy Memb ers of

the FCIC are obscurely proud of this fact they recognize their group as ab errant but are entirely

convinced that this for them outright weird b ehavior is nevertheless absolutely necessary to get

their jobs done

FCIC regulars from the Secret Service the FBI the IRS the Department of Lab or the oces

of federal attorneys state p olice the Air Force from military intelligence often attend meetings

held hither and thither across the country at their own exp ense The FCIC do esnt get grants

It do esnt charge memb ership fees It do esnt have a b oss It has no headquarters just a mail

drop in Washington DC at the Fraud Division of the Secret Service It do esnt have a budget It

do esnt have schedules It meets three times a year sort of Sometimes it issues publications

The Hacker Crackdown

but the FCIC has no regular publisher no treasurer not even a secretary There are no minutes

of FCIC meetings Nonfederal p eople are considered nonvoting memb ers but theres not much

in the way of elections There are no badges lap el pins or certicates of memb ership Everyone is

on a rstname basis There are ab out forty of them Nob o dy knows how many exactly People

come p eople go sometimes p eople go formally but still hang around anyway Nob o dy has ever

exactly gured out what memb ership of this Committee actually entails

Strange as this may seem to some to anyone familiar with the so cial world of computing the

organization of the FCIC is very recognizable

For years now economists and management theorists have sp eculated that the tidal wave of the

information revolution would destroy rigid pyramidal bureaucracies where everything is top down

and centrally controlled Highly trained employees would take on much greater autonomy b eing

selfstarting and selfmotivating moving from place to place task to task with great sp eed and

uidity Adho cracy would rule with groups of p eople sp ontaneously knitting together across

organizational lines tackling the problem at hand applying intense computeraided exp ertise to it

and then vanishing whence they came

This is more or less what has actually happ ened in the world of federal computer investigation

With the conspicuous exception of the phone companies which are after all over a hundred years

old practically every organization that plays any imp ortant role in this b o ok functions just like the

FCIC The Chicago Task Force the Arizona Racketeering Unit the Legion of Do om the Phrack

crowd the Electronic Frontier Foundation they all lo ok and act like tiger teams or users

groups They are all electronic adho cracies leaping up sp ontaneously to attempt to meet a need

Some are p olice Some are by strict denition criminals Some are p olitical interestgroups

But every single group has that same quality of apparent sp ontaneity Hey gang My uncles

got a barn lets put on a show

Every one of these groups is embarrassed by this amateurism and for the sake of their

public image in a world of noncomputer p eople they all attempt to lo ok as stern and formal and

impressive as p ossible These electronic frontierdwellers resemble groups of nineteenthcentury

pioneers hankering after the resp ectability of stateho o d There are however two crucial dierences

in the historical exp erience of these pioneers of the nineteeth and twentyrst centuries

First p owerful information technology do es play into the hands of small uid lo osely organized

groups There have always b een pioneers hobbyists amateurs dilettantes volunteers

movements users groups and blueribb on panels of exp erts around But a group of this

kind when technically equipp ed to ship huge amounts of sp ecialized information at lightning

sp eed to its memb ers to government and to the press is simply a dierent kind of animal Its

like the dierence b etween an eel and an electric eel

The second crucial change is that American so ciety is currently in a state approaching p ermanent

technological revolution In the world of computers particularly it is practically imp ossible to ever

stop b eing a pioneer unless you either drop dead or delib erately jump o the bus The scene has

never slowed down enough to b ecome wellinstitutionali zed And after twenty thirty forty years

the computer revolution continues to spread to p ermeate new corners of so ciety Anything that

really works is already obsolete

If you sp end your entire working life as a pioneer the word pioneer b egins to lose its

meaning Your way of life lo oks less and less like an intro duction to something else more stable

and organized and more and more like just the way things are A p ermanent revolution is

really a contradiction in terms If turmoil lasts long enough it simply b ecomes a new kind of

so ciety still the same game of history but new players new rules Apply this to the world of

late twentiethcentury law enforcement and the implications are novel and puzzling indeed Any

bureaucratic ruleb o ok you write ab out computer crime will b e awed when you write it and almost

an antique by the time it sees print The uidity and fast reactions of the FCIC give them a great

advantage in this regard which explains their success Even with the b est will in the world which

Chapter Law And Order

it do es not in fact p ossess it is imp ossible for an organization the size of the US Federal Bureau

of Investigation to get up to sp eed on the theory and practice of computer crime If they tried to

train all their agents to do this it would b e suicidal as they would never b e able to do anything

else

The FBI do es try to train its agents in the basics of electronic crime at their base in Quantico

Virginia And the Secret Service along with many other law enforcement groups runs quite

successful and wellattended training courses on wire fraud business crime and computer intrusion

at the Federal Law Enforcement Training Center FLETC pronounced etsy in Glynco Georgia

But the b est eorts of these bureaucracies do es not remove the absolute need for a cuttingedge

mess like the FCIC

For you see the memb ers of FCIC are the trainers of the rest of law enforcement Practically

and literally sp eaking they are the Glynco computer crime faculty by another name If the FCIC

went over a cli on a bus the US law enforcement community would b e rendered deaf dumb and

blind in the world of computer crime and would swiftly feel a desp erate need to reinvent them

And this is no time to go starting from scratch

On June I once again arrived in Pho enix Arizona for the latest meeting of the Federal

Computer Investigations Committee This was more or less the twentieth meeting of this stellar

group The count was uncertain since nob o dy could gure out whether to include the meetings of

the Colluquy which is what the FCIC was called in the mids b efore it had even managed

to obtain the dignity of its own acronym

Since my last visit to Arizona in May the lo cal AzScam brib ery scandal had resolved itself in

a general muddle of humiliation The Pho enix chief of p olice whose agents had videotap ed nine

state legislators up to no go o d had resigned his oce in a tussle with the Pho enix city council over

the propriety of his undercover op erations

The Pho enix Chief could now join Gail Thackeray and eleven of her closest asso ciates in the

shared exp erience of p olitically motivated unemployment As of June resignations were still con

tinuing at the Arizona Attorney Generals oce which could b e interpreted as either a New Bro om

Sweeping Clean or a Night of the Long Knives Part I I dep ending on your p oint of view

The meeting of FCIC was held at the Scottsdale Hilton Resort Scottsdale is a wealthy sub

urb of Pho enix known as Scottsdull to scong lo cal trendies but wellequipp ed with p osh

shoppingmalls and manicured lawns while conspicuously undersupplied with homeless derelicts

The Scottsdale Hilton Resort was a sprawling hotel in p ostmo dern cryptoSouthwestern style It

featured a mission b ell tower plated in turquoise tile and vaguely resembling a Saudi minaret

Inside it was all barbarically strip ed Santa Fe Style decor There was a health spa downstairs

and a large o ddlyshap ed p o ol in the patio A p o olside umbrellastand oered Ben and Jerrys

p olitically correct Peace Pops

I registered as a memb er of FCIC attaining a handy discount rate then went in search of the

Feds Sure enough at the back of the hotel grounds came the unmistakable sound of Gail Thackeray

holding forth

Since I had also attended the Computers Freedom and Privacy conference ab out which more

later this was the second time I had seen Thackeray in a group of her law enforcement colleagues

Once again I was struck by how simply pleased they seemed to see her It was natural that shed

get some attention as Gail was one of two women in a group of some thirty men but there was a

lot more to it than that

Gail Thackeray p ersonies the so cial glue of the FCIC They could give a damn ab out her losing

her job with the Attorney General They were sorry ab out it of course but hell theyd all lost

jobs If they were the kind of guys who liked steady b oring jobs they would never have gotten into

computer work in the rst place

The Hacker Crackdown

I wandered into her circle and was immediately intro duced to ve strangers The conditions

of my visit at FCIC were reviewed I would not quote anyone directly I would not tie opinions

expressed to the agencies of the attendees I would not a purely hyp othetical example rep ort the

conversation of a guy from the Secret Service talking quite civilly to a guy from the FBI as these

two agencies never talk to each other and the IRS also present also hyp othetical never talks to

anyb o dy

Worse yet I was forbidden to attend the rst conference And I didnt I have no idea what the

FCIC was up to b ehind closed do ors that afterno on I rather susp ect that they were engaging in a

frank and thorough confession of their errors go ofups and blunders as this has b een a feature of

every FCIC meeting since their legendary Memphis b eer bust of Perhaps the single greatest

attraction of FCIC is that it is a place where you can go let your hair down and completely level

with p eople who actually comprehend what you are talking ab out Not only do they understand

you but they really pay attention they are grateful for your insights and they forgive you which

in nine cases out of ten is something even your b oss cant do b ecause as so on as you start talking

ROM BBS or T trunk his eyes glaze over I had nothing much to do that afterno on

The FCIC were b eavering away in their conference ro om Do ors were rmly closed windows to o

dark to p eer through I wondered what a real hacker a computer intruder would do at a meeting

like this

The answer came at once He would trash the place Not reduce the place to trash in some

orgy of vandalism thats not the use of the term in the hacker milieu No he would quietly empty

the trash baskets and silently raid any valuable data indiscreetly thrown away

Journalists have b een known to do this Journalists hunting information have b een known

to do almost every single unethical thing that hackers have ever done They also throw in a few

awful techniques all their own The legality of trashing is somewhat dubious but it is not in fact

agrantly illegal It was however absurd to contemplate trashing the FCIC These p eople knew

all ab out trashing I wouldnt last fteen seconds

The idea sounded interesting though Id b een hearing a lot ab out the practice lately On the

spur of the moment I decided I would try trashing the oce across the hall from the FCIC an

area which had nothing to do with the investigators

The oce was tiny six chairs a table::: Nevertheless it was op en so I dug around in its plastic

trash can

To my utter astonishment I came up with the torn scraps of a SPRINT longdistance phone

bill More digging pro duced a bank statement and the scraps of a handwritten letter along with

gum cigarette ashes candy wrapp ers and a dayoldissue of USA TODAY

The trash went back in its receptacle while the scraps of data went into my travel bag I detoured

through the hotel souvenir shop for some Scotch tap e and went up to my ro om

Coincidence or not it was quite true Some p o or soul had in fact thrown a SPRINT bill into

the hotels trash Date May total amount due Not a business phone either but a

residential bill in the name of someone called Evelyn not her real name Evelyns records showed a

PAST DUE BILL Here was her ninedigit account ID Here was a stern computerprinted

warning TREAT YOUR FONCARD AS YOU WOULD ANY CREDIT CARD TO SECURE

AGAINST FRAUD NEVER GIVE YOUR FONCARD NUMBER OVER THE PHONE UNLESS

YOU INITIATED THE CALL IF YOU RECEIVE SUSPICIOUS CALLS PLEASE NOTIFY

CUSTOMER SERVICE IMMEDIATELY

I examined my watch Still plenty of time left for the FCIC to carry on I sorted out the scraps

of Evelyns SPRINT bill and reassembled them with fresh Scotch tap e Here was her tendigit

FONCARD numb er Didnt seem to have the ID numb er necessary to cause real fraud trouble

Chapter Law And Order

I did however have Evelyns home phone numb er And the phone numb ers for a whole crowd

of Evelyns longdistance friends and acquaintances In San Diego Folsom Redondo Las Vegas

La Jolla Top eka and Northampton Massachusetts Even someb o dy in Australia

I examined other do cuments Here was a bank statement It was Evelyns IRA account down at

a bank in San Mateo California total balance Here was a chargecard bill for

She was paying it o bit by bit

Driven by motives that were completely unethical and prurient I now examined the handwritten

notes They had b een torn fairly thoroughly so much so that it to ok me almost an entire ve

minutes to reassemble them

They were drafts of a love letter They had b een written on the lined stationery of Evelyns

employer a biomedical company Probably written at work when she should have b een doing

something else

Dear Bob not his real name I guess in everyones life there comes a time when hard

decisions have to b e made and this is a dicult one for me very upsetting Since you havent

called me and I dont understand why I can only surmise its b ecause you dont want to I thought

I would have heard from you Friday I did have a few unusual problems with my phone and p ossibly

you tried I hop e so

Rob ert you asked me to let go:::

The rst note ended Unusual problems with her phone I lo oked swiftly at the next note

Bob not hearing from you for the whole weekend has left me very p erplexed:::

Next draft Dear Bob there is so much I dont understand right now and I wish I did I wish

I could talk to you but for some unknown reason you have elected not to call this is so dicult

for me to understand:::

She tried again

Bob Since I have always held you in such high esteem I had every hop e that we could remain

go o d friends but now one essential ingredient is missing resp ect Your ability to discard p eople

when their purp ose is served is appalling to me The kindest thing you could do for me now is to

leave me alone You are no longer welcome in my heart or home:::

Try again

Bob I wrote a very factual note to you to say how much resp ect I had lost for you by the way

you treat p eople me in particular so uncaring and cold The kindest thing you can do for me is to

leave me alone entirely as you are no longer welcome in my heart or home I would appreciate it if

you could retire your debt to me as so on as p ossible I wish no link to you in any way Sincerely

Evelyn

Go o d heavens I thought the bastard actually owes her money I turned to the next page

Bob very simple GOODBYE No more mind games no more fascination no more coldness

no more resp ect for you Its over Finis Evie

There were two versions of the nal brusho letter but they read ab out the same Mayb e she

hadnt sent it The nal item in my illicit and shameful b o oty was an envelop e addressed to Bob

at his home address but it had no stamp on it and it hadnt b een mailed

Mayb e shed just b een blowing o steam b ecause her rascal b oyfriend had neglected to call her

one weekend Big deal Mayb e theyd kissed and made up mayb e she and Bob were down at Pops

Cho colate Shop now sharing a malted Sure

Easy to nd out All I had to do was call Evelyn up With a halfclever story and enough

brassplated gall I could probably trick the truth out of her Phonephreaks and hackers deceive

p eople over the phone all the time Its called so cial engineering So cial engineering is a very

The Hacker Crackdown

common practice in the underground and almost magically eective Human b eings are almost

always the weakest link in computer security The simplest way to learn Things You Are Not Meant

To Know is simply to call up and exploit the knowledgeable p eople With so cial engineering you

use the bits of sp ecialized knowledge you already have as a key to manipulate p eople into b elieving

that you are legitimate You can then coax atter or frighten them into revealing almost anything

you want to know Deceiving p eople esp ecially over the phone is easy and fun Exploiting their

gullibili ty is very gratifying it makes you feel very sup erior to them If Id b een a malicious hacker

on a trashing raid I would now have Evelyn very much in my p ower Given all this inside data

it wouldnt take much eort at all to invent a convincing lie If I were ruthless enough and jaded

enough and clever enough this momentary indiscretion of hers mayb e committed in tears who

knows could cause her a whole world of confusion and grief

I didnt even have to have a malicious motive Mayb e Id b e on her side and call up Bob

instead and anonymously threaten to break b oth his kneecaps if he didnt take Evelyn out for a

steak dinner pronto It was still profoundly none of my business To have gotten this knowledge

at all was a sordid act and to use it would b e to inict a sordid injury

To do all these awful things would require exactly zero hightech exp ertise All it would take

was the willingness to do it and a certain amount of b ent imagination I went back downstairs

The hardworking FCIC who had lab ored fortyve minutes over their schedule were through for

the day and adjourned to the hotel bar We all had a b eer

I had a chat with a guy ab out Isis or rather IACIS the International Asso ciation of Computer

Investigation Sp ecialists Theyre into computer forensics the techniques of picking computer

systems apart without destroying vital evidence IACIS currently run out of Oregon is comprised

of investigators in the US Canada Taiwan and Ireland Taiwan and Ireland I said Are Taiwan

and Ireland really in the forefront of this stu Well not exactly my informant admitted They

just happ en to have b een the rst ones to have caught on by word of mouth Still the international

angle counts b ecause this is obviously an international problem Phonelines go everywhere

There was a Mountie here from the Royal Canadian Mounted Police He seemed to b e having

quite a go o d time Nob o dy had ung this Canadian out b ecause he might p ose a foreign security

risk These are cyb erspace cops They still worry a lot ab out jurisdictions but mere geography is

the least of their troubles NASA had failed to show NASA suers a lot from computer intrusions

in particular from Australian raiders and a welltrump eted Chaos Computer Club case and in

there was a brief press urry when it was revealed that one of NASAs Houston branchexchanges

had b een systematically ripp ed o by a gang of phonephreaks But the NASA guys had had their

funding cut They were stripping everything

Air Force OSI its Oce of Sp ecial Investigations is the only federal entity dedicated fulltime

to computer security Theyd b een exp ected to show up in force but some of them had cancelled

a Pentagon budget pinch

As the empties piled up the guys b egan joshing around and telling warstories These are

cops Thackeray said tolerantly If theyre not talking shop they talk ab out women and b eer

I heard the story ab out the guy who asked for a copy of a computer disk photo copied the

lab el on it He put the oppy disk onto the glass plate of a photo copier The blast of static when

the copier worked completely erased all the real information on the disk

Some other p o or souls threw a whole bag of conscated diskettes into the squadcar trunk next

to the p olice radio The p owerful radio signal blasted them to o We heard a bit ab out Dave

Geneson the rst computer prosecutor a mainframerunner in Dade County turned lawyer Dave

Geneson was one guy who had hit the ground running a signal virtue in making the transition

to computer crime It was generally agreed that it was easier to learn the world of computers

rst then p olice or prosecutorial work You could take certain computer p eople and train em to

successful p olice work but of course they had to have the cop mentality They had to have street

Chapter Law And Order

smarts Patience Persistence And discretion Youve got to make sure theyre not hotshots

showos cowb oys

Most of the folks in the bar had backgrounds in military intelligence or drugs or homicide

It was rudely opined that military intelligence was a contradiction in terms while even the

grisly world of homicide was considered cleaner than drug enforcement One guy had b een way

undercover doing dop ework in Europ e for four years straight Im almost recovered now he said

deadpan with the acid black humor that is pure cop Hey now I can say fucker without putting

mother in front of it

In the cop world another guy said earnestly everything is go o d and bad black and white

In the computer world everything is gray

One guy a founder of the FCIC whod b een with the group since it was just the Colluquy

describ ed his own intro duction to the eld Hed b een a Washington DC homicide guy called in

on a hacker case From the word hacker he naturally assumed he was on the trail of a knife

wielding marauder and went to the computer center exp ecting blo o d and a b o dy When he nally

gured out what was happ ening there after loudly demanding in vain that the programmers

sp eak English he called headquarters and told them he was clueless ab out computers They

told him nob o dy else knew diddly either and to get the hell back to work

So he said he had pro ceeded by comparisons By analogy By metaphor Someb o dy broke in

to your computer huh Breaking and entering I can understand that Howd he get in Over

the phonelines Harassing phonecalls I can understand that What we need here is a tap and a

trace

It worked It was b etter than nothing And it worked a lot faster when he got hold of another

cop whod done something similar And then the two of them got another and another and pretty

so on the Colluquy was a happ ening thing It help ed a lot that everyb o dy seemed to know Carlton

Fitzpatrick the datapro cessing trainer in Glynco

The ice broke bigtime in Memphis in The Colluquy had attracted a bunch of new guys

Secret Service FBI military other feds heavy guys Nob o dy wanted to tell anyb o dy anything

They susp ected that if word got back to the home oce theyd all b e red They passed an

uncomfortably guarded afterno on

The formalities got them nowhere But after the formal session was over the organizers brought

in a case of b eer As so on as the participants kno cked it o with the bureaucratic ranks and turf

ghting everything changed I bared my soul one veteran reminisced proudly By nightfall they

were building pyramids of empty b eercans and doing everything but comp osing a team ght song

FCIC were not the only computer crime p eople around There was DATTA District Attorneys

Technology Theft Asso ciation though they mostly sp ecialized in chip theft intellectual prop erty

and blackmarket cases There was HTCIA High Tech Computer Investigators Asso ciation also

out in Silicon Valley a year older than FCIC and featuring brilliant p eople like Donald Ingraham

There was LEETAC Law Enforcement Electronic Technology Assistance Committee in Florida

and computer crime units in Illinois and Maryland and Texas and Ohio and Colorado and Penn

sylvania But these were lo cal groups FCIC were the rst to really network nationally and on a

federal level

FCIC p eople live on the phone lines Not on bulletin b oard systems they know very well what

b oards are and they know that b oards arent secure Everyone in the FCIC has a voicephone

bill like you wouldnt b elieve FCIC p eople have b een tight with the telco p eople for a long time

Telephone cyb erspace is their native habitat

FCIC has three basic subtrib es the trainers the security p eople and the investigators Thats

why its called an Investigations Committee with no mention of the term computer crime

the dreaded Cword FCIC ocially is an asso ciation of agencies rather than individual s

unocially this eld is small enough that the inuence of individuals and individual exp ertise

The Hacker Crackdown

is paramount Attendance is by invitation only and most everyone in FCIC considers himself a

prophet without honor in his own house

Again and again I heard this with dierent terms but identical sentiments Id b een sitting in

the wilderness talking to myself I was totally isolated I was desp erate FCIC is the b est

thing there is ab out computer crime in America FCIC is what really works This is where

you hear real p eople telling you whats really happ ening out there not just lawyers picking nits

We taught each other everything we knew

The sincerity of these statements convinces me that this is true FCIC is the real thing and it

is invaluable Its also very sharply at o dds with the rest of the traditions and p ower structure in

American law enforcement There probably hasnt b een anything around as lo ose and gogetting

as the FCIC since the start of the US Secret Service in the s FCIC p eople are living like

twentyrst century p eople in a twentiethcentury environment and while theres a great deal to b e

said for that theres also a great deal to b e said against it and those against it happ en to control

the budgets I listened to two FCIC guys from Jersey compare life histories One of them had b een

a biker in a fairly heavyduty gang in the s Oh did you know soandso said the other

guy from Jersey Big guy heavyset

Yeah I knew him

Yeah he was one of ours He was our plant in the gang

Really Wow Yeah I knew him Helluva guy

Thackeray reminisced at length ab out b eing teargassed blind in the Novemb er antiwar

protests in Washington Circle covering them for her college pap er Oh yeah I was there said

another cop Glad to hear that tear gas hit somethin Haw haw haw Hed b een so blind himself

he confessed that later that day hed arrested a small tree

FCIC are an o dd group sifted out by coincidence and necessity and turned into a new kind of

cop There are a lot of sp ecialized cops in the world your bunco guys your drug guys your tax

guys but the only group that matches FCIC for sheer isolation are probably the childp ornography

p eople Because they b oth deal with conspirators who are desp erate to exchange forbidden data

and also desp erate to hide and b ecause nob o dy else in law enforcement even wants to hear ab out

it

FCIC p eople tend to change jobs a lot They tend not to get the equipment and training they

want and need And they tend to get sued quite often

As the night wore on and a band set up in the bar the talk grew darker Nothing ever gets

done in government someone opined until theres a disaster Computing disasters are awful but

theres no denying that they greatly help the credibility of FCIC p eople The Internet Worm for

instance For years wed b een warning ab out that but its nothing compared to whats coming

They exp ect horrors these p eople They know that nothing will really get done until there is a

horror

Next day we heard an extensive brieng from a guy whod b een a computer cop gotten into

hot water with an Arizona city council and now installed computer networks for a living at a

considerable rise in pay He talked ab out pulling b eroptic networks apart

Even a single computer with enough p eripherals is a literal network a bunch of machines

all cabled together generally with a complexity that puts stereo units to shame FCIC p eople

invent and publicize metho ds of seizing computers and maintaining their evidence Simple things

sometimes but vital rules of thumb for street cops who nowadays often stumble across a busy

computer in the midst of a drug investigation or a whitecollar bust For instance Photograph the

Chapter Law And Order

system b efore you touch it Lab el the ends of all the cables b efore you detach anything Park

the heads on the disk drives b efore you move them Get the diskettes Dont put the diskettes

in magnetic elds Dont write on diskettes with ballp oint p ens Get the manuals Get the

printouts Get the handwritten notes Copy data b efore you lo ok at it and then examine the copy

instead of the original Now our lecturer distributed copied diagrams of a typical LAN or Lo cal

Area Network which happ ened to b e out of Connecticut One hundred and ftynine desktop

computers each with its own p eripherals Three le servers Five star couplers each with

thirtytwo p orts One sixteenp ort coupler o in the corner oce All these machines talking to

each other distributing electronic mail distributing software distributing quite p ossibly criminal

evidence All linked by high capacity b eroptic cable A bad guy cops talk a lot ab out bad

guys might b e lurking on PC or and distributing his ill doings onto some dup es

p ersonal machine in another oce or another o or or quite p ossibly two or three miles

away Or conceivably the evidence might b e datastrip ed split up into meaningless slivers

stored one by one on a whole crowd of dierent disk drives

The lecturer challenged us for solutions I for one was utterly clueless As far as I could gure

the Cossacks were at the gate there were probably more disks in this single building than were

seized during the entirety of Op eration Sundevil

Inside informant someb o dy said Right Theres always the human angle something easy

to forget when contemplating the arcane recesses of high technology Cops are skilled at getting

p eople to talk and computer p eople given a chair and some sustained attention will talk ab out

their computers till their throats go raw Theres a case on record of a single question Howd

you do it eliciting a fortyveminute videotap ed confession from a computer criminal who not

only completely incriminated himself but drew helpful diagrams

Computer p eople talk Hackers brag Phonephreaks talk pathologically why else are they

stealing phoneco des if not to natter for ten hours straight to their friends on an opp osite seab oard

Computerliterate p eople do in fact p ossess an arsenal of nifty gadgets and techniques that would

allow them to conceal all kinds of exotic skullduggery and if they could only shut up ab out it they

could probably get away with all manner of amazing informationcrimes But thats just not how

it works or at least thats not how its worked so far

Most every phonephreak ever busted has swiftly implicated his mentors his disciples and

his friends Most every whitecollar computercriminal smugly convinced that his clever scheme

is bulletpro of swiftly learns otherwise when for the rst time in his life an actual nokidding

p oliceman leans over grabs the front of his shirt lo oks him right in the eye and says All right

asshole you and me are going downtown All the hardware in the world will not insulate your

nerves from these actual reallife sensations of terror and guilt

Cops know ways to get from p oint A to p oint Z without thumbing through every letter in some

smartass badguys alphab et Cops know how to cut to the chase Cops know a lot of things other

p eople dont know

Hackers know a lot of things other p eople dont know to o Hackers know for instance how to

sneak into your computer through the phonelines But cops can show up right on your do orstep

and carry o you and your computer in separate steel b oxes A cop interested in hackers can grab

them and grill them A hacker interested in cops has to dep end on hearsay underground legends

and what cops are willing to publicly reveal And the Secret Service didnt get named the Secret

Service b ecause they blab a lot Some p eople our lecturer informed us were under the mistaken

impression that it was imp ossible to tap a b eroptic line Well he announced he and his son

had just whipp ed up a b eroptic tap in his workshop at home He passed it around the audience

along with a circuitcovered LAN plugin card so wed all recognize one if we saw it on a case We

all had a lo ok

The tap was a classic Go ofy Prototyp e a thumblength rounded metal cylinder with a pair

of plastic brackets on it From one end dangled three thin black cables each of which ended in a

The Hacker Crackdown

tiny black plastic cap When you plucked the safetycap o the end of a cable you could see the

glass b er no thicker than a pinhole

Our lecturer informed us that the metal cylinder was a wavelength division multiplexer

Apparently what one did was to cut the b eroptic cable insert two of the legs into the cut to

complete the network again and then read any passing data on the line by ho oking up the third

leg to some kind of monitor Sounded simple enough I wondered why nob o dy had thought of it

b efore I also wondered whether this guys son back at the workshop had any teenage friends

We had a break The guy sitting next to me was wearing a giveaway baseball cap advertising

the Uzi submachine gun We had a desultory chat ab out the merits of Uzis Long a favorite of the

Secret Service it seems Uzis went out of fashion with the advent of the Persian Gulf War our Arab

allies taking some oense at Americans toting Israeli weap ons Besides I was informed by another

exp ert Uzis jam The equivalent weap on of choice to day is the Heckler Ko ch manufactured in

Germany

The guy with the Uzi cap was a forensic photographer He also did a lot of photographic

surveillance work in computer crime cases He used to that is until the rings in Pho enix He was

now a private investigator and with his wife ran a photography salon sp ecializi ng in weddings and

p ortrait photos At one must rep eat a considerable rise in income He was still FCIC If you

were FCIC and you needed to talk to an exp ert ab out forensic photography well there he was

willing and able If he hadnt shown up p eople would have missed him

Our lecturer had raised the p oint that preliminary investigation of a computer system is vital

b efore any seizure is undertaken Its vital to understand how many machines are in there what

kinds there are what kind of op erating system they use how many p eople use them where the

actual data itself is stored To simply barge into an oce demanding all the computers is a recip e

for swift disaster

This entails some discreet inquiries b eforehand In fact what it entails is basically undercover

work An intelligence op eration Spying not to put to o ne a p oint on it

In a chat after the lecture I asked an attendee whether trashing might work

I received a swift brieng on the theory and practice of trash covers Police trash covers

like mail covers or like wiretaps require the agreement of a judge This obtained the trashing

work of cops is just like that of hackers only more so and much b etter organized So much so I

was informed that mobsters in Pho enix make extensive use of lo cked garbage cans picked up by a

sp ecialty highsecurity trash company

In one case a tiger team of Arizona cops had trashed a lo cal residence for four months Every

week they showed up on the municipal garbage truck disguised as garbagemen and carried the

contents of the susp ect cans o to a shade tree where they comb ed through the garbage a messy

task esp ecially considering that one of the o ccupants was undergoing kidney dialysis All useful

do cuments were cleaned dried and examined A discarded typ ewriterribb on was an esp ecially

valuable source of data as its long one strike ribb on of lm contained the contents of every letter

mailed out of the house The letters were neatly retyp ed by a p olice secretary equipp ed with a

large deskmounted magnifying glass

There is something weirdly disquieting ab out the whole sub ject of trashing an unsusp ected

and indeed rather disgusting mo de of deep p ersonal vulnerability Things that we pass by every

day that we take utterly for granted can b e exploited with so little work Once discovered the

knowledge of these vulnerabilities tend to spread

Take the lowly sub ject of manhole covers The humble manhole cover repro duces many of the

dilemmas of computersecurity in miniature Manhole covers are of course technological artifacts

accessp oints to our buried urban infrastructure To the vast ma jority of us manhole covers are

invisible They are also vulnerable For many years now the Secret Service has made a p oint

of caulking manhole covers along all routes of the Presidential motorcade This is of course to

Chapter Law And Order

deter terrorists from leaping out of underground ambush or more likely planting remotecontrol

carsmashing b ombs b eneath the street

Lately manhole covers have seen more and more criminal exploitation esp ecially in New York

City Recently a telco in New York City discovered that a cable television service had b een sneaking

into telco manholes and installing cable service alongside the phonelines without paying royalties

New York companies have also suered a general plague of a underground copp er cable theft b

dumping of garbage including toxic waste and c hasty dumping of murder victims

Industry complaints reached the ears of an innovative New England industrialsecurity com

pany and the result was a new pro duct known as the Intimidator a thick titaniumsteel b olt

with a precisely machined head that requires a sp ecial device to unscrew All these keys have

registered serial numb ers kept on le with the manufacturer There are now some thousands of

these Intimidator b olts b eing sunk into American pavements wherever our President passes like

some macabre paro dy of strewn roses They are also spreading as fast as steel dandelions around

US military bases and many centers of private industry

Quite likely it has never o ccurred to you to p eer under a manhole cover p erhaps climb down

and walk around down there with a ashlight just to see what its like Formally sp eaking this

might b e trespassing but if you didnt hurt anything and didnt make an absolute habit of it

nob o dy would really care The freedom to sneak under manholes was likely a freedom you never

intended to exercise

You now are rather less likely to have that freedom at all You may never even have missed

it until you read ab out it here but if youre in New York City its gone and elsewhere its likely

going This is one of the things that crime and the reaction to crime do es to us

The tenor of the meeting now changed as the Electronic Frontier Foundation arrived The EFF

whose p ersonnel and history will b e examined in detail in the next chapter are a pioneering civil

lib erties group who arose in direct resp onse to the Hacker Crackdown of

Now Mitchell Kap or the Foundations president and Michael Go dwin its chief attorney were

confronting federal law enforcement mano a mano for the rst time ever Ever alert to the manifold

uses of publicity Mitch Kap or and Mike Go dwin had brought their own journalist in tow Rob ert

Drap er from Austin whose recent wellreceived b o ok ab out ROLLING STONE magazine was still

on the stands Drap er was on assignment for TEXAS MONTHLY

The Steve JacksonEFF civil lawsuit against the Chicago Computer Fraud and Abuse Task Force

was a matter of considerable regional interest in Texas There were now two Austinite journalists

here on the case In fact counting Go dwin a former Austinite and former journalist there were

three of us Lunch was like Old Home Week

Later I to ok Drap er up to my hotel ro om We had a long frank talk ab out the case networking

earnestly like a miniature freelancejourno version of the FCIC privately confessing the numerous

blunders of journalists covering the story and trying hard to gure out who was who and what

the hell was really going on out there I showed Drap er everything I had dug out of the Hilton

trashcan We p ondered the ethics of trashing for a while and agreed that they were dismal We

also agreed that nding a SPRINT bill on your rst time out was a heck of a coincidence

First Id trashed and now mere hours later Id bragged to someone else Having entered the

lifestyle of hackerdom I was now unsurprisingly following its logic Having discovered something

remarkable through a surreptitious action I of course had to brag and to drag the passing

Drap er into my iniquities I felt I needed a witness Otherwise nob o dy would have b elieved what

Id discovered:::

Back at the meeting Thackeray cordially if rather tentatively intro duced Kap or and Go dwin to

her colleagues Pap ers were distributed Kap or to ok center stage The brilliant Bostonian hightech

entrepreneur normally the hawk in his own administration and quite an eective public sp eaker

seemed visibly nervous and frankly admitted as much He b egan by saying he consided computer

The Hacker Crackdown

intrusion to b e morally wrong and that the EFF was not a hacker defense fund despite what

had app eared in print Kap or chatted a bit ab out the basic motivations of his group emphasizing

their go o d faith and willingness to listen and seek common ground with law enforcement when

er p ossible

Then at Go dwins urging Kap or suddenly remarked that EFFs own Internet machine had

b een hacked recently and that EFF did not consider this incident amusing

After this surprising confession things b egan to lo osen up quite rapidly So on Kap or was elding

questions parrying ob jections challenging denitions and juggling paradigms with something akin

to his usual gusto

Kap or seemed to score quite an eect with his shrewd and skeptical analysis of the merits of

telco CallerID services On this topic FCIC and EFF have never b een at loggerheads and

have no particular established earthworks to defend CallerID has generally b een promoted as a

privacy service for consumers a presentation Kap or describ ed as a smokescreen the real p oint of

CallerID b eing to allow corp orate customers to build extensive commercial databases on everyb o dy

who phones or faxes them Clearly few p eople in the ro om had considered this p ossibility except

p erhaps for two latearrivals from US WEST RBOC security who chuckled nervously

Mike Go dwin then made an extensive presentation on Civil Lib erties Implications of Computer

Searches and Seizures Now at last we were getting to the real nittygritty here real p olitical

horsetrading The audience listened with close attention angry mutters rising o ccasionally Hes

trying to teach us our jobs Weve b een thinking ab out this for years We think ab out these

issues every day If I didnt seize the works Id b e sued by the guys victims Im violating

the law if I leave ten thousand disks full of illegal pirated software and stolen co des Its our job

to make sure p eople dont trash the Constitution were the defenders of the Constitution We

seize stu when we know it will b e forfeited anyway as restitution for the victim

If its forfeitable then dont get a search warrant get a forfeiture warrant Go dwin suggested

co olly He further remarked that most susp ects in computer crime dont want to see their computers

vanish out the do or headed Go d knew where for who knows how long They might not mind a

search even an extensive search but they want their machines searched onsite Are they gonna

feed us someb o dy asked sourly How ab out if you take copies of the data Go dwin parried

Thatll never stand up in court Okay you make copies give them the copies and take the

originals

Hmmm

Go dwin championed bulletin b oard systems as rep ositories of First Amendment protected free

sp eech He complained that federal computer crime training manuals gave b oards a bad press sug

gesting that they are hotb eds of crime haunted by p edophiles and cro oks whereas the vast ma jority

of the nations thousands of b oards are completely inno cuous and nowhere near so romantically

suspicious

People who run b oards violently resent it when their systems are seized and their dozens or

hundreds of users lo ok on in ab ject horror Their rights of free expression are cut short Their

right to asso ciate with other p eople is infringed And their privacy is violated as their private

electronic mail b ecomes p olice prop erty

Not a soul sp oke up to defend the practice of seizing b oards The issue passed in chastened

silence Legal principles aside and those principles cannot b e settled without laws passed or court

precedents seizing bulletin b oards has b ecome publicrelations p oison for American computer

p olice

And anyway its not entirely necessary If youre a cop you can get most everything you

need from a pirate b oard just by using an inside informant Plenty of vigilantes well concerned

citizens will inform p olice the moment they see a pirate b oard hit their area and will tell the

Chapter Law And Order

p olice all ab out it in such technical detail actually that you kinda wish theyd shut up They

will happily supply p olice with extensive downloads or printouts Its imp ossible to keep this uid

electronic information out of the hands of p olice Some p eople in the electronic community b ecome

enraged at the prosp ect of cops monitoring bulletin b oards This do es have touchy asp ects as

Secret Service p eople in particular examine bulletin b oards with some regularity But to exp ect

electronic p olice to b e deaf dumb and blind in regard to this particular medium rather ies in the

face of common sense Police watch television listen to radio read newspap ers and magazines why

should the new medium of b oards b e dierent Cops can exercise the same access to electronic

information as everyb o dy else As we have seen quite a few computer p olice maintain their own

bulletin b oards including antihacker sting b oards which have generally proven quite eective

As a nal clincher their Mountie friends in Canada and colleagues in Ireland and Taiwan dont

have First Amendment or American constitutional restrictions but they do have phone lines and

can call any bulletin b oard in America whenever they please The same technological determinants

that play into the hands of hackers phone phreaks and software pirates can play into the hands

of p olice Technological determinants dont have any human allegiances Theyre not black or

white or Establishment or Underground or prooranti anything

Go dwin complained at length ab out what he called the Clever Hobbyist hyp othesis the

assumption that the hacker youre busting is clearly a technical genius and must therefore by

searched with extreme thoroughness So from the laws p oint of view why risk missing anything

Take the works Take the guys computer Take his b o oks Take his noteb o oks Take the electronic

drafts of his love letters Take his Walkman Take his wifes computer Take his dads computer

Take his kid sisters computer Take his employers computer Take his compact disks they

might b e CDROM disks cunningly disguised as p op music Take his laser printer he might have

hidden something vital in the printers meg of memory Take his software manuals and hardware

do cumentation Take his sciencection novels and his simulationgaming b o oks Take his Nintendo

GameBoy and his PacMan arcade game Take his answering machine take his telephone out of

the wall Take anything remotely suspicious

Go dwin p ointed out that most hackers are not in fact clever genius hobbyists Quite a

few are cro oks and grifters who dont have much in the way of technical sophistication just some

ruleofthumb ripo techniques The same go es for most fteenyearolds whove downloaded a

co descanning program from a pirate b oard Theres no real need to seize everything in sight It

do esnt require an entire computer system and ten thousand disks to prove a case in court

What if the computer is the instrumentality of a crime someone demanded

Go dwin admitted quietly that the do ctrine of seizing the instrumentality of a crime was pretty

well established in the American legal system The meeting broke up Go dwin and Kap or had to

leave Kap or was testifying next morning b efore the Massachusetts Department Of Public Utility

ab out ISDN narrowband widearea networking

As so on as they were gone Thackeray seemed elated She had taken a great risk with this Her

colleagues had not in fact torn Kap or and Go dwins heads o She was very proud of them and

told them so

Did you hear what Go dwin said ab out instrumentality of a crime she exulted to nob o dy in

particular Wow that means Mitch isnt going to sue me

Americas computer p olice are an interesting group As a so cial phenomenon they are far more

interesting and far more imp ortant than teenage phone phreaks and computer hackers First

theyre older and wiser not dizzy hobbyists with leaky morals but seasoned adult professionals

with all the resp onsibilitie s of public service And unlike hackers they p ossess not merely technical

p ower alone but heavyduty legal and so cial authority

The Hacker Crackdown

And very interestingly they are just as much at sea in cyb erspace as everyone else They are

not happy ab out this Police are authoritarian by nature and prefer to ob ey rules and precedents

Even those p olice who secretly enjoy a fast ride in rough territory will sob erly disclaim any cow

b oy attitude But in cyb erspace there are no rules and precedents They are groundbreaking

pioneers Cyb erspace Rangers whether they like it or not

In my opinion any teenager enthralled by computers fascinated by the ins and outs of computer

security and attracted by the lure of sp ecialized forms of knowledge and p ower would do well to

forget all ab out hacking and set his or her sights on b ecoming a fed Feds can trump hackers at

almost every single thing hackers do including gathering intelligence undercover disguise trashing

phonetapping building dossiers networking and inltrating computer systems criminal com

puter systems Secret Service agents know more ab out phreaking co ding and carding than most

phreaks can nd out in years and when it comes to viruses breakins software b ombs and tro jan

horses Feds have direct access to redhot condential information that is only vague rumor in the

underground

And if its an impressive public rep youre after there are few p eople in the world who can b e

so chillingly impressive as a welltrained wellarmed United States Secret Service agent Of course

a few p ersonal sacrices are necessary in order to obtain that p ower and knowledge First youll

have the galling discipline of b elonging to a large organization but the world of computer crime

is still so small and so amazingly fastmoving that it will remain sp ectacularly uid for years to

come The second sacrice is that youll have to give up ripping p eople o This is not a great loss

Abstaining from the use of illegal drugs also necessary will b e a b o on to your health

A career in computer security is not a bad choice for a young man or woman to day The eld

will almost certainly expand drastically in years to come If you are a teenager to day by the time

you b ecome a professional the pioneers you have read ab out in this b o ok will b e the grand old men

and women of the eld swamp ed by their many disciples and successors Of course some of them

like William P Wo o d of the Secret Service may well b e mangled in the whirring machinery

of legal controversy but by the time you enter the computer crime eld it may have stabilized

somewhat while remaining entertainingly challenging

But you cant just have a badge You have to win it First theres the federal law enforcement

training And its hard its a challenge A real challenge not for wimps and ro dents

Every Secret Service agent must complete gruelling courses at the Federal Law Enforcement

Training Center In fact Secret Service agents are p erio dically retrained during their entire

careers In order to get a glimpse of what this might b e like I myself travelled to FLETC

The Federal Law Enforcement Training Center is a acre facility on Georgias Atlantic coast

Its a milieu of marshgrass seabirds damp clinging seabreezes palmettos mosquitos and bats

Until it was a Navy Air Base and still features a working runway and some WWI I vintage

blo ckhouses and ocers quarters The Center has since b enetted by a fortymilliondollar retrot

but theres still enough forest and swamp on the facility for the Border Patrol to put in tracking

practice

As a town Glynco scarcely exists The nearest real town is Brunswick a few miles down

Highway where I stayed at the aptly named Marshview Holiday Inn I had Sunday dinner at a

seafo o d restaurant called Jinrights where I feasted on deepfried alligator tail This lo cal favorite

was a heap ed basket of bitesized chunks of white tender almost uy reptile meat steaming in a

p epp ered batter crust Alligator makes a culinary exp erience thats hard to forget esp ecially when

lib erally basted with homemade co cktail sauce from a Jinright squeezeb ottle

The crowded clientele were tourists shermen lo cal black folks in their Sunday b est and

white Georgian lo cals who all seemed to b ear an uncanny resemblance to Georgia humorist Lewis

Chapter Law And Order

Grizzard The students from federal agencies who make up the FLETC p opulation scarcely

seem to make a dent in the lowkey lo cal scene The students lo ok like tourists and the teachers

seem to have taken on much of the relaxed air of the Deep South My host was Mr Carlton

Fitzpatrick the Program Co ordinator of the Financial Fraud Institute Carlton Fitzpatrick is a

mustached sinewy welltanned Alabama native somewhere near his late forties with a fondness for

chewing tobacco p owerful computers and salty downhome homilies Wed met b efore at FCIC

in Arizona

The Financial Fraud Institute is one of the nine divisions at FLETC Besides Financial Fraud

theres Driver Marine Firearms and Physical Training These are sp ecialized pursuits There

are also ve general training divisions Basic Training Op erations Enforcement Techniques Legal

Division and Behavioral Science

Somewhere in this curriculum is everything necessary to turn green college graduates into federal

agents First theyre given ID cards Then they get the rather miserablelo oking blue coveralls

known as smurf suits The trainees are assigned a barracks and a cafeteria and immediately set

on FLETCs b onegrinding physical training routine Besides the obligatory daily jogging the

trainers run up danger ags b eside the track when the humidity rises high enough to threaten heat

stroke theres the Nautilus machines the martial arts the survival skills:::

The eighteen federal agencies who maintain onsite academies at FLETC employ a wide variety

of sp ecialized law enforcement units some of them rather arcane Theres Border Patrol IRS

Criminal Investigation Division Park Service Fish and Wildlife Customs Immigration Secret

Service and the Treasurys uniformed sub divisions::: If youre a federal cop and you dont work

for the FBI you train at FLETC This includes p eople as apparently obscure as the agents of

the Railroad Retirement Board Insp ector General Or the Tennessee Valley Authority Police who

are in fact federal p olice ocers and can and do arrest criminals on the federal prop erty of the

Tennessee Valley Authority

And then there are the computer crime p eople All sorts all backgrounds Mr Fitzpatrick is

not jealous of his sp ecialized knowledge Cops all over in every branch of service may feel a need

to learn what he can teach Backgrounds dont matter much Fitzpatrick himself was originally a

Border Patrol veteran then b ecame a Border Patrol instructor at FLETC His Spanish is still uent

but he found himself strangely fascinated when the rst computers showed up at the Training

Center Fitzpatrick did have a background in electrical engineering and though he never considered

himself a computer hacker he somehow found himself writing useful little programs for this new

and promising gizmo

He b egan lo oking into the general sub ject of computers and crime reading Donn Parkers b o oks

and articles keeping an ear co cked for war stories useful insights from the eld the upandcoming

p eople of the lo cal computer crime and high technology units::: So on he got a reputation around

FLETC as the resident computer exp ert and that reputation alone brought him more exp osure

more exp erience until one day he lo oked around and sure enough he was a federal computer

crime exp ert

In fact this unassuming genial man may b e the federal computer crime exp ert There are

plenty of very go o d computer p eople and plenty of very go o d federal investigators but the area

where these worlds of exp ertise overlap is very slim And Carlton Fitzpatrick has b een right at the

center of that since the rst year of the Colluquy a group which owes much to his inuence

He seems quite at home in his mo dest acoustictiled oce with its Ansel Adamsstyle Western

photographic art a goldframed Senior Instructor Certicate and a towering b o okcase crammed

with threering binders with ominous titles such as Datapro Rep orts on Information Security and

CFCA Telecom Security

The phone rings every ten minutes colleagues show up at the do or to chat ab out new devel

opments in lo cksmithing or to shake their heads over the latest dismal developments in the BCCI global banking scandal

The Hacker Crackdown

Carlton Fitzpatrick is a fount of computer crime warstories related in an acerbic drawl He tells

me the colorful tale of a hacker caught in California some years back Hed b een raiding systems

typing co de without a detectable break for twenty twentyfour thirtysix hours straight Not just

logged on typing Investigators were baed Nob o dy could do that Didnt he have to go to

the bathro om Was it some kind of automatic keyb oardwhacking device that could actually typ e

co de

A raid on the susp ects home revealed a situation of astonishing squalor The hacker turned out

to b e a Pakistani computerscience student who had unked out of a California university Hed gone

completely underground as an illegal electronic immigrant and was selling stolen phoneservice to

stay alive The place was not merely messy and dirty but in a state of psychotic disorder Powered

by some weird mix of culture sho ck computer addiction and amphetamines the susp ect had in

fact b een sitting in front of his computer for a day and a half straight with snacks and drugs at

hand on the edge of his desk and a chamb erp ot under his chair

Word ab out stu like this gets around in the hackertracker community

Carlton Fitzpatrick takes me for a guided tour by car around the FLETC grounds One of

our rst sights is the biggest indo or ring range in the world There are federal trainees in there

Fitzpatrick assures me p olitely blasting away with a wide variety of automatic weap ons Uzis

Glo cks AKs::: Hes willing to take me inside I tell him Im sure thats really interesting but

Id rather see his computers Carlton Fitzpatrick seems quite surprised and pleased Im apparently

the rst journalist hes ever seen who has turned down the sho oting gallery in favor of micro chips

Our next stop is a favorite with touring Congressmen the threemile long FLETC driving

range Here trainees of the Driver Marine Division are taught highsp eed pursuit skills setting

and breaking roadblo cks diplomatic security driving for VIP limousines::: A favorite FLETC

pastime is to strap a passing Senator into the passenger seat b eside a Driver Marine trainer hit

a hundred miles an hour then take it right into the skid pan a section of greased track where

two tons of Detroit iron can whip and spin like a ho ckey puck

Cars dont fare well at FLETC First theyre ried again and again for search practice Then

they do miles of highsp eed pursuit training they get ab out seventy miles p er set of steel

b elted radials Then its o to the skid pan where sometimes they roll and tumble headlong in the

grease When theyre suciently greasestained dented and creaky theyre sent to the roadblo ck

unit where theyre battered without pity And nally then theyre sacriced to the Bureau of

Alcohol Tobacco and Firearms whose trainees learn the ins and outs of carb omb work by blowing

them into smoking wreckage

Theres a railroad b oxcar on the FLETC grounds and a large grounded b oat and a propless

plane all traininggrounds for searches The plane sits forlornly on a patch of weedy tarmac next

to an eerie blo ckhouse known as the ninja comp ound where antiterrorism sp ecialists practice

hostage rescues As I gaze on this creepy paragon of mo dern lowintensity warfare my nerves are

jangled by a sudden staccato outburst of automatic weap ons re somewhere in the wo o ds to my

right Nine millimeter Fitzpatrick judges calmly

Even the eldritch ninja comp ound pales somewhat compared to the truly surreal area known as

the raidhouses This is a street lined on b oth sides with nondescript concreteblo ck houses with

at p ebbled ro ofs They were once ocers quarters Now they are training grounds The rst

one to our left Fitzpatrick tells me has b een sp ecially adapted for computer searchandseizure

practice Inside it has b een wired for video from top to b ottom with eighteen panandtilt remotely

controlled video cams mounted on walls and in corners Every movement of the trainee agent is

recorded live by teachers for later tap ed analysis Wasted movements hesitations p ossibly lethal

tactical mistakes all are gone over in detail

Perhaps the weirdest single asp ect of this building is its front do or scarred and scued all along

the b ottom from the rep eated impact day after day of federal sho eleather

Chapter Law And Order

Down at the far end of the row of raidhouses some p eople are practicing a murder We drive

by slowly as some very young and rather nervous lo oking federal trainees interview a heavyset bald

man on the raidhouse lawn Dealing with murder takes a lot of practice rst you have to learn to

control your own instinctive disgust and panic then you have to learn to control the reactions of

a nerveshredded crowd of civilians some of whom may have just lost a loved one some of whom

may b e murderers quite p ossibly b oth at once

A dummy plays the corpse The roles of the b ereaved the morbidly curious and the homicidal

are played for pay by lo cal Georgians waitresses musicians most anyb o dy who needs to mo onlight

and can learn a script These p eople some of whom are FLETC regulars year after year must

surely have one of the strangest jobs in the world

Something ab out the scene normal p eople in a weird situation standing around talking in

bright Georgia sunshine unsuccessfully pretending that something dreadful has gone on while a

dummy lies inside on faked blo o dstains::: While b ehind this weird masquerade like a nested set

of Russian dolls are grim future realities of real death real violence real murders of real p eople

that these young agents will really investigate many times during their careers::: Over and over:::

Will those anticipated murders lo ok like this feel like this not as real as these amateur actors

are trying to make it seem but b oth as real and as numbingly unreal as watching fake p eople

standing around on a fake lawn Something ab out this scene unhinges me It seems nightmarish

to me Kafkaesque I simply dont know how to take it my head is turned around I dont know

whether to laugh cry or just shudder

When the tour is over Carlton Fitzpatrick and I talk ab out computers For the rst time

cyb erspace seems like quite a comfortable place It seems very real to me suddenly a place where

I know what Im talking ab out a place Im used to Its real Real Whatever

Carlton Fitzpatrick is the only p erson Ive met in cyb erspace circles who is happy with his

present equipment Hes got a Meg RAM PC with a meg hard disk a megs on the

way Hes got a Compaq desktop and a Zenith laptop with meg Down the hall is a

NEC MultiSync A with a CDROM drive and a baud mo dem with four comlines Theres

a training minicomputer and a meg lo cal mini just for the Center and a labfull of student PC

clones and halfadozen Macs or so Theres a Data General MV with meg on b oard and a

meg disk

Fitzpatrick plans to run a UNIX b oard on the Data General when hes nished b etatesting

the software for it which he wrote himself Itll have Email features massive les on all manner

of computer crime and investigation pro cedures and will follow the computersecurity sp ecics of

the Department of Defense Orange Bo ok He thinks it will b e the biggest BBS in the federal

government Will it have Phrack on it I ask wryly

Sure he tells me Phrack TAP Computer Underground Digest all that stu With prop er

disclaimers of course

I ask him if he plans to b e the sysop Running a system that size is very timeconsuming and

Fitzpatrick teaches two threehour courses every day

No he says seriously FLETC has to get its money worth out of the instructors He thinks he

can get a lo cal volunteer to do it a highscho ol student He says a bit more something I think

ab out an Eagle Scout law enforcement liaison program but my mind has ro cketed o in disb elief

Youre going to put a teenager in charge of a federal security BBS Im sp eechless It hasnt

escap ed my notice that the FLETC Financial Fraud Institute is the ultimate hackertrashing target

there is stu in here stu of such utter and consummate co ol by every standard of the digital

underground::: I imagine the hackers of my acquaintance fainting deadaway from forbidden

knowledge greedts at the mere prosp ect of cracking the sup erultra topsecret computers used to

train the Secret Service in computer crime:::

The Hacker Crackdown

Uhm Carlton I babble Im sure hes a really nice kid and all but thats a terrible temptation

to set in front of someb o dy whos you know into computers and just starting out:::

Yeah he says that did o ccur to me For the rst time I b egin to susp ect that hes pulling

my leg

He seems proudest when he shows me an ongoing pro ject called JICC Joint Intelligence Control

Council Its based on the services provided by EPIC the El Paso Intelligence Center which

supplies data and intelligence to the Drug Enforcement Administration the Customs Service the

Coast Guard and the state p olice of the four southern b order states Certain EPIC les can now

b e accessed by drugenforcement p olice of Central America South America and the Caribb ean

who can also trade information among themselves Using a telecom program called White Hat

written by two brothers named Lop ez from the Dominican Republic p olice can now network

internationally on inexp ensive PCs Carlton Fitzpatrick is teaching a class of drugwar agents

from the Third World and hes very proud of their progress Perhaps so on the sophisticated

smuggling networks of the Medellin Cartel will b e matched by a sophisticated computer network of

the Medellin Cartels sworn enemies Theyll track b oats track contraband track the international

druglords who now leap over b orders with great ease defeating the p olice through the clever use

of fragmented national jurisdictions

JICC and EPIC must remain b eyond the scop e of this b o ok They seem to me to b e very

large topics fraught with complications that I am not t to judge I do know however that

the international computerassisted networking of p olice across national b oundaries is something

that Carlton Fitzpatrick considers very imp ortant a harbinger of a desirable future I also know

that networks by their nature ignore physical b oundaries And I also know that where you put

communications you put a community and that when those communities b ecome selfaware they

will ght to preserve themselves and to expand their inuence I make no judgements whether this

is go o d or bad Its just cyb erspace its just the way things are

I asked Carlton Fitzpatrick what advice he would have for a twentyyearold who wanted to

shine someday in the world of electronic law enforcement

He told me that the numb er one rule was simply not to b e scared of computers You dont need

to b e an obsessive computer weenie but you mustnt b e bualo ed just b ecause some machine

lo oks fancy The advantages computers give smart cro oks are matched by the advantages they give

smart cops Cops in the future will have to enforce the law with their heads not their holsters

To day you can make go o d cases without ever leaving your oce In the future cops who resist the

computer revolution will never get far b eyond walking a b eat

I asked Carlton Fitzpatrick if he had some single message for the public some single thing that

he would most like the American public to know ab out his work

He thought ab out it while Yes he said nally Tell me the rules and Ill teach those rules

He lo oked me straight in the eye I do the b est that I can

Chapter The Civil Lib ertarians

The Civil Lib ertarians

NuPrometheus FBI Grateful Dead Whole Earth Computer Revolution WELL

Phib er Runs Underground and Acid Spikes the Well The Trial of Knight Lightning

Shadowhawk Plummets to Earth Kyrie in the Confessional A Scholar

Investigates Computers Freedom and Privacy

The story of the Hacker Crackdown as we have followed it thus far has b een technological

sub cultural criminal and legal The story of the Civil Lib ertarians though it partakes of all those

other asp ects is profoundly and thoroughly p olitical

In the obscure longsimmering struggle over the ownership and nature of cyb erspace

b ecame loudly and irretrievably public People from some of the o ddest corners of American so ciety

suddenly found themselves public gures Some of these p eople found this situation much more

than they had ever bargained for They backp edalled and tried to retreat back to the mandarin

obscurity of their cozy sub cultural niches This was generally to prove a mistake

But the civil lib ertarians seized the day in They found themselves organizing propagan

dizing p o diump ounding p ersuading touring negotiating p osing for publicity photos submitting

to interviews squinting in the limelight as they tried a tentative but growingly sophisticated

buckandwing up on the public stage

Its not hard to see why the civil lib ertarians should have this comp etitive advantage

The hackers of the digital underground are an hermetic elite They nd it hard to make any

remotely convincing case for their actions in front of the general public Actually hackers roundly

despise the ignorant public and have never trusted the judgement of the system Hackers do

propagandize but only among themselves mostly in giddy badly sp elled manifestos of class warfare

youth reb ellion or naive techie utopianism Hackers must strut and b oast in order to establish and

preserve their underground reputations But if they sp eak out to o loudly and publicly they will

break the fragile surfacetension of the underground and they will b e harrassed or arrested Over

the longer term most hackers stumble get busted get b etrayed or simply give up As a p olitical

force the digital underground is hamstrung

The telcos for their part are an ivory tower under protracted seige They have plenty of

money with which to push their calculated public image but they waste much energy and go o dwill

attacking one another with slanderous and demeaning ad campaigns The telcos have suered

at the hands of p oliticians and like hackers they dont trust the publics judgement And this

distrust may b e wellfounded Should the general public of the hightech s come to understand

its own b est interests in telecommunications that might well p ose a grave threat to the sp ecialized

technical p ower and authority that the telcos have relished for over a century The telcos do have

strong advantages loyal employees sp ecialized exp ertise inuence in the halls of p ower tactical

allies in law enforcement and unb elievabl y vast amounts of money But p olitically sp eaking they

lack genuine grassro ots supp ort they simply dont seem to have many friends

Cops know a lot of things other p eople dont know But cops willingly reveal only those asp ects

of their knowledge that they feel will meet their institutional purp oses and further public order

Cops have resp ect they have resp onsibilities they have p ower in the streets and even p ower in the

home but cops dont do particularly well in limelight When pressed they will step out in the

public gaze to threaten bad guys or to ca jole prominent citizens or p erhaps to sternly lecture the

naive and misguided But then they go back within their timehonored fortress of the stationhouse

the courtro om and the ruleb o ok

The electronic civil lib ertarians however have proven to b e b orn p olitical animals They seemed

to grasp very early on the p ostmo dern truism that communication is p ower Publicity is p ower

The Hacker Crackdown

Soundbites are p ower The ability to shove ones issue onto the public agenda and keep it there

is p ower Fame is p ower Simple p ersonal uency and elo quence can b e p ower if you can somehow

catch the publics eye and ear

The civil lib ertarians had no monop oly on technical p ower though they all owned computers

most were not particularly advanced computer exp erts They had a go o d deal of money but

nowhere near the earthshaking wealth and the galaxy of resources p ossessed by telcos or federal

agencies They had no ability to arrest p eople They carried out no phreak and hacker covert

dirtytricks

But they really knew how to network

Unlike the other groups in this b o ok the civil lib ertarians have op erated very much in the op en

more or less right in the public hurlyburly They have lectured audiences galore and talked to

countless journalists and have learned to rene their spiels Theyve kept the cameras clicking

kept those faxes humming swapp ed that email run those photo copiers on overtime licked envelop es

and sp ent small fortunes on airfare and longdistance In an information so ciety this op en overt

obvious activity has proven to b e a profound advantage

In the civil lib ertarians of cyb erspace assembled out of nowhere in particular at warp

sp eed This group actually a networking gaggle of interested parties which scarcely deserves

even that lo ose term has almost nothing in the way of formal organization Those formal civil

lib ertarian organizations which did take an interest in cyb erspace issues mainly the Computer

Professionals for So cial Resp onsibility and the American Civil Lib erties Union were carried along

by events in and acted mostly as adjuncts underwriters or launchingpads

The civil lib ertarians nevertheless enjoyed the greatest success of any of the groups in the

Crackdown of At this writing their future lo oks rosy and the p olitical initiative is rmly in

their hands This should b e kept in mind as we study the highly unlikely lives and lifestyles of the

p eople who actually made this happ en

In June Apple Computer Inc of Cup ertino California had a problem Someone had

illicitl y copied a small piece of Apples proprietary software software which controlled an internal

chip driving the Macintosh screen display This Color QuickDraw source co de was a closely guarded

piece of Apples intellectual prop erty Only trusted Apple insiders were supp osed to p ossess it

But the NuPrometheus League wanted things otherwise This p erson or p ersons made

several illici t copies of this source co de p erhaps as many as two dozen He or she or they then

put those illici t oppy disks into envelop es and mailed them to p eople all over America p eople in

the computer industry who were asso ciated with but not directly employed by Apple Computer

The NuPrometheus cap er was a complex highly ideological and very hackerlike crime

Prometheus it will b e recalled stole the re of the Go ds and gave this p otent gift to the gen

eral ranks of downtro dden mankind A similar go dinthemanger attitude was implied for the

corp orate elite of Apple Computer while the Nu Prometheus had himself cast in the role of reb el

demigo d The illici tly copied data was given away for free

The new Prometheus who ever he was escap ed the fate of the ancient Greek Prometheus who

was chained to a ro ck for centuries by the vengeful go ds while an eagle tore and ate his liver On

the other hand NuPrometheus chickened out somewhat by comparison with his role mo del The

small chunk of Color QuickDraw co de he had lched and replicated was more or less useless to

Apples industrial rivals or in fact to anyone else Instead of giving re to mankind it was more

as if NuPrometheus had photo copied the schematics for part of a Bic lighter The act was not a

genuine work of industrial espionage It was b est interpreted as a symb olic delib erate slap in the

face for the Apple corp orate hierarchy

Chapter The Civil Lib ertarians

Apples internal struggles were wellknown in the industry Apples founders Jobs and Woz

niak had b oth taken their leave long since Their raucous core of senior employees had b een a

barnstorming crew of s Californians many of them markedly less than happy with the new

buttondown multimilli on dollar regime at Apple Many of the programmers and develop ers who

had invented the Macintosh mo del in the early s had also taken their leave of the company

It was they not the current masters of Apples corp orate fate who had invented the stolen Color

QuickDraw co de The NuPrometheus stunt was wellcalculated to wound company morale

Apple called the FBI The Bureau takes an interest in highprole intellectualprop erty theft

cases industrial espionage and theft of trade secrets These were likely the right p eople to call

and rumor has it that the entities resp onsible were in fact discovered by the FBI and then quietly

squelched by Apple management NuPrometheus was never publicly charged with a crime or

prosecuted or jailed But there were no further illicit releases of Macintosh internal software

Eventually the painful issue of NuPrometheus was allowed to fade

In the meantime however a large numb er of puzzled bystanders found themselves entertaining

surprise guests from the FBI

One of these p eople was John Perry Barlow Barlow is a most unusual man dicult to describ e

in conventional terms He is p erhaps b est known as a songwriter for the Grateful Dead for he

comp osed lyrics for Hell in a Bucket Picasso Mo on Mexicali Blues I Need a Miracle and

many more he has b een writing for the band since

Before we tackle the vexing question as to why a ro ck lyricist should b e interviewed by the

FBI in a computer crime case it might b e well to say a word or two ab out the Grateful Dead

The Grateful Dead are p erhaps the most successful and longlasting of the numerous cultural

emanations from the HaightAshbury district of San Francisco in the glory days of Movement

p olitics and lysergic transcendance The Grateful Dead are a nexus a veritable whirlwind of

applique decals psychedelic vans tiedyed Tshirts earthcolor denim frenzied dancing and op en

and unashamed drug use The symb ols and the realities of Californian freak p ower surround the

Grateful Dead like knotted macrame

The Grateful Dead and their thousands of Deadhead devotees are radical Bohemians This

much is widely understo o d Exactly what this implies in the s is rather more problematic

The Grateful Dead are among the worlds most p opular and wealthy entertainers numb er

according to Forb es magazine right b etween MC Hammer and Sean Connery In this jeans

clad group of purp orted rash outcasts earned seventeen million dollars They have b een earning

sums much along this line for quite some time now

And while the Dead are not investment bankers or threepiecesuit tax sp ecialists they are

in p oint of fact hippie musicians this money has not b een squandered in senseless Bohemian

excess The Dead have b een quietly active for many years funding various worthy activities in

their extensive and widespread cultural community

The Grateful Dead are not conventional players in the American p ower establishment They

nevertheless are something of a force to b e reckoned with They have a lot of money and a lot of

friends in many places b oth likely and unlikely

The Dead may b e known for backtotheearth environmentalist rhetoric but this hardly makes

them antitechnological Luddites On the contrary like most ro ck musicians the Grateful Dead

have sp ent their entire adult lives in the company of complex electronic equipment They have

funds to burn on any sophisticated to ol and toy that might happ en to catch their fancy And their

fancy is quite extensive

The Deadhead community b oasts any numb er of recording engineers lighting exp erts ro ck video

mavens electronic technicians of all descriptions And the drift go es b oth ways Steve Wozniak

Apples cofounder used to throw ro ck festivals Silicon Valley ro cks out

The Hacker Crackdown

These are the s not the s To day for a surprising numb er of p eople all over America

the supp osed dividing line b etween Bohemian and technician simply no longer exists People of this

sort may have a set of windchimes and a dog with a knotted kerchief round its neck but theyre

also quite likely to own a multimegabyte Macintosh running MIDI synthesizer software and trippy

fractal simulations These days even Timothy Leary himself prophet of LSD do es virtualreality

computergraphics demos in his lecture tours

John Perry Barlow is not a memb er of the Grateful Dead He is however a ranking Deadhead

Barlow describ es himself as a technocrank A vague term like so cial activist might not b e

far from the mark either But Barlow might b e b etter describ ed as a p o et if one keeps in mind

Percy Shelleys archaic denition of p o ets as unacknowledged legislators of the world

Barlow once made a stab at acknowledged legislator status In he narrowly missed the

Republican nomination for a seat in the Wyoming State Senate Barlow is a Wyoming native the

thirdgeneration scion of a welltodo cattleranching family He is in his early forties married and

the father of three daughters

Barlow is not much troubled by other p eoples narrow notions of consistency In the late s

this Republican ro ck lyricist cattle rancher sold his ranch and b ecame a computer telecommunica

tions devotee

The freespirited Barlow made this transition with ease He genuinely enjoyed computers With

a b eep of his mo dem he leapt from smalltown Pinedale Wyoming into electronic contact with

a large and lively crowd of bright inventive technological sophisticates from all over the world

Barlow found the so cial milieu of computing attractive its fastlane pace its bluesky rhetoric

its op enendedness Barlow b egan dabbling in computer journalism with marked success as he

was a quick study and b oth shrewd and elo quent He frequently travelled to San Francisco to

network with Deadhead friends There Barlow made extensive contacts throughout the Californian

computer community including friendships among the wilder spirits at Apple

In May Barlow received a visit from a lo cal Wyoming agent of the FBI The NuPrometheus

case had reached Wyoming

Barlow was troubled to nd himself under investigation in an area of his interests once quite

free of federal attention He had to struggle to explain the very nature of computer crime to a

headscratching lo cal FBI man who sp ecialized in cattlerustling Barlow chatting helpfully and

demonstrating the wonders of his mo dem to the puzzled fed was alarmed to nd all hackers

generally under FBI suspicion as an evil inuence in the electronic community The FBI in pursuit

of a hacker called NuPrometheus were tracing attendees of a susp ect group called the Hackers

Conference

The Hackers Conference which had b een started in was a yearly Californian meeting of

digital pioneers and enthusiasts The hackers of the Hackers Conference had little if anything to do

with the hackers of the digital underground On the contrary the hackers of this conference were

mostly welltodo Californian hightech CEOs consultants journalists and entrepreneurs This

group of hackers were the exact sort of hackers most likely to react with militant fury at any

criminal degradation of the term hacker

Barlow though he was not arrested or accused of a crime and though his computer had certainly

not gone out the do or was very troubled by this anomaly He carried the word to the Well

Like the Hackers Conference the Well was an emanation of the Point Foundation Point

Foundation the inspiration of a wealthy Californian s radical named Stewart Brand was to b e

a ma jor launchpad of the civil lib ertarian eort

Point Foundations cultural eorts like those of their fellow Bay Area Californians the Grateful

Dead were multifaceted and multitudinous Rigid ideological consistency had never b een a strong

suit of the Whole Earth Catalog This Point publication had enjoyed a strong vogue during the late

Chapter The Civil Lib ertarians

s and early s when it oered hundreds of practical and not so practical tips on communitarian

living environmentalism and getting backtotheland The Whole Earth Catalog and its sequels

sold two and half million copies and won a National Bo ok Award

With the slow collapse of American radical dissent the Whole Earth Catalog had slipp ed to a

more mo dest corner of the cultural radar but in its magazine incarnation CoEvolution Quarterly

the Point Foundation continued to oer a magpie p otp ourri of access to to ols and ideas

CoEvolution Quarterly which started in was never a widely p opular magazine Despite

p erio dic outbreaks of millenarian fervor CoEvolution Quarterly failed to revolutionize Western

civilization and replace leaden centuries of history with bright new Californian paradigms Instead

this propaganda arm of Point Foundation cakewalked a ne line b etween impressive brilliance and

New Age akiness CoEvolution Quarterly carried no advertising cost a lot and came out on cheap

newsprint with mo dest blackandwhite graphics It was p o orly distributed and spread mostly by

subscription and word of mouth

It could not seem to grow b eyond subscrib ers And yet it never seemed to shrink much

either Year in year out decade in decade out some strange demographic minority accreted

to supp ort the magazine The enthusiastic readership did not seem to have much in the way of

coherent p olitics or ideals It was sometimes hard to understand what held them together if the

often bitter debate in the lettercolumns could b e describ ed as togetherness

But if the magazine did not ourish it was resilient it got by Then in the birthyear of

the Macintosh computer CoEvolution Quarterly suddenly hit the rapids Point Foundation had

discovered the computer revolution Out came the Whole Earth Software Catalog of arousing

headscratching doubts among the tiedyed faithful and rabid enthusiasm among the nascent cyb er

punk milieu present company included Point Foundation started its yearly Hackers Conference

and b egan to take an extensive interest in the strange new p ossibilitie s of digital counterculture

CoEvolution Quarterly folded its teep ee replaced by Whole Earth Software Review and eventu

ally by Whole Earth Review the magazines present incarnation currently under the editorship

of virtualreality maven Howard Rheingold

saw the birth of the WELL the Whole Earth Lectronic Link The Well was Point

Foundations bulletin b oard system

As b oards went the Well was an anomaly from the b eginning and remained one It was lo cal

to San Francisco It was huge with multiple phonelines and enormous les of commentary Its

complex UNIXbased software might b e most charitably describ ed as useropaque It was run

on a mainframe out of the rambling oces of a nonprot cultural foundation in Sausalito And it

was crammed with fans of the Grateful Dead

Though the Well was p eopled by chattering hipsters of the Bay Area counterculture it was by

no means a digital underground b oard Teenagers were fairly scarce most Well users known

as Wellb eings were thirty and fortysomething Baby Bo omers They tended to work in the

information industry hardware software telecommunications media entertainment Librarians

academics and journalists were esp ecially common on the Well attracted by Point Foundations

op enhanded distribution of to ols and ideas

There were no anarchy les on the Well scarcely a dropp ed hint ab out access co des or credit card

theft No one used handles Vicious amewars were held to a comparatively civilized rumble

Debates were sometimes sharp but no Wellb eing ever claimed that a rival had disconnected his

phone trashed his house or p osted his credit card numb ers

The Well grew slowly as the s advanced It charged a mo dest sum for access and storage

and lost money for years but not enough to hamp er the Point Foundation which was nonprot

anyway By the Well had ab out ve thousand users These users wandered ab out a gigantic

cyb erspace smorgasb ord of Conferences each conference itself consisting of a welter of topics

The Hacker Crackdown

each topic containing dozens sometimes hundreds of comments in a tumbling multip erson debate

that could last for months or years on end

CONFERENCES ON THE WELL

WELL Screenzine Digest g zine

Best of the WELL vintage material g best

Index listing of new topics in all conferences g newtops

Business Education

Apple Library Users Groupg alug Agriculture g agri

Brainstorming g brain Classifieds g cla

Computer Journalism g cj Consultants g consult

Consumers g cons Design g design

Desktop Publishing g desk Disability g disability

Education g ed Energy g energy

Entrepreneurs g entre Homeowners g home

Indexing g indexing Investments g invest

Kids g kids Legal g legal

One Person Business g one

Periodicalnewsletter g per

Telecomm Law g tcl The Future g fut

Translators g trans Travel g tra

Work g work

Electronic Frontier Foundation g eff

Computers Freedom Privacy g cfp

Computer Professionals for Social Responsibility g cpsr

Social Political Humanities

Aging g gray AIDS g aids

Amnesty International g amnesty Archives g arc

Berkeley g berk Buddhist g wonderland

Christian g cross Couples g couples

Current Events g curr Dreams g dream

Drugs g dru East Coast g east

Emotional Health g private Erotica g eros

Environment g env Firearms g firearms

First Amendment g first Fringes of Reason g fringes

Gay g gay Gay Private g gaypriv

Geography g geo German g german

Gulf War g gulf Hawaii g aloha

Health g heal History g hist

Holistic g holi Interview g inter

Italian g ital Jewish g jew

Liberty g liberty Mind g mind

Miscellaneous g misc Men on the WELL g mow

Chapter The Civil Lib ertarians

Network Integration g origin Nonprofits g non

North Bay g north Northwest g nw

Pacific Rim g pacrim Parenting g par

Peace g pea Peninsula g pen

Poetry g poetry Philosophy g phi

Politics g pol Psychology g psy

Psychotherapy g therapy Recovery g recovery

San Francisco g sanfran Scams g scam

Sexuality g sex Singles g singles

Southern g south Spanish g spanish

Spirituality g spirit Tibet g tibet

Transportation g transport True Confessions g tru

Unclear g unclear WELL Writers Workshopg www

Whole Earth g we Women on the WELLg wow

Words g words Writers g wri

Private Conference mail wooly for entry

Private conference mail sonia for entry

Private conference mail flash for entry

Private conference mail reva for entry

Private Conference mail hudu for entry

Private Conference mail dhawk for entry

Arts Recreation Entertainment

ArtCom Electronic Net g acen

AudioVideophilia g aud

Bicycles g bike Bay Area Tonightg bat

Boating g wet Books g books

CDs g cd Comics g comics

Cooking g cook Flying g flying

Fun g fun Games g games

Gardening g gard Kids g kids

Nightowls g owl Jokes g jokes

MIDI g midi Movies g movies

Motorcycling g ride Motoring g car

Music g mus On Stage g onstage

Pets g pets Radio g rad

Restaurant g rest Science Fiction g sf

Sports g spo Star Trek g trek

Television g tv Theater g theater

Weird g weird ZinesFactsheet Fiveg f

Open from midnight to am

Updated daily

Grateful Dead

Grateful Dead g gd Deadplan g dp

Deadlit g deadlit Feedback g feedback

GD Hour g gdh Tapes g tapes

Tickets g tix Tours g tours

The Hacker Crackdown

Private conference mail tnf for entry

Computers

AIForthRealtime g realtime Amiga g amiga

Apple g app Computer Books g cbook

Art Graphics g gra Hacking g hack

HyperCard g hype IBM PC g ibm

LANs g lan Laptop g lap

Macintosh g mac Mactech g mactech

Microtimes g microx Muchomedia g mucho

NeXt g next OS g os

Printers g print Programmers Net g net

Siggraph g siggraph Software Design g sdc

SoftwareProgramming g software

Software Support g ssc

Unix g unix Windows g windows

Word Processing g word

Technical Communications

Bioinfo g bioinfo Info g boing

Media g media NAPLPS g naplps

Netweaver g netweaver Networld g networld

Packet Radio g packet Photography g pho

Radio g rad Science g science

Technical Writers g tec Telecommunicationsg tele

Usenet g usenet Video g vid

Virtual Reality g vr

The WELL Itself

Deeper g deeper Entry g ent

General g gentech Help g help

Hosts g hosts Policy g policy

System News g news Test g test

The list itself is dazzling bringing to the untutored eye a dizzying impression of a bizarre milieu

of mountainclimbing Hawaiian holistic photographers trading truelife confessions with bisexual

wordpro cessing Tib etans

But this confusion is more apparent than real Each of these conferences was a little cyb erspace

world in itself comprising dozens and p erhaps hundreds of subtopics Each conference was com

monly frequented by a fairly small fairly likeminded community of p erhaps a few dozen p eople It

was humanly imp ossible to encompass the entire Well esp ecially since access to the Wells main

frame computer was billed by the hour Most longtime users contented themselves with a few

favorite topical neighb orho o ds with the o ccasional foray elsewhere for a taste of exotica But

esp ecially imp ortant news items and hot topical debates could catch the attention of the entire

Well community

Chapter The Civil Lib ertarians

Like any community the Well had its celebrities and John Perry Barlow the silvertongued

and silvermo demed lyricist of the Grateful Dead ranked prominently among them It was here on

the Well that Barlow p osted his truelife tale of computer crime encounter with the FBI

The story as might b e exp ected created a great stir The Well was already primed for hacker

controversy In Decemb er Harp ers magazine had hosted a debate on the Well ab out the

ethics of illicit computer intrusion While over forty various computermavens to ok part Barlow

proved a star in the debate So did Acid Phreak and Phib er Optik a pair of young New

York hackerphreaks whose skills at telco switchingstation intrusion were matched only by their

apparently limitless hunger for fame The advent of these two b oldly swaggering outlaws in the

precincts of the Well created a sensation akin to that of Black Panthers at a co cktail party for the

radically chic

Phib er Optik in particular was to seize the day in A devotee of the circle and stalwart

of the New York hackers group Phib er Optik was a splendid exemplar of

the computer intruder as committed dissident The eighteenyearold Optik a highscho ol drop out

and parttime computer repairman was young smart and ruthlessly obsessive a sharpdressing

sharptalking digital dude who was utterly and airily contemptuous of anyones rules but his own

By late Phib er Optik had app eared in Harp ers Esquire The New York Times in countless

public debates and conventions even on a television show hosted by Geraldo Rivera

Treated with gingerly resp ect by Barlow and other Well mavens Phib er Optik swiftly b ecame

a Well celebrity Strangely despite his thorny attitude and utter singlemindedness Phib er Optik

seemed to arouse strong protective instincts in most of the p eople who met him He was great copy

for journalists always fearlessly ready to swagger and b etter yet to actually demonstrate some

othewall digital stunt He was a b orn media darling

Even cops seemed to recognize that there was something p eculiarly unworldly and uncriminal

ab out this particular troublemaker He was so b old so agrant so young and so obviously do omed

that even those who strongly disapproved of his actions grew anxious for his welfare and b egan to

utter ab out him as if he were an endangered seal pup

In January nine days after the Martin Luther King Day Crash Phib er Optik Acid

Phreak and a third NYC scoaw named Scorpion were raided by the Secret Service Their

computers went out the do or along with the usual blizzard of pap ers noteb o oks compact disks

answering machines Sony Walkmans etc Both Acid Phreak and Phib er Optik were accused of

having caused the Crash

The mills of justice ground slowly The case eventually fell into the hands of the New York

State Police Phib er had lost his machinery in the raid but there were no charges led against

him for over a year His predicament was extensively publicized on the Well where it caused

much resentment for p olice tactics Its one thing to merely hear ab out a hacker raided or busted

its another to see the p olice attacking someone youve come to know p ersonally and who has

explained his motives at length Through the Harp ers debate on the Well it had b ecome clear

to the Wellb eings that Phib er Optik was not in fact going to hurt anything In their own salad

days many Wellb eings had tasted teargas in pitched streetbattles with p olice They were inclined

to indulgence for acts of civil disob edience

Wellb eings were also startled to learn of the draconian thoroughness of a typical hacker search

andseizure It to ok no great stretch of imagination for them to envision themselves suering much

the same treatment

As early as January sentiment on the Well had already b egun to sour and p eople had

b egun to grumble that hackers were getting a raw deal from the hamhanded p owersthatb e

The resultant issue of Harp ers magazine p osed the question as to whether computerintrusion was

a crime at all As Barlow put it later Ive b egun to wonder if we wouldnt also regard sp elunkers

as desp erate criminals if ATT owned all the caves

The Hacker Crackdown

In February more than a year after the raid on his home Phib er Optik was nally arrested

and was charged with rstdegree Computer Tamp ering and Computer Trespass New York state

oenses He was also charged with a theftofservice misdemeanor involving a complex freecall

scam to a numb er Phib er Optik pled guilty to the misdemeanor charge and was sentenced to

hours of community service

This passing harassment from the unfathomable world of straight p eople seemed to b other Optik

himself little if at all Deprived of his computer by the January searchandseizure he simply b ought

himself a p ortable computer so the cops could no longer monitor the phone where he lived with his

Mom and he went right on with his depredations sometimes on live radio or in front of television

cameras

The crackdown raid may have done little to dissuade Phib er Optik but its galling aect on

the Wellb eings was profound As rolled on the slings and arrows mounted the Knight

Lightning raid the Steve Jackson raid the nationspanning Op eration Sundevil The rhetoric of

law enforcement made it clear that there was in fact a concerted crackdown on hackers in progress

The hackers of the Hackers Conference the Wellb eings and their ilk did not really mind the

o ccasional public misapprehension of hacking if anything this membrane of dierentiation from

straight so ciety made the computer community feel dierent smarter b etter They had never

b efore b een confronted however by a concerted vilication campaign

Barlows central role in the counterstruggle was one of the ma jor anomalies of Journalists

investigating the controversy often stumbled over the truth ab out Barlow but they commonly

dusted themselves o and hurried on as if nothing had happ ened It was as if it were to o much to

b elieve that a s freak from the Grateful Dead had taken on a federal law enforcement op eration

headtohead and actually seemed to b e winning

Barlow had no easily detectable p owerbase for a p olitical struggle of this kind He had no

formal legal or technical credentials Barlow was however a computer networker of truly stellar

brilliance He had a p o ets gift of concise colorful phrasing He also had a journalists shrewdness

an othewall selfdeprecating wit and a phenomenal wealth of simple p ersonal charm

The kind of inuence Barlow p ossessed is fairly common currency in literary artistic or musical

circles A gifted critic can wield great artistic inuence simply through dening the temp er of the

times by coining the catchphrases and the terms of debate that b ecome the common currency of

the p erio d And as it happ ened Barlow was a parttime art critic with a sp ecial fondness for the

Western art of Frederic Remington

Barlow was the rst commentator to adopt William Gibsons striking sciencectional term cy

b erspace as a synonym for the presentday nexus of computer and telecommunications networks

Barlow was insistent that cyb erspace should b e regarded as a qualitatively new world a frontier

According to Barlow the world of electronic communications now made visible through the com

puter screen could no longer b e usefully regarded as just a tangle of hightech wiring Instead it

had b ecome a place cyb erspace which demanded a new set of metaphors a new set of rules and

b ehaviors The term as Barlow employed it struck a useful chord and this concept of cyb erspace

was picked up by Time Scientic American computer p olice hackers and even Constitutional

scholars Cyb erspace now seems likely to b ecome a p ermanent xture of the language

Barlow was very striking in p erson a tall craggyfaced b earded deepvoiced Wyomingan

in a dashing Western ensemble of jeans jacket cowb oy b o ots a knotted throatkerchief and an

everpresent Grateful Dead cloisonne lap el pin

Armed with a mo dem however Barlow was truly in his element Formal hierarchies were not

Barlows strong suit he rarely missed a chance to b elittle the large organizations and their drones

with their uptight institutional mindset Barlow was very much of the freespirit p ersuasion deeply

unimpressed by brasshats and jacksinoce But when it came to the digital grap evine Barlow

was a cyb erspace adho crat par excellence

Chapter The Civil Lib ertarians

There was not a mighty army of Barlows There was only one Barlow and he was a fairly

anomolous individual However the situation only seemed to require a single Barlow In fact

after many p eople must have concluded that a single Barlow was far more than theyd ever

bargained for

Barlows querulous miniessay ab out his encounter with the FBI struck a strong chord on the

Well A numb er of other free spirits on the fringes of Apple Computing had come under suspicion

and they liked it not one whit b etter than he did

One of these was Mitchell Kap or the coinventor of the spreadsheet program Lotus and

the founder of Lotus Development Corp oration Kap or had writteno the passing indignity of

b eing ngerprinted down at his own lo cal Boston FBI headquarters but Barlows p ost made the

full national scop e of the FBIs dragnet clear to Kap or The issue now had Kap ors full attention

As the Secret Service swung into antihacker op eration nationwide in Kap or watched every

move with deep skepticism and growing alarm

As it happ ened Kap or had already met Barlow who had interviewed Kap or for a California

computer journal Like most p eople who met Barlow Kap or had b een very taken with him Now

Kap or to ok it up on himself to drop in on Barlow for a hearttoheart talk ab out the situation

Kap or was a regular on the Well Kap or had b een a devotee of the Whole Earth Catalog since

the b eginning and treasured a complete run of the magazine And Kap or not only had a mo dem

but a private jet In pursuit of the scattered hightech investments of Kap or Enterprises Inc his

p ersonal multimillion dollar holding company Kap or commonly crossed state lines with ab out as

much thought as one might give to faxing a letter

The Kap orBarlow council of June in Pinedale Wyoming was the start of the Electronic

Frontier Foundation Barlow swiftly wrote a manifesto Crime and Puzzlement which announced

his and Kap ors intention to form a p olitical organization to raise and disburse funds for edu

cation lobbying and litigation in the areas relating to digital sp eech and the extension of the

Constitution into Cyb erspace

Furthermore pro claimed the manifesto the foundation would fund conduct and supp ort legal

eorts to demonstrate that the Secret Service has exercised prior restraint on publications limited

free sp eech conducted improp er seizure of equipment and data used undue force and generally

conducted itself in a fashion which is arbitrary oppressive and unconstitutional

Crime and Puzzlement was distributed far and wide through computer networking channels

and also printed in the Whole Earth Review The sudden declaration of a coherent p oliticized

counterstrike from the ranks of hackerdom electried the community Steve Wozniak p erhaps

a bit stung by the NuPrometheus scandal swiftly oered to match any funds Kap or oered the

Foundation

John Gilmore one of the pioneers of Sun Microsystems immediately oered his own extensive

nancial and p ersonal supp ort Gilmore an ardent lib ertarian was to prove an elo quent advo cate

of electronic privacy issues esp ecially freedom from governmental and corp orate computerassisted

surveillance of private citizens

A second meeting in San Francisco rounded up further allies Stewart Brand of the Point

Foundation virtualreality pioneers Jaron Lanier and Chuck Blanchard network entrepreneur and

venture capitalist Nat Goldhab er At this dinner meeting the activists settled on a formal title the

Electronic Frontier Foundation Incorp orated Kap or b ecame its president A new EFF Conference

was op ened on the Point Foundations Well and the Well was declared the home of the Electronic

Frontier Foundation

Press coverage was immediate and intense Like their nineteenthcentury spiritual ancestors

Alexander Graham Bell and Thomas Watson the hightech computer entrepreneurs of the s

and s p eople such as Wozniak Jobs Kap or Gates and H Ross Perot who had raised

The Hacker Crackdown

themselves by their b o otstraps to dominate a glittering new industry had always made very go o d

copy

But while the Wellb eings rejoiced the press in general seemed nonplussed by the selfdeclared

civilizers of cyb erspace EFFs insistence that the war against hackers involved grave Consti

tutional civil lib erties issues seemed somewhat farfetched esp ecially since none of EFFs organizers

were lawyers or established p oliticians The business press in particular found it easier to seize

on the apparent core of the story that hightech entrepreneur Mitchell Kap or had established a

defense fund for hackers Was EFF a genuinely imp ortant p olitical development or merely a

clique of wealthy eccentrics dabbling in matters b etter left to the prop er authorities The jury

was still out

But the stage was now set for op en confrontation And the rst and the most critical battle was

the hacker showtrial of Knight Lightning

It has b een my practice throughout this b o ok to refer to hackers only by their handles There

is little to gain by giving the real names of these p eople many of whom are juveniles many of

whom have never b een convicted of any crime and many of whom had unsusp ecting parents who

have already suered enough

But the trial of Knight Lightning on July made this particular hacker a nationally

known public gure It can do no particular harm to himself or his family if I rep eat the long

established fact that his name is Craig Neidorf pronounced NYEdorf

Neidorf s jury trial to ok place in the United States District Court Northern District of Illinois

Eastern Division with the Honorable Nicholas J Bua presiding The United States of America

was the plainti the defendant Mr Neidorf The defendants attorney was Sheldon T Zenner of

the Chicago rm of Katten Muchin and Zavis

The prosecution was led by the stalwarts of the Chicago Computer Fraud and Abuse Task

Force William J Co ok Colleen D Coughlin and David A Glo ckner all Assistant United States

Attorneys The Secret Service Case Agent was Timothy M Foley

It will b e recalled that Neidorf was the coeditor of an underground hacker magazine called

Phrack Phrack was an entirely electronic publication distributed through bulletin b oards and

over electronic networks It was amateur publication given away for free Neidorf had never made

any money for his work in Phrack Neither had his unindicted coeditor Taran King or any of

the numerous Phrack contributors

The Chicago Computer Fraud and Abuse Task Force however had decided to prosecute Neidorf

as a fraudster To formally admit that Phrack was a magazine and Neidorf a publisher was

to op en a prosecutorial Pandoras Box of First Amendment issues To do this was to play into

the hands of Zenner and his EFF advisers which now included a phalanx of prominent New York

civil rights lawyers as well as the formidable legal sta of Katten Muchin and Zavis Instead the

prosecution relied heavily on the issue of access device fraud Section of Title the section

from which the Secret Service drew its most direct jurisdiction over computer crime

Neidorf s alleged crimes centered around the E Do cument He was accused of having entered

into a fraudulent scheme with the Prophet who it will b e recalled was the Atlanta LoD memb er

who had illici tly copied the E Do cument from the BellSouth AIMSX system

The Prophet himself was also a codefendant in the Neidorf case partandparcel of the alleged

fraud scheme to steal BellSouths E Do cument and to pass the Do cument across state

lines which help ed establish the Neidorf trial as a federal case The Prophet in the spirit of full coop eration had agreed to testify against Neidorf

Chapter The Civil Lib ertarians

In fact all three of the Atlanta crew sto o d ready to testify against Neidorf Their own federal

prosecutors in Atlanta had charged the Atlanta Three with a conspiracy b computer fraud

c wire fraud d access device fraud and e interstate transp ortation of stolen prop erty Title

Sections and

Faced with this blizzard of trouble Prophet and Leftist had ducked any public trial and had

pled guilty to reduced charges one conspiracy count apiece Urvile had pled guilty to that o dd

bit of Section which makes it illegal to p ossess fteen or more illegal access devices in his

case computer passwords And their sentences were scheduled for Septemb er well after

the Neidorf trial As witnesses they could presumably b e relied up on to b ehave

Neidorf however was pleading inno cent Most everyone else caught up in the crackdown had

co op erated fully and pled guilty in hop e of reduced sentences Steve Jackson was a notable

exception of course and had strongly protested his inno cence from the very b eginning But Steve

Jackson could not get a day in court Steve Jackson had never b een charged with any crime in

the rst place

Neidorf had b een urged to plead guilty But Neidorf was a p olitical science ma jor and was disin

clined to go to jail for fraud when he had not made any money had not broken into any computer

and had b een publishing a magazine that he considered protected under the First Amendment

Neidorf s trial was the only legal action of the entire Crackdown that actually involved bringing

the issues at hand out for a public test in front of a jury of American citizens

Neidorf to o had co op erated with investigators He had voluntarily handed over much of the

evidence that had led to his own indictment He had already admitted in writing that he knew

that the E Do cument had b een stolen b efore he had published it in Phrack or from the

prosecutions p oint of view illegally transp orted stolen prop erty by wire in something purp orting

to b e a publication

But even if the publication of the E Do cument was not held to b e a crime that wouldnt let

Neidorf o the ho ok Neidorf had still received the E Do cument when Prophet had transferred

it to him from Rich Andrews Jolnet no de On that o ccasion it certainly hadnt b een published

it was hacker b o oty pure and simple transp orted across state lines

The Chicago Task Force led a Chicago grand jury to indict Neidorf on a set of charges that could

have put him in jail for thirty years When some of these charges were successfully challenged b efore

Neidorf actually went to trial the Chicago Task Force rearranged his indictment so that he faced a

p ossible jail term of over sixty years As a rst oender it was very unlikely that Neidorf would in

fact receive a sentence so drastic but the Chicago Task Force clearly intended to see Neidorf put in

prison and his conspiratorial magazine put p ermanently out of commission This was a federal

case and Neidorf was charged with the fraudulent theft of prop erty worth almost eighty thousand

dollars

William Co ok was a strong b eliever in highprole prosecutions with symb olic overtones He

often published articles on his work in the security trade press arguing that a clear message had to

b e sent to the public at large and the computer community in particular that unauthorized attacks

on computers and the theft of computerized information would not b e tolerated by the courts

The issues were complex the prosecutions tactics somewhat unortho dox but the Chicago Task

Force had proved surefo oted to date Shadowhawk had b een bagged on the wing in by the

Task Force and sentenced to nine months in prison and a ne The Shadowhawk case

involved charges under Section the federal interest computer section

Shadowhawk had not in fact b een a devotee of federal interest computers p er se On the

contrary Shadowhawk who owned an ATT home computer seemed to cherish a sp ecial aggres

sion toward ATT He had bragged on the underground b oards Phreak Klass and Dr

Rip co of his skills at raiding ATT and of his intention to crash ATTs national phone system

The Hacker Crackdown

Shadowhawks brags were noticed by Henry Kluepfel of Bellcore Security scourge of the outlaw

b oards whose relations with the Chicago Task Force were long and intimate

The Task Force successfully established that Section applied to the teenage Shadowhawk

despite the ob jections of his defense attorney Shadowhawk had entered a computer owned by

US Missile Command and merely managed by ATT He had also entered an ATT computer

lo cated at Robbins Air Force Base in Georgia Attacking ATT was of federal interest whether

Shadowhawk had intended it or not

The Task Force also convinced the court that a piece of ATT software that Shadowhawk had

illicitl y copied from Bell Labs the Articial Intelligence C Exp ert System was worth a co ol one

million dollars Shadowhawks attorney had argued that Shadowhawk had not sold the program

and had made no prot from the illici t copying And in p oint of fact the C Exp ert System

was exp erimental software and had no established market value b ecause it had never b een on

the market in the rst place ATTs own assessment of a one million dollar gure for its own

intangible prop erty was accepted without challenge by the court however And the court concurred

with the government prosecutors that Shadowhawk showed clear intent to defraud whether hed

gotten any money or not Shadowhawk went to jail

The Task Forces other b estknown triumph had b een the conviction and jailing of Kyrie

Kyrie a true denizen of the digital criminal underground was a yearold Canadian woman

convicted and jailed for telecommunications fraud in Canada After her release from prison she

had ed the wrath of Canada Bell and the Royal Canadian Mounted Police and eventually settled

very unwisely in Chicago

Kyrie who also called herself Long Distance Information sp ecialized in voicemail abuse

She assembled large numb ers of hot longdistance co des then read them aloud into a series of

corp orate voicemail systems Kyrie and her friends were electronic squatters in corp orate voice

mail systems using them much as if they were pirate bulletin b oards then moving on when their

vo cal chatter clogged the system and the owners necessarily wised up Kyries camp followers were

a lo ose trib e of some hundred and fty phonephreaks who followed her trail of piracy from machine

to machine ardently b egging for her services and exp ertise

Kyries disciples passed her stolen credit card numb ers in exchange for her stolen long distance

information Some of Kyries clients paid her o in cash by scamming credit card cash advances

from Western Union

Kyrie travelled incessantly mostly through airline tickets and hotel ro oms that she scammed

through stolen credit cards Tiring of this she found refuge with a fellow female phone phreak

in Chicago Kyries hostess like a surprising numb er of phone phreaks was blind She was also

physically disabled Kyrie allegedly made the b est of her new situation by applying for and

receiving state welfare funds under a false identity as a qualied caretaker for the handicapp ed

Sadly Kyries two children by a former marriage had also vanished underground with her these

preteen digital refugees had no legal American identity and had never sp ent a day in scho ol

Kyrie was addicted to technical mastery and enthralled by her own cleverness and the ardent

worship of her teenage followers This fo olishly led her to phone up Gail Thackeray in Arizona to

b oast brag strut and oer to play informant Thackeray however had already learned far more

than enough ab out Kyrie whom she roundly despised as an adult criminal corrupting minors a

female Fagin Thackeray passed her tap es of Kyries b oasts to the Secret Service

Kyrie was raided and arrested in Chicago in May She confessed at great length and pled

guilty

In August Co ok and his Task Force colleague Colleen Coughlin sent Kyrie to jail for

months for computer and telecommunications fraud This was a markedly severe sentence by the

usual wristslapping standards of hacker busts Seven of Kyries foremost teenage disciples were

also indicted and convicted The Kyrie hightech street gang as Co ok describ ed it had b een

Chapter The Civil Lib ertarians

crushed Co ok and his colleagues had b een the rst ever to put someone in prison for voicemail

abuse Their pioneering eorts had won them attention and kudos

In his article on Kyrie Co ok drove the message home to the readers of Security Management

magazine a trade journal for corp orate security professionals The case Co ok said and Kyries sti

sentence reect a new reality for hackers and computer crime victims in the s::: Individuals

and corp orations who rep ort computer and telecommunications crimes can now exp ect that their

co op eration with federal law enforcement will result in meaningful punishment Companies and

the public at large must rep ort computerenhanced crimes if they want prosecutors and the course

to protect their rights to the tangible and intangible prop erty develop ed and stored on computers

Co ok had made it his business to construct this new reality for hackers Hed also made it

his business to p olice corp orate prop erty rights to the intangible

Had the Electronic Frontier Foundation b een a hacker defense fund as that term was generally

understo o d they presumably would have sto o d up for Kyrie Her sentence did indeed send

a message that federal heat was coming down on hackers But Kyrie found no defenders at

EFF or anywhere else for that matter EFF was not a bailout fund for electronic cro oks

The Neidorf case paralleled the Shadowhawk case in certain ways The victim once again was

allowed to set the value of the stolen prop erty Once again Kluepfel was b oth investigator and

technical advisor Once again no money had changed hands but the intent to defraud was

central

The prosecutions case showed signs of weakness early on The Task Force had originally hop ed

to prove Neidorf the center of a nationwide Legion of Do om criminal conspiracy The Phrack

editors threw physical gettogethers every summer which attracted hackers from across the country

generally two dozen or so of the magazines favorite contributors and readers Such conventions

were common in the hacker community Magazine for instance held public meetings of

hackers in New York every month LoD heavydudes were always a strong presence at these

Phracksp onsored Summercons

In July an Arizona hacker named Dictator attended in Neidorf s home town

of St Louis Dictator was one of Gail Thackerays underground informants Dictators underground

b oard in Pho enix was a sting op eration for the Secret Service Dictator brought an undercover crew

of Secret Service agents to Summercon The agents b ored spyholes through the wall of Dictators

hotel ro om in St Louis and videotap ed the frolicking hackers through a oneway mirror As it

happ ened however nothing illegal had o ccurred on videotap e other than the guzzling of b eer by

a couple of minors Summercons were so cial events not sinister cabals The tap es showed fteen

hours of raucous laughter pizzagobbling injokes and backslapping

Neidorf s lawyer Sheldon Zenner saw the Secret Service tap es b efore the trial Zenner was

sho cked by the complete harmlessness of this meeting which Co ok had earlier characterized as a

sinister interstate conspiracy to commit fraud Zenner wanted to show the Summercon tap es to

the jury It to ok protracted maneuverings by the Task Force to keep the tap es from the jury as

irrelevant

The E Do cument was also proving a weak reed It had originally b een valued at

Unlike Shadowhawks arcane Articial Intelligence b o oty the E Do cument was not software

it was written in English Computerknowledgeable p eople found this value for a twelvepage

bureaucratic do cument frankly incredible In his Crime and Puzzlement manifesto for EFF

Barlow commented We will probably never know how this gure was reached or by whom though

I like to imagine an appraisal team consisting of Franz Kafka Joseph Heller and Thomas Pynchon

As it happ ened Barlow was unduly p essimistic The EFF did in fact eventually discover

exactly how this gure was reached and by whom but only in long after the Neidorf trial

was over

The Hacker Crackdown

Kim Megahee a Southern Bell security manager had arrived at the do cuments value by simply

adding up the costs asso ciated with the pro duction of the E Do cument Those costs were

as follows

A technical writer had b een hired to research and write the E Do cument hours of

work at an hour cost A Pro ject Manager had overseen the technical writer

hours at an hour made

A week of typing had cost dollars A week of formatting had cost A week of

graphics formatting had cost

Two days of editing cost

A b ox of order lab els cost ve dollars

Preparing a purchase order for the Do cument including typing and the obtaining of an

authorizing signature from within the BellSouth bureaucracy cost

Printing cost Mailing the Do cument to fty p eople to ok fty hours by a clerk and

cost

Placing the Do cument in an index to ok two clerks an hour each totalling

Bureaucratic overhead alone therefore was alleged to have cost a whopping According

to Mr Megahee the typing of a twelvepage do cument had taken a full week Writing it had taken

ve weeks including an overseer who apparently did nothing else but watch the author for ve

weeks Editing twelve pages had taken two days Printing and mailing an electronic do cument

which was already available on the Southern Bell Data Network to any telco employee who needed

it had cost over a thousand dollars

But this was just the b eginning There were also the hardware exp enses Eight hundred fty

dollars for a VT computer monitor Thirtyone thousand dollars for a sophisticated VAXstation

I I computer Six thousand dollars for a computer printer Twentytwo thousand dollars for a copy

of Interleaf software Two thousand ve hundred dollars for VMS software All this to create

the twelvepage Do cument

Plus ten p ercent of the cost of the software and the hardware for maintenance Actually

the ten p ercent maintenance costs though mentioned had b een left o the nal total

apparently through a merciful oversight

Mr Megahees letter had b een mailed directly to William Co ok himself at the oce of the

Chicago federal attorneys The United States Government accepted these telco gures without

question

As incredulity mounted the value of the E Do cument was ocially revised downward This

time Rob ert Kibler of BellSouth Security estimated the value of the twelve pages as a mere

based purp ortedly on RD costs But this sp ecic estimate right down to the

nickel did not move the skeptics at all in fact it provoked op en scorn and a torrent of sarcasm

The nancial issues concerning theft of proprietary information have always b een p eculiar It

could b e argued that BellSouth had not lost its E Do cument at all in the rst place and

therefore had not suered any monetary damage from this theft And Sheldon Zenner did in fact

argue this at Neidorf s trial that Prophets raid had not b een theft but was b etter understo o d

as illicit copying

The money however was not central to anyones true purp oses in this trial It was not Co oks

strategy to convince the jury that the E Do cument was a ma jor act of theft and should b e

punished for that reason alone His strategy was to argue that the E Do cument was dangerous

It was his intention to establish that the E Do cument was a roadmap to the Enhanced

System Neidorf had delib erately and recklessly distributed a dangerous weap on Neidorf and the

Prophet did not care or p erhaps even gloated at the sinister idea that the E Do cument could

Chapter The Civil Lib ertarians

b e used by hackers to disrupt service a life line for every p erson certainly in the Southern

Bell region of the United States and indeed in many communities throughout the United States

in Co oks own words Neidorf had put p eoples lives in danger

In pretrial maneuverings Co ok had established that the E Do cument was to o hot to app ear

in the public pro ceedings of the Neidorf trial The jury itself would not b e allowed to ever see this

Do cument lest it slip into the ocial court records and thus into the hands of the general public

and thus somehow to malicious hackers who might lethally abuse it

Hiding the E Do cument from the jury may have b een a clever legal maneuver but it had a

severe aw There were in p oint of fact hundreds p erhaps thousands of p eople already in p osses

sion of the E Do cument just as Phrack had published it Its true nature was already obvious

to a wide section of the interested public all of whom by the way were at least theoretically

party to a gigantic wirefraud conspiracy Most everyone in the electronic community who had a

mo dem and any interest in the Neidorf case already had a copy of the Do cument It had already

b een available in Phrack for over a year

People even quite normal p eople without any particular prurient interest in forbidden knowl

edge did not shut their eyes in terror at the thought of b eholding a dangerous do cument from

a telephone company On the contrary they tended to trust their own judgement and simply read

the Do cument for themselves And they were not impressed

One such p erson was John Nagle Nagle was a fortyoneyearold professional programmer with

a masters degree in computer science from Stanford He had worked for Ford Aerospace where

he had invented a computernetworking technique known as the Nagle Algorithm and for the

prominent Californian computergraphics rm Auto desk where he was a ma jor sto ckholder

Nagle was also a prominent gure on the Well much resp ected for his technical knowledgeability

Nagle had followed the civillib erties debate closely for he was an ardent telecommunicator

He was no particular friend of computer intruders but he b elieved electronic publishin g had a

great deal to oer so ciety at large and attempts to restrain its growth or to censor free electronic

expression strongly roused his ire

The Neidorf case and the E Do cument were b oth b eing discussed in detail on the Internet

in an electronic publication called Telecom Digest Nagle a longtime Internet maven was a regular

reader of Telecom Digest Nagle had never seen a copy of Phrack but the implications of the case

disturb ed him

While in a Stanford b o okstore hunting b o oks on rob otics Nagle happ ened across a b o ok called

The Intelligent Network Thumbing through it at random Nagle came across an entire chapter

meticulously detailing the workings of E p olice emergency systems This extensive text was

b eing sold op enly and yet in Illinois a young man was in danger of going to prison for publishing

a thin sixpage do cument ab out service

Nagle made an ironic comment to this eect in Telecom Digest From there Nagle was put in

touch with Mitch Kap or and then with Neidorf s lawyers

Sheldon Zenner was delighted to nd a computer telecommunications exp ert willing to sp eak up

for Neidorf one who was not a wacky teenage hacker Nagle was uent mature and resp ectable

hed once had a federal security clearance

Nagle was asked to y to Illinois to join the defense team

Having joined the defense as an exp ert witness Nagle read the entire E Do cument for himself

He made his own judgement ab out its p otential for menace

The time has now come for you yourself the reader to have a lo ok at the E Do cument This

sixpage piece of work was the pretext for a federal prosecution that could have sent an electronic

publisher to prison for thirty or even sixty years It was the pretext for the search and seizure of

The Hacker Crackdown

Steve Jackson Games a legitimate publisher of printed b o oks It was also the formal pretext for the

search and seizure of the Mentors bulletin b oard Pho enix Pro ject and for the raid on the home

of Erik Blo o daxe It also had much to do with the seizure of Richard Andrews Jolnet no de and the

shutdown of Charles Boykins ATT no de The E Do cument was the single most imp ortant

piece of evidence in the Hacker Crackdown There can b e no real and legitimate substitute for the

Do cument itself

Phrack Inc

Volume Two Issue File of

Control Office Administration

Of Enhanced Services For

Special Services and Account Centers

by the Eavesdropper

March

Description of Service

The control office for Emergency service is assigned in

accordance with the existing standard guidelines to one of

the following centers

o Special Services Center SSC

o Major Accounts Center MAC

o Serving Test Center STC

o Toll Control Center TCC

The SSCMAC designation is used in this document

interchangeably for any of these four centers The Special

Services Centers SSCs or Major Account Centers

MACs have been designated as the trouble reporting

contact for all E customer PSAP reported troubles

Subscribers who have trouble on an E call will continue

to contact local repair service CRSAB who will refer the

trouble to the SSCMAC when appropriate

Due to the critical nature of E service the control and

timely repair of troubles is demanded As the primary

E customer contact the SSCMAC is in the unique

position to monitor the status of the trouble and insure its

resolution

System Overview

The number is intended as a nationwide universal

telephone number which provides the public with direct

access to a Public Safety Answering Point PSAP A PSAP

is also referred to as an Emergency Service Bureau ESB

A PSAP is an agency or facility which is authorized by a

municipality to receive and respond to police fire andor

Chapter The Civil Lib ertarians

ambulance services One or more attendants are located

at the PSAP facilities to receive and handle calls of an

emergency nature in accordance with the local municipal

requirements

An important advantage of E emergency service is

improved reduced response times for emergency

services Also close coordination among agencies

providing various emergency services is a valuable

capability provided by E service

A ESS is used as the tandem office for the E network to

route all calls to the correct primary PSAP designated

to serve the calling station The E feature was

developed primarily to provide routing to the correct PSAP

for all calls Selective routing allows a call

originated from a particular station located in a particular

district zone or town to be routed to the primary PSAP

designated to serve that customer station regardless of

wire center boundaries Thus selective routing eliminates

the problem of wire center boundaries not coinciding with

district or other political boundaries

The services available with the E feature include

Forced Disconnect Default Routing

Alternative Routing Night Service

Selective Routing Automatic Number

Identification ANI

Selective Transfer Automatic Location

Identification ALI

PreserviceInstallation Guidelines

When a contract for an E system has been signed it is

the responsibility of Network Marketing to establish an

implementationcutover committee which should include

a representative from the SSCMAC Duties of the E

Implementation Team include coordination of all phases

of the E system deployment and the formation of an

ongoing E maintenance subcommittee

Marketing is responsible for providing the following

customer specific information to the SSCMAC prior to

the start of call through testing

o All PSAPs name address local contact

o All PSAP circuit IDs

o service request including PSAP details on each

PSAP Section K L M

o Network configuration

o Any vendor information name telephone number equipment

The Hacker Crackdown

The SSCMAC needs to know if the equipment and sets at

the PSAP are maintained by the BOCs an independent

company or an outside vendor or any combination This

information is then entered on the PSAP profile sheets

and reviewed quarterly for changes additions and

deletions

Marketing will secure the Major Account Number MAN

and provide this number to Corporate Communications

so that the initial issue of the service orders carry the

MAN and can be tracked by the SSCMAC via

CORDNET PSAP circuits are official services by

definition

All service orders required for the installation of the E

system should include the MAN assigned to the

citycounty which has purchased the system

In accordance with the basic SSCMAC strategy for

provisioning the SSCMAC will be Overall Control Office

OCO for all to PSAP circuits official services and

any other services for this customer Training must be

scheduled for all SSCMAC involved personnel during the

preservice stage of the project

The E Implementation Team will form the ongoing

maintenance subcommittee prior to the initial

implementation of the E system This subcommittee

will establish post implementation quality assurance

procedures to ensure that the E system continues to

provide quality service to the customer

CustomerCompany training trouble reporting interfaces

for the customer telephone company and any involved

independent telephone companies needs to be addressed

and implemented prior to E cutover These functions

can be best addressed by the formation of a subcommittee

of the E Implementation Team to set up

guidelines for and to secure service commitments of

interfacing organizations A SSCMAC supervisor should

chair this subcommittee and include the following

organizations

Switching Control Center

E translations

Trunking

End office and Tandem office hardwaresoftware

Recent Change Memory Administration Center

Daily RC update activity for TNESN translations

Processes validity errors and rejects

Line and Number Administration

Verification of TNESN translations

Chapter The Civil Lib ertarians

Special Service CenterMajor Account Center

Single point of contact for all PSAP and Node to host

troubles

Logs tracks statusing of all trouble reports

Trouble referral follow up and escalation

Customer notification of status and restoration

Analyzation of chronic troubles

Testing installation and maintenance of E circuits

Installation and Maintenance SSIMIM

Repair and maintenance of PSAP equipment and

Telco owned sets

Minicomputer Maintenance Operations Center

E circuit maintenance where applicable

Area Maintenance Engineer

Technical assistance on voice COPSAP network

related E troubles

Maintenance Guidelines

The CCNC will test the Node circuit from the T at the

Host site to the T at the Node site Since Host to Node

CCNC to MMOC circuits are official company services

the CCNC will refer all Node circuit troubles to the

SSCMAC The SSCMAC is responsible for the testing

and follow up to restoration of these circuit troubles

Although Node to PSAP circuit are official services the

MMOC will refer PSAP circuit troubles to the appropriate

SSCMAC The SSCMAC is responsible for testing and

follow up to restoration of PSAP circuit troubles

The SSCMAC will also receive reports from

CRSABIMCs on subscriber troubles when they are

not line troubles The SSCMAC is responsible for testing

and restoration of these troubles

Maintenance responsibilities are as follows

SCC Voice Network ANI to PSAP

SCC responsible for tandem switch

SSIMIM PSAP Equipment Modems CIUs sets

Vendor PSAP Equipment when CPE

SSCMAC PSAP to Node circuits and tandem to

PSAP voice circuits EMNT

MMOC Node site Modems cables etc

Note All above work groups are required to resolve

troubles by interfacing with appropriate work groups for

resolution

The Switching Control Center SCC is responsible for

EAESS translations in tandem central offices These

translations route E calls selective transfer default

The Hacker Crackdown

routing speed calling etc for each PSAP The SCC is also

responsible for troubleshooting on the voice network call

originating to end office tandem equipment

For example ANI failures in the originating offices would

be a responsibility of the SCC

Recent Change Memory Administration Center

RCMAC performs the daily tandem translation updates

recent change for routing of individual telephone

numbers

Recent changes are generated from service order activity

new service address changes etc and compiled into a

daily file by the E Center ALIDMS E Computer

SSIMIM is responsible for the installation and repair of

PSAP equipment PSAP equipment includes ANI

Controller ALI Controller data sets cables sets and

other peripheral equipment that is not vendor owned

SSIMIM is responsible for establishing maintenance

test kits complete with spare parts for PSAP maintenance

This includes test gear data sets and ANIALI Controller

parts

Special Services Center SSC or Major Account Center

MAC serves as the trouble reporting contact for all

PSAP troubles reported by customer The SSCMAC

refers troubles to proper organizations for handling and

tracks status of troubles escalating when necessary The

SSCMAC will close out troubles with customer The

SSCMAC will analyze all troubles and tracks chronic

PSAP troubles

Corporate Communications Network Center CCNC will

test and refer troubles on all node to host circuits All E

circuits are classified as official company property

The Minicomputer Maintenance Operations Center

MMOC maintains the E ALIDMS computer

hardware at the Host site This MMOC is also responsible

for monitoring the system and reporting certain PSAP and

system problems to the local MMOCs SCCs or

SSCMACs The MMOC personnel also operate software

programs that maintain the TN data base under the

direction of the E Center The maintenance of the

NODE computer the interface between the PSAP and the

ALIDMS computer is a function of the MMOC at the

NODE site The MMOCs at the NODE sites may also be

involved in the testing of NODE to Host circuits The

MMOC will also assist on Host to PSAP and data network

related troubles not resolved through standard trouble

clearing procedures

Chapter The Civil Lib ertarians

Installation And Maintenance Center IMC is

responsible for referral of E subscriber troubles that

are not subscriber line problems

E Center Performs the role of System Administration

and is responsible for overall operation of the E

computer software The E Center does AZ trouble

analysis and provides statistical information on the

performance of the system

This analysis includes processing PSAP inquiries trouble

reports and referral of network troubles The E Center

also performs daily processing of tandem recent change

and provides information to the RCMAC for tandem

input The E Center is responsible for daily processing

of the ALIDMS computer data base and provides error

files etc to the Customer Services department for

investigation and correction The E Center participates

in all system implementations and ongoing maintenance

effort and assists in the development of procedures

training and education of information to all groups

Any group receiving a trouble from the SSCMAC

should close out the trouble with the SSCMAC or provide

a status if the trouble has been referred to another group

This will allow the SSCMAC to provide a status back to

the customer or escalate as appropriate

Any group receiving a trouble from the Host site MMOC

or CCNC should close the trouble back to that group

The MMOC should notify the appropriate SSCMAC

when the Host Node or all Node circuits are down so that

the SSCMAC can reply to customer reports that may be

called in by the PSAPs This will eliminate duplicate

reporting of troubles On complete outages the MMOC

will follow escalation procedures for a Node after two

hours and for a PSAP after four hours Additionally the

MMOC will notify the appropriate SSCMAC when the

Host Node or all Node circuits are down

The PSAP will call the SSCMAC to report E troubles

The person reporting the E trouble may not have a

circuit ID and will therefore report the PSAP name and

address Many PSAP troubles are not circuit specific In

those instances where the caller cannot provide a circuit

ID the SSCMAC will be required to determine the

circuit ID using the PSAP profile Under no

circumstances will the SSCMAC Center refuse to take

the trouble The E trouble should be handled as

quickly as possible with the SSCMAC providing as much

assistance as possible while taking the trouble report from

the caller

The Hacker Crackdown

The SSCMAC will screentest the trouble to determine

the appropriate handoff organization based on the

following criteria

PSAP equipment problem SSIMIM

Circuit problem SSCMAC

Voice network problem SCC report trunk group number

Problem affecting multiple PSAPs No ALI report from

all PSAPs Contact the MMOC to check for NODE or

Host computer problems before further testing

The SSCMAC will track the status of reported troubles

and escalate as appropriate The SSCMAC will close out

customercompany reports with the initiating contact

Groups with specific maintenance responsibilities

defined above will investigate chronic troubles upon

request from the SSCMAC and the ongoing maintenance

subcommittee

All out of service E troubles are priority one type

reports One link down to a PSAP is considered a priority

one trouble and should be handled as if the PSAP was

isolated

The PSAP will report troubles with the ANI controller ALI

controller or set equipment to the SSCMAC

NO ANI Where the PSAP reports NO ANI digital

display screen is blank ask if this condition exists on all

screens and on all calls It is important to differentiate

between blank screens and screens displaying XX

or all zeroes

When the PSAP reports all screens on all calls ask if there

is any voice contact with callers If there is no voice

contact the trouble should be referred to the SCC

immediately since calls are not getting through which

may require alternate routing of calls to another PSAP

When the PSAP reports this condition on all screens but

not all calls and has voice contact with callers the report

should be referred to SSIMIM for dispatch The

SSCMAC should verify with the SCC that ANI is pulsing

before dispatching SSIM

When the PSAP reports this condition on one screen for

all calls others work fine the trouble should be referred to

SSIMIM for dispatch because the trouble is isolated to

one piece of equipment at the customer premise

An ANI failure ie all zeroes indicates that the ANI has

not been received by the PSAP from the tandem office or

was lost by the PSAP ANI controller The PSAP may

receive alarms which can be caused by the ANI

Chapter The Civil Lib ertarians

controller logging more than three all zero failures on the

same trunk The PSAP has been instructed to report this

condition to the SSCMAC since it could indicate an

equipment trouble at the PSAP which might be affecting

all subscribers calling into the PSAP When all zeroes are

being received on all calls or alarms continue a tester

should analyze the condition to determine the appropriate

action to be taken The tester must perform cooperative

testing with the SCC when there appears to be a problem

on the TandemPSAP trunks before requesting dispatch

When an occasional all zero condition is reported the

SSCMAC should dispatch SSIMIM to routine

equipment on a chronic troublesweep

The PSAPs are instructed to report incidental ANI failures

to the BOC on a PSAP inquiry trouble ticket paper that is

sent to the Customer Services E group and forwarded

to E center when required This usually involves only a

particular telephone number and is not a condition that

would require a report to the SSCMAC Multiple ANI

failures which our from the same end office XX denotes

end office indicate a hard trouble condition may exist in

the end office or end office tandem trunks The PSAP will

report this type of condition to the SSCMAC and the

SSCMAC should refer the report to the SCC responsible

for the tandem office NOTE XX is the ESCO Emergency

Service Number associated with the incoming trunks

into the tandem It is important that the CMAC tell the

SCC what is displayed at the PSAP ie which

indicates to the SCC which end office is in trouble

Note It is essential that the PSAP fill out inquiry form on

every ANI failure

The PSAP will report a trouble any time an address is not

received on an address display screen blank E call

If a record is not in the data base or an ANI failure is

encountered the screen will provide a display noticing

such condition The SSCMAC should verify with the

PSAP whether the NO ALI condition is on one screen or all

screens

When the condition is on one screen other screens

receive ALI information the SSCMAC will request

SSIMIM to dispatch

If no screens are receiving ALI information there is

usually a circuit trouble between the PSAP and the Host

computer The SSCMAC should test the trouble and

refer for restoral

Note If the SSCMAC receives calls from multiple

PSAPs all of which are receiving NO ALI there is a

The Hacker Crackdown

problem with the Node or Node to Host circuits or the

Host computer itself Before referring the trouble the

SSCMAC should call the MMOC to inquire if the Node

or Host is in trouble

Alarm conditions on the ANI controller digital display at

the PSAP are to be reported by the PSAPs These alarms

can indicate various trouble conditions so the SSCMAC

should ask the PSAP if any portion of the E system is

not functioning properly

The SSCMAC should verify with the PSAP attendant that

the equipments primary function is answering E calls

If it is the SSCMAC should request a dispatch

SSIMIM If the equipment is not primarily used for

E then the SSCMAC should advise PSAP to contact

their CPE vendor

Note These troubles can be quite confusing when the

PSAP has vendor equipment mixed in with equipment

that the BOC maintains The Marketing representative

should provide the SSCMAC information concerning any

unusual or exception items where the PSAP should

contact their vendor This information should be included

in the PSAP profile sheets

ANI or ALI controller down When the host computer

sees the PSAP equipment down and it does not come back

up the MMOC will report the trouble to the SSCMAC

the equipment is down at the PSAP a dispatch will be

required

PSAP link circuit down The MMOC will provide the

SSCMAC with the circuit ID that the Host computer

indicates in trouble Although each PSAP has two circuits

when either circuit is down the condition must be treated

as an emergency since failure of the second circuit will

cause the PSAP to be isolated

Any problems that the MMOC identifies from the Node

location to the Host computer will be handled directly with

the appropriate MMOCsCCNC

Note The customer will call only when a problem is

apparent to the PSAP When only one circuit is down to

the PSAP the customer may not be aware there is a

trouble even though there is one link down notification

should appear on the PSAP screen Troubles called into

the SSCMAC from the MMOC or other company

employee should not be closed out by calling the PSAP

since it may result in the customer responding that they

do not have a trouble These reports can only be closed

out by receiving information that the trouble was fixed

and by checking with the company employee that

Chapter The Civil Lib ertarians

reported the trouble The MMOC personnel will be able

to verify that the trouble has cleared by reviewing a

printout from the host

When the CRSAB receives a subscriber complaint ie

cannot dial the RSA should obtain as much

information as possible while the customer is on the line

For example what happened when the subscriber dialed

The report is automatically directed to the IMC for

subscriber line testing When no line trouble is found the

IMC will refer the trouble condition to the SSCMAC The

SSCMAC will contact Customer Services E Group and

verify that the subscriber should be able to call and

obtain the ESN The SSCMAC will verify the ESN via

SCCS When both verifications match the SSCMAC

will refer the report to the SCC responsible for the

tandem office for investigation and resolution The MAC

is responsible for tracking the trouble and informing the

IMC when it is resolved

For more information please refer to E Glossary of

Terms

End of Phrack File

The reader is forgiven if he or she was entirely unable to read this do cument John Perry Barlow

had a great deal of fun at its exp ense in Crime and Puzzlement Bureaucratese of surpassing

opacity::: To read the whole thing straight through without entering coma requires either a machine

or a human who has to o much practice thinking like one Anyone who can understand it fully and

uidly had altered his consciousness b eyone the ability to ever again read Blake Whitman or

Tolstoy::: the do cument contains little of interest to anyone who is not a student of advanced

organizational sclerosis

With the Do cument itself to hand however exactly as it was published in its sixpage edited

form in Phrack the reader may b e able to verify a few statements of fact ab out its nature First

there is no software no computer co de in the Do cument It is not computerprogramming language

like FORTRAN or C it is English all the sentences have nouns and verbs and punctuation It

do es not explain how to break into the E system It do es not suggest ways to destroy or damage

the E system

There are no access co des in the Do cument There are no computer passwords It do es not

explain how to steal long distance service It do es not explain how to break in to telco switching

stations There is nothing in it ab out using a p ersonal computer or a mo dem for any purp ose at

all go o d or bad

Close study will reveal that this do cument is not ab out machinery The E Do cument is ab out

administration It describ es how one creates and administers certain units of telco bureaucracy

Sp ecial Service Centers and Ma jor Account Centers SSCMAC It describ es how these centers

should distribute resp onsibility for the E service to other units of telco bureaucracy in a chain

of command a formal hierarchy It describ es who answers customer complaints who screens calls

who rep orts equipment failures who answers those rep orts who handles maintenance who chairs

sub committees who gives orders who follows orders who tells whom what to do The Do cument

is not a roadmap to computers The Do cument is a roadmap to p eople

The Hacker Crackdown

As an aid to breaking into computer systems the Do cument is useless As an aid to harassing

and deceiving telco p eople however the Do cument might prove handy esp ecially with its Glossary

which I have not included An intense and protracted study of this Do cument and its Glossary

combined with many other such do cuments might teach one to sp eak like a telco employee And

telco p eople live by sp eech they live by phone communication If you can mimic their language

over the phone you can so cialengineer them If you can con telco p eople you can wreak havo c

among them You can force them to no longer trust one another you can break the telephonic ties

that bind their community you can make them paranoid And p eople will ght harder to defend

their community than they will ght to defend their individual selves

This was the genuine gutlevel threat p osed by Phrack magazine The real struggle was over

the control of telco language the control of telco knowledge It was a struggle to defend the so cial

membrane of dierentiation that forms the walls of the telco communitys ivory tower the

sp ecial jargon that allows telco professionals to recognize one another and to exclude charlatans

thieves and upstarts And the prosecution brought out this fact They rep eatedly made reference

to the threat p osed to telco professionals by hackers using so cial engineering

However Craig Neidorf was not on trial for learning to sp eak like a professional telecommu

nications exp ert Craig Neidorf was on trial for access device fraud and transp ortation of stolen

prop erty He was on trial for stealing a do cument that was purp ortedly highly sensitive and pur

p ortedly worth tens of thousands of dollars

John Nagle read the E Do cument He drew his own conclusions And he presented Zenner

and his defense team with an overowing b ox of similar material drawn mostly from Stanford

Universitys engineering libraries During the trial the defense team Zenner halfadozen other

attorneys Nagle Neidorf and computersecurity exp ert Dorothy Denning all p ored over the E

Do cument linebylin e

On the afterno on of July Zenner b egan to crossexamine a woman named Billie

Williams a service manager for Southern Bell in Atlanta Ms Williams had b een resp onsible

for the E Do cument She was not its author its original author was a Southern Bell sta

manager named Richard Helms However Mr Helms should not b ear the entire blame many telco

sta p eople and maintenance p ersonnel had amended the Do cument It had not b een so much

written by a single author as built by committee out of concreteblo cks of jargon

Ms Williams had b een called as a witness for the prosecution and had gamely tried to explain

the basic technical structure of the E system aided by charts

Now it was Zenners turn He rst established that the proprietary stamp that BellSouth

had used on the E Do cument was stamp ed on every single do cument that BellSouth wrote

thousands of do cuments We do not publish anything other than for our own company Ms

Williams explained Any company do cument of this nature is considered proprietary Nob o dy

was in charge of singling out sp ecial highsecurity publications for sp ecial highsecurity protection

They were all sp ecial no matter how trivial no matter what their sub ject matter the stamp was

put on as so on as any do cument was written and the stamp was never removed

Zenner now asked whether the charts she had b een using to explain the mechanics of E

system were proprietary to o Were they public information these charts all ab out PSAPs

ALIs no des lo cal end switches Could he take the charts out in the street and show them to

anyb o dy without violating some proprietary notion that BellSouth has

Ms Williams showed some confusion but nally agreed that the charts were in fact public

But isnt this what you said was basically what app eared in Phrack

Ms Williams denied this

Chapter The Civil Lib ertarians

Zenner now p ointed out that the E Do cument as published in Phrack was only half the size

of the original E Do cument as Prophet had purloined it Half of it had b een deleted edited

by Neidorf

Ms Williams countered that Most of the information that is in the text le is redundant

Zenner continued to prob e Exactly what bits of knowledge in the Do cument were in fact un

known to the public Lo cations of E computers Phone numb ers for telco p ersonnel Ongoing

maintenance sub committees Hadnt Neidorf removed much of this

Then he p ounced Are you familiar with Bellcore Technical Reference Do cument TRTSY

It was Zenner explained ocially titled E Public Safety Answering Point Interface

Between AESS Switch and Customer Premises Equipment It contained highly detailed and

sp ecic technical information ab out the E System It was published by Bellcore and publicly

available for ab out

He showed the witness a Bellcore catalog which listed thousands of do cuments from Bellcore and

from all the Baby Bells BellSouth included The catalog Zenner p ointed out was free Anyone

with a credit card could call the Bellcore tollfree numb er and simply order any of these

do cuments which would b e shipp ed to any customer without question Including for instance

BellSouth E Service Interfaces to Customer Premises Equipment at a Public Safety Answering

Point

Zenner gave the witness a copy of BellSouth E Service Interfaces which cost as he p ointed

out straight from the catalog Lo ok at it carefully he urged Ms Williams and tell me if

it do esnt contain ab out twice as much detailed information ab out the E system of BellSouth

than app eared anywhere in Phrack

You want me to::: Ms Williams trailed o I dont understand

Take a careful lo ok Zenner p ersisted Take a lo ok at that do cument and tell me when

youre done lo oking at it if indeed it do esnt contain much more detailed information ab out the

E system than app eared in Phrack

Phrack wasnt taken from this Ms Williams said

Excuse me said Zenner

Phrack wasnt taken from this

I cant hear you Zenner said

Phrack was not taken from this do cument I dont understand your question to me

I guess you dont Zenner said

At this p oint the prosecutions case had b een gutshot Ms Williams was distressed Her

confusion was quite genuine Phrack had not b een taken from any publicly available Bellcore

do cument Phrack s E Do cument had b een stolen from her own companys computers from

her own companys text les that her own colleagues had written and revised with much lab or

But the value of the Do cument had b een blown to smithereens It wasnt worth eighty grand

According to Bellcore it was worth thirteen bucks And the lo oming menace that it supp osedly

p osed had b een reduced in instants to a scarecrow Bellcore itself was selling material far more

detailed and dangerous to anyb o dy with a credit card and a phone

Actually Bellcore was not giving this information to just anyb o dy They gave it to anyb o dy

who asked but not many did ask Not many p eople knew that Bellcore had a free catalog and an

numb er John Nagle knew but certainly the average teenage phreak didnt know Tuc a

friend of Neidorf s and sometime Phrack contributor knew and Tuc had b een very helpful to the

defense b ehind the scenes But the Legion of Do om didnt know otherwise they would never

have wasted so much time raiding dumpsters Co ok didnt know Foley didnt know Kluepfel

The Hacker Crackdown

didnt know The right hand of Bellcore knew not what the left hand was doing The right hand

was battering hackers without mercy while the left hand was distributing Bellcores intellectual

prop erty to anyb o dy who was interested in telephone technical trivia apparently a pathetic few

The digital underground was so amateurish and p o orly organized that they had never discovered

this heap of unguarded riches The ivory tower of the telcos was so wrapp edup in the fog of its

own technical obscurity that it had left all the windows op en and ung op en the do ors No one

had even noticed

Zenner sank another nail in the con He pro duced a printed issue of Telephone Engineer

Management a prominent industry journal that comes out twice a month and costs a year

This particular issue of TEM called Up date on featured a galaxy of technical details on

service and a glossary far more extensive than Phrack s

The trial rumbled on somehow through its own momentum Tim Foley testied ab out his

interrogations of Neidorf Neidorf s written admission that he had known the E Do cument was

pilfered was ocially read into the court record

An interesting side issue came up Terminus had once passed Neidorf a piece of UNIX ATT

software a login sequence that had b een cunningly altered so that it could trap passwords The

UNIX software itself was illegally copied ATT prop erty and the alterations Terminus had

made to it had transformed it into a device for facilitating computer breakins Terminus himself

would eventually plead guilty to theft of this piece of software and the Chicago group would send

Terminus to prison for it But it was of dubious relevance in the Neidorf case Neidorf hadnt

written the program He wasnt accused of ever having used it And Neidorf wasnt b eing charged

with software theft or owning a password trapp er

On the next day Zenner to ok the oensive The civil lib ertarians now had their own arcane

untried legal weap onry to launch into action the Electronic Communications Privacy Act of

US Co de Section et seq Section makes it a crime to intentionally access without

authorization a facility in which an electronic communication service is provided it is at heart

an antibugging and antitapping law intended to carry the traditional protections of telephones

into other electronic channels of communication While providing p enalties for amateur sno ops

however Section of the ECPA also lays some formal diculties on the bugging and tapping

activities of p olice

The Secret Service in the p erson of Tim Foley had served Richard Andrews with a federal grand

jury subp o ena in their pursuit of Prophet the E Do cument and the Terminus software ring

But according to the Electronic Communications Privacy Act a provider of remote computing

service was legally entitled to prior notice from the government if a subp o ena was used Richard

Andrews and his basement UNIX no de Jolnet had not received any prior notice Tim Foley

had purp ortedly violated the ECPA and committed an electronic crime Zenner now sought the

judges p ermission to crossexamine Foley on the topic of Foleys own electronic misdeeds

Co ok argued that Richard Andrews Jolnet was a privately owned bulletin b oard and not

within the purview of ECPA Judge Bua granted the motion of the government to prevent cross

examination on that p oint and Zenners oensive zzled This however was the rst direct

assault on the legality of the actions of the Computer Fraud and Abuse Task Force itself the rst

suggestion that they themselves had broken the law and might p erhaps b e called to account

Zenner in any case did not really need the ECPA Instead he grilled Foley on the glaring

contradictions in the supp osed value of the E Do cument He also brought up the embarrassing

fact that the supp osedly redhot E Do cument had b een sitting around for months in Jolnet

with Kluepfels knowledge while Kluepfel had done nothing ab out it

In the afterno on the Prophet was brought in to testify for the prosecution The Prophet it

will b e recalled had also b een indicted in the case as partner in a fraud scheme with Neidorf

In Atlanta the Prophet had already pled guilty to one charge of conspiracy one charge of wire

Chapter The Civil Lib ertarians

fraud and one charge of interstate transp ortation of stolen prop erty The wire fraud charge and

the stolen prop erty charge were b oth directly based on the E Do cument

The twentyyearold Prophet proved a sorry customer answering questions p olitely but in a

barely audible mumble his voice trailing o at the ends of sentences He was constantly urged to

sp eak up

Co ok examining Prophet forced him to admit that he had once had a drug problem abusing

amphetamines marijuana co caine and LSD This may have established to the jury that hackers

are or can b e seedy lowlife characters but it may have damaged Prophets credibili ty somewhat

Zenner later suggested that drugs might have damaged Prophets memory The interesting fact

also surfaced that Prophet had never physically met Craig Neidorf He didnt even know Neidorf s

last name at least not until the trial

Prophet conrmed the basic facts of his hacker career He was a memb er of the Legion of Do om

He had abused co des he had broken into switching stations and rerouted calls he had hung out on

pirate bulletin b oards He had raided the BellSouth AIMSX computer copied the E Do cument

stored it on Jolnet mailed it to Neidorf He and Neidorf had edited it and Neidorf had known

where it came from

Zenner however had Prophet conrm that Neidorf was not a memb er of the Legion of Do om

and had not urged Prophet to break into BellSouth computers Neidorf had never urged Prophet

to defraud anyone or to steal anything Prophet also admitted that he had never known Neidorf

to break in to any computer Prophet said that no one in the Legion of Do om considered Craig

Neidorf a hacker at all Neidorf was not a UNIX maven and simply lacked the necessary skill

and ability to break into computers Neidorf just published a magazine

On Friday July the case against Neidorf collapsed Co ok moved to dismiss the

indictment citing information currently available to us that was not available to us at the inception

of the trial Judge Bua praised the prosecution for this action which he describ ed as very

resp onsible then dismissed a juror and declared a mistrial

Neidorf was a free man His defense however had cost himself and his family dearly Months

of his life had b een consumed in anguish he had seen his closest friends shun him as a federal

criminal He owed his lawyers over a hundred thousand dollars despite a generous payment to the

defense by Mitch Kap or

Neidorf was not found inno cent The trial was simply dropp ed Nevertheless on Septemb er

Judge Bua granted Neidorf s motion for the expungement and sealing of his indictment

record The United States Secret Service was ordered to delete and destroy all ngerprints pho

tographs and other records of arrest or pro cessing relating to Neidorf s indictment including their

pap er do cuments and their computer records

Neidorf went back to scho ol blazingly determined to b ecome a lawyer Having seen the justice

system at work Neidorf lost much of his enthusiasm for merely technical p ower At this writing

Craig Neidorf is working in Washington as a salaried researcher for the American Civil Lib erties

Union

The outcome of the Neidorf trial changed the EFF from voicesinthewilderness to the media

darlings of the new frontier

Legally sp eaking the Neidorf case was not a sweeping triumph for anyone concerned No

constitutional principles had b een established The issues of freedom of the press for electronic

publishers remained in legal limb o There were public misconceptions ab out the case Many p eople

thought Neidorf had b een found inno cent and relieved of all his legal debts by Kap or The truth

The Hacker Crackdown

was that the government had simply dropp ed the case and Neidorf s family had gone deeply into

ho ck to supp ort him

But the Neidorf case did provide a single devastating public soundbite The feds said it was

worth eighty grand and it was only worth thirteen bucks

This is the Neidorf cases single most memorable element No serious rep ort of the case missed

this particular element Even cops could not read this without a wince and a shake of the head It

left the public credibility of the crackdown agents in tatters

The crackdown in fact continued however Those two charges against Prophet which had

b een based on the E Do cument were quietly forgotten at his sentencing even though Prophet

had already pled guilty to them Georgia federal prosecutors strongly argued for jail time for the

Atlanta Three insisting on the need to send a message to the community the message that

hackers around the country need to hear

There was a great deal in their sentencing memorandum ab out the awful things that various

other hackers had done though the Atlanta Three themselves had not in fact actually committed

these crimes There was also much sp eculation ab out the awful things that the Atlanta Three

might have done and were capable of doing even though they had not in fact actually done

them The prosecutions argument carried the day The Atlanta Three were sent to prison Urvile

and Leftist b oth got months each while Prophet a second oender got months

The Atlanta Three were also assessed staggering nes as restitution each BellSouth

claimed that the defendants had stolen approximately worth of proprietary computer

access information sp ecically worth of computer passwords and connect addresses

BellSouths astonishing claim of the extreme value of its own computer passwords and addresses

was accepted at face value by the Georgia court Furthermore as if to emphasize its theoretical

nature this enormous sum was not divvied up among the Atlanta Three but each of them had to

pay all of it

A striking asp ect of the sentence was that the Atlanta Three were sp ecically forbidden to

use computers except for work or under sup ervision Depriving hackers of home computers and

mo dems makes some sense if one considers hackers as computer addicts but EFF ling an

amicus brief in the case protested that this punishment was unconstitutional it deprived the

Atlanta Three of their rights of free asso ciation and free expression through electronic media

Terminus the ultimate hacker was nally sent to prison for a year through the dogged eorts

of the Chicago Task Force His crime to which he pled guilty was the transfer of the UNIX

password trapp er which was ocially valued by ATT at a gure which aroused intense

skepticism among those familiar with UNIX loginc programs

The jailing of Terminus and the Atlanta Legionnaires of Do om however did not cause the EFF

any sense of embarrassment or defeat On the contrary the civil lib ertarians were rapidly gathering

strength

An early and p otent supp orter was Senator Patrick Leahy Demo crat from Vermont who had

b een a Senate sp onsor of the Electronic Communications Privacy Act Even b efore the Neidorf

trial Leahy had sp oken out in defense of hackerp ower and freedom of the keyb oard We cannot

unduly inhibit the inquisitive yearold who if left to exp eriment to day may tomorrow develop

the telecommunications or computer technology to lead the United States into the st century

He represents our future and our b est hop e to remain a technologically comp etitive nation

It was a handsome statement rendered p erhaps rather more eective by the fact that the crack

down raiders did not have any Senators sp eaking out for them On the contrary their highly

secretive actions and tactics all sealed search warrants here and condential ongoing investiga

tions there might have won them a burst of glamorous publicity at rst but were crippling them

in the ongoing propaganda war Gail Thackeray was reduced to unsupp orted bluster Some of

Chapter The Civil Lib ertarians

these p eople who are loudest on the bandwagon may just slink into the background she predicted

in Newsweek when all the facts came out and the cops were vindicated

But all the facts did not come out Those facts that did were not very attering And the cops

were not vindicated And Gail Thackeray lost her job By the end of William Co ok had also

left public employment

had b elonged to the crackdown but by its agents were in severe disarray and the

lib ertarians were on a roll People were o cking to the cause

A particularly interesting ally had b een Mike Go dwin of Austin Texas Go dwin was an indi

vidual almost as dicult to describ e as Barlow he had b een editor of the student newspap er of the

University of Texas and a computer salesman and a programmer and in was back in law

scho ol lo oking for a law degree

Go dwin was also a bulletin b oard maven He was very wellknown in the Austin b oard com

munity under his handle Johnny Mnemonic which he adopted from a cyb erpunk science ction

story by William Gibson Go dwin was an ardent cyb erpunk science ction fan As a fellow Austi

nite of similar age and similar interests I myself had known Go dwin so cially for many years When

William Gibson and myself had b een writing our collab orative SF novel The Dierence Engine

Go dwin had b een our technical advisor in our eort to link our Apple wordpro cessors from Austin

to Vancouver Gibson and I were so pleased by his generous exp ert help that we named a character

in the novel Michael Go dwin in his honor

The handle Mnemonic suited Go dwin very well His erudition and his mastery of trivia were

impressive to the p oint of stup or his ardent curiosity seemed insatiable and his desire to debate and

argue seemed the central drive of his life Go dwin had even started his own Austin debating so ciety

wryly known as the Dull Mens Club In p erson Go dwin could b e overwhelming a ypap er

brained p olymath who could not seem to let any idea go On bulletin b oards however Go dwins

closely reasoned highly grammatical erudite p osts suited the medium well and he b ecame a lo cal

b oard celebrity

Mike Go dwin was the man most resp onsible for the public national exp osure of the Steve Jackson

case The Izenb erg seizure in Austin had received no press coverage at all The March raids on

Mentor Blo o daxe and Steve Jackson Games had received a brief frontpage splash in the front

page of the Austin AmericanStatesman but it was confused and illinformed the warrants were

sealed and the Secret Service wasnt talking Steve Jackson seemed do omed to obscurity Jackson

had not b een arrested he was not charged with any crime he was not on trial He had lost some

computers in an ongoing investigation so what Jackson tried hard to attract attention to the

true extent of his plight but he was drawing a blank no one in a p osition to help him seemed able

to get a mental grip on the issues

Go dwin however was uniquely almost magically qualied to carry Jacksons case to the outside

world Go dwin was a b oard enthusiast a science ction fan a former journalist a computer

salesman a lawyertob e and an Austinite Through a coincidence yet more amazing in his last

year of law scho ol Go dwin had sp ecialized in federal prosecutions and criminal pro cedure Acting

entirely on his own Go dwin made up a press packet which summarized the issues and provided

useful contacts for rep orters Go dwins b ehindthescenes eort which he carried out mostly to

prove a p oint in a lo cal b oard debate broke the story again in the Austin AmericanStatesman

and then in Newsweek

Life was never the same for Mike Go dwin after that As he joined the growing civil lib erties

debate on the Internet it was obvious to all parties involved that here was one guy who in the

midst of complete murk and confusion genuinely understo o d everything he was talking ab out The

disparate elements of Go dwins dilettantish existence suddenly fell together as neatly as the facets of a Rubiks cub e

The Hacker Crackdown

When the time came to hire a fulltime EFF sta attorney Go dwin was the obvious choice

He to ok the Texas bar exam left Austin moved to Cambridge b ecame a fulltime professional

computer civil lib ertarian and was so on touring the nation on b ehalf of EFF delivering well

received addresses on the issues to crowds as disparate as academics industrialists science ction

fans and federal cops

Michael Go dwin is currently the chief legal counsel of the Electronic Frontier Foundation in

Cambridge Massachusetts

Another early and inuential participant in the controversy was Dorothy Denning Dr Denning

was unique among investigators of the computer underground in that she did not enter the debate

with any set of p oliticized motives She was a professional cryptographer and computer security

exp ert whose primary interest in hackers was scholarly She had a BA and MA in mathematics

and a PhD in computer science from Purdue She had worked for SRI International the California

thinktank that was also the home of computer security maven Donn Parker and had authored

an inuential text called Cryptography and Data Security In Dr Denning was working for

Digital Equipment Corp oration in their Systems Reseach Center Her husband Peter Denning was

also a computer security exp ert working for NASAs Research Institute for Advanced Computer

Science He had edited the wellreceived Computers Under Attack Intruders Worms and Viruses

Dr Denning to ok it up on herself to contact the digital underground more or less with an

anthrop ological interest There she discovered that these computerintruding hackers who had

b een characterized as unethical irresp onsible and a serious danger to so ciety did in fact have their

own sub culture and their own rules They were not particularly wellconsidered rules but they

were in fact rules Basically they didnt take money and they didnt break anything

Her dispassionate rep orts on her researches did a great deal to inuence seriousminded computer

professionals the sort of p eople who merely rolled their eyes at the cyb erspace rhapso dies of a

John Perry Barlow

For young hackers of the digital underground meeting Dorothy Denning was a genuinely mind

b oggling exp erience Here was this neatly coied conservatively dressed dainty little p ersonage

who reminded most hackers of their moms or their aunts And yet she was an IBM systems

programmer with profound exp ertise in computer architectures and highsecurity information ow

who had p ersonal friends in the FBI and the National Security Agency

Dorothy Denning was a shining example of the American mathematical intelligentsia a genuinely

brilliant p erson from the central ranks of the computerscience elite And here she was gently

questioning twentyyearold hairyeyed phonephreaks over the deep er ethical implications of their

b ehavior

Confronted by this genuinely nice lady most hackers sat up very straight and did their b est to

keep the anarchyle stu down to a faint whi of brimstone Nevertheless the hackers were in fact

prepared to seriously discuss serious issues with Dorothy Denning They were willing to sp eak the

unsp eakable and defend the indefensible to blurt out their convictions that information cannot b e

owned that the databases of governments and large corp orations were a threat to the rights and

privacy of individuals

Dennings articles made it clear to many that hacking was not simple vandalism by some

evil clique of psychotics Hacking was not an ab errant menace that could b e charmed away

by ignoring it or swept out of existence by jailing a few ringleaders Instead hacking was

symptomatic of a growing primal struggle over knowledge and p ower in the age of information

Denning p ointed out that the attitude of hackers were at least partially shared by forward

lo oking management theorists in the business community p eople like Peter Drucker and Tom

Chapter The Civil Lib ertarians

Peters Peter Drucker in his b o ok The New Realities had stated that control of information by

the government is no longer p ossible Indeed information is now transnational Like money it has

no fatherland

And management maven Tom Peters had chided large corp orations for uptight proprietary

attitudes in his b estseller Thriving on Chaos Information hoarding esp ecially by p olitically mo

tivated p owerseeking stas had b een commonplace throughout American industry service and

manufacturing alike It will b e an imp ossible millstone aroung the neck of tomorrows organiza

tions

Dorothy Denning had shattered the so cial membrane of the digital underground She attended

the Neidorf trial where she was prepared to testify for the defense as an exp ert witness She was

a b ehindthescen es organizer of two of the most imp ortant national meetings of the computer

civil lib ertarians Though not a zealot of any description she brought disparate elements of the

electronic community into a surprising and fruitful collusion

Dorothy Denning is currently the Chair of the Computer Science Department at Georgetown

University in Washington DC

There were many stellar gures in the civil lib ertarian community Theres no question however

that its single most inuential gure was Mitchell D Kap or Other p eople might have formal titles

or governmental p ositions have more exp erience with crime or with the law or with the arcanities

of computer security or constitutional theory But by Kap or had transcended any such narrow

role Kap or had b ecome Mitch

Mitch had b ecome the central civilli b e rtarian adho crat Mitch had sto o d up rst he had

sp oken out loudly directly vigorously and angrily he had put his own reputation and his very

considerable p ersonal fortune on the line By mid Kap or was the b estknown advo cate of

his cause and was known p ersonally by almost every single human b eing in America with any

direct inuence on the question of civil lib erties in cyb erspace Mitch had built bridges crossed

voids changed paradigms forged metaphors made phonecalls and swapp ed business cards to

such sp ectacular eect that it had b ecome imp ossible for anyone to take any action in the hacker

question without wondering what Mitch might think and say and tell his friends

The EFF had simply networked the situation into an entirely new status quo And in fact

this had b een EFFs delib erate strategy from the b eginning Both Barlow and Kap or loathed

bureaucracies and had delib erately chosen to work almost entirely through the electronic spiderweb

of valuable p ersonal contacts

After a year of EFF b oth Barlow and Kap or had every reason to lo ok back with satisfaction

EFF had established its own Internet no de eorg with a wellsto cked electronic archive of

do cuments on electronic civil rights privacy issues and academic freedom EFF was also publishing

EFFector a quarterly printed journal as well as EFFector Online an electronic newsletter with

over subscrib ers And EFF was thriving on the Well

EFF had a national headquarters in Cambridge and a fulltime sta It had b ecome a memb er

ship organization and was attracting grass ro ots supp ort It had also attracted the supp ort of some

thirty civilrights lawyers ready and eager to do pro b ono work in defense of the Constitution in

Cyb erspace

EFF had lobbied successfully in Washington and in Massachusetts to change state and federal

legislation on computer networking Kap or in particular had b ecome a veteran exp ert witness

and had joined the Computer Science and Telecommunications Board of the National Academy of

Science and Engineering

The Hacker Crackdown

EFF had sp onsored meetings such as Computers Freedom and Privacy and the CPSR

Roundtable It had carried out a press oensive that in the words of EFFector has aected

the climate of opinion ab out computer networking and b egun to reverse the slide into hacker

hysteria that was b eginning to grip the nation

It had help ed Craig Neidorf avoid prison

And last but certainly not least the Electronic Frontier Foundation had led a federal lawsuit

in the name of Steve Jackson Steve Jackson Games Inc and three users of the Illuminati bulletin

b oard system The defendants were and are the United States Secret Service William Co ok Tim

Foley Barbara Golden and Henry Kleupfel

The case which is in pretrial pro cedures in an Austin federal court as of this writing is a civil

action for damages to redress alleged violations of the First and Fourth Amendments to the United

States Constitution as well as the Privacy Protection Act of USC aa et seq and

the Electronic Communications Privacy Act USC et seq and et seq

EFF had established that it had credibility It had also established that it had teeth

In the fall of I travelled to Massachusetts to sp eak p ersonally with Mitch Kap or It was

my nal interview for this b o ok

The city of Boston has always b een one of the ma jor intellectual centers of the American republic

It is a very old city by American standards a place of skyscrap ers overshadowing seventeenth

century graveyards where the hightech startup companies of Route coexist with the hand

wrought preindustrial grace of Old Ironsides the USS Constitution

The Battle of Bunker Hill one of the rst and bitterest armed clashes of the American Revolu

tion was fought in Bostons environs To day there is a monumental spire on Bunker Hill visible

throughout much of the city The willingness of the republican revolutionaries to take up arms and

re on their oppressors has left a cultural legacy that two full centuries have not eaced Bunker

Hill is still a p otent center of American p olitical symb olism and the Spirit of is still a p otent

image for those who seek to mold public opinion

Of course not everyone who wraps himself in the ag is necessarily a patriot When I visited

the spire in Septemb er it b ore a huge badlyerased spraycan gratto around its b ottom

reading BRITS OUT IRA PROVOS Inside this hallowed edice was a glasscased diorama

of thousands of tiny toy soldiers reb els and redcoats ghting and dying over the green hill the

riverside marshes the reb el trenchworks Plaques indicated the movement of tro ops the shiftings

of strategy The Bunker Hill Monument is o ccupied at its very center by the toy soldiers of a

military wargame simulation

The Boston metroplex is a place of great universities prominent among the Massachusetts

Institute of Technology where the term computer hacker was rst coined The Hacker Crackdown

of might b e interpreted as a p olitical struggle among American cities traditional strongholds

of longhair intellectual lib eralism such as Boston San Francisco and Austin versus the bare

knuckle industrial pragmatism of Chicago and Pho enix with Atlanta and New York wrapp ed in

internal struggle

The headquarters of the Electronic Frontier Foundation is on Second Street in Cambridge

a Bostonian suburb north of the River Charles Second Street has weedy sidewalks of dented

sagging brick and elderly cracked asphalt large streetsigns warn NO PARKING DURING DE

CLARED SNOW EMERGENCY This is an old area of mo dest manufacturing industries the

EFF is catecorner from the Greene Rubb er Company EFFs building is two stories of red brick

its large wo o den windows feature gracefully arched tops and stone sills

Chapter The Civil Lib ertarians

The glass window b eside the Second Street entrance b ears three sheets of neatly laserprinted

pap er tap ed against the glass They read ON Technology EFF KEI

ON Technology is Kap ors software company which currently sp ecializes in groupware for

the Apple Macintosh computer Groupware is intended to promote ecient so cial interaction

among oceworkers linked by computers ON Technologys most successful software pro ducts to

date are Meeting Maker and Instant Up date

KEI is Kap or Enterprises Inc Kap ors p ersonal holding company the commercial entity that

formally controls his extensive investments in other hardware and software corp orations

EFF is a p olitical action group of a sp ecial sort

Inside someones bike has b een chained to the handrails of a mo dest ight of stairs A wall of

mo dish glass brick separates this antero om from the oces Beyond the brick theres an alarm

system mounted on the wall a sleek complex little numb er that resembles a cross b etween a

thermostat and a CD player Piled against the wall are b ox after b ox of a recent sp ecial issue of

Scientic American How to Work Play and Thrive in Cyb erspace with extensive coverage of

electronic networking techniques and p olitical issues including an article by Kap or himself These

b oxes are addressed to Gerard Van der Leun EFFs Director of Communications who will shortly

mail those magazines to every memb er of the EFF

The joint headquarters of EFF KEI and ON Technology which Kap or currently rents is a

mo destly bustling place Its very much the same physical size as Steve Jacksons gaming company

Its certainly a far cry from the gigantic gray steelsided railway shipping barn on the Monsignor

OBrien Highway that is owned by Lotus Development Corp oration

Lotus is of course the software giant that Mitchell Kap or founded in the late s The software

program Kap or coauthored Lotus is still that companys most protable pro duct Lotus

also b ears a singular distinction in the digital underground its probably the most pirated

piece of application software in world history

Kap or greets me cordially in his own oce down a hall Kap or whose name is pronounced

KAYp or is in his early forties married and the father of two He has a round face high forehead

straight nose a slightly tousled mop of black hair p epp ered with gray His large brown eyes are

wideset reective one might almost say soulful He disdains ties and commonly wears Hawaiian

shirts and tropical prints not so much garish as simply cheerful and just that little bit anomalous

There is just the whi of hacker brimstone ab out Mitch Kap or He may not have the hard

riding hellforleather guitarstrumming charisma of his Wyoming colleague John Perry Barlow

but theres something ab out the guy that still stops one short He has the air of the Eastern city

dude in the b owler hat the dreamy Longfellowquoting p oker shark who only happ ens to know

the exact mathematical o dds against drawing to an inside straight Even among his computer

community colleagues who are hardly known for mental sluggishness Kap or strikes one forcefully

as a very intelligent man He sp eaks rapidly with vigorous gestures his Boston accent sometimes

slipping to the sharp nasal tang of his youth in Long Island

Kap or whose Kap or Family Foundation do es much of his philanthropic work is a strong sup

p orter of Bostons Computer Museum Kap ors interest in the history of his industry has brought

him some remarkable curios such as the byte just outside his oce do or This byte eight dig

ital bits has b een salvaged from the wreck of an electronic computer of the pretransistor age Its

a standing gunmetal rack ab out the size of a small toasteroven with eight slots of handsoldered

breadb oarding featuring thumbsized vacuum tub es If it fell o a table it could easily break your

fo ot but it was stateoftheart computation in the s It would take exactly of these

primordial toasters to hold the rst part of this b o ok

Theres also a coiling multicolored scaly dragon that some inspired technopunk artist has

cobbled up entirely out of transistors capacitors and brightly plasticcoated wiring

The Hacker Crackdown

Inside the oce Kap or excuses himself briey to do a little mousewhizzing housekeeping on

his p ersonal Macintosh I Ifx If its giant screen were an op en window an agile p erson could climb

through it without much trouble at all Theres a coeecup at Kap ors elb ow a memento of

his recent trip to Eastern Europ e which has a blackandwhite stencilled photo and the legend

CAPITALIST FOOLS TOUR Its Kap or Barlow and two California venturecapitalist luminaries

of their acquaintance four windblown grinning Baby Bo omer dudes in leather jackets b o ots

denim travel bags standing on airp ort tarmac somewhere b ehind the formerly Iron Curtain They

lo ok as if theyre having the absolute time of their lives

Kap or is in a reminiscent mo o d We talk a bit ab out his youth high scho ol days as a math

nerd Saturdays attending Columbia Universitys highscho ol science honors program where he

had his rst exp erience programming computers IBM s in and I was very inter

ested says Kap or and then I went o to college and got distracted by drugs sex and ro ck and

roll like anyb o dy with half a brain would have then After college he was a progressivero ck DJ

in Hartford Connecticut for a couple of years

I ask him if he ever misses his ro ck and roll days if he ever wished he could go back to radio

work

He shakes his head atly I stopp ed thinking ab out going back to b e a DJ the day after

Altamont

Kap or moved to Boston in and got a job programming mainframes in COBOL He hated

it He quit and b ecame a teacher of transcendental meditation It was Kap ors long irtation with

Eastern mysticism that gave the world Lotus

In Kap or went to Switzerland where the Transcendental Meditation movement had rented

a gigantic Victorian hotel in StMoritz It was an allmale group a hundred and twenty of them

determined up on Enlightenment or Bust Kap or had given the transcendant his b est shot He

was b ecoming disenchanted by the nuttiness in the organization They were teaching p eople

to levitate he says staring at the o or His voice drops an o ctave b ecomes at They dont

levitate

Kap or chose Bust He went back to the States and acquired a degree in counselling psychology

He worked a while in a hospital couldnt stand that either My rep was he says a very bright

kid with a lot of p otential who hasnt found himself Almost thirty Sort of lost

Kap or was unemployed when he b ought his rst p ersonal computer an Apple I I He sold his

stereo to raise cash and drove to New Hampshire to avoid the sales tax

The day after I purchased it Kap or tells me I was hanging out in a computer store and I saw

another guy a man in his forties welldressed guy and eavesdropp ed on his conversation with the

salesman He didnt know anything ab out computers Id had a year programming And I could

program in BASIC Id taught myself So I went up to him and I actually sold myself to him as a

consultant He pauses I dont know where I got the nerve to do this It was uncharacteristic I

just said I think I can help you Ive b een listening this is what you need to do and I think I can

do it for you And he to ok me on He was my rst client I b ecame a computer consultant the

rst day after I b ought the Apple I I

Kap or had found his true vo cation He attracted more clients for his consultant service and

started an Apple users group

A friend of Kap ors Eric Rosenfeld a graduate student at MIT had a problem He was doing

a thesis on an arcane form of nancial statistics but could not wedge himself into the crowded

queue for time on MITs mainframes One might note at this p oint that if Mr Rosenfeld had

dishonestly broken into the MIT mainframes Kap or himself might have never invented Lotus

and the PC business might have b een set back for years Eric Rosenfeld did have an Apple I I

however and he thought it might b e p ossible to scale the problem down Kap or as favor wrote a program for him in BASIC that did the job

Chapter The Civil Lib ertarians

It then o ccurred to the two of them out of the blue that it might b e p ossible to sell this

program They marketed it themselves in plastic baggies for ab out a hundred bucks a p op mail

order This was a total cottage industry by a marginal consultant Kap or says proudly Thats

how I got started honest to Go d

Rosenfeld who later b ecame a very prominent gure on Wall Street urged Kap or to go to MITs

business scho ol for an MBA Kap or did seven months there but never got his MBA He picked up

some useful to ols mainly a rm grasp of the principles of accounting and in his own words

learned to talk MBA Then he dropp ed out and went to Silicon Valley

The inventors of VisiCalc the Apple computers premier business program had shown an inter

est in Mitch Kap or Kap or worked diligently for them for six months got tired of California and

went back to Boston where they had b etter b o okstores The VisiCalc group had made the critical

error of bringing in professional management That drove them into the ground Kap or says

Yeah you dont hear a lot ab out VisiCalc these days I muse

Kap or lo oks surprised Well Lotus::: we b ought it

Oh You b ought it

Yeah

Sort of like the Bell System buying Western Union

Kap or grins Yep Yep Yeah exactly

Mitch Kap or was not in full command of the destiny of himself or his industry The hottest

software commo dities of the early s were computer games the Atari seemed destined to enter

every teenage home in America Kap or got into business software simply b ecause he didnt have

any particular feeling for computer games But he was supremely fast on his feet op en to new

ideas and inclined to trust his instincts And his instincts were go o d He chose go o d p eople to deal

with gifted programmer Jonathan Sachs the coauthor of Lotus Financial wizard Eric

Rosenfeld canny Wall Street analyst and venture capitalist Ben Rosen Kap or was the founder

and CEO of Lotus one of the most sp ectacularly successful business ventures of the later twentieth

century

He is now an extremely wealthy man I ask him if he actually knows how much money he has

Yeah he says Within a p ercent or two

How much do es he actually have then

He shakes his head A lot A lot Not something I talk ab out Issues of money and class are

things that cut pretty close to the b one

I dont pry Its b eside the p oint One might presume imp olitely that Kap or has at least forty

million thats what he got the year he left Lotus People who ought to know claim Kap or has

ab out a hundred and fty million give or take a market swing in his sto ck holdings If Kap or

had stuck with Lotus as his colleague friend and rival Bill Gates has stuck with his own software

startup Microsoft then Kap or would likely have much the same fortune Gates has somewhere

in the neighb orho o d of three billion give or take a few hundred million Mitch Kap or has all the

money he wants Money has lost whatever charm it ever held for him probably not much in the

rst place When Lotus b ecame to o uptight to o bureaucratic to o far from the true sources of his

own satisfaction Kap or walked He simply severed all connections with the company and went out

the do or It stunned everyone except those who knew him b est

Kap or has not had to strain his resources to wreak a thorough transformation in cyb erspace

p olitics In its rst year EFFs budget was ab out a quarter of a million dollars Kap or is running

EFF out of his p o cket change

The Hacker Crackdown

Kap or takes pains to tell me that he do es not consider himself a civil lib ertarian p er se He has

sp ent quite some time with trueblue civil lib ertarians lately and theres a p oliticalcorrectness to

them that bugs him They seem to him to sp end entirely to o much time in legal nitpicking and

not enough vigorously exercising civil rights in the everyday real world

Kap or is an entrepreneur Like all hackers he prefers his involvements direct p ersonal and

handson The fact that EFF has a no de on the Internet is a great thing Were a publisher

Were a distributor of information Among the items the eorg Internet no de carries is back

issues of Phrack They had an internal debate ab out that in EFF and nally decided to take the

plunge They might carry other digital underground publications but if they do he says well

certainly carry Donn Parker and anything Gail Thackeray wants to put up Well turn it into a

public library that has the whole sp ectrum of use Evolve in the direction of p eople making up

their own minds He grins Well try to lab el all the editorials

Kap or is determined to tackle the technicalities of the Internet in the service of the public

interest The problem with b eing a no de on the Net to day is that youve got to have a captive

technical sp ecialist We have Chris Davis around for the care and feeding of the balky b east We

couldnt do it ourselves

He pauses So one direction in which technology has to evolve is much more standardized units

that a nontechnical p erson can feel comfortable with Its the same shift as from minicomputers

to PCs I can see a future in which any p erson can have a No de on the Net Any p erson can b e a

publisher Its b etter than the media we now have Its p ossible Were working actively

Kap or is in his element now uent thoroughly in command in his material You go tell a

hardware Internet hacker that everyone should have a no de on the Net he says and the rst

thing theyre going to say is IP do esnt scale IP is the interface proto col for the Internet

As it currently exists the IP software is simply not capable of indenite expansion it will run out

of usable addresses it will saturate The answer Kap or says is evolve the proto col Get the

smart p eople together and gure out what to do Do we add ID Do we add new proto col Dont

just say we cant do it

Getting smart p eople together to gure out what to do is a skill at which Kap or clearly excels

I counter that p eople on the Internet rather enjoy their elite technical status and dont seem

particularly anxious to demo cratize the Net

Kap or agrees with a show of scorn I tell them that this is the snobb ery of the p eople on

the Mayower lo oking down their noses at the p eople who came over on the second b oat Just

b ecause they got here a year or ve years or ten years b efore everyb o dy else that do esnt give

them ownership of cyb erspace By what right

I remark that the telcos are an electronic network to o and they seem to guard their sp ecialized

knowledge pretty closely

Kap or rip ostes that the telcos and the Internet are entirely dierent animals The Internet is

an op en system everything is published everything gets argued ab out basically by anyb o dy who

can get in Mostly its exclusive and elitist just b ecause its so dicult Lets make it easier to

use

On the other hand he allows with a swift change of emphasis the socalled elitists do have a

p oint as well Before p eople start coming in who are new who want to make suggestions and

criticize the Net as all screwed up::: They should at least take the time to understand the culture

on its own terms It has its own history show some resp ect for it Im a conservative to that

extent

The Internet is Kap ors paradigm for the future of telecommunications The Internet is decen

tralized nonhierarchical almost anarchic There are no b osses no chain of command no secret

data If each no de ob eys the general interface standards theres simply no need for any central

network authority

Chapter The Civil Lib ertarians

Wouldnt that sp ell the do om of ATT as an institution I ask

That prosp ect do esnt faze Kap or for a moment Their big advantage that they have now

is that they have all of the wiring But two things are happ ening Anyone with rightofway is

putting down b er Southern Pacic Railroad p eople like that theres enormous dark b er

laid in Dark Fib er is b eroptic cable whose enormous capacity so exceeds the demands of

current usage that much of the b er still has no lightsignals on it its still dark awaiting future

use

The other thing thats happ ening is the lo callo op stu is going to go Everyone

from Bellcore to the cable TV companies to ATT wants to put in these things called p ersonal

communication systems So you could have lo cal comp etition you could have multiplicity of

p eople a bunch of neighb orho o ds sticking stu up on p oles And a bunch of other p eople laying

in dark b er So what happ ens to the telephone companies Theres enormous pressure on them

from b oth sides

The more I lo ok at this the more I b elieve that in a p ostindustrial digital world the idea of

regulated monop olies is bad People will lo ok back on it and say that in the th and th centuries

the idea of public utilities was an okay compromise You needed one set of wires in the ground It

was to o economically inecient otherwise And that meant one entity running it But now with

pieces b eing wireless the connections are going to b e via highlevel interfaces not via wires I

mean ultimately there are going to b e wires but the wires are just a commo dity Fib er wireless

You no longer need a utility

Water utilities Gas utilities

Of course we still need those he agrees But when what youre moving is information instead

of physical substances then you can play by a dierent set of rules Were evolving those rules

now Hop efully you can have a much more decentralized system and one in which theres more

comp etition in the marketplace

The role of government will b e to make sure that nob o dy cheats The proverbial level playing

eld A p olicy that prevents monop olization It should result in b etter service lower prices more

choices and lo cal emp owerment He smiles Im very big on lo cal emp owerment

Kap or is a man with a vision Its a very novel vision which he and his allies are working

out in considerable detail and with great energy Dark cynical morbid cyb erpunk that I am I

cannot avoid considering some of the darker implications of decentralized nonhierarchical lo cally

emp owered networking

I remark that some pundits have suggested that electronic networking faxes phones small

scale photo copiers played a strong role in dissolving the p ower of centralized communism and

causing the collapse of the Warsaw Pact

So cialism is totally discredited says Kap or fresh back from the Eastern Blo c The idea that

faxes did it all by themselves is rather wishful thinking

Has it o ccurred to him that electronic networking might corro de Americas industrial and p o

litical infrastructure to the p oint where the whole thing b ecomes untenable unworkable and the

old order just collapses headlong like in Eastern Europ e

No Kap or says atly I think thats extraordinarily unlikely In part b ecause ten or fteen

years ago I had similar hop es ab out p ersonal computers which utterly failed to materialize He

grins wryly then his eyes narrow Im very opp osed to technoutopias Every time I see one I

either run away or try to kill it

It dawns on me then that Mitch Kap or is not trying to make the world safe for demo cracy He

certainly is not trying to make it safe for anarchists or utopians least of all for computer intruders

or electronic ripo artists What he really hop es to do is make the world safe for future Mitch

Kap ors This world of decentralized smallscale no des with instant global access for the b est and

The Hacker Crackdown

brightest would b e a p erfect milieu for the sho estring attic capitalism that made Mitch Kap or

what he is to day

Kap or is a very bright man He has a rare combination of visionary intensity with a strong prac

tical streak The Board of the EFF John Barlow Jerry Berman of the ACLU Stewart Brand John

Gilmore Steve Wozniak and Esther Dyson the doyenne of EastWest computer entrepreneurism

share his gift his vision and his formidable networking talents They are p eople of the s

winnowedout by its turbulence and rewarded with wealth and inuence They are some of the

b est and the brightest that the electronic community has to oer But can they do it in the real

world Or are they only dreaming They are so few And there is so much against them

I leave Kap or and his networking employees struggling cheerfully with the promising intricacies

of their newly installed Macintosh System software The next day is Saturday EFF is closed I

pay a few visits to p oints of interest downtown

One of them is the birthplace of the telephone

Its marked by a bronze plaque in a plinth of blackandwhite sp eckled granite It sits in the

plaza of the John F Kennedy Federal Building the very place where Kap or was once ngerprinted

by the FBI

The plaque has a basrelief picture of Bells original telephone BIRTHPLACE OF THE

TELEPHONE it reads Here on June Alexander Graham Bell and Thomas A Watson

rst transmitted sound over wires

This successful exp eriment was completed in a fth o or garret at what was then Court

Street and marked the b eginning of worldwide telephone service

Court Street is long gone Within sight of Bells plaque across a street is one of the central

oces of NYNEX the lo cal Bell RBOC on Bowdoin Square

I cross the street and circle the telco building slowly hands in my jacket p o ckets Its a bright

windy New England autumn day The central oce is a handsome sera megalith in late Art

Deco eight stories high

Parked outside the back is a p owergeneration truck The generator strikes me as rather anoma

lous Dont they already have their own generators in this eightstory monster Then the suspicion

strikes me that NYNEX must have heard of the Septemb er ATT p oweroutage which crashed

New York City Beltandsusp enders this generator Very telco

Over the glass do ors of the front entrance is a handsome bronze basrelief of Art Deco vines

sunowers and birds entwining the Bell logo and the legend NEW ENGLAND TELEPHONE

AND TELEGRAPH COMPANY an entity which no longer ocially exists

The do ors are lo cked securely I p eer through the shadowed glass Inside is an ocial p oster

reading

New England Telephone a NYNEX Company

ATTENTION

All p ersons while on New England Telephone Company premises are required to visibly wear

their identication cards CCP Section Page

Visitors vendors contractors and all others are required to visibly wear a daily pass

Thank you Kevin C Stanton Building Security Co ordinator

Outside around the corner is a pulldown ribb ed metal security do or a lo cked delivery entrance

Some passing stranger has grattitagged this do or with a single word in red spraypainted cursive

Fury

Chapter The Civil Lib ertarians

My b o ok on the Hacker Crackdown is almost over now I have delib erately saved the b est for

last

In February I attended the CPSR Public Policy Roundtable in Washington DC CPSR

Computer Professionals for So cial Resp onsibili ty was a sister organization of EFF or p erhaps its

aunt b eing older and p erhaps somewhat wiser in the ways of the world of p olitics

Computer Professionals for So cial Resp onsibili ty b egan in in Palo Alto as an informal

discussion group of Californian computer scientists and technicians united by nothing more than

an electronic mailing list This typical hightech adho cracy received the dignity of its own acronym

in and was formally incorp orated in

CPSR lobbied government and public alike with an educational outreach eort sternly warning

against any fo olish and unthinking trust in complex computer systems CPSR insisted that mere

computers should never b e considered a magic panacea for humanitys so cial ethical or p olitical

problems CPSR memb ers were esp ecially troubled ab out the stability safety and dep endabili ty

of military computer systems and very esp ecially troubled by those systems controlling nuclear

arsenals CPSR was b estknown for its p ersistent and wellpublici zed attacks on the scientic

credibility of the Strategic Defense Initiative Star Wars

In CPSR was the nations veteran cyb erp olitical activist group with over two thousand

memb ers in twentyone lo cal chapters across the US It was esp ecially active in Boston Silicon

Valley and Washington DC where its Washington oce sp onsored the Public Policy Roundtable

The Roundtable however had b een funded by EFF which had passed CPSR an extensive grant

for op erations This was the rst largescale ocial meeting of what was to b ecome the electronic

civil lib ertarian community

Sixty p eople attended myself included in this instance not so much as a journalist as a cy

b erpunk author Many of the luminaries of the eld to ok part Kap or and Go dwin as a matter of

course Richard Civille and Marc Rotenb erg of CPSR Jerry Berman of the ACLU John Quarter

man author of The Matrix Steven Levy author of Hackers George Perry and Sandy Weiss of

Pro digy Services there to network ab out the civillib erties troubles their young commercial net

work was exp eriencing Dr Dorothy Denning Cli Figallo manager of the Well Steve Jackson

was there having nally found his ideal target audience and so was Craig Neidorf Knight Light

ning himself with his attorney Sheldon Zenner Katie Hafner science journalist and coauthor

of Cyb erpunk Outlaws and Hackers on the Computer Frontier Dave Farb er ARPAnet pioneer

and fabled Internet guru Janlori Goldman of the ACLUs Pro ject on Privacy and Technology

John Nagle of Auto desk and the Well Don Goldb erg of the House Judiciary Committee Tom

Guidob oni the defense attorney in the Internet Worm case Lance Homan computerscience

professor at The George Washington University Eli Noam of Columbia And a host of others no

less distinguished

Senator Patrick Leahy delivered the keynote address expressing his determination to keep ahead

of the curve on the issue of electronic free sp eech The address was wellreceived and the sense of

excitement was palpable Every panel discussion was interesting some were entirely comp elling

People networked with an almost frantic interest

I myself had a most interesting and cordial lunch discussion with No el and Jeanne Gayler

Admiral Gayler b eing a former director of the National Security Agency As this was the rst known

encounter b etween an actual nokidding cyb erpunk and a chief executive of Americas largest and

b estnanced electronic espionage apparat there was naturally a bit of eyebrowraising on b oth sides

The Hacker Crackdown

Unfortunately our discussion was otherecord In fact all the discussions at the CPSR were

ocially otherecord the idea b eing to do some serious networking in an atmosphere of complete

frankness rather than to stage a media circus

In any case CPSR Roundtable though interesting and intensely valuable was as nothing com

pared to the truly mindb oggling event that transpired a mere month later

Computers Freedom and Privacy Four hundred p eople from every conceivable corner of

Americas electronic community As a science ction writer I have b een to some weird gigs in

my day but this thing is truly b eyond the pale Even Cyb erthon Point Foundations Wo o d

sto ck of Cyb erspace where Bay Area psychedelia collided headlong with the emergent world of

computerized virtual reality was like a Kiwanis Club gig compared to this astonishing do

The electronic community had reached an ap ogee Almost every principal in this b o ok is in

attendance Civil Lib ertarians Computer Cops The Digital Underground Even a few discreet

telco p eople Colorco ded dots for lap el tags are distributed Free Expression issues Law Enforce

ment Computer Security Privacy Journalists Lawyers Educators Librarians Programmers

Stylish punkblack dots for the hackers and phone phreaks Almost everyone here seems to wear

eight or nine dots to have six or seven professional hats

It is a community Something like Lebanon p erhaps but a digital nation People who had feuded

all year in the national press p eople who entertained the deep est suspicions of one anothers motives

and ethics are now in each others laps Computers Freedom and Privacy had every reason in the

world to turn ugly and yet except for small irruptions of puzzling nonsense from the conventions

token lunatic a surprising b onhomie reigned CFP was like a weddingparty in which two lovers

unstable bride and charlatan gro om tie the knot in a clearly disastrous matrimony

It is clear to b oth families even to neighb ors and random guests that this is not a workable

relationship and yet the young couples desp erate attraction can bro ok no further delay They

simply cannot help themselves Cro ckery will y shrieks from their newly wed home will wake the

city blo ck divorce waits in the wings like a vulture over the Kalahari and yet this is a wedding

and there is going to b e a child from it Tragedies end in death comedies in marriage The Hacker

Crackdown is ending in marriage And there will b e a child

From the b eginning anomalies reign John Perry Barlow cyb erspace ranger is here His color

photo in The New York Times Magazine Barlow scowling in a grim Wyoming snowscap e with

long black coat dark hat a Macintosh SE propp ed on a fencep ost and an awesome frontier rie

tucked under one arm will b e the single most striking visual image of the Hacker Crackdown And

he is CFPs guest of honor along with Gail Thackeray of the FCIC What on earth do they exp ect

these dual guests to do with each other Waltz

Barlow delivers the rst address Uncharacteristically he is hoarse the sheer volume of road

work has worn him down He sp eaks briey congenially in a plea for conciliation and takes his

leave to a storm of applause

Then Gail Thackeray takes the stage Shes visibly nervous Shes b een on the Well a lot lately

Reading those Barlow p osts Following Barlow is a challenge to anyone In honor of the famous

lyricist for the Grateful Dead she announces reedily she is going to read a p o em A p o em she

has comp osed herself

Its an awful p o em doggerel in the rollicking meter of Rob ert W Services The Cremation of

Sam McGee but it is in fact a p o em Its the Ballad of the Electronic Frontier A p o em ab out

the Hacker Crackdown and the sheer unlikeliho o d of CFP Its full of injokes The score or so cops

in the audience who are sitting together in a nervous claque are absolutely crackingup Gails

p o em is the funniest go ddamn thing theyve ever heard The hackers and civillib s who had this

Chapter The Civil Lib ertarians

woman gured for Ilsa SheWolf of the SS are staring with their jaws hanging lo osely Never in the

wildest reaches of their imagination had they gured Gail Thackeray was capable of such a totally

othewall move You can see them punching their mental CONTROLRESET buttons Jesus

This womans a hacker weirdo Shes just like us Go d this changes everything

Al Bayse computer technician for the FBI had b een the only cop at the CPSR Roundtable

dragged there with his arm b ent by Dorothy Denning He was guarded and tightlipp ed at CPSR

Roundtable a lion thrown to the Christians

At CFP backed by a claque of cops Bayse suddenly waxes elo quent and even droll describing

the FBIs NCIC a gigantic digital catalog of criminal records as if he has suddenly b ecome

some weird hybrid of George Orwell and George Gob el Tentatively he makes an arcane joke ab out

statistical analysis At least a third of the crowd laughs aloud

They didnt laugh at that at my last sp eech Bayse observes He had b een addressing cops

straight cops not computer p eople It had b een a worthy meeting useful one supp oses but

nothing like this There has never b een anything like this Without any pro dding without any

preparation p eople in the audience simply b egin to ask questions Longhairs freaky p eople math

ematicians Bayse is answering p olitely frankly fully like a man walking on air The ballro oms

atmosphere crackles with surreality A female lawyer b ehind me breaks into a sweat and a hot waft

of surprisingly p otent and musky p erfume ows o her pulsep oints

People are giddy with laughter People are interested fascinated their eyes so wide and dark

that they seem eroticized Unlikely daisychains form in the halls around the bar on the escalators

cops with hackers civil rights with FBI Secret Service with phone phreaks

Gail Thackeray is at her crisp est in a white wo ol sweater with a tiny Secret Service logo I

found Phib er Optik at the payphones and when he saw my sweater he turned into a pillar of salt

she chortles

Phib er discusses his case at much length with his arresting ocer Don Delaney of the New

York State Police After an hours chat the two of them lo ok ready to b egin singing Auld Lang

Syne Phib er nally nds the courage to get his worst complaint o his chest It isnt so much the

arrest It was the charge Pirating service o numb ers Im a programmer Phib er insists This

lame charge is going to hurt my reputation It would have b een co ol to b e busted for something

happ ening like Section computer intrusion Mayb e some kind of crime thats scarcely b een

invented yet Not lousy phone fraud Pho o ey

Delaney seems regretful He had a mountain of p ossible criminal charges against Phib er Optik

The kids gonna plead guilty anyway Hes a rst timer they always plead Coulda charged the

kid with most anything and gotten the same result in the end Delaney seems genuinely sorry not

to have gratied Phib er in this harmless fashion To o late now Phib ers pled already All water

under the bridge Whaddya gonna do

Delaneys got a go o d grasp on the hacker mentality He held a press conference after he busted

a bunch of Masters of Deception kids Some journo had asked him Would you describ e these

p eople as geniuses Delaneys deadpan answer p erfect No I would describ e these p eople as

defendants Delaney busts a kid for hacking co des with rep eated random dialling Tells the press

that NYNEX can track this stu in no time at nowadays and a kid has to b e stupid to do

something so easy to catch Dead on again hackers dont mind b eing thought of as Genghis Khan

by the straights but if theres anything that really gets em where they live its b eing called dumb

Wont b e as much fun for Phib er next time around As a second oender hes gonna see prison

Hackers break the law Theyre not geniuses either Theyre gonna b e defendants And yet

Delaney muses over a drink in the hotel bar he has found it imp ossible to treat them as common

criminals Delaney knows criminals These kids by comparison are clueless there is just no

cro ok vib e o of them they dont smell right theyre just not bad

The Hacker Crackdown

Delaney has seen a lot of action He did Vietnam Hes b een shot at he has shot p eople Hes

a homicide cop from New York He has the app earance of a man who has not only seen the shit

hit the fan but has seen it splattered across whole city blo cks and left to ferment for years This

guy has b een around

He listens to Steve Jackson tell his story The dreamy game strategist has b een dealt a bad hand

He has played it for all he is worth Under his nerdish SFfan exterior is a core of iron Friends

of his say Steve Jackson b elieves in the rules b elieves in fair play He will never compromise his

principles never give up Steve Delaney says to Steve Jackson they had some balls who ever

busted you Youre all right Jackson stunned falls silent and actually blushes with pleasure

Neidorf has grown up a lot in the past year The kid is a quick study you gotta give him that

Dressed by his mom the fashion manager for a national clothing chain Missouri college techiefrat

Craig Neidorf outdapp ers everyone at this gig but the toniest East Coast lawyers The iron jaws

of prison clanged shut without him and now law scho ol b eckons for Neidorf He lo oks like a larval

Congressman

Not a hacker our Mr Neidorf Hes not interested in computer science Why should he b e

Hes not interested in writing C co de the rest of his life and b esides hes seen where the chips

fall To the world of computer science he and Phrack were just a curiosity But to the world of

law::: The kid has learned where the b o dies are buried He carries his noteb o ok of press clippings

wherever he go es

Phib er Optik makes fun of Neidorf for a Midwestern geek for b elieving that Acid Phreak

do es acid and listens to acid ro ck Hell no Acids never done acid Acids into acid house music

Jesus The very idea of doing LSD Our parents did LSD ya clown

Thackeray suddenly turns up on Craig Neidorf the full lighthouse glare of her attention and

b egins a determined halfhour attempt to win the b oy over The Joan of Arc of Computer Crime

is giving career advice to Knight Lightning Your exp erience would b e very valuable a real

asset she tells him with unmistakeable sixtythousandwatt sincerity Neidorf is fascinated He

listens with unfeigned attention Hes no dding and saying yes maam Yes Craig you to o can

forget all ab out money and enter the glamorous and horribly underpaid world of PROSECUTING

COMPUTER CRIME You can put your former friends in prison o o ops:::

You cannot go on dueling at mo dems length indenitely You cannot b eat one another senseless

with rolledup pressclippin gs So oner or later you have to come directly to grips And yet the very

act of assembling here has changed the entire situation drastically John Quarterman author of

The Matrix explains the Internet at his symp osium It is the largest news network in the world it

is growing by leaps and b ounds and yet you cannot measure Internet b ecause you cannot stop it

in place It cannot stop b ecause there is no one anywhere in the world with the authority to stop

Internet It changes yes it grows it emb eds itself across the p ostindustrial p ostmo dern world

and it generates community wherever it touches and it is doing this all by itself

Phib er is dierent A very n de siecle kid Phib er Optik Barlow says he lo oks like an Edwardian

dandy He do es rather Shaven neck the sides of his skull cropp ed hiphop close unruly tangle of

black hair on top that lo oks p omaded he stays up till four am and misses all the sessions then

hangs out in payphone b o oths with his acoustic coupler gutsily CRACKING SYSTEMS RIGHT

IN THE MIDST OF THE HEAVIEST LAW ENFORCEMENT DUDES IN THE US or at least

pretending to::: Unlike Frank Drake Drake who wrote Dorothy Denning out of nowhere and

asked for an interview for his cheap o cyb erpunk fanzine and then started grilling her on her

ethics She was squirmin to o::: Drake scarecrowtall with his oppy blond mohawk rotting

tennis sho es and black leather jacket lettered ILLUMINATI in red gives o an unmistakeable air

of the b ohemian literatus Drake is the kind of guy who reads British industrial design magazines

and appreciates William Gibson b ecause the quality of the prose is so tasty Drake could never

touch a phone or a keyb oard again and hed still have the nosering and the blurry photo copied

fanzines and the sampled industrial music Hes a radical punk with a desktoppublishing rig and

Chapter The Civil Lib ertarians

an Internet address Standing next to Drake the diminutive Phib er lo oks like hes b een physically

coagulated out of phonelines Born to phreak

Dorothy Denning approaches Phib er suddenly The two of them are ab out the same height and

b o dybuild Dennings blue eyes ash b ehind the round windowframes of her glasses Why did

you say I was quaint she asks Phib er quaintly

Its a p erfect description but Phib er is nonplussed::: Well I uh you know:::

I also think youre quaint Dorothy I say novelist to the rescue the journo gift of gab:::

She is neat and dapp er and yet theres an arcane quality to her something like a Pilgrim Maiden

b ehind leaded glass if she were six inches high Dorothy Denning would lo ok great inside a

cabinet::: The Cryptographeress::: The Cryptographrix::: whatever::: Weirdly Peter Denning

lo oks just like his wife you could pick this gentleman out of a thousand guys as the soulmate of

Dorothy Denning Wearing tailored slacks a sp otless fuzzy varsity sweater and a neatly knotted

academicians tie::: This neb oned exquisitely p olite utterly civilized and hyp erintelligent couple

seem to have emerged from some cleaner and ner parallel universe where humanity exists to do

the Brain Teasers column in Scientic American Why do es this Nice Lady hang out with these

unsavory characters

Because the time has come for it thats why Because shes the b est there is at what she do es

Donn Parker is here the Great Bald Eagle of Computer Crime::: With his bald dome great

height and enormous Lincolnli ke hands the great visionary pioneer of the eld plows through the

lesser mortals like an icebreaker::: His eyes are xed on the future with the rigidity of a bronze

statue::: Eventually he tells his audience all business crime will b e computer crime b ecause

businesses will do everything through computers Computer crime as a category will vanish

In the meantime passing fads will ourish and fail and evap orate::: Parkers commanding

resonant voice is sphinxlike everything is viewed from some eldritch valley of deep historical

abstraction::: Yes theyve come and theyve gone these passing aps in the world of digital

computation::: The radiofrequency emanation scandal::: KGB and MI and CIA do it every day

its easy but nob o dy else ever has::: The salamislice fraud mostly mythical::: Crimoids he

calls them::: Computer viruses are the current crimoid champ a lot less dangerous than most

p eople let on but the novelty is fading and theres a crimoid vacuum at the moment the press is

visibly hungering for something more outrageous::: The Great Man shares with us a few sp ecula

tions on the coming crimoids::: Desktop Forgery Wow::: Computers stolen just for the sake of the

information within them datanapping Happ ened in Britain a while ago could b e the coming

thing::: Phantom no des in the Internet

Parker handles his overhead pro jector sheets with an ecclesiastical air::: He wears a grey double

breasted suit a light blue shirt and a very quiet tie of understated maro on and blue paisley:::

Aphorisms emerge from him with slow leaden emphasis::: There is no such thing as an adequately

secure computer when one faces a suciently p owerful adversary::: Deterrence is the most so cially

useful asp ect of security::: People are the primary weakness in all information systems::: The

entire baseline of computer security must b e shifted upward::: Dont ever violate your security by

publicly describing your security measures:::

People in the audience are b eginning to squirm and yet there is something ab out the elemental

purity of this guys philosophy that comp els uneasy resp ect::: Parker sounds like the only sane guy

left in the lifeb oat sometimes The guy who can prove rigorously from deep moral principles that

Harvey there the one with the broken leg and the checkered past is the one who has to b e err:::

that is Mr Harvey is b est placed to make the necessary sacrice for the security and indeed the

very survival of the rest of this lifeb oats crew::: Computer security Parker informs us mournfully

is a nasty topic and we wish we didnt have to have it::: The security exp ert armed with metho d

and logic must think imagine everything that the adversary might do b efore the adversary

might actually do it It is as if the criminals dark brain were an extensive subprogram within the

The Hacker Crackdown

shining cranium of Donn Parker He is a Holmes whose Moriarty do es not quite yet exist and so

must b e p erfectly simulated

CFP is a stellar gathering with the giddiness of a wedding It is a happy time a happy ending

they know their world is changing forever tonight and theyre proud to have b een there to see it

happ en to talk to think to help

And yet as night falls a certain elegiac quality manifests itself as the crowd gathers b eneath

the chandeliers with their wineglasses and dessert plates Something is ending here gone forever

and it takes a while to pinp oint it It is the End of the Amateurs

Afterword The Hacker Crackdown Three Years Later

Afterword The Hacker Crackdown Three Years Later

Three years in cyb erspace is like thirty years anyplace real It feels as if a generation has passed

since I wrote this b o ok In terms of the generations of computing machinery involved thats pretty

much the case

The basic shap e of cyb erspace has changed drastically since A new US Administration is

in p ower whose p ersonnel are if anything only to o aware of the nature and p otential of electronic

networks Its now clear to all players concerned that the status quo is deadandgone in American

media and telecommunications and almost any territory on the electronic frontier is up for grabs

Interactive multimedia cablephone alliances the Information Sup erhighway b ertothecurb

laptops and palmtops the explosive growth of cellular and the Internet the earth trembles visibly

The year was not a pleasant one for ATT By however ATT had successfully

devoured the computer company NCR in an unfriendly takeover nally giving the p oleclimb ers

a ma jor piece of the digital action ATT managed to rid itself of ownership of the troublesome

UNIX op erating system selling it to Novell a netware company which was itself preparing for

a savage market dustup with op eratingsystem titan Microsoft Furthermore ATT acquired

McCaw Cellular in a gigantic merger giving ATT a p otential wireless whiphand over its former

progeny the RBOCs The RBOCs themselves were now ATTs clearest p otential rivals as the

Chinese rewalls b etween regulated monop oly and frenzied digital entrepreneurism b egan to melt

and collapse headlong

ATT mo cked by industry analysts in was reaping awestruck praise by commentators

in ATT had managed to avoid any more ma jor software crashes in its switching stations

ATTs newfound reputation as the nimble giant was all the sweeter since ATTs traditional

rival giant in the world of multinational computing IBM was almost prostrate by IBMs

vision of the commercial computernetwork of the future Pro digy had managed to sp end

million without a whole heck of a lot to show for it while ATT by contrast was b oldly sp eculating

on the p ossibilities of p ersonal communicators and hedging its b ets with investments in handwritten

interfaces In ATT had lo oked bad but in ATT lo oked like the future

At least ATTs advertising lo oked like the future Similar public attention was riveted

on the massive billion megamerger b etween RBOC Bell Atlantic and cableTV giant Tele

Communications Inc Nynex was buying into cable company Viacom International BellSouth was

buying sto ck in Prime Management Southwestern Bell acquiring a cable company in Washington

DC and so forth By stark contrast the Internet a noncommercial entity which ocially did not

even exist had no advertising budget at all And yet almost b elow the level of governmental and

corp orate awareness the Internet was stealthily devouring everything in its path growing at a rate

that deed comprehension Kids who might have b een eager computerintruders a mere ve years

earlier were now surng the Internet where their natural urge to explore led them into cyb erspace

landscap es of such mindb oggling vastness that the very idea of hacking passwords seemed rather a

waste of time

By there had not b een a solid kno ck em down panicstriking teenagehacker computer

intrusion scandal in many long months There had of course b een some striking and wellpubli ciz ed

acts of illici t computer access but they had b een committed by adult whitecollar industry insiders

in clear pursuit of p ersonal or commercial advantage The kids by contrast all seemed to b e on

IRC Internet Relay Chat

Or p erhaps frolicking out in the endless glassro ots network of p ersonal bulletin b oard systems

In there were an estimated b oards in America the p opulation of b oards had fully

doubled since Op eration Sundevil in The hobby was transmuting tfully into a genuine

industry The b oard community were no longer obscure hobbyists many were still hobbyists and

proud of it but b oard sysops and advanced b oard users had b ecome a far more cohesive and

p olitically aware community no longer allowing themselves to b e obscure

The Hacker Crackdown

The sp ecter of cyb erspace in the late s of outwitted authorities trembling in fear b efore

teenage hacker whizkids seemed downright antiquated by Law enforcement emphasis had

changed and the favorite electronic villain of was not the vandal child but the victimizer

of children the digital child p ornographer Op eration Longarm a childp ornography computer

raid carried out by the previously littleknown cyb erspace rangers of the US Customs Service was

almost the size of Op eration Sundevil but received very little notice by comparison

The huge and wellorganized Op eration Disconnect an FBI strike against telephone ripo

conartists was actually larger than Sundevil Op eration Disconnect had its brief moment in

the sun of publicity and then vanished utterly It was unfortunate that a law enforcement aair as

apparently wellconducted as Op eration Disconnect which pursued telecom adult career criminals a

hundred times more morally repugnant than teenage hackers should have received so little attention

and fanfare esp ecially compared to the ab ortive Sundevil and the basically disastrous eorts of the

Chicago Computer Fraud and Abuse Task Force But the life of an electronic p oliceman is seldom

easy

If any law enforcement event truly deserved fullscale press coverage while somehow managing to

escap e it it was the amazing saga of New York State Police Senior Investigator Don Delaney Versus

the Orchard Street FingerHackers This story probably represents the real future of professional

telecommunications crime in America The ngerhackers sold and still sell stolen longdistance

phone service to a captive clientele of illegal aliens in New York City This clientele is desp erate to

call home yet as a group illegal aliens have few legal means of obtaining standard phone service

since their very presence in the United States is against the law The ngerhackers of Orchard

Street were very unusual hackers with an astonishing lack of any kind of genuine technological

knowledge And yet these New York callsell thieves showed a streetlevel ingenuity appalling in

its singleminded sense of larceny

There was no dissidenthacker rhetoric ab out freedomofinformation among the ngerhackers

Most of them came out of the co cainedealing fraternity and they retailed stolen calls with the

same streetcrime techniques of lo okouts and bagholders that a crack gang would employ This was

downanddirty urban ethnic organized crime carried out by crime families every day for cash on

the barrelhead in the harsh world of the streets The ngerhackers dominated certain payphones

in certain strikingly unsavory neighb orho o ds They provided a service no one else would give to a

clientele with little to lose

With such a vast supply of electronic crime at hand Don Delaney ro cketed from a background

in homicide to teaching telecom crime at FLETC in less than three years Few can rival Delaneys

handson streetlevel exp erience in phone fraud Anyone in who still b elieves telecommuni

cations crime to b e something rare and arcane should have a few words with Mr Delaney Don

Delaney has also written two ne essays on telecom fraud and computer crime in Joseph Graus

Criminal and Civil Investigations Handb o ok McGraw Hill

Phrack was still publishing in now under the able editorship of Erik Blo o daxe Blo o daxe

made a determined attempt to get law enforcement and corp orate security to pay real money for

their electronic copies of Phrack but as usual these stalwart defenders of intellectual prop erty

preferred to pirate the magazine Blo o daxe has still not gotten back any of his prop erty from the

seizure raids of March Neither has the Mentor who is still the managing editor of Steve

Jackson Games

Nor has Rob ert Izenb erg who has susp ended his court struggle to get his machinery back Mr

Izenb erg has calculated that his of equipment seized in is in worth at

most The missing software also gone out his do or was long ago replaced He might he says

sue for the sake of principle but he feels that the p eople who seized his machinery have already

b een discredited and wont b e doing any more seizures And even if his machinery were returned

and in go o d repair which is doubtful it will b e essentially worthless by Rob ert Izenb erg

no longer works for IBM but has a job programming for a ma jor telecommunications company in Austin

Afterword The Hacker Crackdown Three Years Later

Steve Jackson won his case against the Secret Service on March just over three years

after the federal raid on his enterprise Thanks to the delaying tactics available through the

legal do ctrine of qualied immunity Jackson was tactically forced to drop his suit against the

individuals William Co ok Tim Foley Barbara Golden and Henry Kluepfel Co ok Foley Golden

and Kluepfel did however testify during the trial

The Secret Service fought vigorously in the case battling Jacksons lawyers right down the line

on the mostly previously untried legal turf of the Electronic Communications Privacy Act and the

Privacy Protection Act of The Secret Service denied they were legally or morally resp onsible

for seizing the work of a publisher They claimed that Jacksons gaming b o oks werent real

b o oks anyhow and the Secret Service didnt realize SJG Inc was a publisher when they raided

his oces and the b o oks only vanished by accident b ecause they merely happ ened to b e inside

the computers the agents were appropriating

The Secret Service also denied any wrongdoing in reading and erasing all the supp osedly pri

vate email inside Jacksons seized b oard Illuminati The USSS attorneys claimed the seizure did

not violate the Electronic Communications Privacy Act b ecause they werent actually intercept

ing electronic mail that was moving on a wire but only electronic mail that was quietly sitting

on a disk inside Jacksons computer They also claimed that USSS agents hadnt read any of the

private mail on Illuminati and anyway even supp osing that they had they were allowed to do that

by the subp o ena

The Jackson case b ecame even more p eculiar when the Secret Service attorneys went so far as to

allege that the federal raid against the gaming company had actually improved Jacksons business

thanks to the ensuing nationwide publicity

It was a long and rather involved trial The judge seemed most p erturb ed not by the arcane

matters of electronic law but by the fact that the Secret Service could have avoided almost all

the consequent trouble simply by giving Jackson his computers back in short order The Secret

Service easily could have lo oked at everything in Jacksons computers recorded everything and

given the machinery back and there would have b een no ma jor scandal or federal court suit On

the contrary everyb o dy simply would have had a go o d laugh Unfortunately it app eared that

this idea had never entered the heads of the Chicagobased investigators They seemed to have

concluded unilaterally and without due course of law that the world would b e b etter o if Steve

Jackson didnt have computers Golden and Foley claimed that they had b oth never even heard

of the Privacy Protection Act Co ok had heard of the Act but hed decided on his own that the

Privacy Protection Act had nothing to do with Steve Jackson

The Jackson case was also a very p oliticized trial b oth sides delib erately angling for a long

term legal precedent that would stakeout big claims for their interests in cyb erspace Jackson

and his EFF advisors tried hard to establish that the least email remark of the lonely electronic

pamphleteer deserves the same somb er civilrights protection as that aorded The New York Times

By stark contrast the Secret Services attorneys argued b oldly that the contents of an electronic

bulletin b oard have no more exp ectation of privacy than a heap of p ostcards In the nal analysis

very little was rmly nailed down Formally the legal rulings in the Jackson case apply only in the

federal Western District of Texas It was however established that these were real civillib erties

issues that p owerful p eople were prepared to go to the courthouse over the seizure of bulletin

b oard systems though it still go es on can b e a p erilous act for the seizer The Secret Service owes

Steve Jackson in damages and a thousand dollars each to three of Jacksons angry and

oended b oard users And Steve Jackson rather than owning the singlelin e bulletin b oard system

Illuminati seized in now rejoices in p ossession of a huge privatelyowned Internet no de

iocom with dozens of phonelines on its own T trunk

Jackson has made the entire blowbyblow narrative of his case available electronically for

interested parties And yet the Jackson case may still not b e over a Secret Service app eal seems

likely and the EFF is also gravely dissatised with the ruling on electronic interception

The Hacker Crackdown

The WELL home of the American electronic civil lib ertarian movement added two thousand

more users and dropp ed its aging Sequent computer in favor of a snappy new Sun Sparcstation

Searchandseizure dicussions on the WELL are now taking a decided backseat to the current hot

topic in digital civil lib erties unbreakable publickey encryption for private citizens

The Electronic Frontier Foundation left its mo dest home in Boston to move inside the Washing

ton Beltway of the Clinton Administration Its new executive director ECPA pioneer and longtime

ACLU activist Jerry Berman gained a reputation of a man adept as dining with tigers as the EFF

devoted its attention to networking at the highest levels of the computer and telecommunications

industry EFFs proencryption lobby and antiwiretapping initiative were esp ecially impressive

successfully assembling a herd of highly variegated industry camels under the same EFF tent in

op en and p owerful opp osition to the electronic ambitions of the FBI and the NSA

EFF had transmuted at lightsp eed from an insurrection to an institution EFF CoFounder

Mitch Kap or once again sidestepp ed the bureaucratic consequences of his own success by remaining

in Boston and adapting the role of EFF guru and gray eminence John Perry Barlow for his part

left Wyoming quit the Republican Party and moved to New York City accompanied by his swarm

of cellular phones Mike Go dwin left Boston for Washington as EFFs ocial legal adviser to the

electronically aicted

After the Neidorf trial Dorothy Denning further proved her rm scholastic indep endenceof

mind by sp eaking up b oldly on the usefulness and so cial value of federal wiretapping Many civil

lib ertarians who regarded the practice of wiretapping with deep o ccult horror were crestfallen

to the p oint of comedy when nationally known hacker sympathizer Dorothy Denning sternly

defended p olice and public interests in ocial eavesdropping However no amount of public uproar

seemed to swerve the quaint Dr Denning in the slightest She not only made up her own mind

she made it up in public and then stuck to her guns

In the stalwarts of the Masters of Deception Phib er Optik Acid Phreak and Scorpion

nally fell afoul of the machineries of legal prosecution Acid Phreak and Scorpion were sent to

prison for six months six months of home detention hours of community service and o ddly

a ne for conspiracy to commit computer crime Phib er Optik the computer intruder with

p erhaps the highest public prole in the entire world to ok the longest to plead guilty but facing

the p ossibility of ten years in jail he nally did so He was sentenced to a year and a day in prison

As for the Atlanta wing of the Legion of Do om Prophet Leftist and Urvile::: Urvile now works

for a software company in Atlanta He is still on probation and still repaying his enormous ne In

fteen months he will once again b e allowed to own a p ersonal computer He is still a convicted

federal felon but has not had any legal diculties since leaving prison He has lost contact with

Prophet and Leftist Unfortunately so have I though not through lack of honest eort

Knight Lightning now is a technical writer for the federal government in Washington DC

He has still not b een accepted into law scho ol but having sp ent more than his share of time in

the company of attorneys hes come to think that mayb e an MBA would b e more to the p oint

He still owes his attorneys but the sum is dwindling steadily since he is manfully working

two jobs Knight Lightning customarily wears a suit and tie and carries a valise He has a federal

security clearance

Unindicted Phrack coeditor Taran King is also a technical writer in Washington DC and

recently got married

Terminus did his time got out of prison and currently lives in Silicon Valley where he is running

a fullscale Internet no de netsyscom He programs professionally for a company sp ecializing in

satellite links for the Internet

Carlton Fitzpatrick still teaches at the Federal Law Enforcement Training Center but FLETC

found that the issues involved in sp onsoring and running a bulletin b oard system are rather more complex than they at rst app ear to b e

Afterword The Hacker Crackdown Three Years Later

Gail Thackeray briey considered going into private security but then changed tack and joined

the Maricopa County District Attorneys Oce with a salary She is still vigorously prosecuting

electronic racketeering in Pho enix Arizona

The fourth consecutive Computers Freedom and Privacy Conference will take place in March

in Chicago

As for Bruce Sterling::: well I thankfully abandoned my brief career as a truecrime

journalist and wrote a new science ction novel Heavy Weather and assembled a new collection of

short stories Globalhead I also write nonction regularly for the p opularscience column in The

Magazine of Fantasy and Science Fiction

I like life b etter on the far side of the b oundary b etween fantasy and reality but Ive come to

recognize that reality has an unfortunate way of annexing fantasy for its own purp oses Thats

why Im on the Police Liaison Committee for EFFAustin a lo cal electronic civil lib erties group

eaustinticcom I dont think I will ever get over my exp erience of the Hacker Crackdown and

I exp ect to b e involved in electronic civil lib erties activism for the rest of my life

It wouldnt b e hard to nd material for another b o ok on computer crime and civil lib erties

issues I truly b elieve that I could write another b o ok much like this one every year Cyb erspace

is very big Theres a lot going on out there far more than can b e adequately covered by the

tiny though growing cadre of networkliterate rep orters I do wish I could do more work on this

topic b ecause the various p eople of cyb erspace are an element of our so ciety that denitely requires

sustained study and attention

But theres only one of me and I have a lot on my mind and like most science ction writers I

have a lot more imagination than discipli ne Having done my stint as an electronicfrontier rep orter

my hat is o to those stalwart few who do it every day I may return to this topic some day but I

have no real plans to do so However I didnt have any real plans to write Hacker Crackdown

either Things happ en nowadays There are landslides in cyb erspace Ill just have to try and stay

alert and on my feet

The electronic landscap e changes with astounding sp eed We are living through the fastest

technological transformation in human history I was glad to have a chance to do cument cyb erspace

during one moment in its long mutation a kind of strob eash of the maelstrom This b o ok is

already outofdate though and it will b e quite obsolete in another ve years It seems a pity

However in ab out fty years I think this b o ok might seem quite interesting And in a hundred

years this b o ok should seem mindb ogglingly archaic and bizarre and will probably seem far

weirder to an audience in than it ever seemed to the contemp orary readership

Keeping up in cyb erspace requires a great deal of sustained attention Personally I keep

tabs with the milieu by reading the invaluable electronic magazine Computer underground Di

gest tkjutmvscsoniuedu with the sub ject header SUB CuD and a message that says SUB

CuD your name yourfullinternetaddress I also read Jack Rickards bracingly icono clastic Board

watch Magazine for print news of the BBS and online community And needless to say I read

Wired the rst magazine of the s that actually lo oks and acts like it really b elongs in this

decade There are other ways to learn of course but these three outlets will guide your eorts

very well

When I myself want to publish something electronically which Im doing with increasing fre

quency I generally put it on the gopher at Texas Internet Consulting who are my well Texan

Internet consultants ticcom This b o ok can b e found there I think it is a worthwhile act to let

this work go free

From thence ones bread oats out onto the dark waters of cyb erspace only to return someday

tenfold And of course thoroughly soggy and riddled with an entire amazing ecosystem of bizarre

and gnawingly hungry cyb ermarine lifeforms For this author at least thats all that really counts

The Hacker Crackdown

Thanks for your attention

Bruce Sterling bruceswellsfcaus New Years Day Austin Texas

i

Table of Contents

Preface to the Electronic Release :::::::::::::::::::::

Chronology of the Hacker Crackdown ::::::::::::::::

Intro duction ::::::::::::::::::::::::::::::::::::::::::::

Crashing The System :::::::::::::::::::::::::::::::

The Digital Underground :::::::::::::::::::::::::

Law And Order ::::::::::::::::::::::::::::::::::::

The Civil Lib ertarians :::::::::::::::::::::::::::

Afterword The Hacker Crackdown Three Years Later

::::::::::::::::::::::::::::::::::::::::::::::::::: ::

ii The Hacker Crackdown