Hacker Crackdown Part 10
You’re reading novel Hacker Crackdown Part 10 online at LightNovelFree.com. Please use the follow button to get notification about the latest chapter next time when you visit LightNovelFree.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy!
There are no access codes in the Doc.u.ment. There are no computer pa.s.swords. It does not explain how to steal long distance service. It does not explain how to break in to telco switching stations. There is nothing in it about using a personal computer or a modem for any purpose at all, good or bad.
Close study will reveal that this doc.u.ment is not about machinery. The E911 Doc.u.ment is about ADMINISTRATION. It describes how one creates and administers certain units of telco bureaucracy: Special Service Centers and Major Account Centers (SSC/MAC). It describes how these centers should distribute responsibility for the E911 service, to other units of telco bureaucracy, in a chain of command, a formal hierarchy. It describes who answers customer complaints, who screens calls, who reports equipment failures, who answers those reports, who handles maintenance, who chairs subcommittees, who gives orders, who follows orders, WHO tells WHOM what to do. The Doc.u.ment is not a "roadmap" to computers. The Doc.u.ment is a roadmap to PEOPLE.
As an aid to breaking into computer systems, the Doc.u.ment is USELESS. As an aid to hara.s.sing and deceiving telco people, however, the Doc.u.ment might prove handy (especially with its Glossary, which I have not included). An intense and protracted study of this Doc.u.ment and its Glossary, combined with many other such doc.u.ments, might teach one to speak like a telco employee. And telco people live by SPEECH--they live by phone communication. If you can mimic their language over the phone, you can "social-engineer" them. If you can con telco people, you can wreak havoc among them. You can force them to no longer trust one another; you can break the telephonic ties that bind their community; you can make them paranoid. And people will fight harder to defend their community than they will fight to defend their individual selves.
This was the genuine, gut-level threat posed by PHRACK magazine. The real struggle was over the control of telco language, the control of telco knowledge. It was a struggle to defend the social "membrane of differentiation" that forms the walls of the telco community's ivory tower--the special jargon that allows telco professionals to recognize one another, and to exclude charlatans, thieves, and upstarts. And the prosecution brought out this fact. They repeatedly made reference to the threat posed to telco professionals by hackers using "social engineering."
However, Craig Neidorf was not on trial for learning to speak like a professional telecommunications expert. Craig Neidorf was on trial for access device fraud and transportation of stolen property. He was on trial for stealing a doc.u.ment that was purportedly highly sensitive and purportedly worth tens of thousands of dollars.
John Nagle read the E911 Doc.u.ment. He drew his own conclusions. And he presented Zenner and his defense team with an overflowing box of similar material, drawn mostly from Stanford University's engineering libraries. During the trial, the defense team--Zenner, half-a-dozen other attorneys, Nagle, Neidorf, and computer-security expert Dorothy Denning, all pored over the E911 Doc.u.ment line-by-line.
On the afternoon of July 25, 1990, Zenner began to cross- examine a woman named Billie Williams, a service manager for Southern Bell in Atlanta. Ms. Williams had been responsible for the E911 Doc.u.ment. (She was not its author--its original "author" was a Southern Bell staff manager named Richard Helms. However, Mr. Helms should not bear the entire blame; many telco staff people and maintenance personnel had amended the Doc.u.ment. It had not been so much "written" by a single author, as built by committee out of concrete-blocks of jargon.) Ms. Williams had been called as a witness for the prosecution, and had gamely tried to explain the basic technical structure of the E911 system, aided by charts.
Now it was Zenner's turn. He first established that the "proprietary stamp" that BellSouth had used on the E911 Doc.u.ment was stamped on EVERY SINGLE DOc.u.mENT that BellSouth wrote-- THOUSANDS of doc.u.ments. "We do not publish anything other than for our own company," Ms. Williams explained. "Any company doc.u.ment of this nature is considered proprietary." n.o.body was in charge of singling out special high-security publications for special high-security protection. They were ALL special, no matter how trivial, no matter what their subject matter--the stamp was put on as soon as any doc.u.ment was written, and the stamp was never removed.
Zenner now asked whether the charts she had been using to explain the mechanics of E911 system were "proprietary," too. Were they PUBLIC INFORMATION, these charts, all about PSAPs, ALIs, nodes, local end switches? Could he take the charts out in the street and show them to anybody, "without violating some proprietary notion that BellSouth has?"
Ms. Williams showed some confusion, but finally agreed that the charts were, in fact, public.
"But isn't this what you said was basically what appeared in PHRACK?"
Ms. Williams denied this.
Zenner now pointed out that the E911 Doc.u.ment as published in Phrack was only half the size of the original E911 Doc.u.ment (as Prophet had purloined it). Half of it had been deleted--edited by Neidorf.
Ms. Williams countered that "Most of the information that is in the text file is redundant."
Zenner continued to probe. Exactly what bits of knowledge in the Doc.u.ment were, in fact, unknown to the public? Locations of E911 computers? Phone numbers for telco personnel? Ongoing maintenance subcommittees? Hadn't Neidorf removed much of this?
Then he pounced. "Are you familiar with Bellcore Technical Reference Doc.u.ment TR-TSY-000350?" It was, Zenner explained, officially t.i.tled "E911 Public Safety Answering Point Interface Between 1-1AESS Switch and Customer Premises Equipment." It contained highly detailed and specific technical information about the E911 System. It was published by Bellcore and publicly available for about $20.
He showed the witness a Bellcore catalog which listed thousands of doc.u.ments from Bellcore and from all the Baby Bells, BellSouth included. The catalog, Zenner pointed out, was free. Anyone with a credit card could call the Bellcore toll-free 800 number and simply order any of these doc.u.ments, which would be s.h.i.+pped to any customer without question. Including, for instance, "BellSouth E911 Service Interfaces to Customer Premises Equipment at a Public Safety Answering Point."
Zenner gave the witness a copy of "BellSouth E911 Service Interfaces," which cost, as he pointed out, $13, straight from the catalog. "Look at it carefully," he urged Ms. Williams, "and tell me if it doesn't contain about twice as much detailed information about the E911 system of BellSouth than appeared anywhere in PHRACK."
"You want me to...." Ms. Williams trailed off. "I don't understand."
"Take a careful look," Zenner persisted. "Take a look at that doc.u.ment, and tell me when you're done looking at it if, indeed, it doesn't contain much more detailed information about the E911 system than appeared in PHRACK."
"PHRACK wasn't taken from this," Ms. Williams said.
"Excuse me?" said Zenner.
"PHRACK wasn't taken from this."
"I can't hear you," Zenner said.
"PHRACK was not taken from this doc.u.ment. I don't understand your question to me."
"I guess you don't," Zenner said.
At this point, the prosecution's case had been gutshot. Ms. Williams was distressed. Her confusion was quite genuine. PHRACK had not been taken from any publicly available Bellcore doc.u.ment. PHRACK E911 Doc.u.ment had been stolen from her own company's computers, from her own company's text files, that her own colleagues had written, and revised, with much labor.
But the "value" of the Doc.u.ment had been blown to smithereens. It wasn't worth eighty grand. According to Bellcore it was worth thirteen bucks. And the looming menace that it supposedly posed had been reduced in instants to a scarecrow. Bellcore itself was selling material far more detailed and "dangerous," to anybody with a credit card and a phone.
Actually, Bellcore was not giving this information to just anybody. They gave it to ANYBODY WHO ASKED, but not many did ask. Not many people knew that Bellcore had a free catalog and an 800 number. John Nagle knew, but certainly the average teenage phreak didn't know. "Tuc," a friend of Neidorf's and sometime PHRACK contributor, knew, and Tuc had been very helpful to the defense, behind the scenes. But the Legion of Doom didn't know--otherwise, they would never have wasted so much time raiding dumpsters. Cook didn't know. Foley didn't know. Kluepfel didn't know. The right hand of Bellcore knew not what the left hand was doing. The right hand was battering hackers without mercy, while the left hand was distributing Bellcore's intellectual property to anybody who was interested in telephone technical trivia--apparently, a pathetic few.
The digital underground was so amateurish and poorly organized that they had never discovered this heap of unguarded riches. The ivory tower of the telcos was so wrapped-up in the fog of its own technical obscurity that it had left all the windows open and flung open the doors. No one had even noticed.
Zenner sank another nail in the coffin. He produced a printed issue of TELEPHONE ENGINEER & MANAGEMENT, a prominent industry journal that comes out twice a month and costs $27 a year. This particular issue of _TE&M_, called "Update on 911," featured a galaxy of technical details on 911 service and a glossary far more extensive than PHRACK'S.
The trial rumbled on, somehow, through its own momentum. Tim Foley testified about his interrogations of Neidorf. Neidorf's written admission that he had known the E911 Doc.u.ment was pilfered was officially read into the court record.
An interesting side issue came up: "Terminus" had once pa.s.sed Neidorf a piece of UNIX AT&T software, a log-in sequence, that had been cunningly altered so that it could trap pa.s.swords. The UNIX software itself was illegally copied AT&T property, and the alterations "Terminus" had made to it, had transformed it into a device for facilitating computer break-ins. Terminus himself would eventually plead guilty to theft of this piece of software, and the Chicago group would send Terminus to prison for it. But it was of dubious relevance in the Neidorf case. Neidorf hadn't written the program. He wasn't accused of ever having used it. And Neidorf wasn't being charged with software theft or owning a pa.s.sword trapper.
On the next day, Zenner took the offensive. The civil libertarians now had their own arcane, untried legal weaponry to launch into action--the Electronic Communications Privacy Act of 1986, 18 US Code, Section 2701 et seq. Section 2701 makes it a crime to intentionally access without authorization a facility in which an electronic communication service is provided--it is, at heart, an anti-bugging and anti-tapping law, intended to carry the traditional protections of telephones into other electronic channels of communication. While providing penalties for amateur snoops, however, Section 2703 of the ECPA also lays some formal difficulties on the bugging and tapping activities of police.
The Secret Service, in the person of Tim Foley, had served Richard Andrews with a federal grand jury subpoena, in their pursuit of Prophet, the E911 Doc.u.ment, and the Terminus software ring. But according to the Electronic Communications Privacy Act, a "provider of remote computing service" was legally ent.i.tled to "prior notice" from the government if a subpoena was used. Richard Andrews and his bas.e.m.e.nt UNIX node, Jolnet, had not received any "prior notice." Tim Foley had purportedly violated the ECPA and committed an electronic crime! Zenner now sought the judge's permission to cross-examine Foley on the topic of Foley's own electronic misdeeds.
Cook argued that Richard Andrews' Jolnet was a privately owned bulletin board, and not within the purview of ECPA. Judge Bua granted the motion of the government to prevent cross- examination on that point, and Zenner's offensive fizzled. This, however, was the first direct a.s.sault on the legality of the actions of the Computer Fraud and Abuse Task Force itself--the first suggestion that they themselves had broken the law, and might, perhaps, be called to account.
Zenner, in any case, did not really need the ECPA. Instead, he grilled Foley on the glaring contradictions in the supposed value of the E911 Doc.u.ment. He also brought up the embarra.s.sing fact that the supposedly red-hot E911 Doc.u.ment had been sitting around for months, in Jolnet, with Kluepfel's knowledge, while Kluepfel had done nothing about it.
In the afternoon, the Prophet was brought in to testify for the prosecution. (The Prophet, it will be recalled, had also been indicted in the case as partner in a fraud scheme with Neidorf.) In Atlanta, the Prophet had already pled guilty to one charge of conspiracy, one charge of wire fraud and one charge of interstate transportation of stolen property. The wire fraud charge, and the stolen property charge, were both directly based on the E911 Doc.u.ment.
The twenty-year-old Prophet proved a sorry customer, answering questions politely but in a barely audible mumble, his voice trailing off at the ends of sentences. He was constantly urged to speak up.
Cook, examining Prophet, forced him to admit that he had once had a "drug problem," abusing amphetamines, marijuana, cocaine, and LSD. This may have established to the jury that "hackers" are, or can be, seedy lowlife characters, but it may have damaged Prophet's credibility somewhat. Zenner later suggested that drugs might have damaged Prophet's memory. The interesting fact also surfaced that Prophet had never physically met Craig Neidorf. He didn't even know Neidorf's last name--at least, not until the trial.
Prophet confirmed the basic facts of his hacker career. He was a member of the Legion of Doom. He had abused codes, he had broken into switching stations and re-routed calls, he had hung out on pirate bulletin boards. He had raided the BellSouth AIMSX computer, copied the E911 Doc.u.ment, stored it on Jolnet, mailed it to Neidorf. He and Neidorf had edited it, and Neidorf had known where it came from.
Zenner, however, had Prophet confirm that Neidorf was not a member of the Legion of Doom, and had not urged Prophet to break into BellSouth computers. Neidorf had never urged Prophet to defraud anyone, or to steal anything. Prophet also admitted that he had never known Neidorf to break in to any computer. Prophet said that no one in the Legion of Doom considered Craig Neidorf a "hacker" at all. Neidorf was not a UNIX maven, and simply lacked the necessary skill and ability to break into computers. Neidorf just published a magazine.
On Friday, July 27, 1990, the case against Neidorf collapsed. Cook moved to dismiss the indictment, citing "information currently available to us that was not available to us at the inception of the trial." Judge Bua praised the prosecution for this action, which he described as "very responsible," then dismissed a juror and declared a mistrial.
Neidorf was a free man. His defense, however, had cost himself and his family dearly. Months of his life had been consumed in anguish; he had seen his closest friends shun him as a federal criminal. He owed his lawyers over a hundred thousand dollars, despite a generous payment to the defense by Mitch Kapor.
Neidorf was not found innocent. The trial was simply dropped. Nevertheless, on September 9, 1991, Judge Bua granted Neidorf's motion for the "expungement and sealing" of his indictment record. The United States Secret Service was ordered to delete and destroy all fingerprints, photographs, and other records of arrest or processing relating to Neidorf's indictment, including their paper doc.u.ments and their computer records.
Neidorf went back to school, blazingly determined to become a lawyer. Having seen the justice system at work, Neidorf lost much of his enthusiasm for merely technical power. At this writing, Craig Neidorf is working in Was.h.i.+ngton as a salaried researcher for the American Civil Liberties Union.
The outcome of the Neidorf trial changed the EFF from voices-in-the-wilderness to the media darlings of the new frontier.
Legally speaking, the Neidorf case was not a sweeping triumph for anyone concerned. No const.i.tutional principles had been established. The issues of "freedom of the press" for electronic publishers remained in legal limbo. There were public misconceptions about the case. Many people thought Neidorf had been found innocent and relieved of all his legal debts by Kapor. The truth was that the government had simply dropped the case, and Neidorf's family had gone deeply into hock to support him.
But the Neidorf case did provide a single, devastating, public sound-bite: THE FEDS SAID IT WAS WORTH EIGHTY GRAND, AND IT WAS ONLY WORTH THIRTEEN BUCKS.
This is the Neidorf case's single most memorable element. No serious report of the case missed this particular element. Even cops could not read this without a wince and a shake of the head. It left the public credibility of the crackdown agents in tatters.
The crackdown, in fact, continued, however. Those two charges against Prophet, which had been based on the E911 Doc.u.ment, were quietly forgotten at his sentencing--even though Prophet had already pled guilty to them. Georgia federal prosecutors strongly argued for jail time for the Atlanta Three, insisting on "the need to send a message to the community," "the message that hackers around the country need to hear."
There was a great deal in their sentencing memorandum about the awful things that various other hackers had done (though the Atlanta Three themselves had not, in fact, actually committed these crimes). There was also much speculation about the awful things that the Atlanta Three MIGHT have done and WERE CAPABLE of doing (even though they had not, in fact, actually done them). The prosecution's argument carried the day. The Atlanta Three were sent to prison: Urvile and Leftist both got 14 months each, while Prophet (a second offender) got 21 months.
The Atlanta Three were also a.s.sessed staggering fines as "rest.i.tution": $233,000 each. BellSouth claimed that the defendants had "stolen" "approximately $233,880 worth" of "proprietary computer access information"--specifically, $233,880 worth of computer pa.s.swords and connect addresses. BellSouth's astonis.h.i.+ng claim of the extreme value of its own computer pa.s.swords and addresses was accepted at face value by the Georgia court. Furthermore (as if to emphasize its theoretical nature) this enormous sum was not divvied up among the Atlanta Three, but each of them had to pay all of it.
A striking aspect of the sentence was that the Atlanta Three were specifically forbidden to use computers, except for work or under supervision. Depriving hackers of home computers and modems makes some sense if one considers hackers as "computer addicts," but EFF, filing an amicus brief in the case, protested that this punishment was unconst.i.tutional--it deprived the Atlanta Three of their rights of free a.s.sociation and free expression through electronic media.
Terminus, the "ultimate hacker," was finally sent to prison for a year through the dogged efforts of the Chicago Task Force. His crime, to which he pled guilty, was the transfer of the UNIX pa.s.sword trapper, which was officially valued by AT&T at $77,000, a figure which aroused intense skepticism among those familiar with UNIX "login.c" programs.
The jailing of Terminus and the Atlanta Legionnaires of Doom, however, did not cause the EFF any sense of embarra.s.sment or defeat. On the contrary, the civil libertarians were rapidly gathering strength.
An early and potent supporter was Senator Patrick Leahy, Democrat from Vermont, who had been a Senate sponsor of the Electronic Communications Privacy Act. Even before the Neidorf trial, Leahy had spoken out in defense of hacker-power and freedom of the keyboard: "We cannot unduly inhibit the inquisitive 13-year-old who, if left to experiment today, may tomorrow develop the telecommunications or computer technology to lead the United States into the 21st century. He represents our future and our best hope to remain a technologically compet.i.tive nation."
It was a handsome statement, rendered perhaps rather more effective by the fact that the crackdown raiders DID NOT HAVE any Senators speaking out for THEM. On the contrary, their highly secretive actions and tactics, all "sealed search warrants" here and "confidential ongoing investigations" there, might have won them a burst of glamorous publicity at first, but were crippling them in the on-going propaganda war. Gail Thackeray was reduced to unsupported bl.u.s.ter: "Some of these people who are loudest on the bandwagon may just slink into the background," she predicted in NEWSWEEK--when all the facts came out, and the cops were vindicated.
But all the facts did not come out. Those facts that did, were not very flattering. And the cops were not vindicated. And Gail Thackeray lost her job. By the end of 1991, William Cook had also left public employment.
1990 had belonged to the crackdown, but by '91 its agents were in severe disarray, and the libertarians were on a roll. People were flocking to the cause.
A particularly interesting ally had been Mike G.o.dwin of Austin, Texas. G.o.dwin was an individual almost as difficult to describe as Barlow; he had been editor of the student newspaper of the University of Texas, and a computer salesman, and a programmer, and in 1990 was back in law school, looking for a law degree.
G.o.dwin was also a bulletin board maven. He was very well-known in the Austin board community under his handle "Johnny Mnemonic," which he adopted from a cyberpunk science fiction story by William Gibson. G.o.dwin was an ardent cyberpunk science fiction fan. As a fellow Austinite of similar age and similar interests, I myself had known G.o.dwin socially for many years. When William Gibson and myself had been writing our collaborative SF novel, THE DIFFERENCE ENGINE, G.o.dwin had been our technical advisor in our effort to link our Apple word-processors from Austin to Vancouver. Gibson and I were so pleased by his generous expert help that we named a character in the novel "Michael G.o.dwin" in his honor.
The handle "Mnemonic" suited G.o.dwin very well. His erudition and his mastery of trivia were impressive to the point of stupor; his ardent curiosity seemed insatiable, and his desire to debate and argue seemed the central drive of his life. G.o.dwin had even started his own Austin debating society, wryly known as the "Dull Men's Club." In person, G.o.dwin could be overwhelming; a flypaper-brained polymath who could not seem to let any idea go. On bulletin boards, however, G.o.dwin's closely reasoned, highly grammatical, erudite posts suited the medium well, and he became a local board celebrity.
Mike G.o.dwin was the man most responsible for the public national exposure of the Steve Jackson case. The Izenberg seizure in Austin had received no press coverage at all. The March 1 raids on Mentor, Bloodaxe, and Steve Jackson Games had received a brief front-page splash in the front page of the AUSTIN AMERICAN-STATESMAN, but it was confused and ill-informed: the warrants were sealed, and the Secret Service wasn't talking. Steve Jackson seemed doomed to obscurity. Jackson had not been arrested; he was not charged with any crime; he was not on trial. He had lost some computers in an ongoing investigation--so what? Jackson tried hard to attract attention to the true extent of his plight, but he was drawing a blank; no one in a position to help him seemed able to get a mental grip on the issues.
G.o.dwin, however, was uniquely, almost magically, qualified to carry Jackson's case to the outside world. G.o.dwin was a board enthusiast, a science fiction fan, a former journalist, a computer salesman, a lawyer-to-be, and an Austinite. Through a coincidence yet more amazing, in his last year of law school G.o.dwin had specialized in federal prosecutions and criminal procedure. Acting entirely on his own, G.o.dwin made up a press packet which summarized the issues and provided useful contacts for reporters. G.o.dwin's behind-the-scenes effort (which he carried out mostly to prove a point in a local board debate) broke the story again in the AUSTIN AMERICAN-STATESMAN and then in NEWSWEEK.
Life was never the same for Mike G.o.dwin after that. As he joined the growing civil liberties debate on the Internet, it was obvious to all parties involved that here was one guy who, in the midst of complete murk and confusion, GENUINELY UNDERSTOOD EVERYTHING HE WAS TALKING ABOUT. The disparate elements of G.o.dwin's dilettantish existence suddenly fell together as neatly as the facets of a Rubik's cube.
When the time came to hire a full-time EFF staff attorney, G.o.dwin was the obvious choice. He took the Texas bar exam, left Austin, moved to Cambridge, became a full-time, professional, computer civil libertarian, and was soon touring the nation on behalf of EFF, delivering well-received addresses on the issues to crowds as disparate as academics, industrialists, science fiction fans, and federal cops.
Michael G.o.dwin is currently the chief legal counsel of the Electronic Frontier Foundation in Cambridge, Ma.s.sachusetts.
Another early and influential partic.i.p.ant in the controversy was Dorothy Denning. Dr. Denning was unique among investigators of the computer underground in that she did not enter the debate with any set of politicized motives. She was a professional cryptographer and computer security expert whose primary interest in hackers was SCHOLARLY. She had a B.A. and M.A. in mathematics, and a Ph.D. in computer science from Purdue. She had worked for SRI International, the California think-tank that was also the home of computer-security maven Donn Parker, and had auth.o.r.ed an influential text called CRYPTOGRAPHY AND DATA SECURITY. In 1990, Dr. Denning was working for Digital Equipment Corporation in their Systems Reseach Center. Her husband, Peter Denning, was also a computer security expert, working for NASA's Research Inst.i.tute for Advanced Computer Science. He had edited the well-received COMPUTERS UNDER ATTACK: INTRUDERS, WORMS AND VIRUSES.
Dr. Denning took it upon herself to contact the digital underground, more or less with an anthropological interest. There she discovered that these computer-intruding hackers, who had been characterized as unethical, irresponsible, and a serious danger to society, did in fact have their own subculture and their own rules. They were not particularly well-considered rules, but they were, in fact, rules. Basically, they didn't take money and they didn't break anything.
Her dispa.s.sionate reports on her researches did a great deal to influence serious-minded computer professionals--the sort of people who merely rolled their eyes at the cybers.p.a.ce rhapsodies of a John Perry Barlow.
For young hackers of the digital underground, meeting Dorothy Denning was a genuinely mind-boggling experience. Here was this neatly coiffed, conservatively dressed, dainty little personage, who reminded most hackers of their moms or their aunts. And yet she was an IBM systems programmer with profound expertise in computer architectures and high-security information flow, who had personal friends in the FBI and the National Security Agency.
Dorothy Denning was a s.h.i.+ning example of the American mathematical intelligentsia, a genuinely brilliant person from the central ranks of the computer-science elite. And here she was, gently questioning twenty-year-old hairy-eyed phone-phreaks over the deeper ethical implications of their behavior.
Confronted by this genuinely nice lady, most hackers sat up very straight and did their best to keep the anarchy-file stuff down to a faint whiff of brimstone. Nevertheless, the hackers WERE in fact prepared to seriously discuss serious issues with Dorothy Denning. They were willing to speak the unspeakable and defend the indefensible, to blurt out their convictions that information cannot be owned, that the databases of governments and large corporations were a threat to the rights and privacy of individuals.
Denning's articles made it clear to many that "hacking" was not simple vandalism by some evil clique of psychotics. "Hacking" was not an aberrant menace that could be charmed away by ignoring it, or swept out of existence by jailing a few ringleaders. Instead, "hacking" was symptomatic of a growing, primal struggle over knowledge and power in the age of information.
Denning pointed out that the att.i.tude of hackers were at least partially shared by forward-looking management theorists in the business community: people like Peter Drucker and Tom Peters. Peter Drucker, in his book THE NEW REALITIES, had stated that "control of information by the government is no longer possible. Indeed, information is now transnational. Like money, it has no 'fatherland.'"
And management maven Tom Peters had chided large corporations for uptight, proprietary att.i.tudes in his bestseller, THRIVING ON CHAOS: "Information h.o.a.rding, especially by politically motivated, power-seeking staffs, had been commonplace throughout American industry, service and manufacturing alike. It will be an impossible millstone aroung the neck of tomorrow's organizations."
Dorothy Denning had shattered the social membrane of the digital underground. She attended the Neidorf trial, where she was prepared to testify for the defense as an expert witness. She was a behind-the-scenes organizer of two of the most important national meetings of the computer civil libertarians. Though not a zealot of any description, she brought disparate elements of the electronic community into a surprising and fruitful collusion.
Dorothy Denning is currently the Chair of the Computer Science Department at Georgetown University in Was.h.i.+ngton, DC.
There were many stellar figures in the civil libertarian community. There's no question, however, that its single most influential figure was Mitch.e.l.l D. Kapor. Other people might have formal t.i.tles, or governmental positions, have more experience with crime, or with the law, or with the arcanities of computer security or const.i.tutional theory. But by 1991 Kapor had transcended any such narrow role. Kapor had become "Mitch."
Mitch had become the central civil-libertarian ad-hocrat. Mitch had stood up first, he had spoken out loudly, directly, vigorously and angrily, he had put his own reputation, and his very considerable personal fortune, on the line. By mid-'91 Kapor was the best-known advocate of his cause and was known PERSONALLY by almost every single human being in America with any direct influence on the question of civil liberties in cybers.p.a.ce. Mitch had built bridges, crossed voids, changed paradigms, forged metaphors, made phone-calls and swapped business cards to such spectacular effect that it had become impossible for anyone to take any action in the "hacker question" without wondering what Mitch might think--and say--and tell his friends.
The EFF had simply NETWORKED the situation into an entirely new status quo. And in fact this had been EFF's deliberate strategy from the beginning. Both Barlow and Kapor loathed bureaucracies and had deliberately chosen to work almost entirely through the electronic spiderweb of "valuable personal contacts."
After a year of EFF, both Barlow and Kapor had every reason to look back with satisfaction. EFF had established its own Internet node, "eff.org," with a well-stocked electronic archive of doc.u.ments on electronic civil rights, privacy issues, and academic freedom. EFF was also publis.h.i.+ng EFFector, a quarterly printed journal, as well as EFFector Online, an electronic newsletter with over 1,200 subscribers. And EFF was thriving on the Well.
EFF had a national headquarters in Cambridge and a full- time staff. It had become a members.h.i.+p organization and was attracting gra.s.s-roots support. It had also attracted the support of some thirty civil-rights lawyers, ready and eager to do pro bono work in defense of the Const.i.tution in Cybers.p.a.ce.
EFF had lobbied successfully in Was.h.i.+ngton and in Ma.s.sachusetts to change state and federal legislation on computer networking. Kapor in particular had become a veteran expert witness, and had joined the Computer Science and Telecommunications Board of the National Academy of Science and Engineering.
EFF had sponsored meetings such as "Computers, Freedom and Privacy" and the CPSR Roundtable. It had carried out a press offensive that, in the words of EFFector, "has affected the climate of opinion about computer networking and begun to reverse the slide into 'hacker hysteria' that was beginning to grip the nation."
It had helped Craig Neidorf avoid prison.
And, last but certainly not least, the Electronic Frontier Foundation had filed a federal lawsuit in the name of Steve Jackson, Steve Jackson Games Inc., and three users of the Illuminati bulletin board system. The defendants were, and are, the United States Secret Service, William Cook, Tim Foley, Barbara Golden and Henry Kleupfel.
The case, which is in pre-trial procedures in an Austin federal court as of this writing, is a civil action for damages to redress alleged violations of the First and Fourth Amendments to the United States Const.i.tution, as well as the Privacy Protection Act of 1980 (42 USC 2000aa et seq.), and the Electronic Communications Privacy Act (18 USC 2510 et seq and 2701 et seq).
EFF had established that it had credibility. It had also established that it had teeth.
In the fall of 1991 I travelled to Ma.s.sachusetts to speak personally with Mitch Kapor. It was my final interview for this book.
The city of Boston has always been one of the major intellectual centers of the American republic. It is a very old city by American standards, a place of skysc.r.a.pers overshadowing seventeenth-century graveyards, where the high-tech start-up companies of Route 128 co-exist with the hand-wrought pre- industrial grace of "Old Ironsides," the USS CONSt.i.tUTION.
The Battle of Bunker Hill, one of the first and bitterest armed clashes of the American Revolution, was fought in Boston's environs. Today there is a monumental spire on Bunker Hill, visible throughout much of the city. The willingness of the republican revolutionaries to take up arms and fire on their oppressors has left a cultural legacy that two full centuries have not effaced. Bunker Hill is still a potent center of American political symbolism, and the Spirit of '76 is still a potent image for those who seek to mold public opinion.
Of course, not everyone who wraps himself in the flag is necessarily a patriot. When I visited the spire in September 1991, it bore a huge, badly-erased, spray-can grafitto around its bottom reading "BRITS OUT--IRA PROVOS." Inside this hallowed edifice was a gla.s.s-cased diorama of thousands of tiny toy soldiers, rebels and redcoats, fighting and dying over the green hill, the riverside marshes, the rebel trenchworks. Plaques indicated the movement of troops, the s.h.i.+ftings of strategy. The Bunker Hill Monument is occupied at its very center by the toy soldiers of a military war-game simulation.
The Boston metroplex is a place of great universities, prominent among the Ma.s.sachusetts Inst.i.tute of Technology, where the term "computer hacker" was first coined. The Hacker Crackdown of 1990 might be interpreted as a political struggle among American cities: traditional strongholds of longhair intellectual liberalism, such as Boston, San Francisco, and Austin, versus the bare-knuckle industrial pragmatism of Chicago and Phoenix (with Atlanta and New York wrapped in internal struggle).
The headquarters of the Electronic Frontier Foundation is on 155 Second Street in Cambridge, a Bostonian suburb north of the River Charles. Second Street has weedy sidewalks of dented, sagging brick and elderly cracked asphalt; large street-signs warn "NO PARKING DURING DECLARED SNOW EMERGENCY." This is an old area of modest manufacturing industries; the EFF is catecorner from the Greene Rubber Company. EFF's building is two stories of red brick; its large wooden windows feature gracefully arched tops and stone sills.
The gla.s.s window beside the Second Street entrance bears three sheets of neatly laser-printed paper, taped against the gla.s.s. They read: ON Technology. EFF. KEI.
"ON Technology" is Kapor's software company, which currently specializes in "groupware" for the Apple Macintosh computer. "Groupware" is intended to promote efficient social interaction among office-workers linked by computers. ON Technology's most successful software products to date are "Meeting Maker" and "Instant Update."
"KEI" is Kapor Enterprises Inc., Kapor's personal holding company, the commercial ent.i.ty that formally controls his extensive investments in other hardware and software corporations.
"EFF" is a political action group--of a special sort.
Hacker Crackdown Part 10
You're reading novel Hacker Crackdown Part 10 online at LightNovelFree.com. You can use the follow function to bookmark your favorite novel ( Only for registered users ). If you find any errors ( broken links, can't load photos, etc.. ), Please let us know so we can fix it as soon as possible. And when you start a conversation or debate about a certain topic with other people, please do not offend them just because you don't like their opinions.
Hacker Crackdown Part 10 summary
You're reading Hacker Crackdown Part 10. This novel has been translated by Updating. Author: Bruce Sterling already has 526 views.
It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.
LightNovelFree.com is a most smartest website for reading novel online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to LightNovelFree.com
- Related chapter:
- Hacker Crackdown Part 9
- Hacker Crackdown Part 11