| ==Phrack Inc.== |
|
|
| Volume Three, Issue 30, File #8 of 12 |
|
|
| <<===========================================================>> |
| << >> |
| << Consensual Realities In Cyberspace >> |
| << >> |
| << by Paul Saffo >> |
| << Personal Computing Magazine >> |
| << >> |
| << Copyright 1989 by the Association for Computing Machinery >> |
| << >> |
| <<===========================================================>> |
|
|
| More often than we realize, reality conspires to imitate art. In the case of |
| the computer virus reality, the art is "cyberpunk," a strangely compelling |
| genre of science fiction that has gained a cult following among hackers |
| operating on both sides of the law. Books with titles like "True Names," |
| "Shockwave Rider," "Neuromancer," "Hard-wired," "Wetware," and "Mona Lisa |
| Overdrive," are shaping the realities of many would-be viral adepts. Anyone |
| trying to make sense of the social culture surrounding viruses should add the |
| books to their reading list as well. |
|
|
| Cyberpunk got its name only a few years ago, but the genre can be traced back |
| to publication of John Brunner's "Shockwave Rider" in 1975. Inspired by Alvin |
| Toffler's 1970 best-seller "Future Shock," Brunner paints a distopian world of |
| the early 21st Century in which Toffler's most pessimistic visions have come to |
| pass. Crime, pollution and poverty are rampant in overpopulated urban |
| arcologies. An inconclusive nuclear exchange at the turn of the century has |
| turned the arms race into a brain race. The novel's hero, Nickie Haflinger, is |
| rescued from a poor and parentless childhood and enrolled in a top secret |
| government think tank charged with training geniuses to work for a |
| military-industrial Big Brother locked in a struggle for global political |
| dominance. |
|
|
| It is also a world certain to fulfill the wildest fantasies of a 1970s phone |
| "phreak." A massive computerized data-net blankets North America, an |
| electronic super highway leading to every computer and every last bit of data |
| on every citizen and corporation in the country. Privacy is a thing of the |
| past, and one's power and status is determined by his or her level of identity |
| code. Haflinger turns out to be the ultimate phone phreak: he discovers the |
| immorality of his governmental employers and escapes into society, relying on |
| virtuoso computer skills (and a stolen transcendental access code) to rewrite |
| his identity at will. After six years on the run and on the verge of a |
| breakdown from input overload, he discovers a lost band of academic |
| techno-libertarians who shelter him in their ecologically sound California |
| commune and... well, you can guess the rest. |
|
|
| Brunner's book became a best-seller and remains in print. It inspired a whole |
| generation of hackers including, apparently, Robert Morris, Jr. of Cornell |
| virus fame. The Los Angeles Times reported that Morris' mother identified |
| "Shockwave Rider" as "her teen-age son's primer on computer viruses and one of |
| the most tattered books in young Morris' room." Though "Shockwave Rider" does |
| not use the term "virus," Haflinger's key skill was the ability to write |
| "tapeworms" -- autonomous programs capable of infiltrating systems and |
| surviving eradication attempts by reassembling themselves from viral bits of |
| code hidden about in larger programs. Parallels between Morris' reality and |
| Brunner's art is not lost on fans of cyberpunk: one junior high student I |
| spoke with has both a dog-eared copy of the book, and a picture of Morris taped |
| next to his computer. For him, Morris is at once something of a folk hero and |
| a role model. |
|
|
| In "Shockwave Rider," computer/human interactions occurred much as they do |
| today: One logged in and relied on some combination of keyboard and screen to |
| interact with the machines. In contrast, second generation cyberpunk offers |
| more exotic and direct forms of interaction. Vernor Vinge's "True Names" was |
| the first novel to hint at something deeper. In his story, and small band of |
| hackers manage to transcend the limitations of keyboard and screen, and |
| actually meet as presences in the network system. Vinge's work found an |
| enthusiastic audience (including Marvin Minsky who wrote the afterword), but |
| never achieved the sort of circulation enjoyed by Brunner. It would be another |
| author, a virtual computer illiterate, who would put cyberpunk on the map. |
|
|
| The author was William Gibson, who wrote "Neuromancer" in 1984 on a 1937 Hermes |
| portable typewriter. Gone are keyboards; Gibson's characters jack directly |
| into Cyberspace, "a consensual hallucination experienced daily by billions of |
| legitimate operators... a graphic representation of data abstracted from the |
| banks of every computer in the human system. Unthinkable complexity. Lines of |
| light ranged in the nonspace of the mind, clusters and constellations of |
| data..." |
|
|
| Just as Brunner offered us a future of the 1970s run riot, Gibson's |
| "Neuromancer" serves up the 1980s taken to their cultural and technological |
| extreme. World power is in the hands of multinational "zaibatsu," battling for |
| power much as mafia and yakuza gangs struggle for turf today. It is a world of |
| organ transplants, biological computers and artificial intelligences. Like |
| Brunner, it is a distopian vision of the future, but while Brunner evoked the |
| hardness of technology, Gibson calls up the gritty decadence evoked in the |
| movie "Bladerunner," or of the William Burroughs novel, "Naked Lunch" (alleged |
| similarities between that novel and "Neuromancer" have triggered rumors that |
| Gibson plagiarized Burroughs). |
|
|
| Gibson's hero, Case, is a "deck cowboy," a freelance corporate thief-for-hire |
| who projects his disembodied consciousness into the cyberspace matrix, |
| penetrating corporate systems to steal data for his employers. It is a world |
| that Ivan Boesky would understand: Corporate espionage and double-dealing has |
| become so much the norm that Case's acts seem less illegal than profoundly |
| ambiguous. |
|
|
| This ambiguity offers an interesting counterpoint to current events. Much of |
| the controversy over the Cornell virus swirls around the legal and ethical |
| ambiguity of Morris' act. For every computer professional calling for Morris' |
| head, another can be found praising him. It is an ambiguity that makes the |
| very meaning of the word "hacker" a subject of frequent debate. |
|
|
| Morris' apparently innocent error in no way matches the actions of Gibson's |
| characters, but a whole new generation of aspiring hackers may be learning |
| their code of ethics from Gibson's novels. "Neuromancer" won three of science |
| fiction's most prestigious awards -- the Hugo, the Nebula and the Philip K. |
| Dick Memorial Award -- and continues to be a best-seller today. Unambiguously |
| illegal and harmful acts of computer piracy such as those alleged against Kevin |
| Mitnick (arrested after a long and aggressive penetration of DEC's computers) |
| would fit right into the "Neuromancer" story line. |
|
|
| "Neuromancer" is the first book in a trilogy. In the second volume, "Count |
| Zero" -- so-called after the code name of a character -- the cyberspace matrix |
| becomes sentient. Typical of Gibson's literary elegance, this becomes apparent |
| through an artist's version of the Turing test. Instead of holding an |
| intelligent conversation with a human, a node of the matrix on an abandoned |
| orbital factory begins making achingly beautiful and mysterious boxes -- a 21st |
| Century version of the work of the late artist, Joseph Cornell. These works of |
| art begin appearing in the terrestrial marketplace, and a young woman art |
| dealer is hired by an unknown patron to track down the source. Her search |
| intertwines with the fates of other characters, building to a conclusion equal |
| to the vividness and suspense of "Neuromancer." The third book, "Mona Lisa |
| Overdrive" answers many of the questions left hanging in the first book and |
| further completes the details of the world created by Gibson including an |
| adoption by the network of the personae of the pantheon of voodoo gods and |
| goddesses, worshipped by 21st Century Rastafarian hackers. |
|
|
| Hard core science fiction fans are notorious for identifying with the worlds |
| portrayed in their favorite books. Visit any science fiction convention and |
| you can encounter amidst the majority of quite normal participants, small |
| minority of individuals who seem just a bit, well, strange. The stereotypes of |
| individuals living out science fiction fantasies in introverted solitude has |
| more than a slight basis in fact. Closet Dr. Whos or Warrior Monks from "Star |
| Wars" are not uncommon in Silicon Valley; I was once startled to discover over |
| lunch that a programmer holding a significant position in a prominent company |
| considered herself to be a wizardess in the literal sense of the term. |
|
|
| Identification with cyberpunk at this sort of level seems to be becoming more |
| and more common. Warrior Monks may have trouble conjuring up Imperial |
| Stormtroopers to do battle with, but aspiring deck jockeys can log into a |
| variety of computer systems as invited or (if they are good enough) uninvited |
| guests. One individual I spoke with explained that viruses held a special |
| appeal to him because it offered a means of "leaving an active alter ego |
| presence on the system even when I wasn't logged in." In short, it was the |
| first step toward experiencing cyberspace. |
|
|
| Gibson apparently is leaving cyberpunk behind, but the number of books in the |
| genre continues to grow. Not mentioned here are a number of other authors such |
| as Rudy Rucker (considered by many to be the father of cyberpunk) and Walter |
| John Williams who offer similar visions of a future networked world inhabited |
| by human/computer symbionts. In addition, at least one magazine, "Reality |
| Hackers" (formerly "High Frontiers Magazine" of drug fame) is exploring the |
| same general territory with a Chinese menu offering of tongue-in-cheek |
| paranoia, ambient music reviews, cyberdelia (contributor Timothy Leary's term) |
| and new age philosophy. |
|
|
| The growing body of material is by no means inspiration for every aspiring |
| digital alchemist. I am particularly struck by the "generation gap" in the |
| computer community when it comes to "Neuromancer": Virtually every teenage |
| hacker I spoke with has the book, but almost none of my friends over 30 have |
| picked it up. |
|
|
| Similarly, not every cyberpunk fan is a potential network criminal; plenty of |
| people read detective thrillers without indulging in the desire to rob banks. |
| But there is little doubt that a small minority of computer artists are finding |
| cyberpunk an important inspiration in their efforts to create an exceedingly |
| strange computer reality. Anyone seeking to understand how that reality is |
| likely to come to pass would do well to pick up a cyberpunk novel or two. |
| _______________________________________________________________________________ |
|
|