| ==Phrack Inc.== |
|
|
| Volume Three, Issue Thirty-Three, File 10 of 13 |
|
|
| PWN ^*^ PWN ^*^ PWN { CyberView '91 } PWN ^*^ PWN ^*^ PWN |
| ^*^ ^*^ |
| PWN P h r a c k W o r l d N e w s PWN |
| ^*^ ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ ^*^ |
| PWN Special Edition Issue Four PWN |
| ^*^ ^*^ |
| PWN "The Hackers Who Came In From The Cold" PWN |
| ^*^ ^*^ |
| PWN June 21-23, 1991 PWN |
| ^*^ ^*^ |
| PWN Written by Bruce Sterling PWN |
| ^*^ ^*^ |
| PWN ^*^ PWN ^*^ PWN { CyberView '91 } PWN ^*^ PWN ^*^ PWN |
|
|
|
|
| The Hackers Who Came In From The Cold |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| "Millionaries and vandals met at the computer-underground convention |
| to discuss free information. What they found was free love." |
|
|
| by Bruce Sterling : bruces @ well.sf.ca.us |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| ** A slightly shorter version of this article appears in Details Magazine |
| (October 1991, pages 94-97, 134). The Details article includes photographs |
| of Knight Lightning, Erik Bloodaxe, Mitch Kapor, and Doc Holiday. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| They called it "CyberView '91." Actually, it was another "SummerCon" -- |
| the traditional summer gathering of the American hacker underground. The |
| organizer, 21 year old "Knight Lightning," had recently beaten a Computer Fraud |
| and Abuse rap that might have put him in jail for thirty years. A little |
| discretion seemed in order. |
|
|
| The convention hotel, a seedy but accommodating motor-inn outside the |
| airport in St Louis, had hosted SummerCons before. Changing the name had been |
| a good idea. If the staff were alert, and actually recognized that these were |
| the same kids back again, things might get hairy. |
|
|
| The SummerCon '88 hotel was definitely out of bounds. The US Secret |
| Service had set up shop in an informant's room that year, and videotaped the |
| drunken antics of the now globally notorious "Legion of Doom" through a one-way |
| mirror. The running of SummerCon '88 had constituted a major count of criminal |
| conspiracy against young Knight Lightning, during his 1990 federal trial. |
|
|
| That hotel inspired sour memories. Besides, people already got plenty |
| nervous playing "hunt the fed" at SummerCon gigs. SummerCons generally |
| featured at least one active federal informant. Hackers and phone phreaks |
| like to talk a lot. They talk about phones and computers -- and about each |
| other. |
|
|
| For insiders, the world of computer hacking is a lot like Mexico. There's |
| no middle class. There's a million little kids screwing around with their |
| modems, trying to snitch long-distance phone-codes, trying to swipe pirated |
| software -- the "kodez kidz" and "warez doodz." They're peons, "rodents." |
| Then there's a few earnest wannabes, up-and-comers, pupils. Not many. Less of |
| 'em every year, lately. |
|
|
| And then there's the heavy dudes. The players. The Legion of Doom are |
| definitely heavy. Germany's Chaos Computer Club are very heavy, and already |
| back out on parole after their dire flirtation with the KGB. The Masters of |
| Destruction in New York are a pain in the ass to their rivals in the |
| underground, but ya gotta admit they are heavy. MoD's "Phiber Optik" has |
| almost completed his public-service sentence, too... "Phoenix" and his crowd |
| down in Australia used to be heavy, but nobody's heard much out of "Nom" and |
| "Electron" since the Australian heat came down on them. |
|
|
| The people in Holland are very active, but somehow the Dutch hackers don't |
| quite qualify as "heavy." Probably because computer-hacking is legal in |
| Holland, and therefore nobody ever gets busted for it. The Dutch lack the |
| proper bad attitude, somehow. |
|
|
| America's answer to the Dutch menace began arriving in a steady confusion |
| of airport shuttle buses and college-kid decaying junkers. A software pirate, |
| one of the more prosperous attendees, flaunted a radar-detecting black |
| muscle-car. In some dim era before the jet age, this section of St Louis had |
| been a mellow, fertile Samuel Clemens landscape. Waist-high summer weeds still |
| flourished beside the four-lane highway and the airport feeder roads. |
|
|
| The graceless CyberView hotel had been slammed down onto this landscape |
| as if dropped from a B-52. A small office-tower loomed in one corner beside a |
| large parking garage. The rest was a rambling mess of long, narrow, dimly lit |
| corridors, with a small swimming pool, a glass-fronted souvenir shop and a |
| cheerless dining room. The hotel was clean enough, and the staff, despite |
| provocation, proved adept at minding their own business. For their part, the |
| hackers seemed quite fond of the place. |
|
|
| The term "hacker" has had a spotted history. Real "hackers," traditional |
| "hackers," like to write software programs. They like to "grind code," |
| plunging into its densest abstractions until the world outside the computer |
| terminal bleaches away. Hackers tend to be portly white techies with thick |
| fuzzy beards who talk entirely in jargon, stare into space a lot, and laugh |
| briefly for no apparent reason. The CyberView crowd, though they call |
| themselves "hackers," are better identified as computer intruders. They don't |
| look, talk or act like 60s M.I.T.-style hackers. |
|
|
| Computer intruders of the 90s aren't stone pocket-protector techies. |
| They're young white suburban males, and look harmless enough, but sneaky. |
| They're much the kind of kid you might find skinny-dipping at 2AM in a backyard |
| suburban swimming pool. The kind of kid who would freeze in the glare of the |
| homeowner's flashlight, then frantically grab his pants and leap over the |
| fence, leaving behind a half-empty bottle of tequila, a Metallica T-shirt, and, |
| probably, his wallet. |
|
|
| One might wonder why, in the second decade of the personal-computer |
| revolution, most computer intruders are still suburban teenage white whiz-kids. |
| Hacking-as-computer-intrusion has been around long enough to have bred an |
| entire generation of serious, heavy-duty adult computer-criminals. Basically, |
| this simply hasn't occurred. Almost all computer intruders simply quit after |
| age 22. They get bored with it, frankly. Sneaking around in other people's |
| swimming pools simply loses its appeal. They get out of school. They get |
| married. They buy their own swimming pools. They have to find some replica |
| of a real life. |
|
|
| The Legion of Doom -- or rather, the Texas wing of LoD -- had hit Saint |
| Louis in high style, this weekend of June 22. The Legion of Doom has been |
| characterized as "a high-tech street gang" by the Secret Service, but this is |
| surely one of the leakiest, goofiest and best-publicized criminal conspiracies |
| in American history. |
|
|
| Not much has been heard from Legion founder "Lex Luthor" in recent years. |
| The Legion's Atlanta wing; "Prophet," "Leftist," and "Urvile," are just now |
| getting out of various prisons and into Georgia halfway-houses. "Mentor" got |
| married and writes science fiction games for a living. |
|
|
| But "Erik Bloodaxe," "Doc Holiday," and "Malefactor" were here -- in |
| person, and in the current issues of TIME and NEWSWEEK. CyberView offered a |
| swell opportunity for the Texan Doomsters to announce the formation of their |
| latest high-tech, uhm, organization, "Comsec Data Security Corporation." |
|
|
| Comsec boasts a corporate office in Houston, and a marketing analyst, and |
| a full-scale corporate computer-auditing program. The Legion boys are now |
| digital guns for hire. If you're a well-heeled company, and you can cough up |
| per diem and air-fare, the most notorious computer-hackers in America will show |
| right up on your doorstep and put your digital house in order -- guaranteed. |
|
|
| Bloodaxe, a limber, strikingly handsome young Texan with shoulder-length |
| blond hair, mirrored sunglasses, a tie, and a formidable gift of gab, did the |
| talking. Before some thirty of his former peers, gathered upstairs over |
| styrofoam coffee and canned Coke in the hotel's Mark Twain Suite, Bloodaxe |
| sternly announced some home truths of modern computer security. |
|
|
| Most so-called "computer security experts" -- (Comsec's competitors) -- |
| are overpriced con artists! They charge gullible corporations thousands of |
| dollars a day, just to advise that management lock its doors at night and use |
| paper shredders. Comsec Corp, on the other hand (with occasional consultant |
| work from Messrs. "Pain Hertz" and "Prime Suspect") boasts America's most |
| formidable pool of genuine expertise at actually breaking into computers. |
|
|
| Comsec, Bloodaxe continued smoothly, was not in the business of turning-in |
| any former hacking compatriots. Just in case anybody here was, you know, |
| worrying... On the other hand, any fool rash enough to challenge a |
| Comsec-secured system had better be prepared for a serious hacker-to-hacker |
| dust-up. |
|
|
| "Why would any company trust you?" someone asked languidly. |
|
|
| Malefactor, a muscular young Texan with close-cropped hair and the build |
| of a linebacker, pointed out that, once hired, Comsec would be allowed inside |
| the employer's computer system, and would have no reason at all to "break in." |
| Besides, Comsec agents were to be licensed and bonded. |
|
|
| Bloodaxe insisted passionately that LoD were through with hacking for |
| good. There was simply no future in it. The time had come for LoD to move on, |
| and corporate consultation was their new frontier. (The career options of |
| committed computer intruders are, when you come right down to it, remarkably |
| slim.) "We don't want to be flippin' burgers or sellin' life insurance when |
| we're thirty," Bloodaxe drawled. "And wonderin' when Tim Foley is gonna come |
| kickin' in the door!" (Special Agent Timothy M. Foley of the US Secret Service |
| has fully earned his reputation as the most formidable anti-hacker cop in |
| America.) |
|
|
| Bloodaxe sighed wistfully. "When I look back at my life... I can see I've |
| essentially been in school for eleven years, teaching myself to be a computer |
| security consultant." |
|
|
| After a bit more grilling, Bloodaxe finally got to the core of matters. |
| Did anybody here hate them now? he asked, almost timidly. Did people think the |
| Legion had sold out? Nobody offered this opinion. The hackers shook their |
| heads, they looked down at their sneakers, they had another slug of Coke. They |
| didn't seem to see how it would make much difference, really. Not at this |
| point. |
|
|
| Over half the attendees of CyberView publicly claimed to be out of the |
| hacking game now. At least one hacker present -- (who had shown up, for some |
| reason known only to himself, wearing a blond wig and a dime-store tiara, and |
| was now catching flung Cheetos in his styrofoam cup) -- already made his |
| living "consulting" for private investigators. |
|
|
| Almost everybody at CyberView had been busted, had their computers seized, |
| or, had, at least, been interrogated -- and when federal police put the squeeze |
| on a teenage hacker, he generally spills his guts. |
|
|
| By '87, a mere year or so after they plunged seriously into anti-hacker |
| OBenforcement, the Secret Service had workable dossiers on everybody that |
| really |
| mattered. By '89, they had files on practically every last soul in the |
| American digital underground. The problem for law enforcement has never been |
| finding out who the hackers are. The problem has been figuring out what the |
| hell they're really up to, and, harder yet, trying to convince the public that |
| it's actually important and dangerous to public safety. |
|
|
| From the point of view of hackers, the cops have been acting wacky lately. |
| The cops, and their patrons in the telephone companies, just don't understand |
| the modern world of computers, and they're scared. "They think there are |
| masterminds running spy-rings who employ us," a hacker told me. "They don't |
| understand that we don't do this for money, we do it for power and knowledge." |
| Telephone security people who reach out to the underground are accused of |
| divided loyalties and fired by panicked employers. A young Missourian coolly |
| psychoanalyzed the opposition. "They're overdependent on things they don't |
| understand. They've surrendered their lives to computers." |
|
|
| "Power and knowledge" may seem odd motivations. "Money" is a lot easier |
| to understand. There are growing armies of professional thieves who rip-off |
| phone service for money. Hackers, though, are into, well, power and |
| knowledge. This has made them easier to catch than the street-hustlers who |
| steal access codes at airports. It also makes them a lot scarier. |
|
|
| Take the increasingly dicey problems posed by "Bulletin Board Systems." |
| "Boards" are home computers tied to home telephone lines, that can store and |
| transmit data over the phone -- written texts, software programs, computer |
| games, electronic mail. Boards were invented in the late 70s, and, while the |
| vast majority of boards are utterly harmless, some few piratical boards swiftly |
| became the very backbone of the 80s digital underground. Over half the |
| attendees of CyberView ran their own boards. "Knight Lightning" had run an |
| electronic magazine, "Phrack," that appeared on many underground boards across |
| America. |
|
|
| Boards are mysterious. Boards are conspiratorial. Boards have been |
| accused of harboring: Satanists, anarchists, thieves, child pornographers, |
| Aryan nazis, religious cultists, drug dealers -- and, of course, software |
| pirates, phone phreaks, and hackers. Underground hacker boards were scarcely |
| reassuring, since they often sported terrifying sci-fi heavy-metal names, like |
| "Speed Demon Elite," "Demon Roach Underground," and "Black Ice." (Modern |
| hacker boards tend to feature defiant titles like "Uncensored BBS," "Free |
| Speech," and "Fifth Amendment.") |
|
|
| Underground boards carry stuff as vile and scary as, say, 60s-era |
| underground newspapers -- from the time when Yippies hit Chicago and ROLLING |
| STONE gave away free roach-clips to subscribers. "Anarchy files" are popular |
| features on outlaw boards, detailing how to build pipe-bombs, how to make |
| Molotovs, how to brew methedrine and LSD, how to break and enter buildings, how |
| to blow up bridges, the easiest ways to kill someone with a single blow of a |
| blunt object -- and these boards bug straight people a lot. Never mind that |
| all this data is publicly available in public libraries where it is protected |
| by the First Amendment. There is something about its being on a computer -- |
| where any teenage geek with a modem and keyboard can read it, and print it out, |
| and spread it around, free as air -- there is something about that, that is |
| creepy. |
|
|
| "Brad" is a New Age pagan from Saint Louis who runs a service known as |
| "WEIRDBASE," available on an international network of boards called "FidoNet." |
| Brad was mired in an interminable scandal when his readers formed a spontaneous |
| underground railroad to help a New Age warlock smuggle his teenage daughter out |
| of Texas, away from his fundamentalist Christian in-laws, who were utterly |
| convinced that he had murdered his wife and intended to sacrifice his daughter |
| to -- Satan! The scandal made local TV in Saint Louis. Cops came around and |
| grilled Brad. The patchouli stench of Aleister Crowley hung heavy in the air. |
| There was just no end to the hassle. |
|
|
| If you're into something goofy and dubious and you have a board about it, |
| it can mean real trouble. Science-fiction game publisher Steve Jackson had his |
| board seized in 1990. Some cryogenics people in California, who froze a woman |
| for post-mortem preservation before she was officially, er, "dead," had their |
| computers seized. People who sell dope-growing equipment have had their |
| computers seized. In 1990, boards all over America went down: Illuminati, |
| CLLI Code, Phoenix Project, Dr. Ripco. Computers are seized as "evidence," but |
| since they can be kept indefinitely for study by police, this veers close to |
| confiscation and punishment without trial. One good reason why Mitchell Kapor |
| showed up at CyberView. |
|
|
| Mitch Kapor was the co-inventor of the mega-selling business program LOTUS |
| 1-2-3 and the founder of the software giant, Lotus Development Corporation. He |
| is currently the president of a newly-formed electronic civil liberties group, |
| the Electronic Frontier Foundation. Kapor, now 40, customarily wears Hawaiian |
| shirts and is your typical post-hippie cybernetic multimillionaire. He and |
| EFF's chief legal counsel, "Johnny Mnemonic," had flown in for the gig in |
| Kapor's private jet. |
|
|
| Kapor had been dragged willy-nilly into the toils of the digital |
| underground when he received an unsolicited floppy-disk in the mail, from an |
| outlaw group known as the "NuPrometheus League." These rascals (still not |
| apprehended) had stolen confidential proprietary software from Apple Computer, |
| Inc., and were distributing it far and wide in order to blow Apple's trade |
| secrets and humiliate the company. Kapor assumed that the disk was a joke, or, |
| more likely, a clever scheme to infect his machines with a computer virus. |
|
|
| But when the FBI showed up, at Apple's behest, Kapor was shocked at the |
| extent of their naivete. Here were these well-dressed federal officials, |
| politely "Mr. Kapor"- ing him right and left, ready to carry out a war to the |
| knife against evil marauding "hackers." They didn't seem to grasp that |
| "hackers" had built the entire personal computer industry. Jobs was a hacker, |
| Wozniak too, even Bill Gates, the youngest billionaire in the history of |
| America -- all "hackers." The new buttoned-down regime at Apple had blown its |
| top, and as for the feds, they were willing, but clueless. Well, let's be |
| charitable -- the feds were "cluefully challenged." "Clue-impaired." |
| "Differently clued...." |
|
|
| Back in the 70s (as Kapor recited to the hushed and respectful young |
| hackers) he himself had practiced "software piracy" -- as those activities |
| would be known today. Of course, back then, "computer software" hadn't been a |
| major industry -- but today, "hackers" had police after them for doing things |
| that the industry's own pioneers had pulled routinely. Kapor was irate about |
| this. His own personal history, the lifestyle of his pioneering youth, was |
| being smugly written out of the historical record by the latter-day corporate |
| androids. Why, nowadays, people even blanched when Kapor forthrightly declared |
| that he'd done LSD in the Sixties. |
|
|
| Quite a few of the younger hackers grew alarmed at this admission of |
| Kapor's, and gazed at him in wonder, as if expecting him to explode. |
|
|
| "The law only has sledgehammers, when what we need are parking tickets and |
| speeding tickets," Kapor said. Anti-hacker hysteria had gripped the nation in |
| 1990. Huge law enforcement efforts had been mounted against illusory threats. |
| In Washington DC, on the very day when the formation of the Electronic Frontier |
| Foundation had been announced, a Congressional committee had been formally |
| presented with the plotline of a thriller movie -- DIE HARD II, in which hacker |
| terrorists seize an airport computer -- as if this Hollywood fantasy posed a |
| clear and present danger to the American republic. A similar hacker thriller, |
| WAR GAMES, had been presented to Congress in the mid-80s. Hysteria served no |
| one's purposes, and created a stampede of foolish and unenforceable laws likely |
| to do more harm than good. |
|
|
| Kapor didn't want to "paper over the differences" between his Foundation |
| and the underground community. In the firm opinion of EFF, intruding into |
| computers by stealth was morally wrong. Like stealing phone service, it |
| deserved punishment. Not draconian ruthlessness, though. Not the ruination of |
| a youngster's entire life. |
|
|
| After a lively and quite serious discussion of digital free-speech issues, |
| the entire crew went to dinner at an Italian eatery in the local mall, on |
| Kapor's capacious charge-tab. Having said his piece and listened with care, |
| Kapor began glancing at his watch. Back in Boston, his six-year-old son was |
| waiting at home, with a new Macintosh computer-game to tackle. A quick |
| phone-call got the jet warmed up, and Kapor and his lawyer split town. |
|
|
| With the forces of conventionality -- such as they were -- out of the |
| picture, the Legion of Doom began to get heavily into "Mexican Flags." A |
| Mexican Flag is a lethal, multi-layer concoction of red grenadine, white |
| tequila and green creme-de-menthe. It is topped with a thin layer of 150 proof |
| rum, set afire, and sucked up through straws. |
|
|
| The formal fire-and-straw ritual soon went by the board as things began to |
| disintegrate. Wandering from room to room, the crowd became howlingly rowdy, |
| though without creating trouble, as the CyberView crowd had wisely taken over |
| an entire wing of the hotel. |
|
|
| "Crimson Death," a cheerful, baby-faced young hardware expert with a |
| pierced nose and three earrings, attempted to hack the hotel's private phone |
| system, but only succeeded in cutting off phone service to his own room. |
|
|
| Somebody announced there was a cop guarding the next wing of the hotel. |
| Mild panic ensued. Drunken hackers crowded to the window. |
|
|
| A gentleman slipped quietly through the door of the next wing wearing a |
| short terrycloth bathrobe and spangled silk boxer shorts. |
|
|
| Spouse-swappers had taken over the neighboring wing of the hotel, and were |
| holding a private weekend orgy. It was a St Louis swingers' group. It turned |
| out that the cop guarding the entrance way was an off-duty swinging cop. He'd |
| angrily threatened to clobber Doc Holiday. Another swinger almost punched-out |
| "Bill from RNOC," whose prurient hacker curiosity, naturally, knew no bounds. |
|
|
| It was not much of a contest. As the weekend wore on and the booze flowed |
| freely, the hackers slowly but thoroughly infiltrated the hapless swingers, who |
| proved surprisingly open and tolerant. At one point, they even invited a group |
| of hackers to join in their revels, though "they had to bring their own women." |
|
|
| Despite the pulverizing effects of numerous Mexican Flags, Comsec Data |
| Security seemed to be having very little trouble on that score. They'd |
| vanished downtown brandishing their full-color photo in TIME magazine, and |
| returned with an impressive depth-core sample of St Louis womanhood, one of |
| whom, in an idle moment, broke into Doc Holiday's room, emptied his wallet, and |
| stole his Sony tape recorder and all his shirts. |
|
|
| Events stopped dead for the season's final episode of STAR TREK: THE NEXT |
| GENERATION. The show passed in rapt attention -- then it was back to harassing |
| the swingers. Bill from RNOC cunningly out-waited the swinger guards, |
| infiltrated the building, and decorated all the closed doors with globs of |
| mustard from a pump-bottle. |
|
|
| In the hungover glare of Sunday morning, a hacker proudly showed me a |
| large handlettered placard reading PRIVATE -- STOP, which he had stolen from |
| the unlucky swingers on his way out of their wing. Somehow, he had managed to |
| work his way into the building, and had suavely ingratiated himself into a |
| bedroom, where he had engaged a swinging airline ticket-agent in a long and |
| most informative conversation about the security of airport computer terminals. |
| The ticket agent's wife, at the time, was sprawled on the bed engaging in |
| desultory oral sex with a third gentleman. It transpired that she herself did |
| a lot of work on LOTUS 1-2-3. She was thrilled to hear that the program's |
| inventor, Mitch Kapor, had been in that very hotel, that very weekend. |
|
|
| Mitch Kapor. Right over there? Here in St Louis? Wow. |
|
|
| Isn't life strange. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| CyberView '91 Guest List |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
| Those known best by handles: Those not: |
|
|
| Bill From RNOC / Circuit / The Conflict / Dead Lord Dorothy Denning |
| Dispater / Doc Holiday / Dr. Williams / Cheap Shades Michael Godwin |
| Crimson Death / Erik Bloodaxe / Forest Ranger / Gomez Brad Hicks |
| Jester Sluggo / J.R. "Bob" Dobbs / Knight Lightning Mitch Kapor |
| Malefactor / Mr. Fido / Ninja Master / Pain Hertz Bruce Sterling |
| Phantom Phreaker / Predat0r / Psychotic Surfer of C&P |
| Racer X / Rambone / The Renegade / Seth 2600 / Taran King |
| Tuc <Tuc gets his own line just because he is cool!> |
| _______________________________________________________________________________ |
|
|