Professional Documents
Culture Documents
by B ruce S terling
<bruces@ w ell.sf.ca.us>
Introduction
This is a pretty good disclaim er, as such disclaim ers go. Icollect intel-
lectual-property disclaim ers, and I've seen dozens of them , and this one
is at least pretty straightforw ard. In this narrow and particular case,
how ever, it isn't quite accurate. Bantam Books puts that disclaim er on
every book they publish,but Bantam Books does not,in fact,ow n the
electronic rights to this book. Ido, because of certain extensive con-
tract m aneuverings m y agent and Iw ent through before this book w as
Since Bantam has seen fit to peacably agree to this schem e of m ine,
Bantam Books is not going to fuss about this. Provided you don't try to
sellthe book,they are not going to bother you for w hat you do w ith the
electronic copy of this book. If you w ant to check this out personally,
you can ask them ; they're at 1540 Broadw ay N Y N Y 10036. H ow ever,
if you w ere so foolish as to print this book and start retailing it for
m oney in violation of m y copyright and the com m ercialinterests of
Bantam Books, then Bantam , a part of the gigantic Bertelsm ann m ulti-
nationalpublishing com bine, w ould roust som e of their heavy-duty
attorneys out of hibernation and crush you like a bug. This is only to be
expected. Ididn't w rite this book so that you could m ake m oney out of it.
If anybody is gonna m ake m oney out of this book,it's gonna be m e and m y
publisher.
M y publisher deserves to m ake m oney out of this book. N ot only did the
folks at Bantam Books com m ission m e to w rite the book,and pay m e a
hefty sum to do so, but they bravely printed, in text, an electronic doc-
um ent the reproduction of w hich w as once alleged to be a federalfelony.
Bantam Books and their num erous attorneys w ere very brave and forth-
right about this book. Furtherm ore, m y form er editor at Bantam Books,
Betsy M itchell, genuinely cared about this project, and w orked hard on
it,and had a lot of w ise things to say about the m anuscript. Betsy
deserves genuine credit for this book, credit that editors too rarely get.
The critics w ere very kind to *The H acker Crackdow n,* and com m er-
cially the book has done w ell. O n the other hand, Ididn't w rite this book
in order to squeeze every last nickeland dim e out of the m itts of im pov-
erished sixteen-year-old cyberpunk high-school-students. Teenagers
don't have any m oney — (no, not even enough for the six- dollar
*H acker Crackdow n* paperback, w ith its attractive bright-red cover
and usefulindex). That's a m ajor reason w hy teenagers som etim es
succum b to the tem ptation to do things they shouldn't,such as sw iping
m y books out of libraries. Kids: this one is allyours, allright? Go
give the print version back. *8 -)
Inform ation *w ants* to be free. A nd the inform ation inside this book
longs for freedom w ith a peculiar intensity. Igenuinely believe that the
naturalhabitat of this book is inside an electronic netw ork. That m ay
not be the easiest direct m ethod to generate revenue for the book's
author, but that doesn't m atter; this is w here this book belongs by its
nature. I've w ritten other books — plenty of other books — and I'll
w rite m ore and Iam w riting m ore, but this one is special. Iam m aking
*The H acker Crackdow n* available electronically as w idely as Ican
conveniently m anage, and if you like the book, and think it is useful,
then Iurge you to do the sam e w ith it.
You can copy this electronic book. Copy the heck out of it,be m y guest,
and give those copies to anybody w ho w ants them . The nascent w orld of
cyberspace is fullof sysadm ins, teachers, trainers, cybrarians, netgu-
rus, and various species of cybernetic activist. If you're one of those
people, Iknow about you,and Iknow the hassle you go through to try to
help people learn about the electronic frontier. Ihope that possessing
this book in electronic form w illlessen your troubles. Granted, this
treatm ent of our electronic socialspectrum is not the ultim ate in acade-
m ic rigor. A nd politically, it has som ething to offend and trouble alm ost
everyone. But hey, I'm told it's readable, and at least the price is right.
You can upload the book onto bulletin board system s,or Internet nodes,
or electronic discussion groups. Go right ahead and do that, Iam giving
You can put the book on disks and give the disks aw ay,as long as you
don't take any m oney for it.
But this book is not public dom ain. You can't copyright it in your ow n
nam e. Iow n the copyright.A ttem pts to pirate this book and m ake
m oney from selling it m ay involve you in a serious litigative snarl.
Believe m e, for the pittance you m ight w ring out of such an action, it's
really not w orth it. This book don't "belong" to you. In an odd but very
genuine w ay,Ifeelit doesn't "belong" to m e,either. It's a book about
the people of cyberspace, and distributing it in this w ay is the best w ay
Iknow to actually m ake this inform ation available, freely and easily, to
allthe people of cyberspace — including people far outside the borders
of the United States,w ho otherw ise m ay never have a chance to see any
edition of the book, and w ho m ay perhaps learn som ething usefulfrom
this strange story of distant, obscure, but portentous events in so-
called "A m erican cyberspace."
This electronic book is now literary freew are. It now belongs to the
em ergent realm of alternative inform ation econom ics. You have no right
to m ake this electronic book part of the conventionalflow of com m erce.
Let it be part of the flow of know ledge:there's a difference. I've divided
the book into four sections, so that it is less ungainly for upload and
dow nload; if there's a section of particular relevance to you and your
colleagues,feelfree to reproduce that one and skip the rest.
Just m ake m ore w hen you need them ,and give them to w hoever m ight
w ant them .
N ow have fun.
1878 First teenage m ales flung off phone system by enraged authori-
ties.
1988
Septem ber. "Prophet" cracks BellSouth A IM SX com puter netw ork and
dow nloads E911 Docum ent to his ow n com puter and to Jolnet.
1989
June. "N uProm etheus League" distributes A pple Com puter proprietary
softw are.
1990
January 18-19 Chicago Task Force raids Knight Lightning in St. Louis.
January 24. USSS and N ew York State Police raid "Phiber O ptik,"
"A cid Phreak," and "Scorpion" in N ew York City.
M arch 1. Chicago Task Force raids Steve Jackson Gam es, Inc.,
"M entor," and "Erik Bloodaxe" in A ustin.
1991
July 1-2. Sw itching station phone softw are crash affects W ashington,
Los A ngeles, Pittsburgh, San Francisco.
Septem ber 17. A T& T phone crash affects N ew York City and three air-
ports.
This is a book about cops, and w ild teenage w hiz- kids, and law yers, and
hairy-eyed anarchists, and industrialtechnicians, and hippies, and
high-tech m illionaires, and gam e hobbyists, and com puter security
experts, and Secret Service agents, and grifters, and thieves.
People have w orked on this "frontier" for generations now . Som e people
becam e rich and fam ous from their efforts there. Som e just played in
it, as hobbyists. O thers soberly pondered it, and w rote about it, and
regulated it, and negotiated over it in internationalforum s, and sued one
another about it, in gigantic, epic court battles that lasted for years.
A nd alm ost since the beginning,som e people have com m itted crim es in
this place.
Because people live in it now . N ot just a few people, not just a few
technicians and eccentrics, but thousands of people, quite norm alpeople.
A nd not just for a little w hile, either, but for hours straight, over
w eeks,and m onths,and years. Cyberspace today is a "N et," a
"M atrix," internationalin scope and grow ing sw iftly and steadily. It's
grow ing in size, and w ealth, and politicalim portance.
People have m et there and been m arried there. There are entire living
com m unities in cyberspace today; chattering, gossipping, planning,
conferring and schem ing, leaving one another voice-m ailand electronic
m ail, giving one another big w eightless chunks of valuable data, both
legitim ate and illegitim ate. They busily pass one another com puter
softw are and the occasionalfestering com puter virus.
In 1990 there cam e a nationw ide crackdow n on illicit com puter hack-
ers, w ith arrests, crim inal charges, one dram atic show -trial, several
guilty pleas, and huge confiscations of data and equipm ent allover the
USA .
This w as a strange, dire, huge event. Sixty thousand people lost their
telephone service com pletely. D uring the nine long hours of frantic
effort that it took to restore service, som e seventy m illion telephone
calls w ent uncom pleted.
W ithin nine hours, A T& T softw are engineers m ore or less understood
w hat had caused the crash. Replicating the problem exactly, poring over
softw are line by line,took them a couple of w eeks. But because it w as
hard to understand technically, the fulltruth of the m atter and its
im plications w ere not w idely and thoroughly aired and explained. The
root cause of the crash rem ained obscure, surrounded by rum or and
fear.
Som ehow the explanation failed to persuade A m erican law enforcem ent
officials and even telephone corporate security personnel. These people
w ere not technicalexperts or softw are w izards, and they had their ow n
suspicions about the cause of this disaster.
The police and telco security had im portant sources of inform ation
denied to m ere softw are engineers. They had inform ants in the com put-
er underground and years of experience in dealing w ith high-tech ras-
cality that seem ed to grow ever m ore sophisticated. For years they had
been expecting a direct and savage attack against the A m erican national
telephone system . A nd w ith the Crash of January 15 — the first m onth
of a new , high-tech decade — their predictions, fears, and suspicions
seem ed at last to have entered the realw orld. A w orld w here the tele-
phone system had not m erely crashed, but, quite likely, *been* crashed
— by "hackers."
The crash created a large dark cloud of suspicion that w ould color cer-
tain people's assum ptions and actions for m onths. The fact that it took
place in the realm of softw are w as suspicious on its face. The fact that
it occurred on M artin Luther King D ay, stillthe m ost politically touchy
of A m erican holidays, m ade it m ore suspicious yet.
The Crash of January 15 gave the Hacker Crackdow n its sense of edge
and its sw eaty urgency. It m ade people, pow erfulpeople in positions of
public authority, w illing to believe the w orst. A nd, m ost fatally, it
helped to give investigators a w illingness to take extrem e m easures and
the determ ination to preserve alm ost totalsecrecy.
Like the crash in the telephone system , this chain reaction w as ready
Technologies have life cycles, like cities do, like institutions do, like
law s and governm ents do.
Contem porary press reports of the stage debut of the telephone show ed
Bell's originalnotion for the telephone, an idea prom oted for a couple of
years,w as that it w ould becom e a m ass m edium . W e m ight recognize
Bell's idea today as som ething close to m odern "cable radio."
Telephones at a centralsource w ould transm it m usic, Sunday serm ons,
and im portant public speeches to a paying netw ork of w ired-up sub-
scribers.
A t the tim e,m ost people thought this notion m ade good sense. In fact,
Bell's idea w as w orkable. In H ungary, this philosophy of the telephone
w as successfully put into everyday practice. In Budapest, for decades,
from 1 8 9 3 untilafter W orld W ar I, there w as a governm ent-run
inform ation service called "Telefon H irm ondo=." H irm ondo= w as a
centralized source of new s and entertainm ent and culture, including
stock reports, plays, concerts, and novels read aloud. A t certain hours
of the day, the phone w ould ring, you w ould plug in a loudspeaker for the
use of the fam ily, and Telefon H irm ondo= w ould be on the air — or
rather, on the phone.
The third stage of technology is know n as the "Cash Cow " stage. In the
"cash cow " stage, a technology finds its place in the w orld, and m atures,
and becom es settled and productive. A fter a year or so, A lexander
Graham Belland his capitalist backers concluded that eerie m usic piped
from nineteenth-century cyberspace w as not the realselling-point of
his invention. Instead, the telephone w as about speech — individual,
personalspeech, the hum an voice, hum an conversation and hum an
interaction. The telephone w as not to be m anaged from any centralized
W hen you picked up a telephone,you w ere not absorbing the cold output
of a m achine — you w ere speaking to another hum an being. O nce people
realized this, their instinctive dread of the telephone as an eerie,
unnaturaldevice, sw iftly vanished. A "telephone call" w as not a "call"
from a "telephone" itself, but a callfrom another hum an being, som e-
one you w ould generally know and recognize. The realpoint w as not
w hat the m achine could do for you (or to you), but w hat you yourself, a
person and citizen, could do *through* the m achine. This decision on
the part of the young BellCom pany w as absolutely vital.
The first telephone netw orks w ent up around Boston — m ostly am ong the
technically curious and the w ell-to-do (m uch the sam e segm ent of the
A m erican populace that, a hundred years later, w ould be buying person-
alcom puters). Entrenched backers of the telegraph continued to scoff.
But in January 1878, a disaster m ade the telephone fam ous. A train
crashed in Tarriffville, Connecticut. Forw ard-looking doctors in the
nearby city of H artford had had Bell's "speaking telephone" installed.
A n alert localdruggist w as able to telephone an entire com m unity of
localdoctors, w ho rushed to the site to give aid. The disaster, as disas-
ters do, aroused intense press coverage. The phone had proven its use-
fulness in the realw orld.
Bell's com panion Thom as W atson, sim ilarly w ealthy and sim ilarly odd,
becam e the ardent politicaldisciple of a 19th-century science-fiction
w riter and w ould-be socialreform er, Edw ard Bellam y. W atson also
trod the boards briefly as a Shakespearian actor.
But the new Bellholding com pany, A m erican Telephone and Telegraph or
A T& T, put in a new m an at the helm , a visionary industrialist nam ed
Theodore V ail. V ail, a form er Post O ffice m anager, understood large
organizations and had an innate feeling for the nature of large-scale
com m unications. V ailquickly saw to it that A T& T seized the technologi-
caledge once again. The Pupin and Cam pbell"loading coil," and the
deForest "audion," are both extinct technology today,but in 1913 they
gave V ail's com pany the best *long-distance* lines ever built. By con-
trolling long-distance — the links betw een, and over, and above the
sm aller localphone com panies — A T& T sw iftly gained the w hip-hand
over them ,and w as soon devouring them right and left.
V ailplow ed the profits back into research and developm ent, starting the
Bell tradition of huge-scale and brilliant industrial research.
V ail, the form er Post O ffice official, w as quite w illing to accom m odate
the US governm ent; in fact he w ould forge an active alliance w ith it.
A T& T w ould becom e alm ost a w ing of the A m erican governm ent,alm ost
another Post O ffice — though not quite. A T& T w ould w illingly subm it to
federalregulation, but in return, it w ould use the governm ent's regula-
tors as its ow n police,w ho w ould keep out com petitors and assure the
Bellsystem 's profits and preem inence.
V ail's system w orked. Except perhaps for aerospace, there has been no
technology m ore thoroughly dom inated by A m ericans than the telephone.
The telephone w as seen from the beginning as a quintessentially
A m erican technology. Bell's policy, and the policy of Theodore V ail, w as
a profoundly dem ocratic policy of *universalaccess.* V ail's fam ous
corporate slogan, "O ne Policy, O ne System , UniversalService," w as a
politicalslogan, w ith a very A m erican ring to it.
Joseph Stalin, for instance, vetoed plans for a Soviet phone system soon
after the Bolshevik revolution. Stalin w as certain that publicly acces-
sible telephones w ould becom e instrum ents of anti-Soviet counterrevo-
lution and conspiracy. (H e w as probably right.) W hen telephones did
arrive in the Soviet Union, they w ould be instrum ents of Party authori-
ty, and alw ays heavily tapped. (A lexander Solzhenitsyn's prison-cam p
novel*The First Circle* describes efforts to develop a phone system
m ore suited to Stalinist purposes.)
W hen the French telephone system finally did arrive, its snarled inade-
quacy w as to be notorious. Devotees of the A m erican BellSystem often
recom m ended a trip to France, for skeptics.
The early telephone com panies, and especially A T& T, w ere am ong the
forem ost em ployers of A m erican w om en. They em ployed the daughters
of the A m erican m iddle-class in great arm ies: in 1891, eight thousand
w om en; by 1946, alm ost a quarter of a m illion. W om en seem ed to
enjoy telephone w ork; it w as respectable, it w as steady, it paid fairly
w ellas w om en's w ork w ent,and — not least — it seem ed a genuine con-
tribution to the socialgood of the com m unity. W om en found V ail's ideal
W ithin the very first year of operation, 1878, Bell's com pany learned
a sharp lesson about com bining teenage boys and telephone sw itchboards.
Putting teenage boys in charge of the phone system brought sw ift and
consistent disaster. Bell's chief engineer described them as "W ild
Indians." The boys w ere openly rude to custom ers. They talked back to
subscribers, saucing off, uttering facetious rem arks, and generally
giving lip. The rascals took Saint Patrick's D ay off w ithout perm ission.
A nd w orst of allthey played clever tricks w ith the sw itchboard plugs:
disconnecting calls, crossing lines so that custom ers found them selves
talking to strangers, and so forth.
This com bination of pow er, technicalm astery, and effective anonym ity
seem ed to act like catnip on teenage boys.
The telephone has achieved a rare and exalted state for a technological
artifact: it has becom e a *household object.* The telephone, like the
clock, like pen and paper, like kitchen utensils and running w ater, has
becom e a technology that is visible only by its absence.The telephone is
technologically transparent. The globaltelephone system is the largest
and m ost com plex m achine in the w orld, yet it is easy to use. M ore
rem arkable yet, the telephone is alm ost entirely physically safe for the
user.
For the average citizen in the 1870s, the telephone w as w eirder, m ore
shocking, m ore "high-tech" and harder to com prehend, than the m ost
outrageous stunts of advanced com puting for us A m ericans in the 1990s.
In trying to understand w hat is happening to us today, w ith our bul-
letin-board system s, direct overseas dialling, fiber- optic transm is-
sions, com puter viruses, hacking stunts, and a vivid tangle of new law s
and new crim es, it is im portant to realize that our society has been
through a sim ilar challenge before — and that, allin all, w e did rather
w ellby it.
This has also happened, and is stillhappening, to com puter netw orks.
Com puter netw orks such as N SFnet, BITnet, USEN ET, JA N ET, are
technically advanced, intim idating, and m uch harder to use than tele-
phones. Even the popular, com m ercialcom puter netw orks, such as
GEnie, Prodigy, and Com puServe, cause m uch head-scratching and have
The w ords "com m unity" and "com m unication" have the sam e root.
W herever you put a com m unications netw ork, you put a com m unity as
w ell. A nd w henever you *take aw ay* that netw ork — confiscate it, out-
law it, crash it, raise its price beyond affordability — then you hurt
that com m unity.
That cause w as the A T& T Crash of January 15, 1990. A fter the Crash,
the w ounded and anxious telephone com m unity w ould com e out fighting
hard.
D uring the long heyday of M a Bell, the Bellem ployee corps w ere nur-
tured top-to-botton on a corporate ethos of public service. There w as
good m oney in Bell, but Bellw as not *about* m oney; Bellused public
relations, but never m ere m arketeering. People w ent into the Bell
System for a good life,and they had a good life.But it w as not m ere
m oney that led Bellpeople out in the m idst of storm s and earthquakes to
fight w ith toppled phone-poles, to w ade in flooded m anholes, to pullthe
red- eyed graveyard-shift over collapsing sw itching-system s. The Bell
But unlike other com panies, Bellw as above and beyond the vulgar com -
m ercialfray. Through its regionaloperating com panies, Bellw as
om nipresent, local, and intim ate, allover A m erica; but the central
ivory tow ers at its corporate heart w ere the tallest and the ivoriest
around.
There w ere other phone com panies in A m erica, to be sure; the so-called
independents. Ruralcooperatives, m ostly; sm allfry, m ostly tolerated,
som etim es w arred upon. For m any decades,"independent" A m erican
phone com panies lived in fear and loathing of the officialBellm onopoly
(or the "BellO ctopus," as M a Bell's nineteenth- century enem ies
described her in m any angry new spaper m anifestos). Som e few of these
independent entrepreneurs, w hile legally in the w rong, fought so bit-
terly against the O ctopus that their illegalphone netw orks w ere cast
into the street by Bellagents and publicly burned.
The people of w hat used to be M a Bellare not happy about their fate.
They feelill-used. They m ight have been grudgingly w illing to m ake a
fulltransition to the free m arket; to becom e just com panies am id other
com panies.But this never happened. Instead, A T& T and the RBO CS
("the Baby Bells") feelthem selves w renched from side to side by state
regulators, by Congress, by the FCC, and especially by the federalcourt
of Judge Harold Greene, the m agistrate w ho ordered the Bellbreakup and
w ho has been the de facto czar of A m erican telecom m unications ever
since 1983.
Bell's "O ne System " of long-distance service is now only about eighty
percent of a system , w ith the rem ainder held by Sprint, M CI, and the
m idget long-distance com panies. Ugly w ars over dubious corporate
practices such as "slam m ing" (an underhanded m ethod of snitching
clients from rivals) break out w ith som e regularity in the realm of
long-distance service. The battle to break Bell's long-distance m onop-
oly w as long and ugly, and since the breakup the battlefield has not
"A T& T had a m ajor service disruption last M onday. W e didn't live up to
our ow n standards of quality, and w e didn't live up to yours. It's as sim -
ple as that. A nd that's not acceptable to us. O r to you....W e understand
how m uch people have com e to depend upon A T& T service,so our A T& T
BellLaboratories scientists and our netw ork engineers are doing every-
thing possible to guard against a recurrence.... W e know there's no w ay
to m ake up for the inconvenience this problem m ay have caused you."
In another press release,A T& T w ent to som e pains to suggest that this
"softw are glitch" *m ight* have happened just as easily to M CI,
although, in fact, it hadn't. (M CI's sw itching softw are w as quite differ-
ent from A T& T's — though not necessarily any safer.) A T& T also
announced their plans to offer a rebate of service on V alentine's D ay to
m ake up for the loss during the Crash.
Telco people found little com fort in objectivity w hen they contem plated
these possibilities. It w as just too close to the bone for them ; it w as
em barrassing; it hurt so m uch, it w as hard even to talk about.
There has alw ays been thieving and m isbehavior in the phone system .
From the outside, to the average citizen, the telcos stillseem gigantic
and im personal. The A m erican public seem s to regard them as som e-
thing akin to Soviet apparats. Even w hen the telcos do their best corpo-
rate- citizen routine, subsidizing m agnet high-schools and sponsoring
new s-show s on public television, they seem to w in little except public
suspicion.
But from the inside, allthis looks very different. There's harsh com pe-
tition. A legaland politicalsystem that seem s baffled and bored,w hen
not actively hostile to telco interests. There's a loss of m orale, a deep
sensation of having som ehow lost the upper hand. Technologicalchange
has caused a loss of data and revenue to other, new er form s of transm is-
sion. There's theft, and new form s of theft, of grow ing scale and bold-
ness and sophistication. W ith allthese factors, it w as no surprise to see
the telcos, large and sm all, break out in a litany of bitter com plaint.
Those bitter rivals: A T& T, M CIand Sprint — and a crow d of Baby Bells:
PacBell, BellSouth, Southw estern Bell, N YN EX, USW est, as w ellas the
Bellresearch consortium Bellcore, and the independent long-distance
carrier M id-A m erican — allw ere to have their role in the great hack-
er dragnet of 1990. A fter years of being battered and pushed around,
the telcos had, at least in a sm allw ay, seized the initiative again. A fter
years of turm oil, telcos and governm ent officials w ere once again to
w ork sm oothly in concert in defense of the System . O ptim ism blossom ed;
From the beginning — even before the crackdow n had a nam e — secrecy
w as a big problem . There w ere m any good reasons for secrecy in the
hacker crackdow n. H ackers and code-thieves w ere w ily prey, slinking
back to their bedroom s and basem ents and destroying vitalincrim inat-
ing evidence at the first hint of trouble. Furtherm ore, the crim es them -
selves w ere heavily technicaland difficult to describe, even to police —
m uch less to the generalpublic.
Yet operationalsecrecy w as even m ore so. If w ord got out that a nation-
w ide crackdow n w as com ing, the hackers m ight sim ply vanish; destroy
Still, that risk seem ed w ellw orth running. Better to run the risk of
vengefulattacks, than to live at the m ercy of potentialcrashers. A ny
cop w ould tellyou that a protection racket had no realfuture.
If you are a corporate security official, and you do your job brilliantly,
then nothing bad happens to your com pany at all. Because of this,you
appear com pletely superfluous. This is one of the m any unattractive
aspects of security w ork. It's rare that these folks have the chance to
draw som e healthy attention to their ow n efforts.
But to have both publicity and secrecy is to have one's cake and eat it too.
In m onths to com e, as w e w illshow , this im possible act w as to cause
great pain to the agents of the crackdow n. But early on,it seem ed possi-
ble — m aybe even likely — that the crackdow n could successfully com -
bine the best of both w orlds. The *arrest* of hackers w ould be heavily
publicized. The actual*deeds* of the hackers, w hich w ere technically
hard to explain and also a security risk, w ould be left decently obscured.
The *threat* hackers posed w ould be heavily trum peted; the likelihood
of their actually com m itting such fearsom e crim es w ould be left to the
public's im agination. The spread of the com puter underground, and its
grow ing technicalsophistication, w ould be heavily prom oted; the actual
hackers them selves, m ostly bespectacled m iddle-class w hite suburban
teenagers, w ould be denied any personalpublicity.
It does not seem to have occurred to any telco officialthat the hackers
accused w ould dem and a day in court; that journalists w ould sm ile upon
the hackers as "good copy;" that w ealthy high-tech entrepreneurs
w ould offer m oraland financialsupport to crackdow n victim s; that con-
stitutionallaw yers w ould show up w ith briefcases, frow ning m ightily.
This possibility does not seem to have ever entered the gam e-plan.
A nd even if it had, it probably w ould not have slow ed the ferocious pur-
suit of a stolen phone-com pany docum ent, m ellifluously know n as
"ControlO ffice A dm inistration of Enhanced 911 Services for Special
Services and M ajor A ccount Centers."
To the average citizen, the idea of the telephone is represented by, w ell,
a *telephone:* a device that you talk into. To a telco professional, how -
ever, the telephone itself is know n, in lordly fashion, as a "subset."
The "subset" in your house is a m ere adjunct, a distant nerve ending, of
the centralsw itching stations, w hich are ranked in levels of heirarchy,
up to the long-distance electronic sw itching stations, w hich are som e of
the largest com puters on earth.
Let us im agine that it is, say, 1925, before the introduction of com put-
ers, w hen the phone system w as sim pler and som ew hat easier to grasp.
Let's further im agine that you are M iss Leticia Luthor, a fictionaloper-
ator for M a Bellin N ew York City of the 20s.
Basically, you, M iss Luthor, *are* the "sw itching system ." You are
sitting in front of a large verticalsw itchboard, know n as a "cordboard,"
m ade of shiny w ooden panels, w ith ten thousand m etal-rim m ed holes
punched in them , know n as jacks. The engineers w ould have put m ore
holes into your sw itchboard,but ten thousand is as m any as you can
reach w ithout actually having to get up out of your chair.
Each of these ten thousand holes has its ow n little electric lightbulb,
know n as a "lam p," and its ow n neatly printed num ber code.
W ith the ease of long habit, you are scanning your board for lit-up
bulbs. This is w hat you do m ost of the tim e,so you are used to it.
A lam p lights up. This m eans that the phone at the end of that line has
been taken off the hook. W henever a handset is taken off the hook,that
closes a circuit inside the phone w hich then signals the localoffice, i.e.
you, autom atically. There m ight be som ebody calling, or then again the
phone m ight be sim ply off the hook,but this does not m atter to you yet.
The first thing you do, is record that num ber in your logbook, in your
fine A m erican public-schoolhandw riting. This com es first, naturally,
since it is done for billing purposes.
In operator's classes, before taking this job, you have been issued a
large pam phlet fullof canned operator's responses for allkinds of con-
tingencies, w hich you had to m em orize. You have also been trained in a
proper non- regional, non-ethnic pronunciation and tone of voice. You
rarely have the occasion to m ake any spontaneous rem ark to a cus-
tom er, and in fact this is frow ned upon (except out on the rurallines
w here people have tim e on their hands and get up to allkinds of m is-
chief).
A tough-sounding user's voice at the end of the line gives you a num ber.
Im m ediately, you w rite that num ber dow n in your logbook, next to the
caller's num ber, w hich you just w rote earlier. You then look and see if
the num ber this guy w ants is in fact on your sw itchboard, w hich it gen-
erally is, since it's generally a localcall. Long distance costs so m uch
that people use it sparingly.
O nly then do you pick up a calling-cord from a shelf at the base of the
sw itchboard. This is a long elastic cord m ounted on a kind of reelso that
it w illzip back in w hen you unplug it. There are a lot of cords dow n
there,and w hen a bunch of them are out at once they look like a nest of
snakes. Som e of the girls think there are bugs living in those cable-
holes. They're called "cable m ites" and are supposed to bite your hands
and give you rashes. You don't believe this, yourself.
Gripping the head of your calling-cord, you slip the tip of it deftly into
the sleeve of the jack for the called person. N ot allthe w ay in, though.
You just touch it. If you hear a clicking sound, that m eans the line is
busy and you can't put the callthrough. If the line is busy, you have to
stick the calling-cord into a "busy-tone jack," w hich w illgive the guy a
busy-tone. This w ay you don't have to talk to him yourself and absorb
his naturalhum an frustration.
But the line isn't busy. So you pop the cord allthe w ay in. Relay cir-
cuits in your board m ake the distant phone ring, and if som ebody picks
You can tellhow long the conversation lasts by the glow of the calling-
cord's lam p, dow n on the calling-cord's shelf. W hen it's over, you
unplug and the calling-cord zips back into place.
Having done this stuff a few hundred thousand tim es,you becom e quite
good at it. In fact you're plugging,and connecting,and disconnecting,
ten, tw enty, forty cords at a tim e. It's a m anualhandicraft, really,
quite satisfying in a w ay, rather like w eaving on an upright loom .
A fter four or five years of this w ork, you get m arried, and you have to
quit your job, this being the naturalorder of w om anhood in the
A m erican 1920s. The phone com pany has to train som ebody else —
m aybe tw o people,since the phone system has grow n som ew hat in the
m eantim e. A nd this costs m oney.
But fully electronic system s are inscribed on silicon chips, and are
lightning-fast, very cheap, and quite durable. They are m uch cheaper
to m aintain than even the best electrom echanicalsystem s,and they fit
into half the space. A nd w ith every year, the silicon chip grow s sm all-
er, faster, and cheaper yet. Best of all, autom ated electronics w ork
around the clock and don't have salaries or health insurance.
There are, how ever, quite serious draw backs to the use of com puter-
chips. W hen they do break dow n, it is a daunting challenge to figure out
w hat the heck has gone w rong w ith them . A broken cordboard generally
had a problem in it big enough to see. A broken chip has invisible,
m icroscopic faults. A nd the faults in bad softw are can be so subtle as to
be practically theological.
A nd so can other people. If they know how ,and if they w ant to,they can
sneak into a m icrochip via the specialphonelines and diddle w ith it,
leaving no physicaltrace at all. If they broke into the operator's station
and held Leticia at gunpoint, that w ould be very obvious. If they broke
into a telco building and w ent after an electrom echanicalsw itch w ith a
toolbelt,that w ould at least leave m any traces. But people can do all
m anner of am azing things to com puter sw itches just by typing on a key-
board, and keyboards are everyw here today. The extent of this vulnera-
bility is deep, dark, broad, alm ost m ind-boggling, and yet this is a
basic, prim alfact of life about any com puter on a netw ork.
Security experts over the past tw enty years have insisted, w ith grow ing
urgency, that this basic vulnerability of com puters represents an
entirely new levelof risk, of unknow n but obviously dire potentialto
society. A nd they are right.
Unfortunately, com puters are also stupid. Unlike hum an beings, com -
puters possess the truly profound stupidity of the inanim ate.
N evertheless, com puters *still* are profoundly brittle and stupid; they
The stuff w e call"softw are" is not like anything that hum an society is
used to thinking about. Softw are is som ething like a m achine, and som e-
thing like m athem atics, and som ething like language, and som ething like
thought, and art, and inform ation.... but softw are is not in fact any of
those other things. The protean quality of softw are is one of the great
sources of its fascination. It also m akes softw are very pow erful, very
subtle, very unpredictable, and very risky.
Som e softw are is bad and buggy. Som e is "robust," even "bulletproof."
The best softw are is that w hich has been tested by thousands of users
under thousands of different conditions, over years. It is then know n as
"stable." This does *not* m ean that the softw are is now flaw less, free
of bugs. It generally m eans that there are plenty of bugs in it, but the
bugs are w ell-identified and fairly w ellunderstood.
There is sim ply no w ay to assure that softw are is free of flaw s. Though
softw are is m athem aticalin nature, it cannot by "proven" like a m athe-
m aticaltheorem ; softw are is m ore like language, w ith inherent am bi-
guities, w ith different definitions, different assum ptions, different lev-
els of m eaning that can conflict.
Hum an beings can m anage,m ore or less,w ith hum an language because
w e can catch the gist of it.
The m odern telephone system has com e to depend, utterly and irretriev-
ably, upon softw are. A nd the System Crash of January 15, 1990, w as
caused by an *im provem ent* in softw are. O r rather, an *attem pted*
im provem ent.
The System 7 softw are for A T& T's 4ESS sw itching station, the "Generic
44E14 CentralO ffice Sw itch Softw are," had been extensively tested, and
w as considered very stable. By the end of 1989,eighty of A T& T's
sw itching system s nationw ide had been program m ed w ith the new soft-
w are. Cautiously, thirty- four stations w ere left to run the slow er,
less-capable System 6, because A T& T suspected there m ight be shake-
dow n problem s w ith the new and unprecedently sophisticated System 7
netw ork.
In order to m aintain the netw ork, sw itches m ust m onitor the condition
of other sw itches — w hether they are up and running, w hether they
have tem porarily shut dow n, w hether they are overloaded and in need of
assistance, and so forth. The new softw are helped controlthis book-
keeping function by m onitoring the status calls from other sw itches.
It only takes four to six seconds for a troubled 4ESS sw itch to rid itself
of allits calls, drop everything tem porarily, and re-boot its softw are
from scratch. Starting over from scratch w illgenerally rid the sw itch
of any softw are problem s that m ay have developed in the course of run-
ning the system . Bugs that arise w illbe sim ply w iped out by this
process. It is a clever idea. This process of autom atically re-booting
from scratch is know n as the "norm alfault recovery routine." Since
A T& T's softw are is in fact exceptionally stable, system s rarely have to
go into "fault recovery" in the first place; but A T& T has alw ays boasted
of its "realw orld" reliability, and this tactic is a belt-and-suspenders
routine.
The 4ESS sw itch used its new softw are to m onitor its fellow sw itches as
they recovered from faults. A s other sw itches cam e back on line after
recovery, they w ould send their "O K" signals to the sw itch. The sw itch
w ould m ake a little note to that effect in its "status m ap," recognizing
that the fellow sw itch w as back and ready to go,and should be sent som e
calls and put back to regular w ork.
H ow ever, the "O K, ready for w ork" signalw as the *very thing that had
caused the sw itch to go dow n in the first place.* A nd *all* the System
7 sw itches had the sam e flaw in their status-m ap softw are. A s soon as
they stopped to m ake the bookkeeping note that their fellow sw itch w as
"O K," then they too w ould becom e vulnerable to the slight chance that
tw o phone-calls w ould hit them w ithin a hundredth of a second.
A t approxim ately 2:25 p.m . EST on M onday, January 15, one of A T& T's
4ESS tollsw itching system s in N ew York City had an actual, legitim ate,
m inor problem . It w ent into fault recovery routines, announced "I'm
going dow n," then announced, "I'm back, I'm O K." A nd this cheery m es-
sage then blasted throughout the netw ork to m any of its fellow 4ESS
sw itches.
M any of the sw itches, at first, com pletely escaped trouble. These lucky
sw itches w ere not hit by the coincidence of tw o phone calls w ithin a
hundredth of a second. Their softw are did not fail— at first. But three
sw itches — in A tlanta, St. Louis, and D etroit — w ere unlucky, and w ere
caught w ith their hands full. A nd they w ent dow n. A nd they cam e back
up,alm ost im m ediately.A nd they too began to broadcast the lethalm es-
sage that they, too, w ere "O K" again, activating the lurking softw are bug
in yet other sw itches.
A s m ore and m ore sw itches did have that bit of bad luck and collapsed,
the call-traffic becam e m ore and m ore densely packed in the rem aining
sw itches, w hich w ere groaning to keep up w ith the load. A nd of course,
as the calls becam e m ore densely packed, the sw itches w ere *m uch m ore
likely* to be hit tw ice w ithin a hundredth of a second.
But the 4ESS sw itches w ere leaping up and dow n every four to six sec-
onds, in a virulent spreading w ave allover A m erica, in utter, m anic,
m echanicalstupidity. They kept *knocking* one another dow n w ith
their contagious "O K" m essages.
It took about ten m inutes for the chain reaction to cripple the netw ork.
Even then, sw itches w ould periodically luck-out and m anage to resum e
their norm alw ork. M any calls — m illions of them — w ere m anaging to
get through. But m illions w eren't.
The sw itching stations that used System 6 w ere not directly affected.
Thanks to these old-fashioned sw itches,A T& T's nationalsystem avoided
com plete collapse. This fact also m ade it clear to engineers that System
7 w as at fault.
By cutting out the backup safety netw ork entirely, they w ere able to
reduce the frenzy of "O K" m essages by about half. The system then
began to recover,as the chain reaction slow ed. By 11:30 pm on M onday
January 15, sw eating engineers on the m idnight shift breathed a sigh of
relief as the last sw itch cleared-up.
By Tuesday they w ere pulling allthe brand-new 4ESS softw are and
replacing it w ith an earlier version of System 7.
If these had been hum an operators, rather than com puters at w ork,
som eone w ould sim ply have eventually stopped scream ing. It w ould have
been *obvious* that the situation w as not "O K," and com m on sense w ould
have kicked in. Hum ans possess com m on sense — at least to som e
O n the other hand,com puters can handle hundreds of calls per second.
H um ans sim ply can't. If every single hum an being in A m erica w orked
for the phone com pany,w e couldn't m atch the perform ance of digital
sw itches: direct-dialling, three-w ay calling, speed-calling, call- w ait-
ing, Caller ID , allthe rest of the cornucopia of digitalbounty.
Replacing com puters w ith operators is sim ply not an option any m ore.
Com e 1991, how ever, the outlines of an apparent new reality w ould
begin to em erge from the fog.
Said the N ew York Tim es Service: "Telephone com pany executives and
federalregulators said they w ere not ruling out the possibility of sabo-
A nd sure enough, w ithin the w eek, a red-faced softw are com pany, D SC
Com m unications Corporation of Plano, Texas, ow ned up to "glitches" in
the "signaltransfer point" softw are that D SC had designed for Bell
A tlantic and Pacific Bell. The im m ediate cause of the July 1 Crash w as a
single m istyped character: one tiny typographicalflaw in one single
line of the softw are. O ne m istyped letter, in one single line, had
deprived the nation's capitalof phone service. It w as not particularly
surprising that this tiny flaw had escaped attention: a typicalSystem 7
station requires *ten m illion* lines of code.
This tim e, Kennedy, La Guardia, and N ew ark airports allhad their voice
and data com m unications cut. This horrifying event w as particularly
ironic, as attacks on airport com puters by hackers had long been a stan-
dard nightm are scenario, m uch trum peted by com puter- security
experts w ho feared the com puter underground.There had even been a
H ollyw ood thriller about sinister hackers ruining airport com puters —
*D ie H ard II.*
The Septem ber 17 N YC Crash, unlike the previous ones, involved not a
w hisper of "hacker" m isdeeds. O n the contrary, by 1991, A T& T itself
w as suffering m uch of the vilification that had form erly been directed at
hackers. Congressm en w ere grum bling. So w ere state and federalregu-
lators. A nd so w as the press.
For their part, ancient rivalM CItook out snide full- page new spaper
ads in N ew York, offering their ow n long- distance services for the
"next tim e that A T& T goes dow n."
"You w ouldn't find a classy com pany like A T& T using such advertising,"
protested A T& T Chairm an Robert A llen, unconvincingly. O nce again, out
cam e the full-page A T& T apologies in new spapers, apologies for "an
inexcusable culm ination of both hum an and m echanicalfailure." (This
tim e, how ever, A T& T offered no discount on later calls. Unkind critics
suggested that A T& T w ere w orried about setting any precedent for
refunding the financiallosses caused by telephone crashes.)
W hy had those N ew York sw itching system s sim ply run out of pow er?
Because no hum an being had attended to the alarm system . W hy did the
alarm system s blare autom atically, w ithout any hum an being noticing?
Because the three telco technicians w ho *should* have been listening
w ere absent from their stations in the pow er-room , on another floor of
T H E D IG IT A L U N D ER G R O U N D
The date w as M ay 9, 1990. The Pope w as touring M exico City.
H ustlers from the M edellin Cartelw ere trying to buy black-m arket
Stinger m issiles in Florida. O n the com ics page, D oonesbury character
A ndy w as dying of A ID S. A nd then.... a highly unusualitem w hose novel-
ty and calculated rhetoric w on it headscratching attention in new spapers
allover A m erica.
Eight paragraphs in the press release gave the bare facts: tw enty-seven
search w arrants carried out on M ay 8, w ith three arrests, and a hun-
dred and fifty agents on the prow lin "tw elve" cities across A m erica.
(D ifferent counts in localpress reports yielded "thirteen," "fourteen,"
and "sixteen" cities.) O fficials estim ated that crim inallosses of rev-
enue to telephone com panies "m ay run into m illions of dollars." Credit
for the Sundevilinvestigations w as taken by the US Secret Service,
A ssistant US A ttorney Tim Holtzen of Phoenix,and the A ssistant
A ttorney Generalof A rizona, GailThackeray.
O f allthe m ajor players in the H acker Crackdow n: the phone com panies,
law enforcem ent, the civillibertarians, and the "hackers" them selves —
the "hackers" are by far the m ost m ysterious, by far the hardest to
understand, by far the *w eirdest.*
But the genuine roots of the m odern hacker *underground* can probably
be traced m ost successfully to a now m uch-obscured hippie anarchist
m ovem ent know n as the Yippies. The Yippies, w ho took their nam e
from the largely fictional"Youth InternationalParty," carried out a
loud and lively policy of surrealistic subversion and outrageous politi-
calm ischief. Their basic tenets w ere flagrant sexualprom iscuity, open
and copious drug use, the politicaloverthrow of any pow erm onger over
thirty years of age, and an im m ediate end to the w ar in V ietnam , by any
The tw o m ost visible Yippies w ere A bbie H offm an and Jerry Rubin.
Rubin eventually becam e a W allStreet broker. H offm an, ardently
sought by federalauthorities, w ent into hiding for seven years, in
M exico, France, and the United States. W hile on the lam , H offm an con-
tinued to w rite and publish, w ith help from sym pathizers in the
A m erican anarcho-leftist underground. M ostly, H offm an survived
through false ID and odd jobs. Eventually he underw ent facialplastic
surgery and adopted an entirely new identity as one "Barry Freed."
A fter surrendering him self to authorities in 1980, H offm an spent a
year in prison on a cocaine conviction.
H offm an's w orldview grew m uch darker as the glory days of the 1960s
faded. In 1989, he purportedly com m itted suicide, under odd and, to
som e, rather suspicious circum stances.
H offm an, like m any a later conspirator, m ade extensive use of pay-
phones for his agitation w ork — in his case, generally through the use of
cheap brass w ashers as coin-slugs.
But this thin veilof decency w as soon dropped entirely. Ripping-off the
System found its ow n justification in deep alienation and a basic outlaw
contem pt for conventionalbourgeois values. Ingenious, vaguely politi-
cized varieties of rip-off, w hich m ight be described as "anarchy by
convenience," becam e very popular in Yippie circles, and because rip-
off w as so useful, it w as to survive the Yippie m ovem ent itself.
In the early 1970s, it required fairly lim ited expertise and ingenuity to
cheat payphones, to divert "free" electricity and gas service, or to rob
vending m achines and parking m eters for handy pocket change. It also
required a conspiracy to spread this know ledge, and the galland nerve
actually to com m it petty theft, but the Yippies had these qualifications
in plenty. In June 1971, A bbie H offm an and a telephone enthusiast sar-
castically know n as "A lBell" began publishing a new sletter called
*Youth InternationalParty Line.* This new sletter w as dedicated to col-
lating and spreading Yippie rip-off techniques, especially of phones, to
the joy of the freew heeling underground and the insensate rage of all
straight people.
*Party Line* w as run out of Greenw ich V illage for a couple of years,
then "A lBell" m ore or less defected from the faltering ranks of
Yippiedom , changing the new sletter's nam e to *TA P* or *Technical
A ssistance Program .* A fter the V ietnam W ar ended,the steam began
leaking rapidly out of A m erican radicaldissent. But by this tim e, "Bell"
and his dozen or so core contributors had the bit betw een their teeth,
and had begun to derive trem endous gut-levelsatisfaction from the sen-
sation of pure *technicalpow er.*
"A lBell" dropped out of the gam e by the late 70s,and "Tom Edison" took
over; TA P readers (som e 1400 of them , alltold) now began to show
m ore interest in telex sw itches and the grow ing phenom enon of com put-
er system s.
In 1983, "Tom Edison" had his com puter stolen and his house set on fire
by an arsonist. This w as an eventually m ortalblow to *TA P* (though
the legendary nam e w as to be resurrected in 1990 by a young
Kentuckian com puter- outlaw nam ed "Predat0r.")
_____
Because the phone netw ork pre-dates the com puter netw ork, the
scofflaw s know n as "phone phreaks" pre-date the scofflaw s know n as
"com puter hackers." In practice, today, the line betw een "phreaking"
and "hacking" is very blurred, just as the distinction betw een tele-
phones and com puters has blurred. The phone system has been digitized,
and com puters have learned to "talk" over phone-lines. W hat's w orse
— and this w as the point of the M r.Jenkins of the Secret Service — som e
A s phone-phreak conferences w ear on, people drop out (or sim ply leave
the phone off the hook,w hile they sashay off to w ork or schoolor
babysitting), and new people are phoned up and invited to join in, from
som e other continent, if possible. Technicaltrivia, boasts, brags, lies,
head-trip deceptions, w eird rum ors, and cruelgossip are allfreely
exchanged.
The sim plest w ay to stealphone-codes is sim ply to look over a victim 's
shoulder as he punches-in his ow n code-num ber on a public payphone.
This technique is know n as "shoulder-surfing," and is especially com -
m on in airports, bus term inals, and train stations. The code is then sold
by the thief for a few dollars. The buyer abusing the code has no com -
puter expertise, but calls his M om in N ew York, Kingston or Caracas
Before com puters and their phone-line m odem s entered A m erican hom es
in gigantic num bers, phone phreaks had their ow n specialtelecom m uni-
cations hardw are gadget,the fam ous "blue box." This fraud device (now
rendered increasingly useless by the digitalevolution of the phone sys-
tem ) could trick sw itching system s into granting free access to long-
distance lines. It did this by m im icking the system 's ow n signal, a tone
of 2600 hertz.
Issues of *Ram parts* w ere recalled or seized on the new sstands, and the
resultant loss of incom e helped put the m agazine out of business. This
w as an om inous precedent for free-expression issues, but the telco's
crushing of a radical-fringe m agazine passed w ithout serious challenge
at the tim e. Even in the freew heeling California 1970s, it w as w idely
felt that there w as som ething sacrosanct about w hat the phone com pany
knew ; that the telco had a legaland m oralright to protect itself by shut-
ting off the flow of such illicit inform ation. M ost telco inform ation w as
so "specialized" that it w ould scarcely be understood by any honest
m em ber of the public. If not published, it w ould not be m issed. To
print such m aterialdid not seem part of the legitim ate role of a free
press.
"V oice-m ailsystem s" can also be abused; phreaks can seize their ow n
sections of these sophisticated electronic answ ering m achines, and use
them for trading codes or know ledge of illegaltechniques. V oice-m ail
abuse does not hurt the com pany directly,but finding supposedly em pty
slots in your com pany's answ ering m achine allcram m ed w ith phreaks
eagerly chattering and hey-duding one another in im penetrable jargon
can cause sensations of alm ost m ysticalrepulsion and dread.
W orse yet, phreaks have som etim es been know n to react truculently to
attem pts to "clean up" the voice-m ailsystem . Rather than hum bly
A cts of phreak revenge against straight people are rare, but voice-m ail
system s are especially tem pting and vulnerable, and an infestation of
angry phreaks in one's voice-m ailsystem is no joke. They can erase
legitim ate m essages; or spy on private m essages; or harass users w ith
recorded taunts and obscenities. They've even been know n to seize con-
trolof voice-m ailsecurity, and lock out legitim ate users, or even shut
dow n the system entirely.
The term "hacker" has had an unfortunate history. This book, *The
H acker Crackdow n,* has little to say about "hacking" in its finer, origi-
nalsense. The term can signify the free-w heeling intellectualexplo-
For som e people, this freedom is the very breath of oxygen, the inven-
tive spontaneity that m akes life w orth living and that flings open doors
to m arvellous possibility and individualem pow erm ent. But for m any
people — and increasingly so — the hacker is an om inous figure, a
sm art- aleck sociopath ready to burst out of his basem ent w ilderness
and savage other people's lives for his ow n anarchicalconvenience.
The term "hacking" is used routinely today by alm ost alllaw enforce-
m ent officials w ith any professionalinterest in com puter fraud and
abuse. A m erican police describe alm ost any crim e com m itted w ith, by,
through, or against a com puter as hacking.
In any case, breaking into com puter system s w as hardly alien to the
originalhacker tradition. The first tottering system s of the 1960s
required fairly extensive internal surgery m erely to function day-by-
day. Their users "invaded" the deepest,m ost arcane recesses of their
operating softw are alm ost as a m atter of routine. "Com puter security"
in these early, prim itive system s w as at best an afterthought. W hat
security there w as, w as entirely physical, for it w as assum ed that any-
one allow ed near this expensive, arcane hardw are w ould be a fully qual-
ified professionalexpert.
In a cam pus environm ent, though, this m eant that grad students, teach-
ing assistants, undergraduates, and eventually, allm anner of dropouts
and hangers-on ended up accessing and often running the w orks.
This clash of values has been fraught w ith controversy. M any hackers
of the 1960s rem em ber their professionalapprenticeship as a long
guerilla w ar against the uptight m ainfram e-com puter "inform ation
priesthood." These com puter-hungry youngsters had to struggle hard
for access to com puting pow er,and m any of them w ere not above cer-
tain, er, shortcuts. But, over the years, this practice freed com puting
from the sterile reserve of lab-coated technocrats and w as largely
responsible for the explosive grow th of com puting in generalsociety —
especially *personal* com puting.
In the 1960s, definitions of "property" and "privacy" had not yet been
extended to cyberspace. Com puters w ere not yet indispensable to soci-
ety. There w ere no vast databanks of vulnerable, proprietary inform a-
tion stored in com puters, w hich m ight be accessed, copied w ithout per-
m ission, erased, altered, or sabotaged. The stakes w ere low in the early
days — but they grew every year, exponentially, as com puters them -
selves grew .
W hat did it m ean to break into a com puter w ithout perm ission and use
its com putationalpow er, or look around inside its files w ithout hurting
anything? W hat w ere com puter-intruding hackers, anyw ay — how
should society, and the law , best define their actions? W ere they just
*brow sers,* harm less intellectual explorers? W ere they *voyeurs,*
snoops, invaders of privacy? Should they be sternly treated as potential
*agents of espionage,* or perhaps as *industrialspies?* O r w ere they
best defined as *trespassers,* a very com m on teenage m isdem eanor?
W as hacking *theft of service?* (A fter all, intruders w ere getting
som eone else's com puter to carry out their orders, w ithout perm ission
and w ithout paying). W as hacking *fraud?* M aybe it w as best
described as *im personation.* The com m onest m ode of com puter intru-
sion w as (and is) to sw ipe or snoop som ebody else's passw ord,and then
enter the com puter in the guise of another person — w ho is com m only
stuck w ith the blam e and the bills.
But these w eighty assessm ents m eant little to the people w ho w ere actu-
ally being judged. From inside the underground w orld of hacking itself,
allthese perceptions seem quaint, w rongheaded, stupid, or m eaningless.
The m ost im portant self-perception of underground hackers — from the
1960s, right through to the present day — is that they are an *elite.*
The day-to-day struggle in the underground is not over sociologicaldef-
initions — w ho cares? — but for pow er,know ledge,and status am ong
one's peers.
H ackers have their *ow n* rules, w hich separate behavior w hich is cool
and elite, from behavior w hich is rodentlike, stupid and losing. These
"rules," how ever, are m ostly unw ritten and enforced by peer pressure
and tribalfeeling. Like allrules that depend on the unspoken conviction
that everybody else is a good old boy,these rules are ripe for abuse. The
m echanism s of hacker peer- pressure, "teletrials" and ostracism , are
rarely used and rarely w ork. Back-stabbing slander, threats, and elec-
tronic harassm ent are also freely em ployed in dow n- and-dirty intra-
hacker feuds, but this rarely forces a rivalout of the scene entirely.
The only realsolution for the problem of an utterly losing, treacherous
and rodentlike hacker is to *turn him in to the police.* Unlike the
M afia or M edellin Cartel, the hacker elite cannot sim ply execute the
bigm ouths, creeps and troublem akers am ong their ranks, so they turn
one another in w ith astonishing frequency.
A nd w hen that risk catches up w ith them , they w illgo right on teaching
and preaching — to a new audience this tim e, their interrogators from
law enforcem ent. A lm ost every hacker arrested tells everything he
know s — allabout his friends, his m entors, his disciples — legends,
threats, horror stories, dire rum ors, gossip, hallucinations. This is, of
course,convenient for law enforcem ent — except w hen law enforcem ent
begins to believe hacker legendry.
Phone phreaks are unique am ong crim inals in their w illingness to call
up law enforcem ent officials — in the office, at their hom es — and give
them an extended piece of their m ind. It is hard not to interpret this as
*begging for arrest,* and in fact it is an act of incredible foolhardiness.
Police are naturally nettled by these acts of chutzpah and w illgo w ell
out of their w ay to bust these flaunting idiots. But it can also be inter-
preted as a product of a w orld-view so elitist, so closed and herm etic,
that electronic police are sim ply not perceived as "police," but rather
as *enem y phone phreaks* w ho should be scolded into behaving "decent-
ly."
H ackers vary in their degree of hatred for authority and the violence of
their rhetoric. But, at a bottom line, they are scofflaw s. They don't
regard the current rules of electronic behavior as respectable efforts to
preserve law and order and protect public safety. They regard these
law s as im m oralefforts by soulless corporations to protect their profit
m argins and to crush dissidents. "Stupid" people, including police,
businessm en, politicians, and journalists, sim ply have no right to judge
the actions of those possessed of genius, techno-revolutionary inten-
tions, and technicalexpertise.
_____
Hackers are generally teenagers and college kids not engaged in earning a
living. They often com e from fairly w ell-to-do m iddle-class back-
grounds, and are m arkedly anti-m aterialistic (except, that is, w hen it
com es to com puter equipm ent). A nyone m otivated by greed for m ere
m oney (as opposed to the greed for pow er,know ledge and status) is
sw iftly w ritten-off as a narrow - m inded breadhead w hose interests can
only be corrupt and contem ptible. H aving grow n up in the 1970s and
1980s, the young Bohem ians of the digitalunderground regard straight
society as aw ash in plutocratic corruption, w here everyone from the
President dow n is for sale and w hoever has the gold m akes the rules.
H ow ever, in our contem porary w orkaday w orld, both governm ents and
corporations are very anxious indeed to police inform ation w hich is
secret, proprietary, restricted, confidential, copyrighted, patented,
hazardous, illegal, unethical, em barrassing, or otherw ise sensitive.
This m akes Goldstein persona non grata, and his philosophy a threat.
V ery little about the conditions of Goldstein's daily life w ould astonish,
say, V aclav H avel. (W e m ay note in passing that President H avelonce
had his w ord-processor confiscated by the Czechoslovak police.)
Goldstein lives by *sam izdat,* acting sem i-openly as a data-center for
the underground, w hile challenging the pow ers-that-be to abide by
Goldstein thoroughly looks and acts the part of techno-rat, w ith shoul-
der-length ringlets and a piraticalblack fisherm an's-cap set at a rak-
ish angle. He often show s up like Banquo's ghost at m eetings of com puter
professionals, w here he listens quietly, half-sm iling and taking thor-
ough notes.
Com puter professionals generally m eet publicly, and find it very diffi-
cult to rid them selves of Goldstein and his ilk w ithout extralegaland
unconstitutionalactions. Sym pathizers, m any of them quite respectable
people w ith responsible jobs, adm ire Goldstein's attitude and surrepti-
tiously pass him inform ation. A n unknow n but presum ably large pro-
portion of G oldstein's 2,000-plus readership are telco security per-
sonneland police, w ho are forced to subscribe to *2600* to stay
abreast of new developm ents in hacking. They thus find them selves
*paying this guy's rent* w hile grinding their teeth in anguish, a situa-
tion that w ould have delighted A bbie Hoffm an (one of Goldstein's few
idols).
"See w hat happens w hen you drop a 'silver box'tone or tw o dow n your
localexchange or through different long distance service carriers,"
advises *2600* contributor "M r. Upsetter" in "H ow To Build a Signal
Box." "If you experim ent system atically and keep good records, you w ill
surely discover som ething interesting."
*2600* has been published consistently since 1984. It has also run a
bulletin board com puter system , printed *2600* T-shirts, taken fax
calls... The Spring 1991 issue has an interesting announcem ent on page
45: "W e just discovered an extra set of w ires attached to our fax line
and heading up the pole. (They've since been clipped.) Your faxes to us
and to anyone else could be m onitored."
Instead, the Crackdow n of 1990 w ould concern itself w ith the com put-
erized version of forbidden data. The crackdow n itself, first and fore-
m ost, w as about *bulletin board system s.* Bulletin Board System s,
m ost often know n by the ugly and un-pluralizable acronym "BBS," are
the life-blood of the digitalunderground. Boards w ere also centralto
law enforcem ent's tactics and strategy in the Hacker Crackdow n.
A "bulletin board system " can be form ally defined as a com puter w hich
serves as an inform ation and m essage- passing center for users dialing-
up over the phone-lines through the use of m odem s. A "m odem ," or
m odulator- dem odulator, is a device w hich translates the digital
im pulses of com puters into audible analog telephone signals, and vice
versa. M odem s connect com puters to phones and thus to each other.
Consider these unique characteristics: boards are cheap, yet they can
have a national, even globalreach. Boards can be contacted from any-
w here in the globaltelephone netw ork, at *no cost* to the person run-
ning the board — the caller pays the phone bill, and if the caller is local,
For the sysop, the cost of operation is not the prim ary lim iting factor.
O nce the investm ent in a com puter and m odem has been m ade,the only
steady cost is the charge for m aintaining a phone line (or severalphone
lines). The prim ary lim its for sysops are tim e and energy. Boards
require upkeep. N ew users are generally "validated" — they m ust be
issued individualpassw ords, and called at hom e by voice-phone, so that
their identity can be verified. O bnoxious users, w ho exist in plenty,
m ust be chided or purged. Proliferating m essages m ust be deleted w hen
they grow old,so that the capacity of the system is not overw helm ed.
A nd softw are program s (if such things are kept on the board) m ust be
exam ined for possible com puter viruses. If there is a financialcharge
to use the board (increasingly com m on, especially in larger and fancier
system s) then accounts m ust be kept,and users m ust be billed. A nd if
the board crashes — a very com m on occurrence — then repairs m ust be
m ade.
Boards can also be grouped by their degree of anonym ity. There is the
com pletely anonym ous board, w here everyone uses pseudonym s — "han-
dles" — and even the sysop is unaw are of the user's true identity. The
sysop him self is likely pseudonym ous on a board of this type. Second,
and rather m ore com m on, is the board w here the sysop know s (or
thinks he know s) the true nam es and addresses of allusers, but the
users don't know one another's nam es and m ay not know his. Third is
the board w here everyone has to use realnam es, and roleplaying and
pseudonym ous posturing are forbidden.
Boards can be grouped by their ease of access. Som e boards are entirely
A nd boards can also be grouped by size. M assive, nationw ide com m ercial
netw orks, such as Com puServe, D elphi, GEnie and Prodigy, are run on
m ainfram e com puters and are generally not considered "boards," though
they share m any of their characteristics, such as electronic m ail, dis-
cussion topics, libraries of softw are, and persistent and grow ing prob-
lem s w ith civil-liberties issues. Som e private boards have as m any as
thirty phone-lines and quite sophisticated hardw are. A nd then there
are tiny boards.
Boards vary in popularity. Som e boards are huge and crow ded, w here
users m ust claw their w ay in against a constant busy-signal. O thers are
huge and em pty — there are few things sadder than a form erly flourish-
ing board w here no one posts any longer,and the dead conversations of
vanished users lie about gathering digitaldust. Som e boards are tiny
and intim ate, their telephone num bers intentionally kept confidentialso
that only a sm allnum ber can log on.
Boards cover m ost every topic im aginable and som e that are hard to
im agine. They cover a vast spectrum of socialactivity. H ow ever, all
board users do have som ething in com m on: their possession of com put-
ers and phones. N aturally, com puters and phones are prim ary topics of
conversation on alm ost every board.
Cam orra. C& M Productions. Catholics A nonym ous. Chaos Com puter
Club. Chief Executive O fficers. Circle O f D eath. Circle O f D eneb. Club
X. Coalition of H i-Tech Pirates. Coast-To-Coast. Corrupt Com puting.
Cult O f The Dead Cow . Custom Retaliations.
Eastern A lliance. The Elite H ackers Guild. Elite Phreakers and H ackers
Club. The Elite Society O f A m erica. EPG. Executives O f Crim e. Extasyy
Elite.
Fargo 4A . Farm ers O f D oom . The Federation. Feds R Us. First Class.
Five O . Five Star. Force H ackers. The 414s.
Team Hackers '86. Team Hackers '87. TeleCom putist N ew sletter Staff.
TribunalO f Know ledge. Triple Entente. Turn O ver A nd D ie Syndrom e
(TO A D S). 300 Club. 1200 Club. 2300 Club. 2600 Club. 2601 Club.
2A F.
Contem plating this list is an im pressive, alm ost hum bling business.
A s a culturalartifact, the thing approaches poetry.
Specialized orthography, especially the use of "ph" for "f" and "z" for
the plural"s," are instant recognition sym bols. So is the use of the
num eral"0" for the letter "O " — com puter-softw are orthography gen-
erally features a slash through the zero, m aking the distinction obvious.
It's quite possible that this entire list refers to as few as a thousand
people. It is not a com plete list of underground groups — there has
never been such a list, and there never w illbe. G roups rise, flourish,
decline, share m em bership, m aintain a cloud of w annabes and casual
hangers-on. People pass in and out, are ostracized, get bored, are bust-
ed by police, or are cornered by telco security and presented w ith huge
bills. M any "underground groups" are softw are pirates, "w arez d00dz,"
+------------+
| Anarchy |
+------------+
*H oly Cow !* The dam ned thing is fullof stuff about bom bs!
First, it should be acknow ledged that spreading know ledge about dem oli-
tions to teenagers is a highly and deliberately antisocialact. It is not,
how ever, illegal.
Som e people, how ever, w illactually try these plans. A determ inedly
m urderous A m erican teenager can probably buy or steala handgun far
m ore easily than he can brew fake "napalm " in the kitchen sink.
N evertheless, if tem ptation is spread before people a certain num ber
w illsuccum b, and a sm allm inority w illactually attem pt these stunts.
A large m inority of that sm all m inority w ill either fail or, quite likely,
m aim them selves, since these "philes" have not been checked for accu-
racy, are not the product of professionalexperience, and are often high-
ly fanciful. But the gloating m enace of these philes is not to be entirely
dism issed.
There have alw ays been young m en w ith obsessive interests in these
topics. N ever before,how ever,have they been able to netw ork so
extensively and easily, and to propagandize their interests w ith
im punity to random passers-by. H igh-schoolteachers w illrecognize
that there's alw ays one in a crow d,but w hen the one in a crow d escapes
controlby jum ping into the phone-lines, and becom es a hundred such
kids alltogether on a board, then trouble is brew ing visibly. The urge
of authority to *do som ething,* even som ething drastic, is hard to
resist. A nd in 1990, authority did som ething. In fact authority did a
great deal.
_____
The process by w hich boards create hackers goes som ething like this. A
youngster becom es interested in com puters — usually, com puter gam es.
H e hears from friends that "bulletin boards" exist w here gam es can be
obtained for free. (M any com puter gam es are "freew are," not copy-
righted — invented sim ply for the love of it and given aw ay to the pub-
lic;som e of these gam es are quite good.) He bugs his parents for a
m odem ,or quite often,uses his parents'm odem .
The w orld of boards suddenly opens up. Com puter gam es can be quite
expensive, realbudget-breakers for a kid, but pirated gam es, stripped
of copy protection, are cheap or free. They are also illegal, but it is
very rare, alm ost unheard of, for a sm all-scale softw are pirate to be
prosecuted. O nce "cracked" of its copy protection,the program ,being
digitaldata, becom es infinitely reproducible. Even the instructions to
the gam e,any m anuals that accom pany it,can be reproduced as text
files, or photocopied from legitim ate sets. O ther users on boards can
give m any usefulhints in gam e-playing tactics. A nd a youngster w ith an
infinite supply of free com puter gam es can certainly cut quite a sw ath
am ong his m odem - less friends.
But localboards can grow stale. A nd alm ost every board m aintains a list
of phone-num bers to other boards, som e in distant, tem pting, exotic
locales. W ho know s w hat they're up to, in O regon or A laska or Florida
or California? It's very easy to find out — just order the m odem to call
through its softw are — nothing to this, just typing on a keyboard, the
sam e thing you w ould do for m ost any com puter gam e. The m achine
reacts sw iftly and in a few seconds you are talking to a bunch of inter-
esting people on another seaboard.
Now ,you too can share codes. You can trade codes to learn other tech-
niques. If you're sm art enough to catch on,and obsessive enough to
w ant to bother, and ruthless enough to start seriously bending rules,
then you'llget better,fast. You start to develop a rep. You m ove up to a
heavier class of board — a board w ith a bad attitude,the kind of board
that naive dopes like your classm ates and your form er self have never
even heard of! You pick up the jargon of phreaking and hacking from the
board. You read a few of those anarchy philes — and m an,you never
realized you could be a real*outlaw * w ithout ever leaving your bed-
room .
You stillplay other com puter gam es, but now you have a new and bigger
gam e. This one w illbring you a different kind of status than destroying
even eight zillion lousy space invaders.
People underground are perfectly aw are that the "gam e" is frow ned upon
It's as if big com panies and their suck-up law yers think that com puting
belongs to them , and they can retailit w ith price stickers, as if it w ere
boxes of laundry soap! But pricing "inform ation" is like trying to price
air or price dream s. W ell, anybody on a pirate board know s that com -
puting can be, and ought to be, *free.* Pirate boards are little indepen-
dent w orlds in cyberspace,and they don't belong to anybody but the
underground. Underground boards aren't "brought to you by Procter &
Gam ble."
Let's sam ple another vivid hacker m anifesto. H ere are som e excerpts
from "The Conscience of a H acker," by "The M entor," from *Phrack*
V olum e O ne, Issue 7, Phile 3.
There have been underground boards alm ost as long as there have been
boards. O ne of the first w as 8BBS,w hich becam e a stronghold of the
W est Coast phone- phreak elite. A fter going on-line in M arch 1980,
8BBS sponsored "Susan Thunder," and "Tuc," and, m ost notoriously,
"the Condor." "The Condor" bore the singular distinction of becom ing
the m ost vilified A m erican phreak and hacker ever. A ngry underground
associates, fed up w ith Condor's peevish behavior, turned him in to
police, along w ith a heaping double-helping of outrageous hacker leg-
endry. A s a result, Condor w as kept in solitary confinem ent for seven
m onths, for fear that he m ight start W orld W ar Three by triggering
m issile silos from the prison payphone. (H aving served his tim e,
Condor is now w alking around loose; W W IIIhas thus far conspicuously
failed to occur.)
"414 Private" w as the hom e board for the first *group* to attract con-
spicuous trouble, the teenage "414 Gang," w hose intrusions into Sloan-
Kettering Cancer Center and Los A lam os m ilitary com puters w ere to be a
nine-days- w onder in 1 9 8 2 .
A t about this tim e, the first softw are piracy boards began to open up,
trading cracked gam es for the A tari800 and the Com m odore C64.
N aturally these boards w ere heavily frequented by teenagers. A nd w ith
the 1983 release of the hacker-thriller m ovie *W ar G am es,* the scene
exploded. It seem ed that every kid in A m erica had dem anded and gotten
a m odem for Christm as. M ost of these dabbler w annabes put their
m odem s in the attic after a few w eeks,and m ost of the rem ainder m inded
their P's and Q 's and stayed w ellout of hot w ater. But som e stubborn
and talented diehards had this hacker kid in *W ar Gam es* figured for a
happening dude. They sim ply could not rest untilthey had contacted the
underground — or, failing that, created their ow n.
The St. Louis scene w as not to rank w ith m ajor centers of A m erican
hacking such as N ew York and L.A . But St. Louis did rejoice in posses-
sion of "Knight Lightning" and "Taran King," tw o of the forem ost
*journalists* native to the underground. M issouriboards like M etal
Shop, M etalShop Private, M etalShop Brew ery, m ay not have been the
heaviest boards around in term s of illicit expertise. But they becam e
boards w here hackers could exchange socialgossip and try to figure out
w hat the heck w as going on nationally — and internationally. Gossip
from M etalShop w as put into the form of new s files, then assem bled
into a generalelectronic publication, *Phrack,* a portm anteau title
coined from "phreak" and "hack." The *Phrack* editors w ere as obses-
sively curious about other hackers as hackers w ere about m achines.
M ost any underground board not hopelessly lam e and out-of-it w ould
feature a com plete run of *Phrack* — and, possibly, the lesser-know n
standards of the underground: the *Legion of D oom TechnicalJournal,*
the obscene and raucous *Cult of the D ead Cow * files, *P/H UN * m aga-
zine, *Pirate,* the *Syndicate Reports,* and perhaps the highly
Som etim es crim es are *com m itted* on police boards. This has som e-
tim es happened by accident, as naive hackers blunder onto police boards
and blithely begin offering telephone codes. Far m ore often, how ever, it
occurs through the now alm ost-traditionaluse of "sting boards." The
first police sting-boards w ere established in 1985: "Underground
Tunnel" in A ustin, Texas, w hose sysop Sgt. Robert A nsley called him self
"Pluto" — "The Phone Com pany" in Phoenix, A rizona, run by Ken
M acLeod of the M aricopa County Sheriff's office — and Sgt.Dan
Pasquale's board in Frem ont, California. Sysops posed as hackers, and
sw iftly garnered coteries of ardent users,w ho posted codes and loaded
pirate softw are w ith abandon,and cam e to a sticky end.
Sting boards, like other boards, are cheap to operate, very cheap by the
standards of undercover police operations. O nce accepted by the local
underground, sysops w illlikely be invited into other pirate boards,
w here they can com pile m ore dossiers. A nd w hen the sting is announced
and the w orst offenders arrested, the publicity is generally gratifying.
The resultant paranoia in the underground — perhaps m ore justly
described as a "deterrence effect" — tends to quelllocallaw breaking for
quite a w hile.
The term "Legion of Doom " cam e from com ic books.The Legion of Doom ,
a conspiracy of costum ed super- villains headed by the chrom e-dom ed
crim inalultra- m asterm ind Lex Luthor, gave Superm an a lot of four-
color graphic trouble for a num ber of decades. O f course, Superm an,
that exem plar of Truth, Justice, and the A m erican W ay, alw ays w on in
the long run. This didn't m atter to the hacker D oom sters — "Legion of
D oom " w as not som e thunderous and evilSatanic reference,it w as not
m eant to be taken seriously. "Legion of D oom " cam e from funny-books
and w as supposed to be funny.
Early on, the LoD phreaks befriended a few com puter-intrusion enthu-
siasts,w ho becam e the associated "Legion of Hackers." Then the tw o
groups conflated into the "Legion of D oom /Hackers," or LoD /H.W hen
the original"hacker" w ing, M essrs. "Com pu- Phreak" and "Phucked
A gent 04," found other m atters to occupy their tim e, the extra "/H"
slow ly atrophied out of the nam e; but by this tim e the phreak w ing,
M essrs. Lex Luthor, "Blue A rcher," "G ary Seven," "Kerrang Khan,"
"M aster of Im pact," "Silver Spy," "The M arauder," and "The
V ideosm ith," had picked up a plethora of intrusion expertise and had
becom e a force to be reckoned w ith.
To see w hy this should be, let's consider the follow ing (invented) para-
graphs, as a kind of thought experim ent.
(B) "Crim son Flash 512 of the Centrex M obsters reports: D 00dz, you
w ouldn't believe this GA RD EN bullshit Bellcore's just com e up w ith!
Now you don't even need a lousy Com m odore to reprogram a sw itch —
just log on to GA RD EN as a technician, and you can reprogram sw itches
right off the keypad in any public phone booth! You can give yourself
hold-on-hold and custom ized m essage transfers, and best of all, the
thing is run off (notoriously insecure) centrex lines using — get this —
standard UN IX softw are! H a ha ha ha!"
LoD m em bers also ran their ow n boards. "Silver Spy" started his ow n
board,"Catch-22," considered one of the heaviest around. So did
"M entor," w ith his "Phoenix Project." W hen they didn't run boards
them selves,they show ed up on other people's boards,to brag,boast,and
strut. A nd w here they them selves didn't go, their philes w ent, carrying
evilknow ledge and an even m ore evilattitude.
A s early as 1986, the police w ere under the vague im pression that
*everyone* in the underground w as Legion of D oom . LoD w as never
that large — considerably sm aller than either "M etalCom m unications"
or "The A dm inistration," for instance — but LoD got trem endous press.
Especially in *Phrack,* w hich at tim es read like an LoD fan m agazine;
and *Phrack* w as everyw here, especially in the offices of telco securi-
ty. You couldn't *get* busted as a phone phreak,a hacker,or even a
lousy codes kid or w arez dood,w ithout the cops asking if you w ere LoD .
It has long been an article of faith in the underground that the "best"
hackers never get caught.They're far too sm art,supposedly. They
never get caught because they never boast,brag,or strut. These
dem igods m ay read underground boards (w ith a condescending sm ile),
but they never say anything there. The "best" hackers,according to
legend, are adult com puter professionals, such as m ainfram e system
adm inistrators, w ho already know the ins and outs of their particular
brand of security. Even the "best" hacker can't break in to just any
com puter at random :the know ledge of security holes is too specialized,
varying w idely w ith different softw are and hardw are. But if people are
em ployed to run, say, a UN IX m ainfram e or a V A X/V M S m achine, then
they tend to learn security from the inside out. A rm ed w ith this know l-
edge,they can look into m ost anybody else's UN IX or V M S w ithout m uch
trouble or risk, if they w ant to. A nd, according to hacker legend, of
course they w ant to,so of course they do. They just don't m ake a big
dealof w hat they've done. So nobody ever finds out.
There w ere uses for him . For instance, a contrite Control-C w as fea-
tured on M ichigan Bellinternalposters, sternly w arning em ployees to
shred their trash. H e'd alw ays gotten m ost of his best inside info from
"trashing" — raiding telco dum psters, for usefuldata indiscreetly
throw n aw ay. He signed these posters,too. Control-C had becom e
som ething like a M ichigan Bellm ascot. A nd in fact, Control-C *did*
keep other hackers at bay. Little hackers w ere quite scared of Control-
C and his heavy-duty Legion of D oom friends. A nd big hackers *w ere*
his friends and didn't w ant to screw up his cushy situation.
N o m atter w hat one m ight say of LoD,they did stick together. W hen
"W asp," an apparently genuinely m alicious N ew York hacker, began
crashing Bellcore m achines, Control-C received sw ift volunteer help
from "the M entor" and the Georgia LoD w ing m ade up of "The Prophet,"
"Urvile," and "Leftist." Using M entor's Phoenix Project board to coor-
dinate, the D oom sters helped telco security to trap W asp, by luring him
U rvile, Prophet and Leftist w ere w ell-qualified for this activity, prob-
ably m ore so even than the quite accom plished Control-C. The Georgia
boys knew allabout phone sw itching-stations. Though relative johnny-
com e- latelies in the Legion of D oom ,they w ere considered som e of
LoD's heaviest guys,into the hairiest system s around.They had the good
fortune to live in or near A tlanta, hom e of the sleepy and apparently
tolerant BellSouth RBO C.
W hen rum or about LoD 's m astery of Georgia's sw itching netw ork got
around to BellSouth through Bellcore and telco security scuttlebutt,
they at first refused to believe it. If you paid serious attention to every
rum or out and about these hacker kids, you w ould hear allkinds of
w acko saucer-nut nonsense: that the N ationalSecurity A gency m oni-
tored allA m erican phone calls, that the CIA and D EA tracked traffic on
bulletin-boards w ith w ord- analysis program s, that the Condor could
start W orld W ar IIIfrom a payphone.
If there w ere hackers into BellSouth sw itching- stations, then how com e
nothing had happened? N othing had been hurt. BellSouth's m achines
w eren't crashing. BellSouth w asn't suffering especially badly from
fraud. BellSouth's custom ers w eren't com plaining. BellSouth w as head-
quartered in A tlanta, am bitious m etropolis of the new high-tech
Sunbelt; and BellSouth w as upgrading its netw ork by leaps and bounds,
digitizing the w orks left right and center. They could hardly be consid-
Except now som ebody had blow n the w hole thing w ide open,and
BellSouth knew .
The electrifying new s w ent out throughout law enforcem ent in 1989. It
had never really occurred to anyone at BellSouth that their prized and
brand-new digitalsw itching-stations could be *re-program m ed.*
People seem ed utterly am azed that anyone could have the nerve. O f
course these sw itching stations w ere "com puters," and everybody knew
hackers liked to "break into com puters:" but telephone people's com -
puters w ere *different* from norm alpeople's com puters.
The exact reason *w hy* these com puters w ere "different" w as rather
ill-defined. It certainly w asn't the extent of their security. The secu-
rity on these BellSouth com puters w as lousy; the A IM SX com puters, for
instance,didn't even have passw ords. But there w as no question that
BellSouth strongly *felt* that their com puters w ere very different
indeed. A nd if there w ere som e crim inals out there w ho had not gotten
that m essage,BellSouth w as determ ined to see that m essage taught.
The Secret Service scram bler-phones and secured lines put a trem en-
dous kink in law enforcem ent's ability to operate freely; to get the w ord
out, cooperate, prevent m isunderstandings. N evertheless, 1989
scarcely seem ed the tim e for half-m easures. If the police and Secret
Service them selves w ere not operationally secure, then how could they
reasonably dem and m easures of security from private enterprise? A t
least,the inconvenience m ade people aw are of the seriousness of the
threat.
If there w as a finalspur needed to get the police off the dim e,it cam e in
the realization that the em ergency 911 system w as vulnerable. The
911 system has its ow n specialized softw are, but it is run on the sam e
digitalsw itching system s as the rest of the telephone netw ork. 911 is
not physically different from norm altelephony. But it is certainly cul-
turally different, because this is the area of telephonic cyberspace
reserved for the police and em ergency services.
The tim e had com e for action. It w as tim e to take stern m easures w ith
the underground. It w as tim e to start picking up the dropped threads,
the loose edges,the bits of braggadocio here and there;it w as tim e to get
on the stick and start putting serious casew ork together. H ackers
w eren't "invisible." They *thought* they w ere invisible; but the truth
w as,they had just been tolerated too long.
The first big break in the case cam e very early on: July 1989, the fol-
low ing m onth. The perpetrator of the "Tina" sw itch w as caught, and
confessed. H is nam e w as "Fry Guy," a 16-year-old in Indiana. Fry Guy
had been a very w icked young m an.
Fry Guy had earned his handle from a stunt involving French fries. Fry
Guy had filched the log-in of a localM acD onald's m anager and had
logged-on to the M acD onald's m ainfram e on the Sprint Telenet system .
Posing as the m anager, Fry Guy had altered M acD onald's records, and
given som e teenage ham burger-flipping friends of his, generous raises.
He had not been caught.
Fry Guy had run across "Urvile" of the Legion of D oom on the A LTO S Chat
board in Bonn, Germ any. A LTO S Chat w as a sophisticated board, accessi-
ble through globe-spanning com puter netw orks like BITnet, Tym net,
and Telenet. A LTO S w as m uch frequented by m em bers of Germ any's
Chaos Com puter Club. Tw o Chaos hackers w ho hung out on A LTO S,
"Jaeger" and "Pengo," had been the centralvillains of Clifford Stoll's
CUCKO O 'S EGG case: consorting in East Berlin w ith a spym aster from
the KGB, and breaking into A m erican com puters for hire, through the
Internet.
Fry G uy quickly learned how to raid inform ation from credit-card con-
sum er-reporting agencies. H e had over a hundred stolen credit-card
num bers in his notebooks, and upw ards of a thousand sw iped long-dis-
tance access codes.He knew how to get onto A ltos,and how to talk the talk
of the underground convincingly. He now w heedled know ledge of sw itch-
ing-station tricks from Urvile on the A LTO S system .
Com bining these tw o form s of know ledge enabled Fry Guy to bootstrap
Fry Guy and his cohort, using LoD techniques, stole six thousand dollars
from W estern Union betw een D ecem ber 1988 and July 1989. They also
dabbled in ordering delivery of stolen goods through card-fraud. Fry
Guy w as intoxicated w ith success. The sixteen-year-old fantasized
w ildly to hacker rivals, boasting that he'd used rip-off m oney to hire
him self a big lim ousine, and had driven out-of-state w ith a groupie
from his favorite heavy- m etalband, M otley Crue.
A rm ed w ith know ledge, pow er, and a gratifying stream of free m oney,
Fry Guy now took it upon him self to calllocalrepresentatives of Indiana
Bellsecurity, to brag, boast, strut, and utter torm enting w arnings that
his pow erfulfriends in the notorious Legion of D oom could crash the
nationaltelephone netw ork. Fry Guy even nam ed a date for the schem e:
the Fourth of July, a nationalholiday.
The Secret Service show ed up in force at Fry Guy's house on July 22,
1989, to the horror of his unsuspecting parents. The raiders w ere led
by a specialagent from the Secret Service's Indianapolis office.
H ow ever, the raiders w ere accom panied and advised by Tim othy M . Foley
of the Secret Service's Chicago office (a gentlem an about w hom w e w ill
soon be hearing a great deal).
The USSS interrogated Fry Guy at length. His case w as put in the charge
of D eborah D aniels, the federalUS A ttorney for the Southern D istrict of
Indiana. Fry Guy w as charged w ith eleven counts of com puter fraud,
unauthorized com puter access, and w ire fraud. The evidence w as thor-
ough and irrefutable. For his part, Fry Guy blam ed his corruption on
the Legion of Doom and offered to testify against them .
Fry Guy insisted that the Legion intended to crash the phone system on a
nationalholiday. A nd w hen A T& T crashed on M artin Luther King D ay,
1990, this lent a credence to his claim that genuinely alarm ed telco
security and the Secret Service.
Fry Guy eventually pled guilty on M ay 31, 1990. O n Septem ber 14, he
w as sentenced to forty-four m onths' probation and four hundred hours'
com m unity service. He could have had it m uch w orse; but it m ade sense
to prosecutors to take it easy on this teenage m inor, w hile zeroing in on
the notorious kingpins of the Legion of Doom .
Fry Guy's theft of long-distance codes had cost the phone com panies
plenty. The theft of long-distance service m ay be a fairly theoretical
"loss," but it costs genuine m oney and genuine tim e to delete allthose
stolen codes,and to re-issue new codes to the innocent ow ners of those
corrupted codes. The ow ners of the codes them selves are victim ized,and
lose tim e and m oney and peace of m ind in the hassle. A nd then there
w ere the credit-card victim s to dealw ith, too, and W estern Union.
W hen it cam e to rip-off, Fry Guy w as far m ore of a thief than LoD . It
w as only w hen it cam e to actualcom puter expertise that Fry Guy w as
sm allpotatoes.
The A tlanta Legion thought m ost "rules" of cyberspace w ere for rodents
and losers, but they *did* have rules. *They never crashed anything,
and they never took m oney.* These w ere rough rules-of-thum b, and
rather dubious principles w hen it com es to the ethicalsubtleties of
cyberspace, but they enabled the A tlanta Three to operate w ith a rela-
tively clear conscience (though never w ith peace of m ind).
If you didn't hack for m oney, if you w eren't robbing people of actual
funds — m oney in the bank, that is — then nobody *really* got hurt, in
But from the point of view of law enforcem ent and telco security, how -
ever, Fry Guy w as not really dangerous. The A tlanta Three *w ere* dan-
gerous. It w asn't the crim es they w ere com m itting, but the *danger,*
the potentialhazard, the sheer *technicalpow er* LoD had accum ulated,
that had m ade the situation untenable.
Fry Guy w as not LoD . H e'd never laid eyes on anyone in LoD ; his only
contacts w ith them had been electronic. Core m em bers of the Legion of
Doom tended to m eet physically for conventions every year or so,to get
drunk, give each other the hacker high-sign, send out for pizza and rav-
age hotelsuites. Fry Guy had never done any of this. D eborah D aniels
assessed Fry Guy accurately as "an LoD w annabe."
This last accusation (taken directly from a press release by the Chicago
Com puter Fraud and A buse Task Force) sounds particularly far-fetched.
O ne m ight conclude at this point that investigators w ould have been
But the H acker Crackdow n of 1990 w as not a sim ple policing action. It
w asn't m eant just to w alk the beat in cyberspace — it w as a *crack-
dow n,* a deliberate attem pt to nailthe core of the operation,to send a
dire and potent m essage that w ould settle the hash of the digitalunder-
ground for good.
By this reasoning, Fry Guy w asn't m uch m ore than the electronic equiv-
alent of a cheap streetcorner dope dealer. A s long as the m asterm inds of
LoD w ere stillflagrantly operating, pushing their m ountains of illicit
know ledge right and left, and w hipping up enthusiasm for blatant law -
breaking, then there w ould be an *infinite supply* of Fry Guys.
Because LoD w ere flagrant, they had left trails everyw here, to be picked
up by law enforcem ent in N ew York, Indiana, Florida, Texas, A rizona,
M issouri, even A ustralia. But 1990's w ar on the Legion of D oom w as
led out of Illinois, by the Chicago Com puter Fraud and A buse Task Force.
_____
The Com puter Fraud and A buse Task Force, led by federalprosecutor
W illiam J. Cook, had started in 1987 and had sw iftly becom e one of the
m ost aggressive local"dedicated com puter-crim e units." Chicago w as a
naturalhom e for such a group. The w orld's first com puter bulletin-
board system had been invented in Illinois. The state of Illinois had
som e of the nation's first and sternest com puter crim e law s. Illinois
State Police w ere m arkedly alert to the possibilities of w hite-collar
crim e and electronic fraud.
O n O ctober 2,1986,the US Senate had passed the "Com puter Fraud and
A buse A ct" unanim ously, but there w ere pitifully few convictions under
this statute. Cook's group took their nam e from this statute,since they
w ere determ ined to transform this pow erfulbut rather theoreticalA ct
of Congress into a real-life engine of legaldestruction against com puter
fraudsters and scofflaw s.
This approach m ight seem a bit dubious,to som eone not acquainted w ith
the gritty realities of prosecutorialw ork. But prosecutors don't put
people in jailfor crim es they have com m itted; they put people in jail
for crim es they have com m itted *that can be proved in court.* Chicago
federalpolice put A lCapone in prison for incom e-tax fraud. Chicago is
a big tow n, w ith a rough- and-ready bare-knuckle tradition on both
sides of the law .
Fry Guy had broken the case w ide open and alerted telco security to the
scope of the problem . But Fry Guy's crim es w ould not put the A tlanta
Three behind bars — m uch less the w acko underground journalists of
*Phrack.* So on July 22, 1989, the sam e day that Fry Guy w as raided
in Indiana,the Secret Service descended upon the A tlanta Three.
The A tlanta Three had also been identified by nam e and listed on the
extensive anti-hacker files m aintained, and retailed for pay, by private
security operative John M axfield of D etroit. M axfield, w ho had exten-
sive ties to telco security and m any inform ants in the underground, w as
a bete noire of the *Phrack* crow d, and the dislike w as m utual.
The A tlanta Three them selves had w ritten articles for *Phrack.* This
boastfulact could not possibly escape telco and law enforcem ent atten-
tion.
O n July 22, 1989, the Secret Service show ed up at the Leftist's house,
w here he lived w ith his parents. A m assive squad of som e tw enty offi-
cers surrounded the building: Secret Service, federalm arshals, local
police, possibly BellSouth telco security; it w as hard to tellin the
crush. Leftist's dad, at w ork in his basem ent office, first noticed a m us-
cular stranger in plain clothes crashing through the back yard w ith a
draw n pistol. A s m ore strangers poured into the house, Leftist's dad
Like m ost hacker parents,Leftist's m om and dad had only the vaguest
notions of w hat their son had been up to allthis tim e. Leftist had a day-
job repairing com puter hardw are. H is obsession w ith com puters
seem ed a bit odd, but harm less enough, and likely to produce a w ell-
paying career. The sudden, overw helm ing raid left Leftist's parents
traum atized.
The Leftist him self had been out after w ork w ith his co-w orkers, sur-
rounding a couple of pitchers of m argaritas. A s he cam e trucking on
tequila-num bed feet up the pavem ent, toting a bag fullof floppy-disks,
he noticed a large num ber of unm arked cars parked in his drivew ay. A ll
the cars sported tiny m icrow ave antennas.
The Secret Service had knocked the front door off its hinges,alm ost
flattening his M om .
Leftist figured the w hole thing for a big m isunderstanding. H e'd never
The A tlanta area w as unique,in that it had three m em bers of the Legion
of D oom w ho actually occupied m ore or less the sam e physical locality.
Unlike the rest of LoD,w ho tended to associate by phone and com puter,
A tlanta LoD actually *w ere* "tightly knit." It w as no realsurprise that
the Secret Service agents apprehending Urvile at the com puter-labs at
Georgia Tech, w ould discover Prophet w ith him as w ell.
Sim ulation gam es are an unusualhobby; but then hackers are unusual
people,and their favorite pastim es tend to be som ew hat out of the ordi-
nary. The best-know n A m erican sim ulation gam e is probably
"D ungeons & D ragons," a m ulti-player parlor entertainm ent played
w ith paper, m aps, pencils, statisticaltables and a variety of oddly-
shaped dice. Players pretend to be heroic characters exploring a w hol-
ly-invented fantasy w orld. The fantasy w orlds of sim ulation gam ing are
com m only pseudo-m edieval, involving sw ords and sorcery — spell-
casting w izards, knights in arm or, unicorns and dragons, dem ons and
goblins.
Urvile and his fellow gam ers preferred their fantasies highly techno-
logical. They m ade use of a gam e know n as "G.U.R.P.S.," the "Generic
UniversalRole Playing System ," published by a com pany called Steve
Jackson Gam es (SJG).
A s m ight be im agined from the com plexity of these gam es, Urvile's gam -
ing notes w ere very detailed and extensive. Urvile w as a "dungeon-
m aster," inventing scenarios for his fellow gam ers, giant sim ulated
adventure-puzzles for his friends to unravel. Urvile's gam e notes cov-
ered dozens of pages w ith allsorts of exotic lunacy, allabout ninja raids
on Libya and break-ins on encrypted Red Chinese supercom puters. H is
notes w ere w ritten on scrap-paper and kept in loose-leaf binders.
The handiest scrap paper around Urvile's college digs w ere the m any
pounds of BellSouth printouts and docum ents that he had snitched out of
telco dum psters. H is notes w ere w ritten on the back of m isappropriated
telco property. W orse yet, the gam ing notes w ere chaotically inter-
spersed w ith U rvile's hand-scraw led records involving *actualcom -
puter intrusions* that he had com m itted.
For instance, there w as the business about LoD 's ability to m onitor
phone-calls to the police and Secret Service. Urvile agreed that this
w as quite possible, and posed no big problem for LoD . In fact, he and his
friends had kicked the idea around on the "Black Ice" board, m uch as
they had discussed m any other nifty notions, such as building personal
flam e-throw ers and jury-rigging fistfulls of blasting-caps. They had
hundreds of dial-up num bers for governm ent agencies that they'd gotten
through scanning A tlanta phones, or had pulled from raided V A X/V M S
m ainfram e com puters.
The Secret Service w as less than satisfied w ith this rapier-like hacker
logic.
So of course the A tlanta Three could crash service. They probably could
have crashed service allover BellSouth territory, if they'd w orked at it
for a w hile. But A tlanta LoD w eren't crashers. O nly losers and rodents
w ere crashers. LoD w ere *elite.*
O f the three LoD stalw arts, Prophet w as in the m ost direct trouble.
Prophet w as a UN IX program m ing expert w ho burrow ed in and out of the
Internet as a m atter of course. He'd started his hacking career at
around age 14, m eddling w ith a UN IX m ainfram e system at the
U niversity of N orth Carolina.
Prophet him self had w ritten the handy Legion of D oom file "UN IX Use
and Security From the Ground Up." UN IX (pronounced "you-nicks") is
a pow erful, flexible com puter operating-system , for m ulti-user,
m ulti-tasking com puters. In 1969, w hen UN IX w as created in Bell
Labs, such com puters w ere exclusive to large corporations and univer-
sities, but today UN IX is run on thousands of pow erfulhom e m achines.
U N IX w as particularly w ell- suited to telecom m unications program -
m ing, and had becom e a standard in the field. N aturally, UN IX also
becam e a standard for the elite hacker and phone phreak.
Lately, Prophet had not been so active as Leftist and Urvile, but Prophet
w as a recidivist. In 1986, w hen he w as eighteen, Prophet had been
A fter that hum iliating bust, Prophet had gotten rid of m ost of his ton-
nage of illicit phreak and hacker data, and had tried to go straight. He
w as, after all, stillon probation. But by the autum n of 1988, the
tem ptations of cyberspace had proved too m uch for young Prophet,and
he w as shoulder-to-shoulder w ith Urvile and Leftist into som e of the
hairiest system s around.
Prophet did not dam age or delete anything in the system . His presence
in A IM SX w as harm less and alm ost invisible. But he could not rest con-
tent w ith that.
Prophet had not been looking for this docum ent. It w as m erely one
am ong hundreds of sim ilar docum ents w ith im penetrable titles.
H ow ever, having blundered over it in the course of his illicit w ander-
ings through A IM SX, he decided to take it w ith him as a trophy. It m ight
prove very usefulin som e future boasting, bragging, and strutting ses-
No one noticed that Prophet had done this. He had "stolen" the E911
D ocum ent in som e sense,but notions of property in cyberspace can be
tricky. BellSouth noticed nothing w rong, because BellSouth stillhad
their originalcopy. They had not been "robbed" of the docum ent itself.
M any people w ere supposed to copy this docum ent — specifically,people
w ho w orked for the nineteen BellSouth "specialservices and m ajor
account centers," scattered throughout the Southeastern United States.
That w as w hat it w as for, w hy it w as present on a com puter netw ork in
the first place:so that it could be copied and read — by telco em ployees.
But now the data had been copied by som eone w ho w asn't supposed to look
at it.
Prophet now had his trophy. But he further decided to store yet another
copy of the E911 D ocum ent on another person's com puter. This unw it-
ting person w as a com puter enthusiast nam ed Richard A ndrew s w ho
lived near Joliet, Illinois. Richard A ndrew s w as a U N IX program m er by
trade, and ran a pow erfulUN IX board called "Jolnet," in the basem ent of
his house.
W hy did Prophet do this? If Prophet had elim inated the E911 D ocum ent
from his ow n com puter, and kept it hundreds of m iles aw ay, on another
m achine, under an alias, then he m ight have been fairly safe from dis-
covery and prosecution — although his sneaky action had certainly put
the unsuspecting Richard A ndrew s at risk.
But, like m ost hackers, Prophet w as a pack-rat for illicit data. W hen it
cam e to the crunch, he could not bear to part from his trophy. W hen
Prophet's place in D ecatur, Georgia w as raided in July 1989, there w as
the E911 D ocum ent,a sm oking gun. A nd there w as Prophet in the hands
O ur story now takes us aw ay from the A tlanta Three and their raids of
the Sum m er of 1989. W e m ust leave A tlanta Three "cooperating fully"
w ith their num erous investigators. A nd allthree of them did cooperate,
as their Sentencing M em orandum from the US D istrict Court of the
N orthern D ivision of Georgia explained — just before allthree of them
w ere sentenced to various federalprisons in N ovem ber 1990.
The third netw ork involved the electronic circle around a hacker
know n as "Term inus."
But Term inus had odd friends and a spotted history.Term inus had once
been the subject of an adm iring interview in *Phrack* (V olum e II,
Issue 1 4 , Phile 2 — dated M ay 1 9 8 7 ). In this article, *Phrack* co-
In the early 1980s, Term inus had been a regular on Plovernet, Pirate-
80, Sherw ood Forest and Shadow land, allw ell-know n pirate boards, all
heavily frequented by the Legion of D oom . A s it happened,Term inus
w as never officially "in LoD ," because he'd never been given the official
LoD high-sign and back-slap by Legion m aven Lex Luthor. Term inus
had never physically m et anyone from LoD . But that scarcely m attered
m uch — the A tlanta Three them selves had never been officially vetted by
Lex, either.
Term inus had not crashed the A T& T phone system on January 15. He
w as, how ever, blithely running a not- for-profit A T& T softw are-pira-
cy ring. This w as not an activity A T& T found am using. A T& T security
officer Jerry D alton valued this "stolen" property at over three hundred
thousand dollars.
A T& T's entry into the tussle of free enterprise had been com plicated by
the new , vague groundrules of the inform ation econom y. Untilthe
break-up of M a Bell, A T& T w as forbidden to sellcom puter hardw are or
softw are. M a Bellw as the phone com pany; M a Bellw as not allow ed to
use the enorm ous revenue from telephone utilities, in order to finance
any entry into the com puter m arket.
A T& T has not exactly kept the UN IX cat in the bag,but it kept a grip on
its scruff w ith som e success. By the ram pant, explosive standards of
softw are piracy, A T& T UN IX source code is heavily copyrighted, w ell-
guarded, w ell-licensed. UN IX w as traditionally run only on m ainfram e
m achines, ow ned by large groups of suit-and- tie professionals, rather
than on bedroom m achines w here people can get up to easy m ischief.
A nd these w ere no m ere hacker teenagers w ith their hands fullof trash-
paper and their noses pressed to the corporate w indow pane. These guys
w ere UN IX w izards, not only carrying A T& T data in their m achines and
their heads, but eagerly netw orking about it, over m achines that w ere
far m ore pow erfulthan anything previously im agined in private hands.
How do you keep people disposable, yet assure their aw estruck respect
for your property? It w as a dilem m a.
The USSS w ere not experts in UN IX or fam iliar w ith the custom s of its
The issue of pirated A T& T softw are w ould bubble along in the back-
ground during the w ar on the Legion of Doom . Som e half-dozen of
Term inus's on-line acquaintances, including people in Illinois, Texas
and California, w ere grilled by the Secret Service in connection w ith the
illicit copying of softw are. Except for Term inus, how ever, none w ere
charged w ith a crim e. N one of them shared his peculiar prom inence in
the hacker underground.
But that did not m eant that these people w ould,or could,stay out of
trouble. The transferralof illicit data in cyberspace is hazy and ill-
defined business, w ith paradoxicaldangers for everyone concerned:
hackers, signalcarriers, board ow ners, cops, prosecutors, even ran-
dom passers-by. Som etim es, w ell-m eant attem pts to avert trouble or
punish w rongdoing bring m ore trouble than w ould sim ple ignorance,
indifference or im propriety.
Term inus's "N etsys" board w as not a com m on-or- garden bulletin board
system ,though it had m ost of the usualfunctions of a board. N etsys w as
not a stand-alone m achine, but part of the globe-spanning "UUCP"
cooperative netw ork. The UUCP netw ork uses a set of Unix softw are
program s called "Unix-to-Unix Copy," w hich allow s Unix system s to
throw data to one another at high speed through the public telephone
netw ork. UUCP is a radically decentralized, not-for-profit netw ork of
UN IX com puters. There are tens of thousands of these UN IX m achines.
Som e are sm all, but m any are pow erfuland also link to other netw orks.
UUCP has certain arcane links to m ajor netw orks such as JA N ET,
A skilled user of Term inus' UN IX m achine could send and receive elec-
tronic m ailfrom alm ost any m ajor com puter netw ork in the w orld.
N etsys w as not called a "board" per se,but rather a "node." "N odes"
w ere larger, faster, and m ore sophisticated than m ere "boards," and for
hackers,to hang out on internationally-connected "nodes" w as quite the
step up from m erely hanging out on local"boards."
Term inus's N etsys node in M aryland had a num ber of direct links to
other, sim ilar UUCP nodes, run by people w ho shared his interests and
at least som ething of his free-w heeling attitude. O ne of these nodes w as
Jolnet, ow ned by Richard A ndrew s, w ho, like Term inus, w as an inde-
pendent UN IX consultant. Jolnet also ran UN IX,and could be contacted at
high speed by m ainfram e m achines from allover the w orld. Jolnet w as
quite a sophisticated piece of w ork, technically speaking, but it w as still
run by an individual, as a private, not-for-profit hobby. Jolnet w as
m ostly used by other UN IX program m ers — for m ail, storage, and access
to netw orks. Jolnet supplied access netw ork access to about tw o hundred
people, as w ellas a localjunior college.
A m ong its various features and services, Jolnet also carried *Phrack*
m agazine.
"Robert Johnson" w as the Prophet from the Legion of Doom ,and the
E911 D ocum ent w as illicitly copied data from Prophet's raid on the
BellSouth com puters.
It struck A ndrew s as fishy that som eone not a telephone em ployee should
have a docum ent referring to the "Enhanced 911 System ." Besides, the
docum ent itself bore an obvious w arning.
"A ttctc" w as the property of A T& T,and w as run from A T& T's Custom er
Technology Center in Dallas,hence the nam e "attctc." "A ttctc" w as bet-
ter-know n as "Killer," the nam e of the m achine that the system w as
running on. "Killer" w as a hefty, pow erful, A T& T 3B2 500 m odel, a
m ulti-user, m ulti-tasking UN IX platform w ith 32 m eg of m em ory and a
m ind-boggling 3.2 Gigabytes of storage. W hen Killer had first arrived
in Texas,in 1985,the 3B2 had been one of A T& T's great w hite hopes for
going head- to-head w ith IBM for the corporate com puter-hardw are
m arket. "Killer" had been shipped to the Custom er Technology Center in
the D allas Infom art, essentially a high-technology m all, and there it
sat, a dem onstration m odel.
In the UN IX program m ing com m unity, Charlie Boykin had the reputation
of a w arm , open-hearted, level- headed kind of guy. In 1989, a group
of Texan UN IX professionals voted Boykin "System A dm inistrator of the
Year." He w as considered a fellow you could trust for good advice.
In Septem ber 1988, w ithout w arning, the E911 D ocum ent cam e plung-
ing into Boykin's life, forw arded by Richard A ndrew s. Boykin im m edi-
ately recognized that the Docum ent w as hot property. He w as not a
voice- com m unications m an, and knew little about the ins and outs of the
Baby Bells, but he certainly knew w hat the 911 System w as, and he w as
angry to see confidentialdata about it in the hands of a nogoodnik. This
w as clearly a m atter for telco security. So, on Septem ber 21, 1988,
From A T& T's security division, the E911 D ocum ent w ent to Bellcore.
Bellcore (or BELL CO m m unications REsearch) had once been the cen-
trallaboratory of the BellSystem . BellLabs em ployees had invented
the UN IX operating system . N ow Bellcore w as a quasi-independent,
jointly ow ned com pany that acted as the research arm for allseven of
the Baby BellRBO Cs. Bellcore w as in a good position to co-ordinate
security technology and consultation for the RBO Cs,and the gentlem an in
charge of this effort w as H enry M . Kluepfel, a veteran of the Bell
System w ho had w orked there for tw enty-four years.
W e can see that the "security" situation of this proprietary docum ent,
once dug out of A IM SX, sw iftly becam e bizarre. W ithout any m oney
changing hands, w ithout any particular specialeffort, this data had been
reproduced at least six tim es and had spread itself allover the continent.
By far the w orst, how ever, w as yet to com e.
For his part, Knight Lightning w as eager to publish as m uch of the docu-
m ent as he could m anage. Knight Lightning w as a fledgling political-
science m ajor w ith a particular interest in freedom -of-inform ation
issues. H e w ould gladly publish m ost anything that w ould reflect glory
on the prow ess of the underground and em barrass the telcos. How ever,
Knight Lightning him self had contacts in telco security, and som etim es
consulted them on m aterialhe'd received that m ight be too dicey for
publication.
Prophet and Knight Lightning decided to edit the E911 Docum ent so as
to delete m ost of its identifying traits. First of all, its large "N O T FO R
USE O R D ISCLO SURE" w arning had to go. Then there w ere other m atters.
For instance, it listed the office telephone num bers of severalBellSouth
911 specialists in Florida. If these phone num bers w ere published in
*Phrack,* the BellSouth em ployees involved w ould very likely be has-
sled by phone phreaks, w hich w ould anger BellSouth no end, and pose a
definite operationalhazard for both Prophet and *Phrack.*
So Knight Lightning cut the D ocum ent alm ost in half, rem oving the
phone num bers and som e of the touchier and m ore specific inform ation.
H e passed it back electronically to Prophet; Prophet w as stillnervous,
so Knight Lightning cut a bit m ore. They finally agreed that it w as ready
to go, and that it w ould be published in *Phrack* under the pseudonym ,
"The Eavesdropper."
*Phrack* tended to duck and cover w henever the heat cam e dow n.
D uring the sum m er busts of 1987 — (hacker busts tended to cluster in
sum m er, perhaps because hackers w ere easier to find at hom e than in
college) — *Phrack* had ceased publication for severalm onths, and laid
low . SeveralLoD hangers-on had been arrested, but nothing had hap-
pened to the *Phrack* crew , the prem iere gossips of the underground.
In 1988, *Phrack* had been taken over by a new editor, "Crim son
D eath," a raucous youngster w ith a taste for anarchy files.
1989, how ever, looked like a bounty year for the underground. Knight
Lightning and his co-editor Taran King took up the reins again, and
*Phrack* flourished throughout 1989. A tlanta LoD w ent dow n hard in
the sum m er of 1 9 8 9 , but *Phrack* rolled m errily on. Prophet's
E911 D ocum ent seem ed unlikely to cause *Phrack* any trouble. By
January 1990, it had been available in *Phrack* for alm ost a year.
Kluepfeland D alton, officers of Bellcore and A T& T security, had pos-
sessed the docum ent for sixteen m onths — in fact,they'd had it even
But then cam e the m onster M artin Luther King D ay Crash of January
15, 1990.
A flat three days later, on January 18, four agents show ed up at Knight
Lightning's fraternity house. O ne w as Tim othy Foley, the second
Barbara Golden,both of them Secret Service agents from the Chicago
office. A lso along w as a University of M issourisecurity officer, and
Reed N ew lin, a security m an from Southw estern Bell, the RBO C having
jurisdiction over M issouri.
Foley accused Knight Lightning of causing the nationw ide crash of the
phone system .
A nd now this event, or som ething that looked just like it, had actually
taken place. The Crash had lit a fire under the Chicago Task Force. A nd
the form er fence- sitters at Bellcore and A T& T w ere now ready to roll.
The consensus am ong telco security — already horrified by the skillof
the BellSouth intruders — w as that the digitalunderground w as out of
hand. LoD and *Phrack* m ust go.
N ext day — January 19, 1990, a Friday — the Secret Service returned
w ith a search w arrant, and thoroughly searched Knight Lightning's
upstairs room in the fraternity house. They took allhis floppy disks,
though, interestingly, they left Knight Lightning in possession of both
his com puter and his m odem . (The com puter had no hard disk, and in
Foley's judgem ent w as not a store of evidence.) But this w as a very
m inor bright spot am ong Knight Lightning's rapidly m ultiplying trou-
bles. By this tim e, Knight Lightning w as in plenty of hot w ater, not only
w ith federalpolice, prosecutors, telco investigators, and university
security, but w ith the elders of his ow n cam pus fraternity, w ho w ere
outraged to think that they had been unw ittingly harboring a federal
com puter-crim inal.
In the m eantim e,w e m ust continue our dogged pursuit of the E911
D ocum ent.
It m ust have been clear by January 1990 that the E911 D ocum ent, in
the form *Phrack* had published it back in February 1989, had gone
A nd yet, the E911 D ocum ent w as *still* stolen property, form ally and
legally speaking. A ny electronic transference of this docum ent, by any-
one unauthorized to have it, could be interpreted as an act of w ire fraud.
Interstate transfer of stolen property, including electronic property,
w as a federalcrim e.
The Chicago Com puter Fraud and A buse Task Force had been assured that
the E911 Docum ent w as w orth a hefty sum of m oney. In fact,they had a
precise estim ate of its w orth from BellSouth security personnel:
$79,449. A sum of this scale seem ed to w arrant vigorous prosecution.
Even if the dam age could not be undone,at least this large sum offered a
good legalpretext for stern punishm ent of the thieves. It seem ed likely
to im press judges and juries. A nd it could be used in court to m op up the
Legion of Doom .
The A tlanta crow d w as already in the bag,by the tim e the Chicago Task
Force had gotten around to *Phrack.* But the Legion w as a hydra-headed
thing. In late 89, a brand-new Legion of D oom board, "Phoenix
Project," had gone up in A ustin, Texas. Phoenix Project w as sysoped by
no less a m an than the M entor him self, ably assisted by University of
Texas student and hardened D oom ster "Erik Bloodaxe."
The Chicago Com puter Fraud and A buse Task Force now prepared to
descend upon A ustin,Texas.
O ddly, not one but *tw o* trails of the Task Force's investigation led
tow ard A ustin. The city of A ustin, like A tlanta, had m ade itself a bul-
w ark of the Sunbelt's Inform ation A ge, w ith a strong university
research presence, and a num ber of cutting-edge electronics com panies,
including M otorola, D ell, Com puA dd, IBM , Sem atech and M CC.
W here com puting m achinery w ent, hackers generally follow ed. A ustin
boasted not only "Phoenix Project," currently LoD 's m ost flagrant
underground board, but a num ber of UN IX nodes.
H aving interview ed Term inus and exam ined the records on N etsys, the
Chicago Task Force w ere now convinced that they had discovered an
underground gang of UN IX softw are pirates, w ho w ere dem onstrably
guilty of interstate trafficking in illicitly copied A T& T source code.
Izenberg w as sw ept into the dragnet around Term inus, the self-pro-
claim ed ultim ate UN IX hacker.
The puzzle becam ing m uch stranger som e five m inutes later. A ustin U.
S. Secret Service A gent A lSoliz, accom panied by University of Texas
cam pus-security officer Larry Coutorie and the ubiquitous Tim Foley,
m ade their appearance at Izenberg's door. They w ere in plain clothes:
slacks, polo shirts. They cam e in, and Tim Foley accused Izenberg of
belonging to the Legion of Doom .
Izenberg told them that he had never heard of the "Legion of Doom ." A nd
w hat about a certain stolen E911 Docum ent,that posed a direct threat to
the police em ergency lines? Izenberg claim ed that he'd never heard of
that, either.
W ho?
They gave him Term inus's realnam e. O h yes, said Izenberg. H e knew
*that* guy allright — he w as leading discussions on the Internet about
A T& T com puters, especially the A T& T 3B2.
Foley told Izenberg that Term inus had been acquiring hot softw are
through his, Izenberg's, m achine.
Foley told him that this m odem (a Telenet T2500 w hich ran at 19.2
kilobaud, and w hich had just gone out Izenberg's door in Secret Service
custody) w as likely hot property. Izenberg w as taken aback to hear
Still, if the United States Secret Service figured they needed his com -
puter for nationalsecurity reasons — or w hatever — then Izenberg
w ould not kick. H e figured he w ould som ehow m ake the sacrifice of his
tw enty thousand dollars' w orth of professionalequipm ent, in the spirit
of fullcooperation and good citizenship.
Six m onths w ould pass before Izenberg decided to phone the Secret
Service and ask how the case w as going.That w as the first tim e that
Robert Izenberg w ould ever hear the nam e of W illiam Cook. A s of
January 1992, a fulltw o years after the seizure, Izenberg, stillnot
charged w ith any crim e, w ould be struggling through the m orass of the
courts, in hope of recovering his thousands of dollars' w orth of seized
equipm ent.
Still, M entor could judge the clim ate. A tlanta in ruins, *Phrack* in
deep trouble, som ething w eird going on w ith UN IX nodes — discretion
w as advisable. Phoenix Project w ent off-line.
Kluepfel, of course, had been m onitoring this LoD bulletin board for his
ow n purposes — and those of the Chicago unit. A s far back as June
1987,Kluepfelhad logged on to a Texas underground board called
"Phreak Klass 2600." There he'd discovered an Chicago youngster
nam ed "Shadow haw k," strutting and boasting about rifling A T& T com -
puter files, and bragging of his am bitions to riddle A T& T's Bellcore
com puters w ith trojan horse program s. Kluepfelhad passed the new s to
Cook in Chicago,Shadow haw k's com puters had gone out the door in
Secret Service custody, and Shadow haw k him self had gone to jail.
The M entor w as less w ary. The daw n raid rousted him and his w ife from
bed in their underw ear, and six Secret Service agents, accom panied by
an A ustin policem an and H enry Kluepfelhim self, m ade a rich haul. O ff
w ent the w orks, into the agents' w hite Chevrolet m inivan: an IBM PC-
A T clone w ith 4 m eg of RA M and a 120-m eg hard disk; a H ew lett-
Packard LaserJet IIprinter; a com pletely legitim ate and highly expen-
sive SCO -Xenix 286 operating system ; Pagem aker disks and docum enta-
tion; and the M icrosoft W ord w ord-processing program . M entor's w ife
had her incom plete academ ic thesis stored on the hard-disk; that w ent,
too,and so did the couple's telephone. A s of tw o years later,allthis
property rem ained in police custody.
M entor rem ained under guard in his apartm ent as agents prepared to
raid Steve Jackson Gam es. The fact that this w as a business headquar-
ters and not a private residence did not deter the agents. It w as still
very early;no one w as at w ork yet. The agents prepared to break dow n
the door, but M entor, eavesdropping on the Secret Service w alkie-talkie
traffic,begged them not to do it,and offered his key to the building.
The exact details of the next events are unclear. The agents w ould not let
anyone else into the building. Their search w arrant, w hen produced,
w as unsigned. A pparently they breakfasted from the local
"W hataburger," as the litter from ham burgers w as later found inside.
They also extensively sam pled a bag of jellybeans kept by an SJG
SJG em ployees, diligently show ing up for the day's w ork, w ere m et at
the door and briefly questioned by U.S.Secret Service agents. The
em ployees w atched in astonishm ent as agents w ielding crow bars and
screw drivers em erged w ith captive m achines. They attacked outdoor
storage units w ith boltcutters. The agents w ore blue nylon w indbreak-
ers w ith "SECRET SERV ICE" stencilled across the back, w ith running-
shoes and jeans.
A fter the *Phrack* show -trial, the Steve Jackson Gam es scandalw as
the m ost bizarre and aggravating incident of the Hacker Crackdow n of
1990. This raid by the Chicago Task Force on a science-fiction gam ing
publisher w as to rouse a sw arm ing host of civilliberties issues, and
gave rise to an enduring controversy that w as stillre-com plicating
itself, and grow ing in the scope of its im plications, a fulltw o years
later.
The pursuit of the E911 Docum ent stopped w ith the Steve Jackson Gam es
raid. A s w e have seen, there w ere hundreds, perhaps thousands of com -
puter users in A m erica w ith the E911 D ocum ent in their possession.
Theoretically, Chicago had a perfect legalright to raid any of these peo-
ple, and could have legally seized the m achines of anybody w ho sub-
Richard A ndrew s found him self in deep trouble, thanks to the E911
D ocum ent. A ndrew s lived in Illinois, the native stom ping grounds of the
Chicago Task Force. O n February 3 and 6, both his hom e and his place of
w ork w ere raided by USSS. His m achines w ent out the door,too,and he
w as grilled at length (though not arrested). A ndrew s proved to be in
purportedly guilty possession of: UN IX SV R 3.2; UN IX SV R 3.1; UUCP;
PM O N ; W W B; IW B; D W B; N RO FF; KO RN SH ELL '88; C++; and Q UEST,
am ong other item s. A ndrew s had received this proprietary code —
w hich A T& T officially valued at w ellover $250,000 — through the
UN IX netw ork, m uch of it supplied to him as a personalfavor by
Term inus. Perhaps w orse yet, A ndrew s adm itted to returning the favor,
by passing Term inus a copy of A T& T proprietary STA RLA N source code.
Even Charles Boykin, him self an A T& T em ployee, entered som e very hot
w ater. By 1990,he'd alm ost forgotten about the E911 problem he'd
reported in Septem ber 88;in fact,since that date,he'd passed tw o m ore
security alerts to Jerry D alton, concerning m atters that Boykin consid-
ered far w orse than the E911 D ocum ent.
Boykin, w ho had him self reported the E911 problem , now found him self
under a cloud of suspicion. In a w eird private-security replay of the
Secret Service seizures, Boykin's ow n hom e w as visited by A T& T
Security and his ow n m achines w ere carried out the door.
It's interesting to note that the US Secret Service som ehow failed to
seize Boykin's "Killer" node and carry A T& T's ow n com puter out the
door. N or did they raid Boykin's hom e. They seem ed perfectly w illing
to take the w ord of A T& T Security that A T& T's em ployee,and A T& T's
"Killer" node, w ere free of hacker contraband and on the up-and-up.
But the experiences of A ndrew s and Boykin, and the users of their sys-
tem s,rem ained side issues. They did not begin to assum e the social,
political, and legalim portance that gathered, slow ly but inexorably,
around the issue of the raid on Steve Jackson Gam es.
_____
First, Steve Jackson Gam es, Inc., w as *not* a publisher of "com puter
gam es." SJG published "sim ulation gam es," parlor gam es that w ere
played on paper, w ith pencils, and dice, and printed guidebooks fullof
rules and statistics tables. There w ere no com puters involved in the
gam es them selves. W hen you bought a Steve Jackson Gam e,you did not
receive any softw are disks. W hat you got w as a plastic bag w ith som e
cardboard gam e tokens,m aybe a few m aps or a deck of cards. M ost of
their products w ere books.
"Illum inati" got its nam e from a card-gam e that Steve Jackson him self,
the com pany's founder and sole ow ner, had invented. This m ulti-player
card-gam e w as one of M r Jackson's best-know n, m ost successful, m ost
technically innovative products. "Illum inati" w as a gam e of paranoiac
conspiracy in w hich various antisocialcults w arred covertly to dom i-
nate the w orld. "Illum inati" w as hilarious, and great fun to play,
involving flying saucers, the CIA , the KGB, the phone com panies, the Ku
Klux Klan, the South A m erican N azis, the cocaine cartels, the Boy
Scouts,and dozens of other splinter groups from the tw isted depths of
M r. Jackson's professionally fervid im agination. For the uninitiated,
any public discussion of the "Illum inati" card-gam e sounded, by turns,
utterly m enacing or com pletely insane.
A nd then there w as SJG's "Car W ars," in w hich souped-up arm ored hot-
rods w ith rocket-launchers and heavy m achine-guns did battle on the
A m erican highw ays of the future. The lively Car W ars discussion on
the Illum inatiboard featured m any m eticulous, painstaking discussions
of the effects of grenades, land-m ines, flam ethrow ers and napalm . It
sounded like hacker anarchy files run am uck.
M r Jackson and his co-w orkers earned their daily bread by supplying
people w ith m ake-believe adventures and w eird ideas. The m ore far-
out, the better.
Sim ulation gam ing is an unusualpastim e, but gam ers have not generally
had to beg the perm ission of the Secret Service to exist. W argam es and
role-playing adventures are an old and honored pastim e, m uch favored
by professionalm ilitary strategists. O nce little- know n, these gam es
are now played by hundreds of thousands of enthusiasts throughout
N orth A m erica, Europe and Japan. Gam ing-books, once restricted to
hobby outlets, now com m only appear in chain-stores like B. D alton's
and W aldenbooks, and sellvigorously.
Both "Car W ars" and "Illum inati" w ere w ell-know n, popular gam es.
But the m ainstay of the Jackson organization w as their Generic
UniversalRole-Playing System , "G .U.R.P.S." The G URPS system w as
considered solid and w ell-designed, an asset for players. But perhaps
the m ost popular feature of the GURPS system w as that it allow ed gam -
ing-m asters to design scenarios that closely resem bled w ell-know n
books,m ovies,and other w orks of fantasy. Jackson had licensed and
adapted w orks from m any science fiction and fantasy authors. There w as
*G U RPS C onan,* *G U RPS Riverw orld,* *G U RPS H orseclans,* *G U RPS
W itch W orld,* nam es em inently fam iliar to science-fiction readers.
A nd there w as *GURPS SpecialO ps,* from the w orld of espionage fan-
tasy and unconventionalw arfare.
The cyberpunks had a strong follow ing am ong the globalgeneration that
had grow n up in a w orld of com puters, m ultinationalnetw orks, and
cable television. Their outlook w as considered som ew hat m orbid, cyni-
cal, and dark, but then again, so w as the outlook of their generational
peers. A s that generation m atured and increased in strength and influ-
ence, so did the cyberpunks. A s science-fiction w riters w ent, they
w ere doing fairly w ellfor them selves. By the late 1980s, their w ork
had attracted attention from gam ing com panies,including Steve Jackson
Gam es, w hich w as planning a cyberpunk sim ulation for the flourishing
GURPS gam ing- system .
The tim e seem ed ripe for such a product, w hich had already been proven
in the m arketplace. The first gam es- com pany out of the gate, w ith a
product boldly called "Cyberpunk" in defiance of possible infringem ent-
of- copyright suits, had been an upstart group called R. Talsorian.
Talsorian's Cyberpunk w as a fairly decent gam e, but the m echanics of
the sim ulation system left a lot to be desired. Com m ercially, how ever,
the gam e did very w ell.
The next cyberpunk gam e had been the even m ore successful
*Shadow run* by FA SA Corporation. The m echanics of this gam e w ere
fine, but the scenario w as rendered m oronic by sappy fantasy elem ents
like elves, trolls, w izards, and dragons — allhighly ideologically-
incorrect, according to the hard-edged, high-tech standards of cyber-
punk science fiction.
A nd now ,that book,stored on a com puter,had gone out the door in the
custody of the Secret Service.
The day after the raid, Steve Jackson visited the localSecret Service
headquarters w ith a law yer in tow . There he confronted Tim Foley (still
in A ustin at that tim e) and dem anded his book back. But there w as
trouble. *GURPS Cyberpunk,* alleged a Secret Service agent to aston-
ished businessm an Steve Jackson, w as "a m anualfor com puter crim e."
"N o, this is real." This statem ent w as repeated severaltim es, by sev-
Jackson w as left to believe that his com puters had been seized because
he intended to publish a science fiction book that law enforcem ent con-
sidered too dangerous to see print.
Like m y "cyberpunk" colleagues in the U.S. and Canada, I've never been
entirely happy w ith this literary label— especially after it becam e a
synonym for com puter crim inal. But Idid once edit a book of stories by
m y colleagues, called *M IRRO RSH A D ES: the Cyberpunk A nthology,*
and I've long been a w riter of literary- criticalcyberpunk m anifestos.
Iam not a "hacker" of any description, though Ido have readers in the
digitalunderground.
I'd know n Steve Jackson for m any years. W e knew one another as col-
leagues, for w e frequented the sam e localscience-fiction conventions.
I'd played Jackson gam es, and recognized his cleverness; but he certain-
ly had never struck m e as a potentialm asterm ind of com puter crim e.
Ialso knew a little about com puter bulletin-board system s. In the m id-
1980s Ihad taken an active role in an A ustin board called "SM O F-BBS,"
one of the first boards dedicated to science fiction. Ihad a m odem ,and on
occasion I'd logged on to Illum inati, w hich alw ays looked entertainly
w acky, but certainly harm less enough.
The neighbors grew alarm ed at the antics of the Futurians and reported
them to the Secret Service as suspected counterfeiters. In the w inter of
1939, a squad of USSS agents w ith draw n guns burst into "Futurian
H ouse," prepared to confiscate the forged currency and illicit printing
presses. There they discovered a slum bering science fiction fan nam ed
But the Jackson case did not com e to a sw ift and com ic end. No quick
answ ers cam e his w ay, or m ine; no sw ift reassurances that allw as
right in the digitalw orld, that m atters w ere w ellin hand after all.
Q uite the opposite. In m y alternate role as a som etim e pop-science
journalist, Iinterview ed Jackson and his staff for an article in a
British m agazine. The strange details of the raid left m e m ore con-
cerned than ever. W ithout its com puters, the com pany had been finan-
cially and operationally crippled. H alf the SJG w orkforce, a group of
entirely innocent people, had been sorrow fully fired, deprived of their
livelihoods by the seizure. It began to daw n on m e that authors —
A m erican w riters — m ight w ellhave their com puters seized, under
sealed w arrants, w ithout any crim inalcharge; and that, as Steve
Jackson had discovered, there w as no im m ediate recourse for this. This
w as no joke; this w asn't science fiction; this w as real.
Ideterm ined to put science fiction aside untilIhad discovered w hat had
happened and w here this trouble had com e from . It w as tim e to enter the
purportedly realw orld of electronic free expression and com puter
crim e.Hence,this book. Hence,the w orld of the telcos; and the w orld of
the digitalunderground; and next, the w orld of the police.
LA W A N D O R D ER
O f the various anti-hacker activities of 1990, "O peration Sundevil" had
by far the highest public profile. The sw eeping, nationw ide com puter
seizures of M ay 8, 1990 w ere unprecedented in scope and highly, if
rather selectively, publicized.
Unlike the efforts of the Chicago Com puter Fraud and A buse Task Force,
"O peration Sundevil" w as not intended to com bat "hacking" in the sense
of com puter intrusion or sophisticated raids on telco sw itching stations.
N or did it have anything to do w ith hacker m isdeeds w ith A T& T's soft-
w are, or w ith Southern Bell's proprietary docum ents.
In the eyes of police, people w ho actively conspire to break the law are
not regarded as "clubs," "debating salons," "users' groups," or "free
speech advocates." Rather,such people tend to find them selves form al-
ly indicted by prosecutors as "gangs," "racketeers," "corrupt organiza-
tions" and "organized crim e figures."
W hat's m ore, the illicit data contained on outlaw boards goes w ellbeyond
m ere acts of speech and/or possible crim inalconspiracy. A s w e have
seen, it w as com m on practice in the digitalunderground to post pur-
loined telephone codes on boards,for any phreak or hacker w ho cared to
abuse them . Is posting digitalbooty of this sort supposed to be protected
by the First A m endm ent? H ardly — though the issue, like m ost issues
in cyberspace, is not entirely resolved. Som e theorists argue that to
m erely *recite* a num ber publicly is not illegal — only its *use* is
illegal. But anti-hacker police point out that m agazines and new spa-
pers (m ore traditionalform s of free expression) never publish stolen
telephone codes (even though this m ight w ellraise their circulation).
Stolen credit card num bers, being riskier and m ore valuable, w ere less
often publicly posted on boards — but there is no question that som e
underground boards carried "carding" traffic, generally exchanged
through private m ail.
But besides their nuisance potentialfor the spread of illicit know ledge,
bulletin boards have another vitally interesting aspect for the profes-
sionalinvestigator. Bulletin boards are cram -fullof *evidence.* A ll
that busy trading of electronic m ail, allthose hacker boasts, brags and
struts, even the stolen codes and cards, can be neat, electronic, real-
tim e recordings of crim inalactivity.
There w ere a num ber of m otives for Sundevil. First, it offered a chance
to get ahead of the curve on w ire-fraud crim es. Tracking back credit-
card ripoffs to their perpetrators can be appallingly difficult. If these
m iscreants have any kind of electronic sophistication, they can snarl
their tracks through the phone netw ork into a m ind-boggling, untrace-
able m ess, w hile stillm anaging to "reach out and rob som eone." Boards,
how ever,fullof brags and boasts,codes and cards,offer evidence in the
handy congealed form .
M any of these raids occurred, not in the cities proper, but in associated
w hite-m iddle class suburbs — places like M ount Lebanon, Pennsylvania
and Clark Lake, M ichigan. There w ere a few raids on offices; m ost took
place in people's hom es,the classic hacker basem ents and bedroom s.
H ackers are generally not indicted (if at all) untilthe evidence in their
seized com puters is evaluated — a process that can take w eeks,m onths
— even years. W hen hackers are arrested on the spot, it's generally an
arrest for other reasons. D rugs and/or illegalw eapons show up in a
good third of anti-hacker com puter seizures (though not during
Sundevil).
That scofflaw teenage hackers (or their parents) should have m arijuana
in their hom es is probably not a shocking revelation, but the surpris-
ingly com m on presence of illegalfirearm s in hacker dens is a bit dis-
quieting. A PersonalCom puter can be a great equalizer for the techno-
cow boy — m uch like that m ore traditionalA m erican "Great Equalizer,"
the PersonalSixgun. M aybe it's not allthat surprising that som e guy
obsessed w ith pow er through illicit technology w ould also have a few
illicit high-velocity-im pact devices around. A n elem ent of the digital
underground particularly dotes on those "anarchy philes," and this ele-
m ent tends to shade into the crackpot m ilieu of survivalists, gun-nuts,
anarcho-leftists and the ultra-libertarian right-w ing.
This is not to say that hacker raids to date have uncovered any m ajor
crack-dens or illegalarsenals; but Secret Service agents do not regard
"hackers" as "just kids." They regard hackers as unpredictable people,
bright and slippery. It doesn't help m atters that the hacker him self has
been "hiding behind his keyboard" allthis tim e. Com m only, police have
no idea w hat he looks like. This m akes him an unknow n quantity, som e-
one best treated w ith proper caution.
But in any case, no one w as hurt during Sundevil, or indeed during any
part of the H acker Crackdow n.
N o few er than 150 m em bers of the Secret Service w ere sent into the
field during Sundevil. They w ere com m only accom panied by squads of
localand/or state police. M ost of these officers — especially the locals
— had never been on an anti- hacker raid before. (This w as one good
reason, in fact, w hy so m any of them w ere invited along in the first
place.) A lso, the presence of a uniform ed police officer assures the
raidees that the people entering their hom es are, in fact, police. Secret
Service agents w ear plain clothes. So do the telco security experts w ho
com m only accom pany the Secret Service on raids (and w ho m ake no
particular effort to identify them selves as m ere em ployees of telephone
com panies).
A typicalhacker raid goes som ething like this. First, police storm in
rapidly, through every entrance, w ith overw helm ing force, in the
assum ption that this tactic w illkeep casualties to a m inim um . Second,
possible suspects are im m ediately rem oved from the vicinity of any and
allcom puter system s, so that they w illhave no chance to purge or
destroy com puter evidence.Suspects are herded into a room w ithout
com puters, com m only the living room , and kept under guard — not
*arm ed* guard, for the guns are sw iftly holstered, but under guard
nevertheless. They are presented w ith the search w arrant and w arned
that anything they say m ay be held against them .Com m only they have a
great dealto say, especially if they are unsuspecting parents.
Som ew here in the house is the "hot spot" — a com puter tied to a phone
line (possibly severalcom puters and severalphones). Com m only it's a
teenager's bedroom ,but it can be anyw here in the house;there m ay be
severalsuch room s. This "hot spot" is put in charge of a tw o-agent
team , the "finder" and the "recorder." The "finder" is com puter-
trained,com m only the case agent w ho has actually obtained the search
w arrant from a judge. He or she understands w hat is being sought, and
actually carries out the seizures: unplugs m achines, opens draw ers,
desks, files, floppy-disk containers, etc. The "recorder" photographs
allthe equipm ent, just as it stands — especially the tangle of w ired con-
Even Secret Service agents w ere not, and are not, expert com puter
users. They have not m ade,and do not m ake,judgem ents on the fly about
potentialthreats posed by various form s of equipm ent. They m ay exer-
cise discretion; they m ay leave D ad his com puter, for instance, but they
don't *have* to. Standard com puter-crim e search w arrants, w hich
date back to the early 80s,use a sw eeping language that targets com put-
ers, m ost anything attached to a com puter,m ost anything used to oper-
ate a com puter — m ost anything that rem otely resem bles a com puter —
plus m ost any and allw ritten docum ents surrounding it. Com puter-
crim e investigators have strongly urged agents to seize the w orks.
But the seizure of tw enty-five boards, and the m ulti-m egabyte m oun-
tains of possibly usefulevidence contained in these boards (and in their
ow ners' other com puters, also out the door), w ere far from the only
m otives for O peration Sundevil. A n unprecedented action of great
am bition and size, Sundevil's m otives can only be described as political.
It w as a public-relations effort, m eant to pass certain m essages, m eant
to m ake certain situations clear: both in the m ind of the generalpublic,
and in the m inds of various constituencies of the electronic com m unity.
First — and this m otivation w as vital— a "m essage" w ould be sent from
law enforcem ent to the digitalunderground. This very m essage w as
recited in so m any w ords by Garry M . Jenkins, the A ssistant D irector of
the US Secret Service, at the Sundevilpress conference in Phoenix on
The results of this situation can be dire. Crim inals escape apprehension
and punishm ent. The com puter-crim e units that do exist, can't get w ork.
The true scope of com puter-crim e: its size, its realnature, the scope of
its threats, and the legalrem edies for it — allrem ain obscured.
Police treasure good relations w ith the business com m unity. Rarely
w illyou see a policem an so indiscreet as to allege publicly that som e
m ajor em ployer in his state or city has succum bed to paranoia and gone
off the rails. N evertheless, police — and com puter police in particular
— are aw are of this possibility. Com puter-crim e police can and do
spend up to half of their business hours just doing public relations:
sem inars, "dog and pony show s," som etim es w ith parents' groups or
com puter users, but generally w ith their core audience: the likely vic-
tim s of hacking crim es. These, of course, are telcos, credit card com pa-
nies and large com puter- equipped corporations. The police strongly
urge these people, as good citizens, to report offenses and press crim i-
The Secret Service is best know n for its prim ary public role: its agents
protect the President of the United States. They also guard the
President's fam ily, the V ice President and his fam ily, form er
Presidents, and Presidentialcandidates. They som etim es guard foreign
dignitaries w ho are visiting the United States, especially foreign heads
of state,and have been know n to accom pany A m erican officials on diplo-
m atic m issions overseas.
The Secret Service has been charged by Congress w ith a num ber of lit-
tle-know n duties. They guard the precious m etals in Treasury vaults.
They guard the m ost valuable historicaldocum ents of the United States:
originals of the Constitution, the D eclaration of Independence, Lincoln's
Second InauguralA ddress, an A m erican-ow ned copy of the M agna Carta,
and so forth. O nce they w ere assigned to guard the M ona Lisa,on her
A m erican tour in the 1960s.
The term "access device" seem s intuitively sim ple. It's som e kind of
high-tech gizm o you use to get m oney w ith. It m akes good sense to put
this sort of thing in the charge of counterfeiting and w ire- fraud
experts.
"A ccess device" can therefore be construed to include credit cards them -
selves (a popular forgery item now adays). It also includes credit card
account *num bers,* those standards of the digitalunderground. The
sam e goes for telephone charge cards (an increasingly popular item
w ith telcos,w ho are tired of being robbed of pocket change by phone-
booth thieves). A nd also telephone access *codes,* those *other* stan-
dards of the digitalunderground. (Stolen telephone codes m ay not
"obtain m oney," but they certainly do obtain valuable "services," w hich
is specifically forbidden by Section 1029.)
W e can now see that Section 1029 already pits the United States Secret
Service directly against the digitalunderground, w ithout any m ention at
allof the w ord "com puter."
Section 1029 is rem arkably elastic. Suppose you find a com puter pass-
w ord in som ebody's trash. That passw ord m ight be a "code" — it's cer-
tainly a "m eans of account access." Now suppose you log on to a com put-
er and copy som e softw are for yourself. You've certainly obtained "ser-
vice" (com puter service) and a "thing of value" (the softw are).
Suppose you tella dozen friends about your sw iped passw ord,and let
them use it, too. N ow you're "trafficking in unauthorized access
devices." A nd w hen the Prophet,a m em ber of the Legion of Doom ,passed
a stolen telephone com pany docum ent to Knight Lightning at *Phrack*
m agazine,they w ere both charged under Sec.1029!
There are tw o lim itations on Section 1029. First, the offense m ust
"affect interstate or foreign com m erce" in order to becom e a m atter of
federaljurisdiction. The term "affecting com m erce" is not w elldefined;
but you m ay take it as a given that the Secret Service can take an inter-
est if you've done m ost anything that happens to cross a state line.State
and localpolice can be touchy about their jurisdictions, and can som e-
tim es be m ulish w hen the feds show up. But w hen it com es to com put-
er- crim e, the localpolice are pathetically gratefulfor federalhelp —
in fact they com plain that they can't get enough of it. If you're stealing
long-distance service, you're alm ost certainly crossing state lines, and
you're definitely "affecting the interstate com m erce" of the telcos. A nd
if you're abusing credit cards by ordering stuff out of glossy catalogs
from , say, V erm ont, you're in for it.
The second lim itation is m oney. A s a rule, the feds don't pursue penny-
ante offenders. Federaljudges w illdism iss cases that appear to w aste
their tim e. Federalcrim es m ust be serious; Section 1029 specifies a
m inim um loss of a thousand dollars.
W e now com e to the very next section of Title 18, w hich is Section
1030, "Fraud and related activity in connection w ith com puters." This
statute gives the Secret Service direct jurisdiction over acts of com put-
er intrusion. O n the face of it, the Secret Service w ould now seem to
"(d) The United States Secret Service shall, *in addition to any other
agency having such authority,* have the authority to investigate offens-
es under this section. Such authority of the United States Secret Service
shallbe exercised in accordance w ith an agreem ent w hich shallbe
entered into by the Secretary of the Treasury *and the A ttorney
G eneral.*" (A uthor's italics.)
The Secretary of the Treasury is the titular head of the Secret Service,
w hile the A ttorney Generalis in charge of the FBI. In Section (d),
Congress shrugged off responsibility for the com puter-crim e turf-bat-
tle betw een the Service and the Bureau,and m ade them fight it out allby
them selves. The result w as a rather dire one for the Secret Service, for
the FBIended up w ith exclusive jurisdiction over com puter break-ins
having to do w ith nationalsecurity, foreign espionage, federally insured
banks, and U .S. m ilitary bases, w hile retaining joint jurisdiction over
allthe other com puter intrusions. Essentially, w hen it com es to Section
1030, the FBInot only gets the realglam or stuff for itself, but can peer
over the shoulder of the Secret Service and barge in to m eddle w henever
it suits them .
The second problem has to do w ith the dicey term "Federalinterest com -
puter." Section 1030(a)(2) m akes it illegalto "access a com puter
w ithout authorization" if that com puter belongs to a financialinstitution
or an issuer of credit cards (fraud cases, in other w ords). Congress
w as quite w illing to give the Secret Service jurisdiction over m oney-
transferring com puters, but Congress balked at letting them investigate
any and allcom puter intrusions. Instead, the USSS had to settle for the
m oney m achines and the "Federalinterest com puters." A "Federal
interest com puter" is a com puter w hich the governm ent itself ow ns, or
is using. Large netw orks of interstate com puters, linked over state
lines, are also considered to be of "Federalinterest." (This notion of
"Federalinterest" is legally rather foggy and has never been clearly
defined in the courts. The Secret Service has never yet had its hand
The FBIm ay have dealt itself an ace off the bottom of the deck w hen it
com es to Section 1030;but that's not the w hole story;that's not the
street.W hat's Congress thinks is one thing,and Congress has been
know n to change its m ind. The *real* turf- struggle is out there in the
streets w here it's happening. If you're a localstreet-cop w ith a com -
puter problem , the Secret Service w ants you to know w here you can find
the realexpertise. W hile the Bureau crow d are off having their
favorite shoes polished — (w ing-tips) — and m aking derisive fun of the
Service's favorite shoes — ("pansy-ass tassels") — the tassel-toting
Secret Service has a crew of ready- and-able hacker-trackers
installed in the capitalof every state in the Union. N eed advice?
They'llgive you advice, or at least point you in the right direction. N eed
training? They can see to that,too.
If you're a localcop and you callin the FBI, the FBI(as is w idely and
slanderously rum ored) w illorder you around like a coolie, take allthe
credit for your busts, and m op up every possible scrap of reflected
glory. The Secret Service, on the other hand, doesn't brag a lot. They're
the quiet types. *V ery* quiet. V ery cool. Efficient. H igh-tech.
M irrorshades, icy stares, radio ear-plugs, an U zi m achine-pistol
tucked som ew here in that w ell-cut jacket. A m erican sam urai, sw orn to
give their lives to protect our President. "The granite agents." Trained
in m artialarts, absolutely fearless. Every single one of 'em has a top-
secret security clearance. Som ething goes a little w rong, you're not
There's rom ance in the w ork of the Service. The intim ate access to cir-
cles of great pow er; the esprit- de-corps of a highly trained and disci-
plined elite; the high responsibility of defending the Chief Executive; the
fulfillm ent of a patriotic duty. A nd as police w ork goes, the pay's not
bad. But there's squalor in Service w ork, too. You m ay get spat upon by
protesters how ling abuse — and if they get violent,if they get too close,
som etim es you have to knock one of them dow n — discreetly.
N o one knew the exact extent of the threat to the currency. There w ere
panicked estim ates that as m uch as a third of the entire nationalcur-
rency w as faked. Counterfeiters — know n as "boodlers" in the under-
ground slang of the tim e — w ere m ostly technically skilled printers
w ho had gone to the bad. M any had once w orked printing legitim ate cur-
rency. Boodlers operated in rings and gangs. Technicalexperts
engraved the bogus plates — com m only in basem ents in N ew York City.
Sm ooth confidence m en passed large w ads of high-quality, high- denom -
ination fakes, including the really sophisticated stuff — governm ent
bonds, stock certificates, and railw ay shares. Cheaper, botched fakes
w ere sold or sharew ared to low -levelgangs of boodler w annabes. (The
really cheesy low life boodlers m erely upgraded realbills by altering
face values,changing ones to fives,tens to hundreds,and so on.)
Then the Secret Service entered the picture. The first agents w ere a
rough and ready crew . Their chief w as one W illiam P. W ood, a form er
guerilla in the M exican W ar w ho'd w on a reputation busting contractor
fraudsters for the W ar D epartm ent during the CivilW ar. W ood, w ho
w as also Keeper of the CapitalPrison, had a sideline as a counterfeiting
expert, bagging boodlers for the federalbounty m oney.
W ood w as nam ed Chief of the new Secret Service in July 1865. There
w ere only ten Secret Service agents in all: W ood him self, a handful
w ho'd w orked for him in the W ar D epartm ent, and a few form er private
investigators — counterfeiting experts — w hom W ood had w on over to
public service. (The Secret Service of 1865 w as m uch the size of the
Chicago Com puter Fraud Task Force or the A rizona Racketeering Unit of
1990.) These ten "O peratives" had an additionaltw enty or so "A ssistant
O peratives" and "Inform ants." Besides salary and per diem , each Secret
Service em ployee received a w hopping tw enty-five dollars for each
boodler he captured.
W ood him self publicly estim ated that at least *half* of A m erica's cur-
rency w as counterfeit, a perhaps pardonable perception. W ithin a year
the Secret Service had arrested over 200 counterfeiters. They busted
about tw o hundred boodlers a year for four years straight.
W ood attributed his success to travelling fast and light, hitting the bad-
guys hard, and avoiding bureaucratic baggage. "Because m y raids w ere
m ade w ithout m ilitary escort and Idid not ask the assistance of state
officers, Isurprised the professionalcounterfeiter."
W ood's socialm essage to the once-im pudent boodlers bore an eerie ring
W illiam P. W ood, the Secret Service's guerilla pioneer, did not end w ell.
H e succum bed to the lure of aim ing for the really big score. The notori-
ous Brockw ay Gang of N ew York City, headed by W illiam E. Brockw ay,
the "King of the Counterfeiters," had forged a num ber of governm ent
bonds. They'd passed these brilliant fakes on the prestigious W allStreet
investm ent firm of Jay Cooke and Com pany. The Cooke firm w ere fran-
tic and offered a huge rew ard for the forgers' plates.
W ood never got his m oney. A nd he lost his job to boot. He resigned in
1869.
W ood ended badly. He m ust have felt stabbed in the back. In fact his
entire organization w as m angled.
O n the other hand, W illiam P. W ood *w as* the first head of the Secret
Service. W illiam W ood w as the pioneer. People stillhonor his nam e.
W ho rem em bers the nam e of the *second* head of the Secret Service?
Shortly after this, G ailThackeray lost her job. A nd I tem porarily m is-
placed m y ow n career as a science-fiction w riter, to becom e a full-tim e
com puter-crim e journalist. In early M arch, 1 9 9 1 , I flew to Phoenix,
A rizona, to interview GailThackeray for m y book on the hacker crack-
W hat, in her expert opinion, are the w orst form s of electronic crim e, I
ask, consulting m y notes. Is it — credit card fraud? Breaking into A TM
bank m achines? Phone-phreaking? Com puter intrusions? Softw are
viruses? A ccess-code theft? Records tam pering? Softw are piracy?
Pornographic bulletin boards? Satellite TV piracy? Theft of cable ser-
vice? It's a long list. By the tim e Ireach the end of it Ifeelrather
depressed.
"O h no," says GailThackeray, leaning forw ard over the table, her w hole
body gone stiff w ith energetic indignation, "the biggest dam age is tele-
phone fraud. Fake sw eepstakes, fake charities. Boiler-room con opera-
tions. You could pay off the nationaldebt w ith w hat these guys steal....
They target old people,they get hold of credit ratings and dem ographics,
they rip off the old and the w eak." The w ords com e tum bling out of her.
It's low -tech stuff, your everyday boiler-room fraud. G rifters, con-
ning people out of m oney over the phone,have been around for decades.
This is w here the w ord "phony" cam e from !
"The 'light-bulbs for the blind' people," Thackeray m uses, w ith a spe-
cialloathing. "There's just no end to them ."
A nd the very latest is the bizarre A zScam case, in w hich state legisla-
tors w ere videotaped, eagerly taking cash from an inform ant of the
Phoenix city police departm ent,w ho w as posing as a V egas m obster.
"O h," says Thackeray cheerfully. "These people are am ateurs here, they
thought they w ere finally getting to play w ith the big boys. They don't
have the least idea how to take a bribe! It's not institutionalcorruption.
It's not like back in Philly."
H alf her life seem s to be spent training people — m erely pointing out, to
the naive and incredulous (such as m yself) that this stuff is *actually
going on out there.* It's a sm allw orld, com puter crim e. A young w orld.
GailThackeray, a trim blonde Baby- Boom er w ho favors Grand Canyon
w hite-w ater rafting to killsom e slow tim e, is one of the w orld's m ost
senior, m ost veteran "hacker-trackers." H er m entor w as D onn
Parker, the California think-tank theorist w ho got it allstarted 'w ay
back in the m id- 70s, the "grandfather of the field," "the great bald
eagle of com puter crim e."
Left to them selves, they m ostly talk about the intricacies of ripping-off
phones; it's about as interesting as listening to hot-rodders talk about
suspension and distributor-caps. They also gossip cruelly about each
other. A nd w hen talking to GailThackeray, they incrim inate them -
selves. "Ihave tapes," Thackeray says coolly.
Phone phreaks just talk like crazy. "D ial-Tone" out in A labam a has
been know n to spend half-an- hour sim ply reading stolen phone-codes
aloud into voice-m ailansw ering m achines. H undreds, thousands of
num bers, recited in a m onotone, w ithout a break — an eerie phenom e-
non. W hen arrested, it's a rare phone phreak w ho doesn't inform at
endless length on everybody he know s.
H ackers are no better. W hat other group of crim inals, she asks rhetor-
ically, publishes new sletters and holds conventions? She seem s deeply
nettled by the sheer brazenness of this behavior, though to an outsider,
this activity m ight m ake one w onder w hether hackers should be consid-
ered "crim inals" at all. Skateboarders have m agazines, and they tres-
pass a lot. Hot rod people have m agazines and they break speed lim its
and som etim es killpeople....
Iask her w hether it w ould be any loss to society if phone phreaking and
com puter hacking, as hobbies, sim ply dried up and blew aw ay, so that
nobody ever did it again.
She seem s surprised. "N o," she says sw iftly. "M aybe a little... in the old
days... the M IT stuff... But there's a lot of w onderful, legalstuff you can
do w ith com puters now ,you don't have to break into som ebody else's
just to learn. You don't have that excuse. You can learn allyou like."
A t this question, the unm istakable light of true hackerdom flares in Gail
Thackeray's eyes. She becom es tense,anim ated,the w ords pour out:
"A n A m iga 2000 w ith an IBM card and M ac em ulation! The m ost com m on
hacker m achines are A m igas and Com m odores. A nd A pples." If she had
the A m iga,she enthuses,she could run a w hole galaxy of seized com put-
er-evidence disks on one convenient m ultifunctionalm achine. A cheap
one,too. N ot like the old A ttorney Generallab,w here they had an
ancient CP/M m achine, assorted A m iga flavors and A pple flavors, a cou-
ple IBM S, allthe utility softw are... but no Com m odores. The w orksta-
tions dow n at the A ttorney General's are W ang dedicated w ord-proces-
sors. Lam e m achines tied in to an office net — though at least they get
on- line to the Lexis and W estlaw legaldata services.
Idon't say anything. Irecognize the syndrom e, though. This com puter-
fever has been running through segm ents of our society for years now .
It's a strange kind of lust: K-hunger, M eg-hunger; but it's a shared dis-
ease; it can killparties dead, as conversation spirals into the deepest
and m ost deviant recesses of softw are releases and expensive peripher-
als.... The m ark of the hacker beast. Ihave it too. The w hole "electronic
com m unity," w hatever the hellthat is, has it. GailThackeray has it.
GailThackeray is a hacker cop. M y im m ediate reaction is a strong rush
of indignant pity: *w hy doesn't som ebody buy this w om an her A m iga?!*
It's not like she's asking for a Cray X-M P supercom puter m ainfram e; an
A m iga's a sw eet little cookie-box thing. W e're losing zillions in orga-
nized fraud; prosecuting and defending a single hacker case in court can
cost a hundred grand easy. How com e nobody can com e up w ith four
lousy grand so this w om an can do her job? For a hundred grand w e could
buy every com puter cop in A m erica an A m iga. There aren't that m any of
'em .
But then again,you don't need a how itzer to enforce the law . You can do a
lot just w ith a badge. W ith a badge alone, you can basically w reak havoc,
take a terrible vengeance on w rongdoers. N inety percent of "com puter
crim e investigation" is just "crim e investigation:" nam es, places,
dossiers, m odus operandi, search w arrants, victim s, com plainants,
inform ants...
W hat w illcom puter crim e look like in ten years? W illit get better?
D id "Sundevil" send 'em reeling back in confusion?
It'llbe like it is now , only w orse, she tells m e w ith perfect conviction.
Stillthere in the background, ticking along, changing w ith the tim es: the
crim inal underw orld. It'll be like drugs are. Like our problem s w ith
alcohol. A llthe cops and law s in the w orld never solved our problem s
w ith alcohol. If there's som ething people w ant, a certain percentage of
them are just going to take it. Fifteen percent of the populace w illnever
steal. Fifteen percent w illstealm ost anything not nailed dow n. The
battle is for the hearts and m inds of the rem aining seventy percent.
A nd crim inals catch on fast. If there's not "too steep a learning curve"
— if it doesn't require a baffling am ount of expertise and practice —
then crim inals are often som e of the first through the gate of a new
D rug dealers w ent w ild over cellular phones. There are sim ple m ethods
of faking ID on cellular phones, m aking the location of the callm obile,
free of charge, and effectively untraceable. N ow victim ized cellular
com panies routinely bring in vast toll-lists of calls to Colom bia and
Pakistan.
Judge Greene's fragm entation of the phone com pany is driving law
enforcem ent nuts. Four thousand telecom m unications com panies. Fraud
skyrocketing. Every tem ptation in the w orld available w ith a phone and
a credit card num ber. Crim inals untraceable. A galaxy of "new neat
rotten things to do."
A sians just aren't m uch into phone phreaking. They're the w orld m as-
ters at organized softw are piracy. The French aren't into phone-
phreaking either. The French are into com puterized industrialespi-
onage.
A nd the viruses are getting nastier. The "Scud" virus is the latest one
out. It w ipes hard-disks.
The A ttorney General's office, built in 1981 during the Babbitt adm in-
istration, is a long low tw o- story building of w hite cem ent and w all-
sized sheets of curtain-glass. Behind each glass w allis a law yer's
office, quite open and visible to anyone strolling by. A cross the street is
a dour governm ent building labelled sim ply ECO N O M IC SECURITY,
som ething that has not been in great supply in the A m erican Southw est
lately.
The offices are about tw elve feet square. They feature tallw ooden cases
fullof red-spined law books; W ang com puter m onitors; telephones;
Post-it notes galore. A lso fram ed law diplom as and a generalexcess of
bad W estern landscape art. A nselA dam s photos are a big favorite, per-
haps to com pensate for the dism alspecter of the parking- lot, tw o acres
of striped black asphalt, w hich features gravellandscaping and som e
sickly-looking barrel cacti.
It has grow n dark. GailThackeray has told m e that the people w ho w ork
late here, are afraid of m uggings in the parking lot. It seem s cruelly
ironic that a w om an tracing electronic racketeers across the interstate
labyrinth of Cyberspace should fear an assault by a hom eless derelict in
the parking lot of her ow n w orkplace.
Perhaps this is less than coincidence. Perhaps these tw o seem ingly dis-
parate w orlds are som ehow generating one another. The poor and disen-
franchised take to the streets, w hile the rich and com puter-equipped,
Icross the parking lot to the street behind the A ttorney General's office.
A pair of young tram ps are bedding dow n on flattened sheets of card-
board, under an alcove stretching over the sidew alk. O ne tram p w ears a
glitter-covered T-shirt reading "CA LIFO RN IA " in Coca-Cola cursive.
His nose and cheeks look chafed and sw ollen;they glisten w ith w hat
seem s to be V aseline. The other tram p has a ragged long-sleeved shirt
and lank brow n hair parted in the m iddle. They both w ear blue jeans
coated in grim e. They are both drunk.
"It's our first tim e here," says the red-nosed tram p unconvincingly.
There is a lot of cardboard stacked here. M ore than any tw o people could
use.
"W e usually stay at the V innie's dow n the street," says the brow n-
haired tram p, puffing a M arlboro w ith a m editative air, as he spraw ls
w ith his head on a blue nylon backpack. "The Saint V incent's."
W e m ake eye contact. W e nod politely. Iw alk past him . "Hey! Excuse
m e sir!" he says.
"H ave you seen," the guy says rapidly, "a black guy, about 6'7", scars
on both his cheeks like this — " he gestures — "w ears a black baseball
cap on backw ards, w andering around here anyplace?"
"Yeah?"
"Iw ent to the cops and now he's got an A PB out on his ass," he says w ith
satisfaction. "You run into him , you let m e know ."
"Stanley...."
"O h," Stanley says, in the sam e rapid voice, "you don't have to reach,
uh,m e. You can just callthe cops. Go straight to the cops." He reaches
into a pocket and pulls out a greasy piece of pasteboard."See,here's m y
report on him ."
Ilook. The "report," the size of an index card, is labelled PRO -A CT:
Phoenix Residents O pposing A ctive Crim e Threat.... or is it O rganized
A gainst Crim e Threat? In the darkening street it's hard to read. Som e
kind of vigilante group? N eighborhood w atch? Ifeelvery puzzled.
"Really? But w hat's w ith the..." For the first tim e Itake a close look at
Stanley's trolley. It's a rubber-w heeled thing of industrialm etal, but
the device Ihad m istaken for a tank of propane is in fact a w ater-cooler.
Stanley also has an A rm y duffel-bag, stuffed tight as a sausage w ith
clothing or perhaps a tent, and, at the base of his trolley, a cardboard
box and a battered leather briefcase.
"Isee," Isay, quite at a loss. For the first tim e Inotice that Stanley has
a w allet. H e has not lost his w allet at all. It is in his back pocket and
chained to his belt. It's not a new w allet. It seem s to have seen a lot of
w ear.
"W ell, you know how it is, brother," says Stanley. N ow that Iknow that
he is hom eless — *a possible threat* — m y entire perception of him
has changed in an instant. His speech, w hich once seem ed just bright
and enthusiastic,now seem s to have a dangerous tang of m ania. "Ihave
to do this!" he assures m e. "Track this guy dow n...It's a thing Ido...you
know ... to keep m yself together!" H e sm iles, nods, lifts his trolley by
its decaying rubber handgrips.
"Gotta w ork together, y'know , " Stanley boom s, his face alight w ith
cheerfulness, "the police can't do everything!"
Som e people just don't get along w ith com puters. They can't read. They
can't type. They just don't have it in their heads to m aster arcane
instructions in w irebound m anuals. Som ew here, the process of com -
puterization of the populace w illreach a lim it. Som e people — quite
decent people m aybe, w ho m ight have thrived in any other situation —
w illbe left irretrievably outside the bounds. W hat's to be done w ith
these people, in the bright new shiny electrow orld? H ow w illthey be
regarded, by the m ouse-w hizzing m asters of cyberspace? W ith con-
tem pt? Indifference? Fear?
Som etim es he's a m aniac vandalready to sm ash the phone system for no
sane reason at all. Som etim es he's a fascist fed, coldly program m ing his
m ighty m ainfram es to destroy our Billof Rights. Som etim es he's a telco
bureaucrat, covertly conspiring to register allm odem s in the service of
an O rw ellian surveillance regim e. M ostly, though, this fearsom e
phantom is a "hacker." He's strange,he doesn't belong,he's not autho-
rized, he doesn't sm ellright, he's not keeping his proper place, he's not
one of us. The focus of fear is the hacker,for m uch the sam e reasons
that Stanley's fancied assailant is black.
To know Stanley is to know his dem on. If you know the other guy's
dem on,then m aybe you'llcom e to know som e of your ow n. You'llbe
able to separate reality from illusion. A nd then you w on't do your
cause,and yourself,m ore harm than good.Like poor dam ned Stanley
from Chicago did.
_____
M em bers of the FCIC are obscurely proud of this fact; they recognize
their group as aberrant, but are entirely convinced that this, for them ,
outright *w eird* behavior is nevertheless *absolutely necessary* to
get their jobs done.
FCIC regulars — from the Secret Service, the FBI, the IRS, the
D epartm ent of Labor,the offices of federalattorneys,state police,the
A ir Force, from m ilitary intelligence — often attend m eetings, held
hither and thither across the country, at their ow n expense. The FCIC
doesn't get grants. It doesn't charge m em bership fees. It doesn't have a
boss. It has no headquarters — just a m aildrop in W ashington D C, at the
Strange as this m ay seem to som e, to anyone fam iliar w ith the social
w orld of com puting, the "organization" of the FCIC is very recognizable.
For years now ,econom ists and m anagem ent theorists have speculated
that the tidalw ave of the inform ation revolution w ould destroy rigid,
pyram idalbureaucracies, w here everything is top- dow n and centrally
controlled. H ighly trained "em ployees" w ould take on m uch greater
autonom y, being self-starting, and self-m otivating, m oving from place
to place, task to task, w ith great speed and fluidity. "A d-hocracy" w ould
rule, w ith groups of people spontaneously knitting together across
organizationallines, tackling the problem at hand, applying intense
com puter-aided expertise to it, and then vanishing w hence they cam e.
This is m ore or less w hat has actually happened in the w orld of federal
com puter investigation. W ith the conspicuous exception of the phone
com panies, w hich are after allover a hundred years old, practically
*every* organization that plays any im portant role in this book func-
tions just like the FCIC. The Chicago Task Force, the A rizona
Racketeering Unit, the Legion of D oom , the Phrack crow d, the Electronic
Frontier Foundation — they *all* look and act like "tiger team s" or
"user's groups." They are allelectronic ad-hocracies leaping up spon-
taneously to attem pt to m eet a need.
Som e are police. Som e are, by strict definition, crim inals. Som e are
politicalinterest-groups. But every single group has that sam e quality
of apparent spontaneity — "Hey,gang! M y uncle's got a barn — let's put
Every one of these groups is em barrassed by this "am ateurism ," and,
for the sake of their public im age in a w orld of non-com puter people,
they allattem pt to look as stern and form aland im pressive as possible.
These electronic frontier-dw ellers resem ble groups of nineteenth-cen-
tury pioneers hankering after the respectability of statehood. There are
how ever, tw o crucialdifferences in the historicalexperience of these
"pioneers" of the nineteeth and tw enty-first centuries.
First, pow erfulinform ation technology *does* play into the hands of
sm all, fluid, loosely organized groups. There have alw ays been "pio-
neers," "hobbyists," "am ateurs," "dilettantes," "volunteers," "m ove-
m ents," "users' groups" and "blue-ribbon panels of experts" around.
But a group of this kind — w hen technically equipped to ship huge
am ounts of specialized inform ation, at lightning speed, to its m em bers,
to governm ent, and to the press — is sim ply a different kind of anim al.
It's like the difference betw een an eeland an electric eel.
If you spend your entire w orking life as a "pioneer," the w ord "pioneer"
begins to lose its m eaning. Your w ay of life looks less and less like an
introduction to "som ething else" m ore stable and organized, and m ore
and m ore like *just the w ay things are.* A "perm anent revolution" is
really a contradiction in term s. If "turm oil" lasts long enough, it sim -
ply becom es *a new kind of society* — stillthe sam e gam e of history,
but new players, new rules.
A pply this to the w orld of late tw entieth-century law enforcem ent, and
the im plications are noveland puzzling indeed. A ny bureaucratic rule-
The FBIdoes try to train its agents in the basics of electronic crim e, at
their base in Q uantico, V irginia. A nd the Secret Service, along w ith
m any other law enforcem ent groups, runs quite successfuland w ell-
attended training courses on w ire fraud, business crim e, and com puter
intrusion at the FederalLaw Enforcem ent Training Center (FLETC,
pronounced "fletsy") in Glynco,Georgia. But the best efforts of these
bureaucracies does not rem ove the absolute need for a "cutting-edge
m ess" like the FCIC.
For you see — the m em bers of FCIC *are* the trainers of the rest of law
enforcem ent. Practically and literally speaking, they are the Glynco
com puter-crim e faculty by another nam e. If the FCIC w ent over a cliff
on a bus,the U.S.law enforcem ent com m unity w ould be rendered deaf
dum b and blind in the w orld of com puter crim e, and w ould sw iftly feela
desperate need to reinvent them .A nd this is no tim e to go starting from
scratch.
O n June 11, 1991, Ionce again arrived in Phoenix, A rizona, for the
latest m eeting of the FederalCom puter Investigations Com m ittee. This
w as m ore or less the tw entieth m eeting of this stellar group. The count
w as uncertain, since nobody could figure out w hether to include the
m eetings of "the Colluquy," w hich is w hat the FCIC w as called in the
m id-1980s before it had even m anaged to obtain the dignity of its ow n
acronym .
Since m y last visit to A rizona, in M ay, the localA zScam bribery scandal
had resolved itself in a generalm uddle of hum iliation. The Phoenix
chief of police,w hose agents had videotaped nine state legislators up to
The Phoenix Chief could now join GailThackeray and eleven of her clos-
est associates in the shared experience of politically m otivated unem -
ploym ent. A s of June, resignations w ere stillcontinuing at the A rizona
A ttorney General's office, w hich could be interpreted as either a N ew
Broom Sw eeping Clean or a N ight of the Long Knives Part II, depending
on your point of view .
Since Ihad also attended the Com puters Freedom and Privacy conference
(about w hich m ore later), this w as the second tim e Ihad seen Thackeray
in a group of her law enforcem ent colleagues. O nce again Iw as struck
by how sim ply pleased they seem ed to see her. It w as naturalthat she'd
get *som e* attention,as Gailw as one of tw o w om en in a group of som e
thirty m en; but there w as a lot m ore to it than that.
The answ er cam e at once. He w ould "trash" the place. N ot reduce the
place to trash in som e orgy of vandalism ;that's not the use of the term
in the hacker m ilieu. N o, he w ould quietly *em pty the trash baskets*
and silently raid any valuable data indiscreetly throw n aw ay.
The idea sounded interesting,though. I'd been hearing a lot about the
practice lately. O n the spur of the m om ent, Idecided Iw ould try trash-
ing the office *across the hall* from the FCIC, an area w hich had noth-
ing to do w ith the investigators.
The trash w ent back in its receptacle w hile the scraps of data w ent into
m y travelbag. Idetoured through the hotelsouvenir shop for som e
Scotch tape and w ent up to m y room .
Iexam ined m y w atch. Stillplenty of tim e left for the FCIC to carry on.
Isorted out the scraps of Evelyn's SPRIN T billand re-assem bled them
w ith fresh Scotch tape. H ere w as her ten-digit FO N CA RD num ber.
D idn't seem to have the ID num ber necessary to cause realfraud trouble.
They w ere drafts of a love letter. They had been w ritten on the lined
stationery of Evelyn's em ployer, a biom edicalcom pany. Probably
w ritten at w ork w hen she should have been doing som ething else.
"D ear Bob," (not his realnam e) "Iguess in everyone's life there com es
a tim e w hen hard decisions have to be m ade,and this is a difficult one
for m e — very upsetting. Since you haven't called m e,and Idon't
understand w hy, Ican only surm ise it's because you don't w ant to. I
thought Iw ould have heard from you Friday. Idid have a few unusual
problem s w ith m y phone and possibly you tried, Ihope so. "Robert, you
asked m e to 'let go'..."
"Bob, not hearing from you for the w hole w eekend has left m e very per-
plexed..."
N ext draft.
"D ear Bob, there is so m uch Idon't understand right now , and Iw ish I
did. Iw ish Icould talk to you, but for som e unknow n reason you have
elected not to call— this is so difficult for m e to understand..."
"Bob, Since Ihave alw ays held you in such high esteem , Ihad every hope
that w e could rem ain good friends, but now one essentialingredient is
m issing — respect. Your ability to discard people w hen their purpose is
served is appalling to m e. The kindest thing you could do for m e now is
to leave m e alone.You are no longer w elcom e in m y heart or hom e..."
Try again.
"Bob,Iw rote a very factualnote to you to say how m uch respect Ihad
lost for you, by the w ay you treat people, m e in particular, so uncaring
and cold.The kindest thing you can do for m e is to leave m e alone entire-
ly, as you are no longer w elcom e in m y heart or hom e. Iw ould appreci-
ate it if you could retire your debt to m e as soon as possible — Iw ish no
link to you in any w ay. Sincerely, Evelyn."
"Bob: very sim ple. GO O D BYE! N o m ore m ind gam es — no m ore fascina-
tion — no m ore coldness — no m ore respect for you! It's over — Finis.
Evie"
There w ere tw o versions of the finalbrushoff letter, but they read about
the sam e. M aybe she hadn't sent it. The finalitem in m y illicit and
sham efulbooty w as an envelope addressed to "Bob" at his hom e address,
but it had no stam p on it and it hadn't been m ailed.
M aybe she'd just been blow ing off steam because her rascalboyfriend
had neglected to callher one w eekend. Big deal. M aybe they'd kissed and
m ade up,m aybe she and Bob w ere dow n at Pop's Chocolate Shop now ,
sharing a m alted. Sure.
Ididn't even have to have a *m alicious* m otive. M aybe I'd be "on her
side," and callup Bob instead,and anonym ously threaten to break both
his kneecaps if he didn't take Evelyn out for a steak dinner pronto. It
w as stillprofoundly *none of m y business.* To have gotten this
know ledge at allw as a sordid act and to use it w ould be to inflict a sordid
injury.
Iw ent back dow nstairs. The hard-w orking FCIC, w ho had labored forty-
five m inutes over their schedule, w ere through for the day, and
adjourned to the hotelbar. W e allhad a beer.
Ihad a chat w ith a guy about "Isis," or rather IA CIS, the International
A ssociation of Com puter Investigation Specialists. They're into "com -
puter forensics," the techniques of picking com puter- system s apart
w ithout destroying vitalevidence. IA CIS, currently run out of O regon, is
A s the em pties piled up, the guys began joshing around and telling w ar-
stories. "These are cops," Thackeray said tolerantly. "If they're not
talking shop they talk about w om en and beer."
Iheard the story about the guy w ho,asked for "a copy" of a com puter
disk, *photocopied the labelon it.* He put the floppy disk onto the glass
plate of a photocopier. The blast of static w hen the copier w orked com -
pletely erased allthe realinform ation on the disk.
Som e other poor souls threw a w hole bag of confiscated diskettes into the
squad-car trunk next to the police radio. The pow erfulradio signal
blasted them ,too.
"In the cop w orld," another guy said earnestly, "everything is good and
bad, black and w hite. In the com puter w orld everything is gray."
O ne guy — a founder of the FCIC,w ho'd been w ith the group since it w as
just the Colluquy — described his ow n introduction to the field. H e'd
been a W ashington D C hom icide guy called in on a "hacker" case. From
the w ord "hacker," he naturally assum ed he w as on the trailof a knife-
w ielding m arauder,and w ent to the com puter center expecting blood and
a body. W hen he finally figured out w hat w as happening there (after
loudly dem anding, in vain, that the program m ers "speak English"), he
called headquarters and told them he w as clueless about com puters.
They told him nobody else knew diddly either,and to get the hellback to
w ork.
The ice broke big-tim e in M em phis in '86. The Colluquy had attracted a
bunch of new guys — Secret Service, FBI, m ilitary, other feds, heavy
guys.Nobody w anted to tellanybody anything. They suspected that if
w ord got back to the hom e office they'd allbe fired. They passed an
uncom fortably guarded afternoon.
The form alities got them now here. But after the form alsession w as
over, the organizers brought in a case of beer. A s soon as the partici-
pants knocked it off w ith the bureaucratic ranks and turf-fighting,
everything changed. "Ibared m y soul," one veteran rem inisced proudly.
By nightfallthey w ere building pyram ids of em pty beer-cans and doing
everything but com posing a team fight song.
FCIC w ere not the only com puter-crim e people around. There w as
D A TTA (D istrict A ttorneys'Technology Theft A ssociation), though they
m ostly specialized in chip theft, intellectualproperty, and black-m ar-
ket cases. There w as HTCIA (High Tech Com puter Investigators
A ssociation), also out in Silicon V alley, a year older than FCIC and fea-
turing brilliant people like D onald Ingraham . There w as LEETA C (Law
Enforcem ent Electronic Technology A ssistance Com m ittee) in Florida,
and com puter- crim e units in Illinois and M aryland and Texas and O hio
and Colorado and Pennsylvania. But these w ere localgroups. FCIC w ere
the first to really netw ork nationally and on a federallevel.
FCIC has three basic sub-tribes: the trainers, the security people, and
A gain and again Iheard this, w ith different term s but identicalsenti-
m ents. "I'd been sitting in the w ilderness talking to m yself." "Iw as
totally isolated." "Iw as desperate." "FCIC is the best thing there is
about com puter crim e in A m erica." "FCIC is w hat really w orks." "This
is w here you hear realpeople telling you w hat's really happening out
there, not just law yers picking nits." "W e taught each other everything
w e knew ."
The sincerity of these statem ents convinces m e that this is true. FCIC is
the realthing and it is invaluable. It's also very sharply at odds w ith
the rest of the traditions and pow er structure in A m erican law enforce-
m ent. There probably hasn't been anything around as loose and go-get-
ting as the FCIC since the start of the U.S. Secret Service in the 1860s.
FCIC people are living like tw enty-first- century people in a tw enti-
eth-century environm ent, and w hile there's a great dealto be said for
that,there's also a great dealto be said against it,and those against it
happen to controlthe budgets.
FCIC people tend to change jobs a lot. They tend not to get the equipm ent
and training they w ant and need. A nd they tend to get sued quite often.
A s the night w ore on and a band set up in the bar, the talk grew darker.
N othing ever gets done in governm ent,som eone opined,untilthere's a
*disaster.* Com puting disasters are aw ful, but there's no denying that
they greatly help the credibility of FCIC people. The Internet W orm ,
for instance. "For years w e'd been w arning about that — but it's nothing
com pared to w hat's com ing." They expect horrors,these people. They
know that nothing w illreally get done untilthere is a horror.
_____
N ext day w e heard an extensive briefing from a guy w ho'd been a com -
puter cop, gotten into hot w ater w ith an A rizona city council, and now
installed com puter netw orks for a living (at a considerable rise in pay).
H e talked about pulling fiber-optic netw orks apart.
"Inside inform ant," som ebody said. Right. There's alw ays the hum an
angle,som ething easy to forget w hen contem plating the arcane recesses
of high technology. Cops are skilled at getting people to talk,and com -
puter people, given a chair and som e sustained attention, w illtalk about
their com puters tilltheir throats go raw . There's a case on record of a
single question — "H ow 'd you do it?" — eliciting a forty-five-m inute
videotaped confession from a com puter crim inalw ho not only com plete-
ly incrim inated him self but drew helpfuldiagram s.
Com puter people talk. H ackers *brag.* Phone- phreaks talk *patho-
logically* — w hy else are they stealing phone-codes, if not to natter for
ten hours straight to their friends on an opposite seaboard? Com puter-
M ost every phone-phreak ever busted has sw iftly im plicated his m en-
tors, his disciples, and his friends. M ost every w hite-collar com puter-
crim inal, sm ugly convinced that his clever schem e is bulletproof,
sw iftly learns otherw ise w hen, for the first tim e in his life, an actual
no-kidding policem an leans over, grabs the front of his shirt, looks him
right in the eye and says: "A llright, *asshole* — you and m e are going
dow ntow n!" A llthe hardw are in the w orld w illnot insulate your
nerves from these actualreal-life sensations of terror and guilt.
Cops know w ays to get from point A to point Z w ithout thum bing through
every letter in som e sm art-ass bad-guy's alphabet. Cops know how to
cut to the chase. Cops know a lot of things other people don't know .
Hackers know a lot of things other people don't know ,too. Hackers
know , for instance, how to sneak into your com puter through the phone-
lines. But cops can show up *right on your doorstep* and carry off
*you* and your com puter in separate steelboxes. A cop interested in
hackers can grab them and grillthem . A hacker interested in cops has to
depend on hearsay, underground legends, and w hat cops are w illing to
publicly reveal. A nd the Secret Service didn't get nam ed "the *Secret*
Service" because they blab a lot.
Som e people, our lecturer inform ed us, w ere under the m istaken
im pression that it w as "im possible" to tap a fiber-optic line. W ell, he
announced, he and his son had just w hipped up a fiber-optic tap in his
w orkshop at hom e. H e passed it around the audience, along w ith a cir-
cuit-covered LA N plug-in card so w e'd allrecognize one if w e saw it on a
case. W e allhad a look.
The guy w ith the Uzicap w as a forensic photographer. He also did a lot
of photographic surveillance w ork in com puter crim e cases. H e used
to, that is, untilthe firings in Phoenix. H e w as now a private investi-
gator and, w ith his w ife, ran a photography salon specializing in w ed-
dings and portrait photos. A t — one m ust repeat — a considerable rise in
incom e.
In one case,a tiger team of A rizona cops had trashed a localresidence for
four m onths. Every w eek they show ed up on the m unicipalgarbage
truck,disguised as garbagem en,and carried the contents of the suspect
cans off to a shade tree,w here they com bed through the garbage — a
m essy task, especially considering that one of the occupants w as under-
going kidney dialysis. A llusefuldocum ents w ere cleaned, dried and
exam ined. A discarded typew riter-ribbon w as an especially valuable
source of data, as its long one- strike ribbon of film contained the con-
tents of every letter m ailed out of the house. The letters w ere neatly
retyped by a police secretary equipped w ith a large desk-m ounted m ag-
nifying glass.
Take the low ly subject of *m anhole covers.* The hum ble m anhole cover
reproduces m any of the dilem m as of com puter-security in m iniature.
M anhole covers are, of course, technologicalartifacts, access-points to
our buried urban infrastructure. To the vast m ajority of us, m anhole
covers are invisible. They are also vulnerable. For m any years now ,
the Secret Service has m ade a point of caulking m anhole covers along all
Lately, m anhole covers have seen m ore and m ore crim inalexploitation,
especially in N ew York City. Recently, a telco in N ew York City discov-
ered that a cable television service had been sneaking into telco m an-
holes and installing cable service alongside the phone-lines — *w ithout
paying royalties.* N ew York com panies have also suffered a general
plague of (a) underground copper cable theft; (b) dum ping of garbage,
including toxic w aste, and (c) hasty dum ping of m urder victim s.
Q uite likely it has never occurred to you to peer under a m anhole cover,
perhaps clim b dow n and w alk around dow n there w ith a flashlight, just
to see w hat it's like. Form ally speaking, this m ight be trespassing, but
if you didn't hurt anything, and didn't m ake an absolute habit of it,
nobody w ould really care. The freedom to sneak under m anholes w as
likely a freedom you never intended to exercise.
You now are rather less likely to have that freedom at all. You m ay
never even have m issed it untilyou read about it here, but if you're in
N ew York City it's gone, and elsew here it's likely going. This is one of
the things that crim e,and the reaction to crim e, does to us.
The Steve Jackson/EFF civillaw suit against the Chicago Com puter Fraud
and A buse Task Force w as a m atter of considerable regionalinterest in
Texas. There w ere now tw o A ustinite journalists here on the case. In
fact, counting Godw in (a form er A ustinite and form er journalist) there
w ere three of us. Lunch w as like O ld H om e W eek.
First I'd "trashed" — and now , m ere hours later, I'd bragged to som eone
else. H aving entered the lifestyle of hackerdom , Iw as now , unsurpris-
ingly, follow ing its logic. H aving discovered som ething rem arkable
through a surreptitious action, Iof course *had* to "brag," and to drag
the passing D raper into m y iniquities. Ifelt Ineeded a w itness.
O therw ise nobody w ould have believed w hat I'd discovered....
Then, at Godw in's urging, Kapor suddenly rem arked that EFF's ow n
Internet m achine had been "hacked" recently, and that EFF did not con-
sider this incident am using.
Kapor seem ed to score quite an effect w ith his shrew d and skeptical
analysis of the m erits of telco "Caller-ID " services. (O n this topic,
FCIC and EFF have never been at loggerheads, and have no particular
established earthw orks to defend.) Caller-ID has generally been pro-
m oted as a privacy service for consum ers, a presentation Kapor
described as a "sm okescreen," the realpoint of Caller-ID being to
*allow corporate custom ers to build extensive com m ercialdatabases on
everybody w ho phones or faxes them .* Clearly, few people in the room
had considered this possibility, except perhaps for tw o late-arrivals
from US W EST RBO C security, w ho chuckled nervously.
"O kay, you m ake copies, give *them * the copies, and take the origi-
nals."
Hm m m .
Som e people in the electronic com m unity becom e enraged at the prospect
of cops "m onitoring" bulletin boards. This does have touchy aspects,as
Secret Service people in particular exam ine bulletin boards w ith som e
regularity. But to expect electronic police to be deaf dum b and blind in
regard to this particular m edium rather flies in the face of com m on
sense. Police w atch television, listen to radio, read new spapers and
m agazines;w hy should the new m edium of boards be different? Cops
can exercise the sam e access to electronic inform ation as everybody
else. A s w e have seen, quite a few com puter police m aintain *their
ow n* bulletin boards, including anti-hacker "sting" boards, w hich
have generally proven quite effective.
Godw in com plained at length about w hat he called "the Clever Hobbyist
hypothesis" — the assum ption that the "hacker" you're busting is
clearly a technicalgenius, and m ust therefore by searched w ith extrem e
thoroughness. So: from the law 's point of view , w hy risk m issing any-
thing? Take the w orks. Take the guy's com puter. Take his books.Take
his notebooks. Take the electronic drafts of his love letters. Take his
W alkm an. Take his w ife's com puter. Take his dad's com puter. Take his
kid sister's com puter. Take his em ployer's com puter. Take his com pact
Godw in pointed out that m ost "hackers" are not, in fact, clever genius
hobbyists. Q uite a few are crooks and grifters w ho don't have m uch in
the w ay of technicalsophistication; just som e rule-of-thum b rip-off
techniques. The sam e goes for m ost fifteen- year-olds w ho've dow n-
loaded a code-scanning program from a pirate board. There's no real
need to seize everything in sight. It doesn't require an entire com puter
system and ten thousand disks to prove a case in court.
W hat if the com puter is the instrum entality of a crim e? som eone
dem anded.
Godw in adm itted quietly that the doctrine of seizing the instrum entality
of a crim e w as pretty w ellestablished in the A m erican legalsystem .
The m eeting broke up. Godw in and Kapor had to leave. Kapor w as testi-
fying next m orning before the M assachusetts D epartm ent O f Public
Utility, about ISD N narrow band w ide-area netw orking.
"D id you hear w hat Godw in said about *instrum entality of a crim e?*"
she exulted, to nobody in particular. "W ow , that m eans *M itch isn't
going to sue m e.*"
_____
A nd if it's an im pressive public rep you're after, there are few people
in the w orld w ho can be so chillingly im pressive as a w ell-trained,
w ell-arm ed United States Secret Service agent.
But you can't just have a badge. You have to w in it. First,there's the
federallaw enforcem ent training. A nd it's hard — it's a challenge. A
realchallenge — not for w im ps and rodents.
Every Secret Service agent m ust com plete gruelling courses at the
FederalLaw Enforcem ent Training Center. (In fact, Secret Service
agents are periodically re-trained during their entire careers.)
In order to get a glim pse of w hat this m ight be like, Im yself travelled to
FLETC.
_____
The crow ded clientele w ere tourists, fisherm en, localblack folks in
their Sunday best, and w hite Georgian locals w ho allseem ed to bear an
uncanny resem blance to Georgia hum orist Lew is Grizzard.
H e began looking into the generalsubject of com puters and crim e, read-
ing D onn Parker's books and articles, keeping an ear cocked for w ar
stories, usefulinsights from the field, the up-and-com ing people of the
localcom puter-crim e and high- technology units.... Soon he got a repu-
tation around FLETC as the resident "com puter expert," and that reputa-
tion alone brought him m ore exposure, m ore experience — untilone day
he looked around, and sure enough he *w as* a federalcom puter-crim e
expert.
W ord about stuff like this gets around in the hacker-tracker com m uni-
ty.
Carlton Fitzpatrick takes m e for a guided tour by car around the FLETC
grounds. O ne of our first sights is the biggest indoor firing range in the
w orld. There are federaltrainees in there, Fitzpatrick assures m e
politely, blasting aw ay w ith a w ide variety of autom atic w eapons: Uzis,
Glocks, A K-47s.... H e's w illing to take m e inside. Itellhim I'm sure
that's really interesting, but I'd rather see his com puters. Carlton
Fitzpatrick seem s quite surprised and pleased. I'm apparently the first
journalist he's ever seen w ho has turned dow n the shooting gallery in
O ur next stop is a favorite w ith touring Congressm en: the three-m ile
long FLETC driving range. H ere trainees of the D river & M arine
D ivision are taught high-speed pursuit skills, setting and breaking
road-blocks, diplom atic security driving for V IP lim ousines.... A
favorite FLETC pastim e is to strap a passing Senator into the passenger
seat beside a D river & M arine trainer, hit a hundred m iles an hour,
then take it right into "the skid-pan," a section of greased track w here
tw o tons of D etroit iron can w hip and spin like a hockey puck.
Cars don't fare w ellat FLETC. First they're rifled again and again for
search practice. Then they do 25,000 m iles of high-speed pursuit
training; they get about seventy m iles per set of steel-belted radials.
Then it's off to the skid pan, w here som etim es they rolland tum ble
headlong in the grease. W hen they're sufficiently grease-stained, dent-
ed, and creaky, they're sent to the roadblock unit, w here they're bat-
tered w ithout pity. A nd finally then they're sacrificed to the Bureau of
A lcohol, Tobacco and Firearm s, w hose trainees learn the ins and outs of
car-bom b w ork by blow ing them into sm oking w reckage.
Even the eldritch ninja com pound pales som ew hat com pared to the truly
surrealarea know n as "the raid-houses." This is a street lined on both
sides w ith nondescript concrete-block houses w ith flat pebbled roofs.
They w ere once officers' quarters. N ow they are training grounds. The
first one to our left, Fitzpatrick tells m e, has been specially adapted for
com puter search-and-seizure practice. Inside it has been w ired for
video from top to bottom , w ith eighteen pan-and-tilt rem otely con-
trolled videocam s m ounted on w alls and in corners. Every m ovem ent of
Perhaps the w eirdest single aspect of this building is its front door,
scarred and scuffed allalong the bottom ,from the repeated im pact,day
after day, of federalshoe-leather.
D ow n at the far end of the row of raid-houses som e people are practicing
a m urder. W e drive by slow ly as som e very young and rather nervous-
looking federaltrainees interview a heavyset bald m an on the raid-
house law n. D ealing w ith m urder takes a lot of practice; first you have
to learn to controlyour ow n instinctive disgust and panic, then you
have to learn to controlthe reactions of a nerve- shredded crow d of
civilians, som e of w hom m ay have just lost a loved one, som e of w hom
m ay be m urderers — quite possibly both at once.
A dum m y plays the corpse. The roles of the bereaved, the m orbidly
curious, and the hom icidalare played, for pay, by localGeorgians:
w aitresses,m usicians,m ost anybody w ho needs to m oonlight and can
learn a script. These people, som e of w hom are FLETC regulars year
after year, m ust surely have one of the strangest jobs in the w orld.
Som ething about the scene: "norm al" people in a w eird situation, stand-
ing around talking in bright G eorgia sunshine, unsuccessfully pretend-
ing that som ething dreadfulhas gone on, w hile a dum m y lies inside on
faked bloodstains.... W hile behind this w eird m asquerade, like a nested
set of Russian dolls, are grim future realities of realdeath, realvio-
lence, realm urders of realpeople, that these young agents w illreally
investigate, m any tim es during their careers.... O ver and over.... W ill
those anticipated m urders look like this, feellike this — not as "real" as
these am ateur actors are trying to m ake it seem , but both as "real," and
as num bingly unreal, as w atching fake people standing around on a fake
law n? Som ething about this scene unhinges m e. It seem s nightm arish to
m e, Kafkaesque. Isim ply don't know how to take it;m y head is turned
around; Idon't know w hether to laugh, cry, or just shudder.
W hen the tour is over, Carlton Fitzpatrick and Italk about com puters.
Fitzpatrick plans to run a UN IX board on the D ata Generalw hen he's fin-
ished beta-testing the softw are for it, w hich he w rote him self. It'll
have E- m ailfeatures, m assive files on allm anner of com puter-crim e
and investigation procedures, and w illfollow the com puter-security
specifics of the D epartm ent of D efense "O range Book." H e thinks it w ill
be the biggest BBS in the federalgovernm ent.
Iask him if he plans to be the sysop. Running a system that size is very
tim e-consum ing, and Fitzpatrick teaches tw o three-hour courses every
day.
N o,he says seriously, FLETC has to get its m oney w orth out of the
instructors. H e thinks he can get a localvolunteer to do it, a high-
schoolstudent.
H e says a bit m ore, som ething Ithink about an Eagle Scout law -enforce-
m ent liaison program , but m y m ind has rocketed off in disbelief.
"Uhm , Carlton," Ibabble, "I'm sure he's a really nice kid and all, but
that's a terrible tem ptation to set in front of som ebody w ho's,you know ,
into com puters and just starting out..."
"Yeah," he says, "that did occur to m e." For the first tim e Ibegin to
suspect that he's pulling m y leg.
JICC and EPIC m ust rem ain beyond the scope of this book. They seem to
m e to be very large topics fraught w ith com plications that Iam not fit to
judge. Ido know , how ever, that the international, com puter-assisted
netw orking of police, across nationalboundaries, is som ething that
Carlton Fitzpatrick considers very im portant, a harbinger of a desir-
He told m e that the num ber one rule w as sim ply not to be scared of com -
puters. You don't need to be an obsessive "com puter w eenie," but you
m ustn't be buffaloed just because som e m achine looks fancy. The advan-
tages com puters give sm art crooks are m atched by the advantages they
give sm art cops. Cops in the future w illhave to enforce the law "w ith
their heads,not their holsters." Today you can m ake good cases w ithout
ever leaving your office. In the future, cops w ho resist the com puter
revolution w illnever get far beyond w alking a beat.
Iasked Carlton Fitzpatrick if he had som e single m essage for the public;
som e single thing that he w ould m ost like the A m erican public to know
about his w ork.
T H E C IV IL LIB ER T A R IA N S
The story of the H acker Crackdow n, as w e have follow ed it thus far, has
been technological, subcultural, crim inaland legal. The story of the
CivilLibertarians, though it partakes of allthose other aspects, is pro-
foundly and thoroughly *political.*
In 1990, the obscure, long-sim m ering struggle over the ow nership and
nature of cyberspace becam e loudly and irretrievably public. People
from som e of the oddest corners of A m erican society suddenly found
them selves public figures. Som e of these people found this situation
m uch m ore than they had ever bargained for. They backpedalled,and
tried to retreat back to the m andarin obscurity of their cozy subcultural
niches. This w as generally to prove a m istake.
But the civillibertarians seized the day in 1990. They found them selves
organizing, propagandizing, podium - pounding, persuading, touring,
negotiating, posing for publicity photos, subm itting to interview s,
squinting in the lim elight as they tried a tentative, but grow ingly
sophisticated, buck-and-w ing upon the public stage.
It's not hard to see w hy the civillibertarians should have this com peti-
tive advantage.
The hackers of the digitalunderground are an herm etic elite. They find
it hard to m ake any rem otely convincing case for their actions in front
of the generalpublic. A ctually, hackers roundly despise the "ignorant"
public,and have never trusted the judgem ent of "the system ." Hackers
do propagandize, but only am ong them selves, m ostly in giddy, badly
spelled m anifestos of class w arfare, youth rebellion or naive techie
utopianism . H ackers m ust strut and boast in order to establish and pre-
serve their underground reputations. But if they speak out too loudly
The telcos, for their part, are an ivory tow er under protracted seige.
They have plenty of m oney w ith w hich to push their calculated public
im age,but they w aste m uch energy and goodw illattacking one another
w ith slanderous and dem eaning ad cam paigns. The telcos have suffered
at the hands of politicians, and, like hackers, they don't trust the pub-
lic's judgem ent. A nd this distrust m ay be w ell-founded. Should the
generalpublic of the high-tech 1990s com e to understand its ow n best
interests in telecom m unications, that m ight w ellpose a grave threat to
the specialized technicalpow er and authority that the telcos have rel-
ished for over a century. The telcos do have strong advantages:loyal
em ployees, specialized expertise, influence in the halls of pow er, tac-
ticalallies in law enforcem ent, and unbelievably vast am ounts of m oney.
But politically speaking, they lack genuine grassroots support; they
sim ply don't seem to have m any friends.
Cops know a lot of things other people don't know . But cops w illingly
revealonly those aspects of their know ledge that they feelw illm eet
their institutionalpurposes and further public order. Cops have
respect, they have responsibilities, they have pow er in the streets and
even pow er in the hom e, but cops don't do particularly w ellin lim elight.
W hen pressed, they w illstep out in the public gaze to threaten bad-
guys, or to cajole prom inent citizens, or perhaps to sternly lecture the
naive and m isguided. But then they go back w ithin their tim e-honored
fortress of the station-house, the courtroom and the rule-book.
Unlike the other groups in this book, the civillibertarians have operat-
ed very m uch in the open, m ore or less right in the public hurly-burly.
They have lectured audiences galore and talked to countless journalists,
and have learned to refine their spiels. They've kept the cam eras
clicking, kept those faxes hum m ing, sw apped that em ail, run those pho-
tocopiers on overtim e, licked envelopes and spent sm allfortunes on
airfare and long- distance. In an inform ation society, this open, overt,
obvious activity has proven to be a profound advantage.
But the "N uProm etheus League" w anted things otherw ise. This person
(or persons) m ade severalillicit copies of this source code, perhaps as
m any as tw o dozen. H e (or she, or they) then put those illicit floppy
disks into envelopes and m ailed them to people allover A m erica: people
in the com puter industry w ho w ere associated w ith, but not directly
em ployed by, A pple Com puter.
The N uProm etheus caper w as a com plex, highly ideological, and very
hacker-like crim e. Prom etheus, it w illbe recalled, stole the fire of the
Gods and gave this potent gift to the generalranks of dow ntrodden
m ankind. A sim ilar god-in-the-m anger attitude w as im plied for the
corporate elite of A pple Com puter, w hile the "N u" Prom etheus had him -
self cast in the role of rebeldem igod. The illicitly copied data w as given
aw ay for free.
The new Prom etheus,w hoever he w as,escaped the fate of the ancient
Greek Prom etheus, w ho w as chained to a rock for centuries by the
vengefulgods w hile an eagle tore and ate his liver. O n the other hand,
N uProm etheus chickened out som ew hat by com parison w ith his role
m odel. The sm allchunk of Color Q uickD raw code he had filched and
replicated w as m ore or less useless to A pple's industrialrivals (or, in
fact, to anyone else). Instead of giving fire to m ankind, it w as m ore as
if N uProm etheus had photocopied the schem atics for part of a Bic
lighter. The act w as not a genuine w ork of industrialespionage. It w as
best interpreted as a sym bolic, deliberate slap in the face for the A pple
corporate heirarchy.
In the m eantim e, how ever, a large num ber of puzzled bystanders found
them selves entertaining surprise guests from the FBI.
The GratefulD ead are am ong the w orld's m ost popular and w ealthy
A nd w hile the D ead are not investm ent bankers or three-piece-suit tax
specialists — they are, in point of fact, hippie m usicians — this m oney
has not been squandered in senseless Bohem ian excess. The Dead have
been quietly active for m any years, funding various w orthy activities in
their extensive and w idespread culturalcom m unity.
The D eadhead com m unity boasts any num ber of recording engineers,
lighting experts, rock video m avens, electronic technicians of all
descriptions. A nd the drift goes both w ays. Steve W ozniak,A pple's co-
founder, used to throw rock festivals. Silicon V alley rocks out.
These are the 1990s, not the 1960s. Today, for a surprising num ber of
people allover A m erica, the supposed dividing line betw een Bohem ian
and technician sim ply no longer exists. People of this sort m ay have a
set of w indchim es and a dog w ith a knotted kerchief 'round its neck,but
they're also quite likely to ow n a m ultim egabyte M acintosh running
M ID Isynthesizer softw are and trippy fractalsim ulations. These days,
even Tim othy Leary him self, prophet of LSD , does virtual-reality com -
puter- graphics dem os in his lecture tours.
In M ay 1990, Barlow received a visit from a localW yom ing agent of the
FBI. The N uProm etheus case had reached W yom ing.
But if the m agazine did not flourish, it w as resilient; it got by. Then, in
1984, the birth-year of the M acintosh com puter, *CoEvolution
Q uarterly* suddenly hit the rapids. Point Foundation had discovered the
com puter revolution. O ut cam e the *W hole Earth Softw are Catalog* of
1984, arousing headscratching doubts am ong the tie- dyed faithful, and
rabid enthusiasm am ong the nascent "cyberpunk" m ilieu, present com -
pany included. Point Foundation started its yearly H ackers Conference,
and began to take an extensive interest in the strange new possibilities
of digitalcounterculture. *CoEvolution Q uarterly* folded its teepee,
replaced by *W hole Earth Softw are Review * and eventually by *W hole
Earth Review * (the m agazine's present incarnation, currently under
the editorship of virtual-reality m aven H ow ard Rheingold).
1985 saw the birth of the "W ELL" — the "W hole Earth 'Lectronic Link."
The W ellw as Point Foundation's bulletin board system .
A s boards w ent, the W ellw as an anom aly from the beginning, and
rem ained one. It w as localto San Francisco. It w as huge, w ith m ultiple
There w ere no anarchy files on the W ell, scarcely a dropped hint about
access codes or credit-card theft. N o one used handles. V icious "flam e-
w ars" w ere held to a com paratively civilized rum ble. D ebates w ere
som etim es sharp, but no W ellbeing ever claim ed that a rivalhad dis-
connected his phone, trashed his house, or posted his credit card num -
bers.
Grateful Dead
-------------
Grateful Dead (g gd)
Deadplan* (g dp)
Deadlit (g deadlit)
Feedback (g feedback)
GD Hour (g gdh)
Tapes (g tapes)
Tickets (g tix)
Tours (g tours)
Computers
-----------
AI/Forth/Realtime (g realtime)
Amiga (g amiga)
Apple (g app)
Computer Books (g cbook)
Art & Graphics (g gra)
Hacking (g hack)
HyperCard (g hype)
IBM PC (g ibm)
LANs (g lan)
Laptop (g lap)
Macintosh (g mac)
Mactech (g mactech)
Microtimes (g microx)
Muchomedia (g mucho)
NeXt (g next)
OS/2 (g os2)
Printers (g print)
Programmer's Net (g net)
Siggraph (g siggraph)
Software Design (g sdc)
Software/Programming (software)
Software Support (g ssc)
Unix (g unix)
Windows (g windows)
Word Processing (g word)
Technical - Communications
----------------------------
Bioinfo (g bioinfo)
Info (g boing)
But this confusion is m ore apparent than real. Each of these conferences
w as a little cyberspace w orld in itself, com prising dozens and perhaps
hundreds of sub-topics.Each conference w as com m only frequented by a
fairly sm all, fairly like-m inded com m unity of perhaps a few dozen peo-
ple. It w as hum anly im possible to encom pass the entire W ell(espe-
cially since access to the W ell's m ainfram e com puter w as billed by the
hour). M ost long- tim e users contented them selves w ith a few favorite
topicalneighborhoods, w ith the occasionalforay elsew here for a taste of
exotica. But especially im portant new s item s, and hot topicaldebates,
could catch the attention of the entire W ellcom m unity.
Like any com m unity, the W ellhad its celebrities, and John Perry
In January 24, 1990 (nine days after the M artin Luther King D ay
Crash), Phiber O ptik, A cid Phreak, and a third N YC scofflaw nam ed
Scorpion w ere raided by the Secret Service. Their com puters w ent out
the door, along w ith the usualblizzard of papers, notebooks, com pact
disks, answ ering m achines, Sony W alkm ans, etc. Both A cid Phreak and
Phiber O ptik w ere accused of having caused the Crash.
The m ills of justice ground slow ly. The case eventually fellinto the
hands of the N ew York State Police. Phiber had lost his m achinery in the
raid, but there w ere no charges filed against him for over a year. H is
predicam ent w as extensively publicized on the W ell, w here it caused
m uch resentm ent for police tactics. It's one thing to m erely hear about
a hacker raided or busted; it's another to see the police attacking som e-
one you've com e to know personally,and w ho has explained his m otives
at length. Through the *Harper's* debate on the W ell, it had becom e
clear to the W ellbeings that Phiber O ptik w as not in fact going to "hurt
anything." In their ow n salad days, m any W ellbeings had tasted tear-
gas in pitched street-battles w ith police. They w ere inclined to indul-
gence for acts of civildisobedience.
In February 1991, m ore than a year after the raid on his hom e, Phiber
This passing harassm ent from the unfathom able w orld of straight people
seem ed to bother O ptik him self little if at all. D eprived of his com puter
by the January search-and-seizure, he sim ply bought him self a
portable com puter so the cops could no longer m onitor the phone w here
he lived w ith his M om , and he w ent right on w ith his depredations,
som etim es on live radio or in front of television cam eras.
The crackdow n raid m ay have done little to dissuade Phiber O ptik, but
its galling affect on the W ellbeings w as profound. A s 1990 rolled on,
the slings and arrow s m ounted: the Knight Lightning raid, the Steve
Jackson raid, the nation-spanning O peration Sundevil. The rhetoric of
law enforcem ent m ade it clear that there w as, in fact, a concerted
crackdow n on hackers in progress.
The hackers of the H ackers Conference, the W ellbeings, and their ilk,
did not really m ind the occasionalpublic m isapprehension of "hacking";
if anything, this m em brane of differentiation from straight society m ade
the "com puter com m unity" feeldifferent, sm arter, better. They had
never before been confronted, how ever, by a concerted vilification cam -
paign.
Barlow 's querulous m ini-essay about his encounter w ith the FBIstruck
a strong chord on the W ell. A num ber of other free spirits on the
fringes of A pple Com puting had com e under suspicion, and they liked it
not one w hit better than he did.
"Crim e and Puzzlem ent" w as distributed far and w ide through com puter
netw orking channels, and also printed in the *W hole Earth Review .*
The sudden declaration of a coherent, politicized counter-strike from
the ranks of hackerdom electrified the com m unity. Steve W ozniak
(perhaps a bit stung by the N uProm etheus scandal) sw iftly offered to
m atch any funds Kapor offered the Foundation.
But the stage w as now set for open confrontation.A nd the first and the
m ost criticalbattle w as the hacker show -trialof "Knight Lightning."
_____
But the trialof Knight Lightning on July 24-27, 1990, m ade this par-
ticular "hacker" a nationally know n public figure. It can do no particu-
lar harm to him self or his fam ily if Irepeat the long-established fact
that his nam e is Craig N eidorf (pronounced N YE-dorf).
The prosecution w as led by the stalw arts of the Chicago Com puter Fraud
and A buse Task Force: W illiam J. Cook, Colleen D . Coughlin, and D avid A .
Glockner, allA ssistant United States A ttorneys. The Secret Service
Case A gent w as Tim othy M .Foley.
The Chicago Com puter Fraud and A buse Task Force,how ever,had decided
to prosecute N eidorf as a fraudster. To form ally adm it that *Phrack*
w as a "m agazine" and N eidorf a "publisher" w as to open a prosecutorial
Pandora's Box of First A m endm ent issues. To do this w as to play into
the hands of Zenner and his EFF advisers, w hich now included a phalanx
of prom inent N ew York civilrights law yers as w ellas the form idable
legalstaff of Katten, M uchin and Zavis. Instead, the prosecution relied
heavily on the issue of access device fraud: Section 1029 of Title 18,
the section from w hich the Secret Service drew its m ost direct juris-
diction over com puter crim e.
The Prophet him self w as also a co-defendant in the N eidorf case, part-
and-parcelof the alleged "fraud schem e" to "steal" BellSouth's E911
Docum ent (and to pass the Docum ent across state lines,w hich helped
establish the N eidorf trialas a federalcase). The Prophet, in the spirit
of fullco-operation, had agreed to testify against N eidorf.
But even if the "publication" of the E911 Docum ent w as not held to be a
crim e, that w ouldn't let N eidorf off the hook. N eidorf had stillreceived
the E911 D ocum ent w hen Prophet had transferred it to him from Rich
A ndrew s' Jolnet node. O n that occasion, it certainly hadn't been "pub-
lished" — it w as hacker booty, pure and sim ple, transported across state
lines.
The issues w ere com plex, the prosecution's tactics som ew hat unortho-
dox,but the Chicago Task Force had proved sure-footed to date.
"Shadow haw k" had been bagged on the w ing in 1989 by the Task Force,
and sentenced to nine m onths in prison, and a $10,000 fine. The
Shadow haw k case involved charges under Section 1030, the "federal
interest com puter" section.
Shadow haw k had not in fact been a devotee of "federal-interest" com put-
ers per se. O n the contrary,Shadow haw k,w ho ow ned an A T& T hom e
com puter,seem ed to cherish a specialaggression tow ard A T& T. He had
bragged on the underground boards "Phreak Klass 2600" and "D r.
Ripco" of his skills at raiding A T& T, and of his intention to crash
A T& T's nationalphone system .Shadow haw k's brags w ere noticed by
H enry Kluepfelof Bellcore Security, scourge of the outlaw boards,
w hose relations w ith the Chicago Task Force w ere long and intim ate.
The Task Force successfully established that Section 1030 applied to the
teenage Shadow haw k,despite the objections of his defense attorney.
Shadow haw k had entered a com puter "ow ned" by U.S.M issile Com m and
The Task Force also convinced the court that a piece of A T& T softw are
that Shadow haw k had illicitly copied from BellLabs, the "A rtificial
Intelligence C5 Expert System ," w as w orth a coolone m illion dollars.
Shadow haw k's attorney had argued that Shadow haw k had not sold the
program and had m ade no profit from the illicit copying. A nd in point of
fact, the C5 Expert System w as experim entalsoftw are, and had no
established m arket value because it had never been on the m arket in the
first place. A T& T's ow n assessm ent of a "one m illion dollar" figure for
its ow n intangible property w as accepted w ithout challenge by the
court, how ever. A nd the court concurred w ith the governm ent prosecu-
tors that Shadow haw k show ed clear "intent to defraud" w hether he'd got-
ten any m oney or not. Shadow haw k w ent to jail.
The Task Force's other best-know n trium ph had been the conviction and
jailing of "K yrie." K yrie, a true denizen of the digitalcrim inalunder-
ground, w as a 36-year-old Canadian w om an, convicted and jailed for
telecom m unications fraud in Canada. A fter her release from prison,
she had fled the w rath of Canada Belland the RoyalCanadian M ounted
Police, and eventually settled, very unw isely, in Chicago.
In A ugust 1990, Cook and his Task Force colleague Colleen Coughlin sent
Kyrie to jailfor 27 m onths, for com puter and telecom m unications
fraud. This w as a m arkedly severe sentence by the usualw rist-slap-
ping standards of "hacker" busts. Seven of Kyrie's forem ost teenage
disciples w ere also indicted and convicted. The Kyrie "high-tech street
gang," as Cook described it, had been crushed. Cook and his colleagues
had been the first ever to put som eone in prison for voice-m ailabuse.
Their pioneering efforts had w on them attention and kudos.
In his article on Kyrie, Cook drove the m essage hom e to the readers of
*Security M anagem ent* m agazine, a trade journalfor corporate secu-
rity professionals. The case, Cook said, and Kyrie's stiff sentence,
"reflect a new reality for hackers and com puter crim e victim s in the
Cook had m ade it his business to construct this "new reality for hack-
ers." H e'd also m ade it his business to police corporate property rights
to the intangible.
The N eidorf case paralleled the Shadow haw k case in certain w ays. The
victim once again w as allow ed to set the value of the "stolen" property.
O nce again Kluepfelw as both investigator and technicaladvisor. O nce
again no m oney had changed hands,but the "intent to defraud" w as cen-
tral.
The prosecution's case show ed signs of w eakness early on. The Task
Force had originally hoped to prove N eidorf the center of a nationw ide
Legion of D oom crim inalconspiracy. The *Phrack* editors threw
physicalget-togethers every sum m er, w hich attracted hackers from
across the country;generally tw o dozen or so of the m agazine's favorite
contributors and readers. (Such conventions w ere com m on in the hack-
er com m unity; 2600 M agazine, for instance, held public m eetings of
hackers in N ew York, every m onth.) LoD heavy-dudes w ere alw ays a
strong presence at these *Phrack*-sponsored "Sum m ercons."
In July 1988, an A rizona hacker nam ed "D ictator" attended Sum m ercon
in N eidorf's hom e tow n of St. Louis. D ictator w as one of GailThackeray's
underground inform ants; D ictator's underground board in Phoenix w as a
sting operation for the Secret Service. D ictator brought an undercover
N eidorf's law yer, Sheldon Zenner, saw the Secret Service tapes before
the trial. Zenner w as shocked by the com plete harm lessness of this
m eeting, w hich Cook had earlier characterized as a sinister interstate
conspiracy to com m it fraud. Zenner w anted to show the Sum m ercon
tapes to the jury. It took protracted m aneuverings by the Task Force to
keep the tapes from the jury as "irrelevant."
The E911 D ocum ent w as also proving a w eak reed. It had originally
been valued at $79,449. Unlike Shadow haw k's arcane A rtificial
Intelligence booty, the E911 D ocum ent w as not softw are — it w as w rit-
ten in English. Com puter-know ledgeable people found this value — for a
tw elve-page bureaucratic docum ent — frankly incredible. In his
"Crim e and Puzzlem ent" m anifesto for EFF, Barlow com m ented: "W e
w illprobably never know how this figure w as reached or by w hom ,
though Ilike to im agine an appraisalteam consisting of Franz Kafka,
Joseph H eller, and Thom as Pynchon."
1. A technicalw riter had been hired to research and w rite the E911
D ocum ent. 200 hours of w ork, at $35 an hour, cost : $7,000. A
Project M anager had overseen the technicalw riter. 200 hours, at $31
an hour, m ade: $6,200.
5. Preparing a purchase order for the D ocum ent, including typing and
the obtaining of an authorizing signature from w ithin the BellSouth
bureaucracy, cost $129.
6. Printing cost $313. M ailing the D ocum ent to fifty people took fifty
hours by a clerk, and cost $858.
But this w as just the beginning. There w ere also the *hardw are
expenses.* Eight hundred fifty dollars for a V T220 com puter m onitor.
*Thirty-one thousand dollars* for a sophisticated V A Xstation IIcom -
puter. Six thousand dollars for a com puter printer. *Tw enty-tw o
thousand dollars* for a copy of "Interleaf" softw are. Tw o thousand five
hundred dollars for V M S softw are. A llthis to create the tw elve-page
D ocum ent.
Plus ten percent of the cost of the softw are and the hardw are, for m ain-
tenance. (A ctually,the ten percent m aintenance costs,though m en-
tioned, had been left off the final$79,449 total, apparently through a
m erciful oversight).
The m oney, how ever, w as not centralto anyone's true purposes in this
trial. It w as not Cook's strategy to convince the jury that the E911
Docum ent w as a m ajor act of theft and should be punished for that reason
alone. His strategy w as to argue that the E911 D ocum ent w as *danger-
ous.* It w as his intention to establish that the E911 D ocum ent w as "a
road-m ap" to the Enhanced 911 System . N eidorf had deliberately and
recklessly distributed a dangerous w eapon. N eidorf and the Prophet did
not care (or perhaps even gloated at the sinister idea) that the E911
D ocum ent could be used by hackers to disrupt 911 service, "a life line
for every person certainly in the Southern Bellregion of the United
States,and indeed,in m any com m unities throughout the United States,"
in Cook's ow n w ords. N eidorf had put people's lives in danger.
N agle w as also a prom inent figure on the W ell, m uch respected for his
technicalknow ledgeability.
The N eidorf case,and the E911 D ocum ent,w ere both being discussed in
detailon the Internet, in an electronic publication called *Telecom
D igest.* N agle, a longtim e Internet m aven, w as a regular reader of
*Telecom D igest.* N agle had never seen a copy of *Phrack,* but the
im plications of the case disturbed him .
N agle m ade an ironic com m ent to this effect in *Telecom D igest.* From
there, N agle w as put in touch w ith M itch Kapor, and then w ith N eidorf's
law yers.
Having joined the defense as an expert w itness, N agle read the entire
E911 D ocum ent for him self. He m ade his ow n judgem ent about its
potentialfor m enace.
The tim e has now com e for you yourself,the reader,to have a look at the
E911 D ocum ent. This six-page piece of w ork w as the pretext for a fed-
eralprosecution that could have sent an electronic publisher to prison
for thirty, or even sixty, years. It w as the pretext for the search and
seizure of Steve Jackson Gam es, a legitim ate publisher of printed books.
It w as also the form alpretext for the search and seizure of the M entor's
bulletin board, "Phoenix Project," and for the raid on the hom e of Erik
Bloodaxe. It also had m uch to do w ith the seizure of Richard A ndrew s'
Jolnet node and the shutdow n of Charles Boykin's A T& T node. The E911
D ocum ent w as the single m ost im portant piece of evidence in the Hacker
Crackdow n. There can be no realand legitim ate substitute for the
D ocum ent itself.
==Phrack Inc.==
by the Eavesdropper
M arch, 1988
D escription of Service
~~~~~~~~~~~~~~~~~~~~~~
The controloffice for Em ergency 911 service is assigned in accordance w ith
the existing standard guidelines to one of the follow ing centers:
The SSC/M A C designation is used in this docum ent interchangeably for any of
these four centers. The SpecialServices Centers (SSCs) or M ajor A ccount
Centers (M A Cs) have been designated as the trouble reporting contact for all
E911 custom er (PSA P) reported troubles. Subscribers w ho have trouble on an
E9 1 1 call w ill continue to contact local repair service (CRSA B) w ho w ill refer
the trouble to the SSC/M A C, w hen appropriate.
System O verview
~~~~~~~~~~~~~~~
The num ber 911 is intended as a nationw ide universaltelephone num ber w hich
provides the public w ith direct access to a Public Safety A nsw ering Point
(PSA P). A PSA P is also referred to as an Em ergency Service Bureau (ESB).
A PSA P is an agency or facility w hich is authorized by a m unicipality to
receive and respond to police, fire and/or am bulance services. O ne or m ore
attendants are located at the PSA P facilities to receive and handle calls of an
em ergency nature in accordance w ith the localm unicipalrequirem ents.
1A ESS is used as the tandem office for the E911 netw ork to route all911
calls to the correct (prim ary) PSA P designated to serve the calling station.
The E911 feature w as developed prim arily to provide routing to the correct
PSA P for all 9 1 1 calls. Selective routing allow s a 9 1 1 call originated from a
particular station located in a particular district, zone, or tow n, to be routed
to the prim ary PSA P designated to serve that custom er station regardless of
Preservice/Installation G uidelines
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
W hen a contract for an E911 system has been signed, it is the responsibility
of N etw ork M arketing to establish an im plem entation/cutover com m ittee
w hich should include a representative from the SSC/M A C. D uties of the E911
Im plem entation Team include coordination of allphases of the E911 system
deploym ent and the form ation of an on-going E911 m aintenance subcom m ittee.
M arketing is responsible for providing the follow ing custom er specific infor-
m ation to the SSC/M A C prior to the start of callthrough testing:
The SSC/M A C needs to know if the equipm ent and sets at the PSA P are m ain-
tained by the BO Cs, an independent com pany, or an outside vendor, or any
com bination. This inform ation is then entered on the PSA P profile sheets and
review ed quarterly for changes, additions and deletions.
The E911 Im plem entation Team w illform the on-going m aintenance subcom -
m ittee prior to the initialim plem entation of the E911 system . This sub-com -
m ittee w illestablish post im plem entation quality assurance procedures to
1) Sw itching ControlCenter
- E9 1 1 translations
- Trunking
- End office and Tandem office hardw are/softw are
2) Recent Change M em ory A dm inistration Center
- D aily RC update activity for TN /ESN translations
- Processes validity errors and rejects
3) Line and N um ber A dm inistration
- V erification of TN /ESN translations
4 ) Special Service Center/M ajor A ccount Center
- Single point of contact for allPSA P and N ode to host troubles
- Logs, tracks & statusing of all trouble reports
- Trouble referral, follow up, and escalation
- Custom er notification of status and restoration
- A nalyzation of "chronic" troubles
- Testing, installation and m aintenance of E911 circuits
5 ) Installation and M aintenance (SSIM /I& M )
- Repair and m aintenance of PSA P equipm ent and Telco ow ned sets
6) M inicom puter M aintenance O perations Center
- E911 circuit m aintenance (w here applicable)
7) A rea M aintenance Engineer
- Technicalassistance on voice (CO -PSA P) netw ork related E9 1 1 trou-
bles
M aintenance Guidelines
~~~~~~~~~~~~~~~~~~~~~~
The CCN C w illtest the N ode circuit from the 202T at the H ost site to the
202T at the N ode site. Since H ost to N ode (CCN C to M M O C) circuits are offi-
cialcom pany services, the CCN C w illrefer allN ode circuit troubles to the
SSC/M A C. The SSC/M A C is responsible for the testing and follow up to
restoration of these circuit troubles.
A lthough N ode to PSA P circuit are official services, the M M O C w ill refer
PSA P circuit troubles to the appropriate SSC/M A C. The SSC/M A C is respon-
sible for testing and follow up to restoration of PSA P circuit troubles.
The SSC/M A C w ill also receive reports from CRSA B/IM C(s) on subscriber
911 troubles w hen they are not line troubles. The SSC/M A C is responsible
for testing and restoration of these troubles.
Recent changes are generated from service order activity (new service,
address changes, etc.) and com piled into a daily file by the E911 Center
(A LI/D M S E911 Com puter).
SSIM /I& M is responsible for the installation and repair of PSA P equipm ent.
PSA P equipm ent includes A N I Controller, A LI Controller, data sets, cables,
sets, and other peripheralequipm ent that is not vendor ow ned. SSIM /I& M is
responsible for establishing m aintenance test kits, com plete w ith spare parts
for PSA P m aintenance. This includes test gear, data sets, and A N I/A LI
Controller parts.
Corporate Com m unications N etw ork Center (CCN C) w illtest and refer trou-
bles on allnode to host circuits. A llE9 1 1 circuits are classified as official
com pany property.
This analysis includes processing PSA P inquiries (trouble reports) and refer-
ralof netw ork troubles. The E911 Center also perform s daily processing of
tandem recent change and provides inform ation to the RCM A C for tandem
input. The E911 Center is responsible for daily processing of the A LI/D M S
com puter data base and provides error files, etc. to the Custom er Services
departm ent for investigation and correction. The E911 Center participates in
allsystem im plem entations and on-going m aintenance effort and assists in the
developm ent of procedures, training and education of inform ation to all
groups.
A ny group receiving a 911 trouble from the SSC/M A C should close out the
trouble w ith the SSC/M A C or provide a status if the trouble has been
referred to another group. This w illallow the SSC/M A C to provide a status
back to the custom er or escalate as appropriate.
The M M O C should notify the appropriate SSC/M A C w hen the H ost, N ode, or
allN ode circuits are dow n so that the SSC/M A C can reply to custom er
reports that m ay be called in by the PSA Ps. This w illelim inate duplicate
reporting of troubles. O n com plete outages the M M O C w illfollow escalation
procedures for a N ode after tw o (2) hours and for a PSA P after four (4)
hours. A dditionally the M M O C w illnotify the appropriate SSC/M A C w hen the
H ost, N ode, or allN ode circuits are dow n.
The PSA P w ill call the SSC/M A C to report E9 1 1 troubles. The person report-
ing the E911 trouble m ay not have a circuit I.D . and w illtherefore report the
PSA P nam e and address. M any PSA P troubles are not circuit specific. In
those instances w here the caller cannot provide a circuit I.D ., the SSC/M A C
w illbe required to determ ine the circuit I.D . using the PSA P profile. Under no
circum stances w illthe SSC/M A C Center refuse to take the trouble. The E911
trouble should be handled as quickly as possible, w ith the SSC/M A C providing
as m uch assistance as possible w hile taking the trouble report from the
caller.
The PSA P w ill report troubles w ith the A N I controller, A LI controller or set
equipm ent to the SSC/M A C.
W hen the PSA P reports all screens on all calls, ask if there is any voice con-
tact w ith callers. If there is no voice contact the trouble should be referred
to the SCC im m ediately since 911 calls are not getting through w hich m ay
require alternate routing of calls to another PSA P.
W hen the PSA P reports this condition on allscreens but not allcalls and has
voice contact w ith callers, the report should be referred to SSIM /I& M for
dispatch. The SSC/M A C should verify w ith the SCC that A N Iis pulsing before
dispatching SSIM .
W hen the PSA P reports this condition on one screen for allcalls (others w ork
fine) the trouble should be referred to SSIM /I& M for dispatch, because the
trouble is isolated to one piece of equipm ent at the custom er prem ise.
A n A N Ifailure (i.e. allzeroes) indicates that the A N Ihas not been received by
the PSA P from the tandem office or w as lost by the PSA P A N Icontroller.
The PSA P m ay receive "02" alarm s w hich can be caused by the A N Icon-
troller logging m ore than three allzero failures on the sam e trunk. The PSA P
has been instructed to report this condition to the SSC/M A C since it could
indicate an equipm ent trouble at the PSA P w hich m ight be affecting allsub-
scribers calling into the PSA P. W hen allzeroes are being received on allcalls
or "02" alarm s continue, a tester should analyze the condition to determ ine
the appropriate action to be taken. The tester m ust perform cooperative
testing w ith the SCC w hen there appears to be a problem on the Tandem -PSA P
trunks before requesting dispatch.
N ote: It is essential that the PSA P fill out inquiry form on every A N I failure.
W hen the condition is on one screen (other screens receive A LIinform ation)
the SSC/M A C w ill request SSIM /I& M to dispatch.
N ote: If the SSC/M A C receives calls from m ultiple PSA P's, all of w hich are
receiving N O A LI, there is a problem w ith the N ode or N ode to H ost circuits or
the H ost com puter itself. Before referring the trouble the SSC/M A C should
callthe M M O C to inquire if the N ode or H ost is in trouble.
The SSC/M A C should verify w ith the PSA P attendant that the equipm ent's
prim ary function is answ ering E9 1 1 calls. If it is, the SSC/M A C should
request a dispatch SSIM /I& M . If the equipm ent is not prim arily used for
E911, then the SSC/M A C should advise PSA P to contact their CPE vendor.
N ote: These troubles can be quite confusing w hen the PSA P has vendor equip-
m ent m ixed in w ith equipm ent that the BO C m aintains. The M arketing repre-
sentative should provide the SSC/M A C inform ation concerning any unusualor
exception item s w here the PSA P should contact their vendor. This inform a-
tion should be included in the PSA P profile sheets.
PSA P link (circuit) dow n: The M M O C w ill provide the SSC/M A C w ith the cir-
cuit ID that the H ost com puter indicates in trouble. A lthough each PSA P has
tw o circuits, w hen either circuit is dow n the condition m ust be treated as an
em ergency since failure of the second circuit w illcause the PSA P to be iso-
lated.
A ny problem s that the M M O C identifies from the N ode location to the H ost
com puter w illbe handled directly w ith the appropriate M M O C(s)/CCN C.
W hen the CRSA B receives a subscriber com plaint (i.e., cannot dial911) the
RSA should obtain as m uch inform ation as possible w hile the custom er is on
the line.
For exam ple, w hat happened w hen the subscriber dialed 911? The report is
autom atically directed to the IM C for subscriber line testing. W hen no line
trouble is found, the IM C w illrefer the trouble condition to the SSC/M A C.
The SSC/M A C w illcontact Custom er Services E9 1 1 G roup and verify that the
subscriber should be able to call911 and obtain the ESN . The SSC/M A C w ill
verify the ESN via 2 SCCS. W hen both verifications m atch, the SSC/M A C w ill
refer the report to the SCC responsible for the 911 tandem office for investi-
gation and resolution. The M A C is responsible for tracking the trouble and
inform ing the IM C w hen it is resolved.
W ith the D ocum ent itself to hand, how ever, exactly as it w as published
(in its six-page edited form ) in *Phrack,* the reader m ay be able to
verify a few statem ents of fact about its nature. First, there is no soft-
w are, no com puter code, in the D ocum ent. It is not com puter-program -
m ing language like FO RTRA N or C++, it is English; allthe sentences
have nouns and verbs and punctuation. It does not explain how to break
into the E911 system . It does not suggest w ays to destroy or dam age the
E911 system .
There are no access codes in the Docum ent. There are no com puter
passw ords. It does not explain how to steallong distance service. It does
not explain how to break in to telco sw itching stations. There is nothing
in it about using a personalcom puter or a m odem for any purpose at all,
good or bad.
Close study w illrevealthat this docum ent is not about m achinery. The
E911 D ocum ent is about *adm inistration.* It describes how one creates
and adm inisters certain units of telco bureaucracy: SpecialService
Centers and M ajor A ccount Centers (SSC/M A C). It describes how these
centers should distribute responsibility for the E911 service, to other
units of telco bureaucracy, in a chain of com m and, a form alhierarchy.
It describes w ho answ ers custom er com plaints, w ho screens calls, w ho
reports equipm ent failures, w ho answ ers those reports, w ho handles
m aintenance, w ho chairs subcom m ittees, w ho gives orders, w ho follow s
orders, *w ho* tells *w hom * w hat to do. The D ocum ent is not a
"roadm ap" to com puters. The Docum ent is a roadm ap to *people.*
A s an aid to breaking into com puter system s, the D ocum ent is *useless.*
A s an aid to harassing and deceiving telco people,how ever,the Docum ent
m ight prove handy (especially w ith its Glossary, w hich Ihave not
included). A n intense and protracted study of this D ocum ent and its
John N agle read the E911 D ocum ent. He drew his ow n conclusions. A nd
he presented Zenner and his defense team w ith an overflow ing box of
sim ilar m aterial, draw n m ostly from Stanford U niversity's engineering
libraries. D uring the trial, the defense team — Zenner, half-a-dozen
other attorneys, N agle, N eidorf, and com puter-security expert D orothy
D enning, allpored over the E911 D ocum ent line-by-line.
M s. W illiam s had been called as a w itness for the prosecution, and had
gam ely tried to explain the basic technicalstructure of the E911 sys-
tem , aided by charts.
Zenner now asked w hether the charts she had been using to explain the
m echanics of E911 system w ere "proprietary," too. W ere they *public
inform ation,* these charts, allabout PSA Ps, A LIs, nodes, localend
sw itches? Could he take the charts out in the street and show them to
anybody, "w ithout violating som e proprietary notion that BellSouth
has?"
M s W illiam s show ed som e confusion, but finally agreed that the charts
w ere, in fact, public.
Zenner now pointed out that the E911 D ocum ent as published in Phrack
w as only half the size of the originalE911 D ocum ent (as Prophet had
purloined it). Half of it had been deleted — edited by N eidorf.
"*Phrack* w as not taken from this docum ent. Idon't understand your
question to m e."
But the "value" of the D ocum ent had been blow n to sm ithereens. It w as-
n't w orth eighty grand. A ccording to Bellcore it w as w orth thirteen
bucks. A nd the loom ing m enace that it supposedly posed had been
reduced in instants to a scarecrow . Bellcore itself w as selling m aterial
far m ore detailed and "dangerous," to anybody w ith a credit card and a
phone.
A ctually, Bellcore w as not giving this inform ation to just anybody. They
gave it to *anybody w ho asked,* but not m any did ask. N ot m any people
knew that Bellcore had a free catalog and an 800 num ber. John N agle
knew , but certainly the average teenage phreak didn't know . "Tuc," a
friend of N eidorf's and som etim e *Phrack* contributor, knew , and Tuc
had been very helpfulto the defense,behind the scenes. But the Legion
of Doom didn't know — otherw ise,they w ould never have w asted so m uch
tim e raiding dum psters. Cook didn't know . Foley didn't know . Kluepfel
didn't know . The right hand of Bellcore knew not w hat the left hand w as
doing. The right hand w as battering hackers w ithout m ercy, w hile the
left hand w as distributing Bellcore's intellectualproperty to anybody
w ho w as interested in telephone technicaltrivia — apparently, a
pathetic few .
The trialrum bled on, som ehow , through its ow n m om entum . Tim Foley
testified about his interrogations of N eidorf. N eidorf's w ritten adm is-
sion that he had know n the E911 D ocum ent w as pilfered w as officially
read into the court record.
A n interesting side issue cam e up: "Term inus" had once passed N eidorf a
piece of UN IX A T& T softw are, a log-in sequence, that had been cunningly
altered so that it could trap passw ords. The UN IX softw are itself w as
illegally copied A T& T property, and the alterations "Term inus" had
m ade to it, had transform ed it into a device for facilitating com puter
break-ins. Term inus him self w ould eventually plead guilty to theft of
this piece of softw are,and the Chicago group w ould send Term inus to
prison for it. But it w as of dubious relevance in the N eidorf case.
N eidorf hadn't w ritten the program . He w asn't accused of ever having
used it. A nd N eidorf w asn't being charged w ith softw are theft or ow ning
a passw ord trapper.
O n the next day, Zenner took the offensive. The civillibertarians now
had their ow n arcane, untried legalw eaponry to launch into action —
the Electronic Com m unications Privacy A ct of 1986, 18 US Code,
Section 2701 et seq. Section 2701 m akes it a crim e to intentionally
access w ithout authorization a facility in w hich an electronic com m uni-
cation service is provided — it is, at heart, an anti-bugging and anti-
tapping law , intended to carry the traditionalprotections of telephones
The Secret Service, in the person of Tim Foley, had served Richard
A ndrew s w ith a federalgrand jury subpoena, in their pursuit of
Prophet, the E911 D ocum ent, and the Term inus softw are ring. But
according to the Electronic Com m unications Privacy A ct, a "provider of
rem ote com puting service" w as legally entitled to "prior notice" from
the governm ent if a subpoena w as used. Richard A ndrew s and his base-
m ent UN IX node, Jolnet, had not received any "prior notice." Tim Foley
had purportedly violated the ECPA and com m itted an electronic crim e!
Zenner now sought the judge's perm ission to cross-exam ine Foley on the
topic of Foley's ow n electronic m isdeeds.
Cook argued that Richard A ndrew s' Jolnet w as a privately ow ned bulletin
board,and not w ithin the purview of ECPA . Judge Bua granted the
m otion of the governm ent to prevent cross-exam ination on that point,
and Zenner's offensive fizzled. This, how ever, w as the first direct
assault on the legality of the actions of the Com puter Fraud and A buse
Task Force itself — the first suggestion that they them selves had broken
the law , and m ight, perhaps, be called to account.
Zenner, in any case, did not really need the ECPA . Instead, he grilled
Foley on the glaring contradictions in the supposed value of the E911
Docum ent. He also brought up the em barrassing fact that the supposedly
red- hot E911 D ocum ent had been sitting around for m onths, in Jolnet,
w ith Kluepfel's know ledge, w hile Kluepfelhad done nothing about it.
Zenner, how ever, had Prophet confirm that N eidorf w as not a m em ber of
the Legion of Doom ,and had not urged Prophet to break into BellSouth
com puters.N eidorf had never urged Prophet to defraud anyone,or to
stealanything. Prophet also adm itted that he had never know n N eidorf
to break in to any com puter. Prophet said that no one in the Legion of
D oom considered Craig N eidorf a "hacker" at all. N eidorf w as not a UN IX
m aven, and sim ply lacked the necessary skilland ability to break into
com puters. N eidorf just published a m agazine.
O n Friday, July 27, 1990, the case against N eidorf collapsed. Cook
m oved to dism iss the indictm ent, citing "inform ation currently avail-
able to us that w as not available to us at the inception of the trial."
Judge Bua praised the prosecution for this action, w hich he described as
"very responsible," then dism issed a juror and declared a m istrial.
N eidorf w as a free m an. H is defense, how ever, had cost him self and his
fam ily dearly. M onths of his life had been consum ed in anguish; he had
seen his closest friends shun him as a federalcrim inal. H e ow ed his
N eidorf w ent back to school, blazingly determ ined to becom e a law yer.
H aving seen the justice system at w ork, N eidorf lost m uch of his enthu-
siasm for m erely technicalpow er. A t this w riting, Craig N eidorf is
w orking in W ashington as a salaried researcher for the A m erican Civil
Liberties U nion.
_____
Legally speaking, the N eidorf case w as not a sw eeping trium ph for any-
one concerned. N o constitutionalprinciples had been established. The
issues of "freedom of the press" for electronic publishers rem ained in
legallim bo. There w ere public m isconceptions about the case. M any
people thought N eidorf had been found innocent and relieved of allhis
legaldebts by Kapor. The truth w as that the governm ent had sim ply
dropped the case,and N eidorf's fam ily had gone deeply into hock to sup-
port him .
But the N eidorf case did provide a single, devastating, public sound-bite:
*The feds said it w as w orth eighty grand, and it w as only w orth thirteen
bucks.*
This is the N eidorf case's single m ost m em orable elem ent. N o serious
report of the case m issed this particular elem ent. Even cops could not
read this w ithout a w ince and a shake of the head. It left the public
credibility of the crackdow n agents in tatters.
A striking aspect of the sentence w as that the A tlanta Three w ere specif-
ically forbidden to use com puters, except for w ork or under supervi-
sion. D epriving hackers of hom e com puters and m odem s m akes som e
sense if one considers hackers as "com puter addicts," but EFF, filing an
am icus brief in the case, protested that this punishm ent w as unconsti-
tutional— it deprived the A tlanta Three of their rights of free associa-
tion and free expression through electronic m edia.
Term inus, the "ultim ate hacker," w as finally sent to prison for a year
through the dogged efforts of the Chicago Task Force. His crim e,to
The jailing of Term inus and the A tlanta Legionnaires of D oom , how ever,
did not cause the EFF any sense of em barrassm ent or defeat. O n the
contrary, the civillibertarians w ere rapidly gathering strength.
But allthe facts did not com e out. Those facts that did,w ere not very
flattering. A nd the cops w ere not vindicated. A nd GailThackeray lost
her job. By the end of 1991, W illiam Cook had also left public em ploy-
m ent.
1990 had belonged to the crackdow n,but by '91 its agents w ere in
severe disarray, and the libertarians w ere on a roll. People w ere
flocking to the cause.
The handle "M nem onic" suited Godw in very w ell. H is erudition and his
m astery of trivia w ere im pressive to the point of stupor; his ardent
curiosity seem ed insatiable,and his desire to debate and argue seem ed
the centraldrive of his life. Godw in had even started his ow n A ustin
debating society, w ryly know n as the "D ullM en's Club." In person,
Godw in could be overw helm ing; a flypaper- brained polym ath w ho
could not seem to let any idea go.O n bulletin boards,how ever,Godw in's
closely reasoned, highly gram m atical, erudite posts suited the m edium
w ell, and he becam e a localboard celebrity.
Godw in, how ever, w as uniquely, alm ost m agically, qualified to carry
Jackson's case to the outside w orld.Godw in w as a board enthusiast,a
science fiction fan, a form er journalist, a com puter salesm an, a
law yer-to-be, and an A ustinite. Through a coincidence yet m ore am az-
ing, in his last year of law schoolGodw in had specialized in federal
prosecutions and crim inalprocedure. A cting entirely on his ow n,
Godw in m ade up a press packet w hich sum m arized the issues and pro-
vided usefulcontacts for reporters. Godw in's behind-the-scenes effort
(w hich he carried out m ostly to prove a point in a localboard debate)
broke the story again in the *A ustin A m erican-Statesm an* and then in
*N ew sw eek.*
Life w as never the sam e for M ike Godw in after that. A s he joined the
grow ing civilliberties debate on the Internet, it w as obvious to allpar-
ties involved that here w as one guy w ho, in the m idst of com plete m urk
and confusion, *genuinely understood everything he w as talking about.*
The disparate elem ents of Godw in's dilettantish existence suddenly fell
together as neatly as the facets of a Rubik's cube.
W hen the tim e cam e to hire a full-tim e EFF staff attorney, Godw in w as
the obvious choice. He took the Texas bar exam ,left A ustin,m oved to
Cam bridge, becam e a full-tim e, professional, com puter civil libertari-
an, and w as soon touring the nation on behalf of EFF, delivering w ell-
received addresses on the issues to crow ds as disparate as academ ics,
industrialists, science fiction fans, and federalcops.
D enning's articles m ade it clear to m any that "hacking" w as not sim ple
vandalism by som e evilclique of psychotics. "H acking" w as not an
aberrant m enace that could be charm ed aw ay by ignoring it, or sw ept
out of existence by jailing a few ringleaders. Instead, "hacking" w as
sym ptom atic of a grow ing, prim alstruggle over know ledge and pow er in
the age of inform ation.
D enning pointed out that the attitude of hackers w ere at least partially
shared by forw ard-looking m anagem ent theorists in the business com -
m unity: people like Peter D rucker and Tom Peters. Peter D rucker, in
his book *The N ew Realities,* had stated that "controlof inform ation
by the governm ent is no longer possible. Indeed, inform ation is now
transnational. Like m oney, it has no 'fatherland.'"
A nd m anagem ent m aven Tom Peters had chided large corporations for
uptight, proprietary attitudes in his bestseller, *Thriving on Chaos:*
"Inform ation hoarding, especially by politically m otivated, pow er-
seeking staffs, had been com m onplace throughout A m erican industry,
service and m anufacturing alike. It w illbe an im possible m illstone
aroung the neck of tom orrow 's organizations."
The EFF had sim ply *netw orked* the situation into an entirely new
status quo. A nd in fact this had been EFF's deliberate strategy from the
beginning. Both Barlow and Kapor loathed bureaucracies and had delib-
erately chosen to w ork alm ost entirely through the electronic spiderw eb
of "valuable personalcontacts."
A fter a year of EFF, both Barlow and Kapor had every reason to look
back w ith satisfaction. EFF had established its ow n Internet node,
"eff.org," w ith a w ell-stocked electronic archive of docum ents on elec-
tronic civilrights, privacy issues, and academ ic freedom . EFF w as also
publishing *EFFector,* a quarterly printed journal, as w ell as
*EFFector O nline,* an electronic new sletter w ith over 1,200 sub-
scribers. A nd EFF w as thriving on the W ell.
EFF had sponsored m eetings such as "Com puters, Freedom and Privacy"
and the CPSR Roundtable. It had carried out a press offensive that, in
the w ords of *EFFector,* "has affected the clim ate of opinion about
com puter netw orking and begun to reverse the slide into 'hacker hyste-
ria' that w as beginning to grip the nation."
A nd, last but certainly not least, the Electronic Frontier Foundation had
filed a federallaw suit in the nam e of Steve Jackson, Steve Jackson
Gam es Inc., and three users of the Illum inatibulletin board system . The
defendants w ere, and are, the United States Secret Service, W illiam
Cook, Tim Foley, Barbara Golden and H enry Kleupfel.
EFF had established that it had credibility. It had also established that it
had teeth.
The city of Boston has alw ays been one of the m ajor intellectualcenters
of the A m erican republic. It is a very old city by A m erican standards, a
place of skyscrapers overshadow ing seventeenth-century graveyards,
w here the high-tech start-up com panies of Route 128 co-exist w ith the
hand-w rought pre-industrialgrace of "O ld Ironsides," the USS
*Constitution.*
The Battle of Bunker H ill, one of the first and bitterest arm ed clashes of
the A m erican Revolution, w as fought in Boston's environs. Today there
is a m onum entalspire on Bunker H ill, visible throughout m uch of the
city. The w illingness of the republican revolutionaries to take up
arm s and fire on their oppressors has left a culturallegacy that tw o
fullcenturies have not effaced. Bunker H illis stilla potent center of
A m erican politicalsym bolism , and the Spirit of '76 is stilla potent
im age for those w ho seek to m old public opinion.
The glass w indow beside the Second Street entrance bears three sheets of
neatly laser-printed paper, taped against the glass. They read: O N
Technology. EFF. KEI.
"O N Technology" is Kapor's softw are com pany, w hich currently special-
izes in "groupw are" for the A pple M acintosh com puter. "Groupw are" is
intended to prom ote efficient socialinteraction am ong office-w orkers
linked by com puters. O N Technology's m ost successfulsoftw are prod-
ucts to date are "M eeting M aker" and "Instant Update."
Lotus is, of course, the softw are giant that M itchellKapor founded in the
late 70s. The softw are program Kapor co-authored, "Lotus 1-2-3," is
stillthat com pany's m ost profitable product. "Lotus 1-2-3" also bears
a singular distinction in the digitalunderground: it's probably the m ost
pirated piece of application softw are in w orld history.
There is just the w hiff of hacker brim stone about M itch Kapor. H e m ay
not have the hard-riding, hell-for- leather, guitar-strum m ing charis-
m a of his W yom ing colleague John Perry Barlow , but there's som ething
about the guy that stillstops one short. He has the air of the Eastern
city dude in the bow ler hat, the dream y, Longfellow -quoting poker
shark w ho only *happens* to know the exact m athem aticalodds against
draw ing to an inside straight. Even am ong his com puter-com m unity
colleagues, w ho are hardly know n for m entalsluggishness, Kapor
strikes one forcefully as a very intelligent m an. H e speaks rapidly,
w ith vigorous gestures, his Boston accent som etim es slipping to the
sharp nasaltang of his youth in Long Island.
Kapor, w hose Kapor Fam ily Foundation does m uch of his philanthropic
w ork, is a strong supporter of Boston's Com puter M useum . Kapor's
interest in the history of his industry has brought him som e rem ark-
able curios, such as the "byte" just outside his office door. This "byte"
— eight digitalbits — has been salvaged from the w reck of an electronic
com puter of the pre-transistor age. It's a standing gunm etalrack about
Inside the office, Kapor excuses him self briefly to do a little m ouse-
w hizzing housekeeping on his personalM acintosh IIfx. If its giant
screen w ere an open w indow , an agile person could clim b through it
w ithout m uch trouble at all. There's a coffee-cup at Kapor's elbow , a
m em ento of his recent trip to Eastern Europe, w hich has a black-and-
w hite stencilled photo and the legend CA PITA LIST FO O LS TO UR. It's
K apor, Barlow , and tw o California venture-capitalist lum inaries of
their acquaintance, four w indblow n, grinning Baby Boom er dudes in
leather jackets, boots, denim , travelbags, standing on airport tarm ac
som ew here behind the form erly Iron Curtain. They look as if they're
having the absolute tim e of their lives.
Kapor is in a rem iniscent m ood. W e talk a bit about his youth — high
schooldays as a "m ath nerd," Saturdays attending Colum bia
University's high-schoolscience honors program , w here he had his
first experience program m ing com puters. IBM 1620s, in 1965 and
'66. "Iw as very interested," says Kapor, "and then Iw ent off to college
and got distracted by drugs sex and rock and roll, like anybody w ith half
a brain w ould have then!" A fter college he w as a progressive-rock D J
in H artford, Connecticut, for a couple of years.
Iask him if he ever m isses his rock and rolldays — if he ever w ished he
could go back to radio w ork.
Kapor m oved to Boston in 1974 and got a job program m ing m ainfram es
Kapor chose Bust. He w ent back to the States and acquired a degree in
counselling psychology. H e w orked a w hile in a hospital, couldn't stand
that either. "M y rep w as," he says "a very bright kid w ith a lot of
potentialw ho hasn't found him self. A lm ost thirty. Sort of lost."
"The day after Ipurchased it," Kapor tells m e, "Iw as hanging out in a
com puter store and Isaw another guy, a m an in his forties, w ell-
dressed guy,and eavesdropped on his conversation w ith the salesm an.
He didn't know anything about com puters. I'd had a year program m ing.
A nd Icould program in BA SIC. I'd taught m yself. So Iw ent up to him ,
and Iactually sold m yself to him as a consultant." He pauses. "Idon't
know w here Igot the nerve to do this. It w as uncharacteristic. Ijust
said, 'Ithink Ican help you, I've been listening, this is w hat you need to
do and Ithink Ican do it for you.' A nd he took m e on! He w as m y first
client! Ibecam e a com puter consultant the first day after Ibought the
A pple II."
Kapor had found his true vocation. H e attracted m ore clients for his
consultant service, and started an A pple users' group.
The inventors of V isiCalc, the A pple com puter's prem ier business pro-
gram , had show n an interest in M itch Kapor. Kapor w orked diligently
for them for six m onths, got tired of California, and w ent back to Boston
w here they had better bookstores. The V isiCalc group had m ade the
criticalerror of bringing in "professionalm anagem ent." "That drove
them into the ground," Kapor says.
"Yeah."
M itch Kapor w as not in fullcom m and of the destiny of him self or his
industry. The hottest softw are com m odities of the early 1980s w ere
*com puter gam es* — the A tariseem ed destined to enter every teenage
hom e in A m erica. Kapor got into business softw are sim ply because he
didn't have any particular feeling for com puter gam es. But he w as
suprem ely fast on his feet, open to new ideas and inclined to trust his
instincts. A nd his instincts w ere good. He chose good people to dealw ith
— gifted program m er Jonathan Sachs (the co-author of Lotus 1-2-3).
Financialw izard Eric Rosenfeld, canny W allStreet analyst and venture
capitalist Ben Rosen. Kapor w as the founder and CEO of Lotus,one of the
m ost spectacularly successfulbusiness ventures of the later tw entieth
century.
He shakes his head. "A lot. A lot. N ot som ething Italk about. Issues of
m oney and class are things that cut pretty close to the bone."
Idon't pry. It's beside the point. O ne m ight presum e, im politely, that
Kapor has at least forty m illion — that's w hat he got the year he left
Lotus. People w ho ought to know claim Kapor has about a hundred and
fifty m illion, give or take a m arket sw ing in his stock holdings. If Kapor
had stuck w ith Lotus, as his colleague friend and rivalBillGates has
stuck w ith his ow n softw are start-up, M icrosoft, then Kapor w ould
likely have m uch the sam e fortune Gates has — som ew here in the neigh-
borhood of three billion, give or take a few hundred m illion. M itch
Kapor has allthe m oney he w ants. M oney has lost w hatever charm it
ever held for him — probably not m uch in the first place. W hen Lotus
becam e too uptight,too bureaucratic,too far from the true sources of
his ow n satisfaction, Kapor w alked. H e sim ply severed allconnections
w ith the com pany and w ent out the door. It stunned everyone — except
Kapor has not had to strain his resources to w reak a thorough transfor-
m ation in cyberspace politics. In its first year, EFF's budget w as about
a quarter of a m illion dollars. Kapor is running EFF out of his pocket
change.
Kapor takes pains to tellm e that he does not consider him self a civil
libertarian per se. H e has spent quite som e tim e w ith true-blue civil
libertarians lately, and there's a political-correctness to them that
bugs him . They seem to him to spend entirely too m uch tim e in legal
nitpicking and not enough vigorously exercising civilrights in the
everyday realw orld.
Kapor agrees, w ith a show of scorn. "Itellthem that this is the snob-
bery of the people on the *M ayflow er* looking dow n their noses at the
people w ho cam e over *on the second boat!* Just because they got here
a year, or five years, or ten years before everybody else, that doesn't
give them ow nership of cyberspace! By w hat right?"
Irem ark that the telcos are an electronic netw ork, too, and they seem to
guard their specialized know ledge pretty closely.
Kapor ripostes that the telcos and the Internet are entirely different
anim als. "The Internet is an open system , everything is published,
everything gets argued about,basically by anybody w ho can get in.
M ostly, it's exclusive and elitist just because it's so difficult. Let's
m ake it easier to use."
O n the other hand, he allow s w ith a sw ift change of em phasis, the so-
called elitists do have a point as w ell. "Before people start com ing in,
w ho are new ,w ho w ant to m ake suggestions,and criticize the N et as 'all
screw ed up'.... They should at least take the tim e to understand the cul-
ture on its ow n term s. It has its ow n history — show som e respect for
it. I'm a conservative, to that extent."
"The role of governm ent w illbe to m ake sure that nobody cheats. The
proverbial'levelplaying field.' A policy that prevents m onopolization.
It should result in better service, low er prices, m ore choices, and local
em pow erm ent." H e sm iles. "I'm very big on localem pow erm ent."
Irem ark that som e pundits have suggested that electronic netw orking —
faxes, phones, sm all-scale photocopiers — played a strong role in dis-
solving the pow er of centralized com m unism and causing the collapse of
the W arsaw Pact.
"N o," Kapor says flatly. "I think that's extraordinarily unlikely. In
part, because ten or fifteen years ago, Ihad sim ilar hopes about person-
alcom puters — w hich utterly failed to m aterialize." H e grins w ryly,
then his eyes narrow . "I'm *very* opposed to techno-utopias. Every
tim e Isee one, Ieither run aw ay, or try to killit."
It daw ns on m e then that M itch Kapor is not trying to m ake the w orld
safe for dem ocracy. H e certainly is not trying to m ake it safe for anar-
chists or utopians — least of allfor com puter intruders or electronic
Ileave Kapor and his netw orking em ployees struggling cheerfully w ith
the prom ising intricacies of their new ly installed M acintosh System 7
softw are. The next day is Saturday. EFF is closed. Ipay a few visits to
points of interest dow ntow n.
109 Court Street is long gone. W ithin sight of Bell's plaque, across a
Icross the street and circle the telco building, slow ly, hands in m y
jacket pockets. It's a bright, w indy, N ew England autum n day. The cen-
traloffice is a handsom e 1940s-era m egalith in late A rt D eco, eight
stories high.
O ver the glass doors of the front entrance is a handsom e bronze bas-
relief of A rt D eco vines, sunflow ers, and birds, entw ining the Belllogo
and the legend N EW EN GLA N D TELEPHO N E A N D TELEGRA PH CO M PA N Y —
an entity w hich no longer officially exists.
The doors are locked securely. Ipeer through the shadow ed glass. Inside
is an officialposter reading:
A TTEN TIO N
"A llpersons w hile on N ew England Telephone Com pany prem ises are
required to visibly w ear their identification cards (C.C.P. Section 2,
Page 1).
M y book on the H acker Crackdow n is alm ost over now . Ihave deliber-
ately saved the best for last.
"Com puters, Freedom and Privacy." Four hundred people from every
conceivable corner of A m erica's electronic com m unity. A s a science
fiction w riter, Ihave been to som e w eird gigs in m y day, but this thing
is truly *beyond the pale.* Even "Cyberthon," Point Foundation's
"W oodstock of Cyberspace" w here Bay A rea psychedelia collided headlong
w ith the em ergent w orld of com puterized virtualreality, w as like a
Kiw anis Club gig com pared to this astonishing do.
The "electronic com m unity" had reached an apogee. A lm ost every prin-
cipalin this book is in attendance. CivilLibertarians. Com puter Cops.
The D igitalUnderground.Even a few discreet telco people. Colorcoded
dots for lapeltags are distributed. Free Expression issues. Law
Enforcem ent. Com puter Security. Privacy. Journalists. Law yers.
Educators. Librarians. Program m ers. Stylish punk-black dots for the
hackers and phone phreaks.A lm ost everyone here seem s to w ear eight
or nine dots, to have six or seven professionalhats.
It is clear to both fam ilies — even to neighbors and random guests — that
this is not a w orkable relationship, and yet the young couple's desperate
attraction can brook no further delay. They sim ply cannot help them -
From the beginning, anom alies reign. John Perry Barlow , cyberspace
ranger, is here. H is color photo in *The N ew York Tim es M agazine,*
Barlow scow ling in a grim W yom ing snow scape, w ith long black coat,
dark hat,a M acintosh SE30 propped on a fencepost and an aw esom e
frontier rifle tucked under one arm , w illbe the single m ost striking
visualim age of the Hacker Crackdow n. A nd he is CFP's guest of honor —
along w ith GailThackeray of the FCIC! W hat on earth do they expect
these dualguests to do w ith each other? W altz?
Then GailThackeray takes the stage. She's visibly nervous. She's been
on the W ella lot lately. Reading those Barlow posts. Follow ing Barlow
is a challenge to anyone. In honor of the fam ous lyricist for the Grateful
Dead,she announces reedily,she is going to read — *a poem .* A poem
she has com posed herself.
A lBayse, com puter technician for the FBI, had been the only cop at the
CPSR Roundtable, dragged there w ith his arm bent by D orothy D enning.
He w as guarded and tightlipped at CPSR Roundtable;a "lion throw n to the
Christians."
People are giddy w ith laughter. People are interested, fascinated, their
eyes so w ide and dark that they seem eroticized. Unlikely daisy-chains
form in the halls, around the bar, on the escalators: cops w ith hackers,
civilrights w ith FBI, Secret Service w ith phone phreaks.
Phiber discusses his case at m uch length w ith his arresting officer, D on
D elaney of the N ew York State Police. A fter an hour's chat,the tw o of
them look ready to begin singing "A uld Lang Syne." Phiber finally finds
the courage to get his w orst com plaint off his chest. It isn't so m uch the
arrest. It w as the *charge.* Pirating service off 900 num bers. I'm a
D elaney's got a good grasp on the hacker m entality.He held a press con-
ference after he busted a bunch of M asters of Deception kids. Som e
journo had asked him : "W ould you describe these people as *genius-
es?*" D elaney's deadpan answ er, perfect: "N o, Iw ould describe these
people as *defendants.*" D elaney busts a kid for hacking codes w ith
repeated random dialling. Tells the press that N YN EX can track this
stuff in no tim e flat now adays,and a kid has to be *stupid* to do som e-
thing so easy to catch. Dead on again: hackers don't m ind being thought
of as Genghis Khan by the straights, but if there's anything that really
gets 'em w here they live, it's being called *dum b.*
W on't be as m uch fun for Phiber next tim e around.A s a second offender
he's gonna see prison. Hackers break the law . They're not geniuses,
either. They're gonna be defendants. A nd yet,Delaney m uses over a
drink in the hotelbar, he has found it im possible to treat them as com -
m on crim inals. D elaney know s crim inals. These kids, by com parison,
are clueless — there is just no crook vibe off of them , they don't sm ell
right, they're just not *bad.*
Delaney has seen a lot of action. He did V ietnam .He's been shot at,he has
shot people. He's a hom icide cop from N ew York. He has the appearance
of a m an w ho has not only seen the shit hit the fan but has seen it splat-
tered across w hole city blocks and left to ferm ent for years. This guy
has been around.
N eidorf has grow n up a lot in the past year. The kid is a quick study, you
gotta give him that. D ressed by his m om ,the fashion m anager for a
nationalclothing chain, M issouricollege techie-frat Craig N eidorf out-
dappers everyone at this gig but the toniest East Coast law yers. The iron
jaw s of prison clanged shut w ithout him and now law schoolbeckons for
N eidorf. H e looks like a larvalCongressm an.
Phiber O ptik m akes fun of N eidorf for a M idw estern geek, for believing
that "A cid Phreak" does acid and listens to acid rock. Hellno. A cid's
never done *acid!* A cid's into *acid house m usic.* Jesus. The very
idea of doing LSD . O ur *parents* did LSD , ya clow n.
Phiber is different. A very fin de siecle kid, Phiber O ptik. Barlow says
he looks like an Edw ardian dandy. He does rather. Shaven neck, the
sides of his skullcropped hip-hop close, unruly tangle of black hair on
top that looks pom aded, he stays up tillfour a.m . and m isses allthe ses-
sions, then hangs out in payphone booths w ith his acoustic coupler
gutsily CRA CKIN G SYSTEM S RIGH T IN TH E M ID ST O F TH E H EA V IEST LA W
EN FO RCEM EN T D UD ES IN TH E U.S., or at least *pretending* to....
Unlike "Frank D rake." D rake, w ho w rote D orothy D enning out of
now here, and asked for an interview for his cheapo cyberpunk fanzine,
and then started grilling her on her ethics. She w as squirm in', too....
D rake, scarecrow -tallw ith his floppy blond m ohaw k, rotting tennis
shoes and black leather jacket lettered ILLUM IN A TIin red, gives off an
unm istakeable air of the bohem ian literatus. D rake is the kind of guy
w ho reads British industrialdesign m agazines and appreciates W illiam
Gibson because the quality of the prose is so tasty. D rake could never
touch a phone or a keyboard again, and he'd stillhave the nose- ring and
the blurry photocopied fanzines and the sam pled industrialm usic. H e's
a radicalpunk w ith a desktop- publishing rig and an Internet address.
Standing next to D rake, the dim inutive Phiber looks like he's been
physically coagulated out of phone-lines. Born to phreak.
"Ialso think you're quaint, D orothy," Isay, novelist to the rescue, the
journo gift of gab... She is neat and dapper and yet there's an arcane
quality to her, som ething like a Pilgrim M aiden behind leaded glass; if
she w ere six inches high D orothy D enning w ould look great inside a
china cabinet... The Cryptographeress.... The Cryptographrix... w hat-
ever... W eirdly, Peter D enning looks just like his w ife, you could pick
this gentlem an out of a thousand guys as the soulm ate of Dorothy
D enning. W earing tailored slacks, a spotless fuzzy varsity sw eater, and
a neatly knotted academ ician's tie.... This fineboned, exquisitely polite,
utterly civilized and hyperintelligent couple seem to have em erged from
som e cleaner and finer paralleluniverse, w here hum anity exists to do
the Brain Teasers colum n in Scientific A m erican. W hy does this N ice
Lady hang out w ith these unsavory characters?
Because the tim e has com e for it,that's w hy.Because she's the best
there is at w hat she does.
D onn Parker is here, the Great Bald Eagle of Com puter Crim e.... W ith
his bald dom e, great height, and enorm ous Lincoln-like hands, the great
visionary pioneer of the field plow s through the lesser m ortals like an
icebreaker.... H is eyes are fixed on the future w ith the rigidity of a
bronze statue.... Eventually, he tells his audience, allbusiness crim e
w illbe com puter crim e, because businesses w illdo everything through
com puters. "Com puter crim e" as a category w illvanish.
People in the audience are beginning to squirm , and yet there is som e-
thing about the elem entalpurity of this guy's philosophy that com pels
uneasy respect.... Parker sounds like the only sane guy left in the
lifeboat, som etim es. The guy w ho can prove rigorously, from deep
m oralprinciples, that H arvey there, the one w ith the broken leg and the
checkered past, is the one w ho has to be, err.... that is, M r. H arvey is
best placed to m ake the necessary sacrifice for the security and indeed
the very survivalof the rest of this lifeboat's crew .... Com puter secu-
rity, Parker inform s us m ournfully, is a nasty topic, and w e w ish w e
didn't have to have it... The security expert,arm ed w ith m ethod and
logic, m ust think — im agine — everything that the adversary m ight do
before the adversary m ight actually do it. It is as if the crim inal's dark
brain w ere an extensive subprogram w ithin the shining cranium of
D onn Parker. H e is a H olm es w hose M oriarty does not quite yet exist
and so m ust be perfectly sim ulated.
T he H acker C rackdow n
T hree Years Later
Three years in cyberspace is like thirty years anyplace real. It feels as
if a generation has passed since Iw rote this book. In term s of the gen-
erations of com puting m achinery involved, that's pretty m uch the case.
The year 1990 w as not a pleasant one for A T& T. By 1993, how ever,
A T& T had successfully devoured the com puter com pany N CR in an
unfriendly takeover, finally giving the pole-clim bers a m ajor piece of
the digitalaction. A T& T m anaged to rid itself of ow nership of the trou-
blesom e UN IX operating system , selling it to N ovell, a netw are com pany,
w hich w as itself preparing for a savage m arket dust-up w ith operating-
system titan M icrosoft. Furtherm ore, A T& T acquired M cCaw Cellular in
a gigantic m erger, giving A T& T a potentialw ireless w hip-hand over its
form er progeny, the RBO Cs. The RBO Cs them selves w ere now A T& T's
clearest potentialrivals, as the Chinese firew alls betw een regulated
m onopoly and frenzied digitalentrepreneurism began to m elt and col-
lapse headlong.
A t least, A T& T's *advertising* looked like the future. Sim ilar public
attention w as riveted on the m assive $22 billion m egam erger betw een
RBO C BellA tlantic and cable-TV giant Tele-Com m unications Inc. N ynex
w as buying into cable com pany V iacom International. BellSouth w as
buying stock in Prim e M anagem ent, Southw estern Bellacquiring a cable
com pany in W ashington D C, and so forth. By stark contrast, the
Internet, a noncom m ercialentity w hich officially did not even exist, had
no advertising budget at all. A nd yet, alm ost below the levelof govern-
m entaland corporate aw areness, the Internet w as stealthily devouring
everything in its path, grow ing at a rate that defied com prehension.
Kids w ho m ight have been eager com puter-intruders a m ere five years
earlier w ere now surfing the Internet, w here their naturalurge to
explore led them into cyberspace landscapes of such m indboggling vast-
ness that the very idea of hacking passw ords seem ed rather a w aste of
tim e.
By 1993, there had not been a solid, knock 'em dow n, panic-striking,
teenage-hacker com puter-intrusion scandalin m any long m onths.
There had, of course, been som e striking and w ell-publicized acts of
illicit com puter access, but they had been com m itted by adult w hite-
collar industry insiders in clear pursuit of personal or com m ercial
advantage. The kids, by contrast, allseem ed to be on IRC, Internet Relay
Chat.
If any law enforcem ent event truly deserved full-scale press coverage
(w hile som ehow m anaging to escape it),it w as the am azing saga of N ew
York State Police Senior Investigator D on D elaney V ersus the O rchard
Street Finger- H ackers. This story probably represents the real
future of professionaltelecom m unications crim e in A m erica. The fin-
ger- hackers sold, and stillsell, stolen long-distance phone service to a
captive clientele of illegalaliens in N ew York City. This clientele is des-
perate to callhom e, yet as a group, illegalaliens have few legalm eans of
obtaining standard phone service, since their very presence in the
United States is against the law . The finger-hackers of O rchard Street
N or has Robert Izenberg, w ho has suspended his court struggle to get his
m achinery back. M r Izenberg has calculated that his $20,000 of
equipm ent seized in 1990 is, in 1993, w orth $4,000 at m ost. The
m issing softw are,also gone out his door,w as long ago replaced. He
m ight, he says, sue for the sake of principle, but he feels that the people
Steve Jackson w on his case against the Secret Service on M arch 12,
1993, just over three years after the federalraid on his enterprise.
Thanks to the delaying tactics available through the legaldoctrine of
"qualified im m unity," Jackson w as tactically forced to drop his suit
against the individuals W illiam Cook, Tim Foley, Barbara Golden and
H enry Kluepfel. (Cook, Foley, Golden and Kluepfeldid, how ever, testify
during the trial.)
The Secret Service also denied any w rongdoing in reading and erasing all
the supposedly "private" e-m ailinside Jackson's seized board,
Illum inati. The USSS attorneys claim ed the seizure did not violate the
Electronic Com m unications Privacy A ct, because they w eren't actually
"intercepting" electronic m ailthat w as m oving on a w ire, but only elec-
tronic m ailthat w as quietly sitting on a disk inside Jackson's com puter.
They also claim ed that USSS agents hadn't read any of the private m ailon
Illum inati; and anyw ay, even supposing that they had, they w ere allow ed
to do that by the subpoena.
The Jackson case becam e even m ore peculiar w hen the Secret Service
attorneys w ent so far as to allege that the federalraid against the gam ing
com pany had actually *im proved Jackson's business* thanks to the
It w as a long and rather involved trial. The judge seem ed m ost per-
turbed,not by the arcane m atters of electronic law ,but by the fact that
the Secret Service could have avoided alm ost allthe consequent trouble
sim ply by giving Jackson his com puters back in short order. The
Secret Service easily could have looked at everything in Jackson's com -
puters, recorded everything, and given the m achinery back, and there
w ould have been no m ajor scandalor federalcourt suit. O n the con-
trary, everybody sim ply w ould have had a good laugh. Unfortunately, it
appeared that this idea had never entered the heads of the Chicago-based
investigators. They seem ed to have concluded unilaterally, and w ithout
due course of law ,that the w orld w ould be better off if Steve Jackson
didn't have com puters. Golden and Foley claim ed that they had both
never even heard of the Privacy Protection A ct. Cook had heard of the
A ct,but he'd decided on his ow n that the Privacy Protection A ct had
nothing to do w ith Steve Jackson.
The Jackson case w as also a very politicized trial, both sides deliberate-
ly angling for a long-term legalprecedent that w ould stake-out big
claim s for their interests in cyberspace. Jackson and his EFF advisors
tried hard to establish that the least e-m ailrem ark of the lonely elec-
tronic pam phleteer deserves the sam e som ber civil-rights protection as
that afforded *The N ew York Tim es.* By stark contrast, the Secret
Service's attorneys argued boldly that the contents of an electronic bul-
letin board have no m ore expectation of privacy than a heap of postcards.
In the finalanalysis, very little w as firm ly nailed dow n. Form ally, the
legalrulings in the Jackson case apply only in the federalW estern
D istrict of Texas. It w as, how ever, established that these w ere real
civil- liberties issues that pow erfulpeople w ere prepared to go to the
courthouse over; the seizure of bulletin board system s, though it still
goes on,can be a perilous act for the seizer.The Secret Service ow es
Steve Jackson $50,000 in dam ages,and a thousand dollars each to three
of Jackson's angry and offended board users. A nd Steve Jackson,rather
than ow ning the single-line bulletin board system "Illum inati" seized in
1990, now rejoices in possession of a huge privately-ow ned Internet
node, "io.com ," w ith dozens of phone-lines on its ow n T-1 trunk.
A fter the N eidorf trial, D orothy D enning further proved her firm
scholastic independence-of-m ind by speaking up boldly on the useful-
ness and socialvalue of federalw iretapping. M any civillibertarians,
w ho regarded the practice of w iretapping w ith deep occult horror, w ere
crestfallen to the point of com edy w hen nationally know n "hacker sym -
pathizer" D orothy D enning sternly defended police and public interests
In 1993, the stalw arts of the M asters of D eception, Phiber O ptik, A cid
Phreak and Scorpion, finally fellafoulof the m achineries of legalpros-
ecution. A cid Phreak and Scorpion w ere sent to prison for six m onths,
six m onths of hom e detention, 750 hours of com m unity service, and,
oddly, a $50 fine for conspiracy to com m it com puter crim e. Phiber
O ptik, the com puter intruder w ith perhaps the highest public profile in
the entire w orld, took the longest to plead guilty, but, facing the possi-
bility of ten years in jail, he finally did so. H e w as sentenced to a year
and a day in prison.
Term inus did his tim e, got out of prison, and currently lives in Silicon
V alley w here he is running a full-scale Internet node, "netsys.com ." H e
program s professionally for a com pany specializing in satellite links
for the Internet.
Ilike life better on the far side of the boundary betw een fantasy and
reality; but I've com e to recognize that reality has an unfortunate w ay
of annexing fantasy for its ow n purposes. That's w hy I'm on the Police
Liaison Com m ittee for EFF- A ustin, a localelectronic civilliberties
group (eff- austin@ tic.com ). Idon't think Iw illever get over m y
experience of the H acker Crackdow n, and Iexpect to be involved in elec-
tronic civilliberties activism for the rest of m y life.
But there's only one of m e, and Ihave a lot on m y m ind, and, like m ost
H ow ever, in about fifty years, Ithink this book m ight seem quite inter-
esting. A nd in a hundred years, this book should seem m ind-bogglingly
archaic and bizarre, and w illprobably seem far w eirder to an audience
in 2092 than it ever seem ed to the contem porary readership.
From thence,one's bread floats out onto the dark w aters of cyberspace,
B ruce S terling
<bruces@ w ell.sf.ca.us>
N ew Years' D ay 1994, A ustin Texas