| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-Three, File 10 of 13 | |
| PWN ^*^ PWN ^*^ PWN { CyberView '91 } PWN ^*^ PWN ^*^ PWN | |
| ^*^ ^*^ | |
| PWN P h r a c k W o r l d N e w s PWN | |
| ^*^ ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ ^*^ | |
| PWN Special Edition Issue Four PWN | |
| ^*^ ^*^ | |
| PWN "The Hackers Who Came In From The Cold" PWN | |
| ^*^ ^*^ | |
| PWN June 21-23, 1991 PWN | |
| ^*^ ^*^ | |
| PWN Written by Bruce Sterling PWN | |
| ^*^ ^*^ | |
| PWN ^*^ PWN ^*^ PWN { CyberView '91 } PWN ^*^ PWN ^*^ PWN | |
| The Hackers Who Came In From The Cold | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| "Millionaries and vandals met at the computer-underground convention | |
| to discuss free information. What they found was free love." | |
| by Bruce Sterling : bruces @ well.sf.ca.us | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| ** A slightly shorter version of this article appears in Details Magazine | |
| (October 1991, pages 94-97, 134). The Details article includes photographs | |
| of Knight Lightning, Erik Bloodaxe, Mitch Kapor, and Doc Holiday. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| They called it "CyberView '91." Actually, it was another "SummerCon" -- | |
| the traditional summer gathering of the American hacker underground. The | |
| organizer, 21 year old "Knight Lightning," had recently beaten a Computer Fraud | |
| and Abuse rap that might have put him in jail for thirty years. A little | |
| discretion seemed in order. | |
| The convention hotel, a seedy but accommodating motor-inn outside the | |
| airport in St Louis, had hosted SummerCons before. Changing the name had been | |
| a good idea. If the staff were alert, and actually recognized that these were | |
| the same kids back again, things might get hairy. | |
| The SummerCon '88 hotel was definitely out of bounds. The US Secret | |
| Service had set up shop in an informant's room that year, and videotaped the | |
| drunken antics of the now globally notorious "Legion of Doom" through a one-way | |
| mirror. The running of SummerCon '88 had constituted a major count of criminal | |
| conspiracy against young Knight Lightning, during his 1990 federal trial. | |
| That hotel inspired sour memories. Besides, people already got plenty | |
| nervous playing "hunt the fed" at SummerCon gigs. SummerCons generally | |
| featured at least one active federal informant. Hackers and phone phreaks | |
| like to talk a lot. They talk about phones and computers -- and about each | |
| other. | |
| For insiders, the world of computer hacking is a lot like Mexico. There's | |
| no middle class. There's a million little kids screwing around with their | |
| modems, trying to snitch long-distance phone-codes, trying to swipe pirated | |
| software -- the "kodez kidz" and "warez doodz." They're peons, "rodents." | |
| Then there's a few earnest wannabes, up-and-comers, pupils. Not many. Less of | |
| 'em every year, lately. | |
| And then there's the heavy dudes. The players. The Legion of Doom are | |
| definitely heavy. Germany's Chaos Computer Club are very heavy, and already | |
| back out on parole after their dire flirtation with the KGB. The Masters of | |
| Destruction in New York are a pain in the ass to their rivals in the | |
| underground, but ya gotta admit they are heavy. MoD's "Phiber Optik" has | |
| almost completed his public-service sentence, too... "Phoenix" and his crowd | |
| down in Australia used to be heavy, but nobody's heard much out of "Nom" and | |
| "Electron" since the Australian heat came down on them. | |
| The people in Holland are very active, but somehow the Dutch hackers don't | |
| quite qualify as "heavy." Probably because computer-hacking is legal in | |
| Holland, and therefore nobody ever gets busted for it. The Dutch lack the | |
| proper bad attitude, somehow. | |
| America's answer to the Dutch menace began arriving in a steady confusion | |
| of airport shuttle buses and college-kid decaying junkers. A software pirate, | |
| one of the more prosperous attendees, flaunted a radar-detecting black | |
| muscle-car. In some dim era before the jet age, this section of St Louis had | |
| been a mellow, fertile Samuel Clemens landscape. Waist-high summer weeds still | |
| flourished beside the four-lane highway and the airport feeder roads. | |
| The graceless CyberView hotel had been slammed down onto this landscape | |
| as if dropped from a B-52. A small office-tower loomed in one corner beside a | |
| large parking garage. The rest was a rambling mess of long, narrow, dimly lit | |
| corridors, with a small swimming pool, a glass-fronted souvenir shop and a | |
| cheerless dining room. The hotel was clean enough, and the staff, despite | |
| provocation, proved adept at minding their own business. For their part, the | |
| hackers seemed quite fond of the place. | |
| The term "hacker" has had a spotted history. Real "hackers," traditional | |
| "hackers," like to write software programs. They like to "grind code," | |
| plunging into its densest abstractions until the world outside the computer | |
| terminal bleaches away. Hackers tend to be portly white techies with thick | |
| fuzzy beards who talk entirely in jargon, stare into space a lot, and laugh | |
| briefly for no apparent reason. The CyberView crowd, though they call | |
| themselves "hackers," are better identified as computer intruders. They don't | |
| look, talk or act like 60s M.I.T.-style hackers. | |
| Computer intruders of the 90s aren't stone pocket-protector techies. | |
| They're young white suburban males, and look harmless enough, but sneaky. | |
| They're much the kind of kid you might find skinny-dipping at 2AM in a backyard | |
| suburban swimming pool. The kind of kid who would freeze in the glare of the | |
| homeowner's flashlight, then frantically grab his pants and leap over the | |
| fence, leaving behind a half-empty bottle of tequila, a Metallica T-shirt, and, | |
| probably, his wallet. | |
| One might wonder why, in the second decade of the personal-computer | |
| revolution, most computer intruders are still suburban teenage white whiz-kids. | |
| Hacking-as-computer-intrusion has been around long enough to have bred an | |
| entire generation of serious, heavy-duty adult computer-criminals. Basically, | |
| this simply hasn't occurred. Almost all computer intruders simply quit after | |
| age 22. They get bored with it, frankly. Sneaking around in other people's | |
| swimming pools simply loses its appeal. They get out of school. They get | |
| married. They buy their own swimming pools. They have to find some replica | |
| of a real life. | |
| The Legion of Doom -- or rather, the Texas wing of LoD -- had hit Saint | |
| Louis in high style, this weekend of June 22. The Legion of Doom has been | |
| characterized as "a high-tech street gang" by the Secret Service, but this is | |
| surely one of the leakiest, goofiest and best-publicized criminal conspiracies | |
| in American history. | |
| Not much has been heard from Legion founder "Lex Luthor" in recent years. | |
| The Legion's Atlanta wing; "Prophet," "Leftist," and "Urvile," are just now | |
| getting out of various prisons and into Georgia halfway-houses. "Mentor" got | |
| married and writes science fiction games for a living. | |
| But "Erik Bloodaxe," "Doc Holiday," and "Malefactor" were here -- in | |
| person, and in the current issues of TIME and NEWSWEEK. CyberView offered a | |
| swell opportunity for the Texan Doomsters to announce the formation of their | |
| latest high-tech, uhm, organization, "Comsec Data Security Corporation." | |
| Comsec boasts a corporate office in Houston, and a marketing analyst, and | |
| a full-scale corporate computer-auditing program. The Legion boys are now | |
| digital guns for hire. If you're a well-heeled company, and you can cough up | |
| per diem and air-fare, the most notorious computer-hackers in America will show | |
| right up on your doorstep and put your digital house in order -- guaranteed. | |
| Bloodaxe, a limber, strikingly handsome young Texan with shoulder-length | |
| blond hair, mirrored sunglasses, a tie, and a formidable gift of gab, did the | |
| talking. Before some thirty of his former peers, gathered upstairs over | |
| styrofoam coffee and canned Coke in the hotel's Mark Twain Suite, Bloodaxe | |
| sternly announced some home truths of modern computer security. | |
| Most so-called "computer security experts" -- (Comsec's competitors) -- | |
| are overpriced con artists! They charge gullible corporations thousands of | |
| dollars a day, just to advise that management lock its doors at night and use | |
| paper shredders. Comsec Corp, on the other hand (with occasional consultant | |
| work from Messrs. "Pain Hertz" and "Prime Suspect") boasts America's most | |
| formidable pool of genuine expertise at actually breaking into computers. | |
| Comsec, Bloodaxe continued smoothly, was not in the business of turning-in | |
| any former hacking compatriots. Just in case anybody here was, you know, | |
| worrying... On the other hand, any fool rash enough to challenge a | |
| Comsec-secured system had better be prepared for a serious hacker-to-hacker | |
| dust-up. | |
| "Why would any company trust you?" someone asked languidly. | |
| Malefactor, a muscular young Texan with close-cropped hair and the build | |
| of a linebacker, pointed out that, once hired, Comsec would be allowed inside | |
| the employer's computer system, and would have no reason at all to "break in." | |
| Besides, Comsec agents were to be licensed and bonded. | |
| Bloodaxe insisted passionately that LoD were through with hacking for | |
| good. There was simply no future in it. The time had come for LoD to move on, | |
| and corporate consultation was their new frontier. (The career options of | |
| committed computer intruders are, when you come right down to it, remarkably | |
| slim.) "We don't want to be flippin' burgers or sellin' life insurance when | |
| we're thirty," Bloodaxe drawled. "And wonderin' when Tim Foley is gonna come | |
| kickin' in the door!" (Special Agent Timothy M. Foley of the US Secret Service | |
| has fully earned his reputation as the most formidable anti-hacker cop in | |
| America.) | |
| Bloodaxe sighed wistfully. "When I look back at my life... I can see I've | |
| essentially been in school for eleven years, teaching myself to be a computer | |
| security consultant." | |
| After a bit more grilling, Bloodaxe finally got to the core of matters. | |
| Did anybody here hate them now? he asked, almost timidly. Did people think the | |
| Legion had sold out? Nobody offered this opinion. The hackers shook their | |
| heads, they looked down at their sneakers, they had another slug of Coke. They | |
| didn't seem to see how it would make much difference, really. Not at this | |
| point. | |
| Over half the attendees of CyberView publicly claimed to be out of the | |
| hacking game now. At least one hacker present -- (who had shown up, for some | |
| reason known only to himself, wearing a blond wig and a dime-store tiara, and | |
| was now catching flung Cheetos in his styrofoam cup) -- already made his | |
| living "consulting" for private investigators. | |
| Almost everybody at CyberView had been busted, had their computers seized, | |
| or, had, at least, been interrogated -- and when federal police put the squeeze | |
| on a teenage hacker, he generally spills his guts. | |
| By '87, a mere year or so after they plunged seriously into anti-hacker | |
| OBenforcement, the Secret Service had workable dossiers on everybody that | |
| really | |
| mattered. By '89, they had files on practically every last soul in the | |
| American digital underground. The problem for law enforcement has never been | |
| finding out who the hackers are. The problem has been figuring out what the | |
| hell they're really up to, and, harder yet, trying to convince the public that | |
| it's actually important and dangerous to public safety. | |
| From the point of view of hackers, the cops have been acting wacky lately. | |
| The cops, and their patrons in the telephone companies, just don't understand | |
| the modern world of computers, and they're scared. "They think there are | |
| masterminds running spy-rings who employ us," a hacker told me. "They don't | |
| understand that we don't do this for money, we do it for power and knowledge." | |
| Telephone security people who reach out to the underground are accused of | |
| divided loyalties and fired by panicked employers. A young Missourian coolly | |
| psychoanalyzed the opposition. "They're overdependent on things they don't | |
| understand. They've surrendered their lives to computers." | |
| "Power and knowledge" may seem odd motivations. "Money" is a lot easier | |
| to understand. There are growing armies of professional thieves who rip-off | |
| phone service for money. Hackers, though, are into, well, power and | |
| knowledge. This has made them easier to catch than the street-hustlers who | |
| steal access codes at airports. It also makes them a lot scarier. | |
| Take the increasingly dicey problems posed by "Bulletin Board Systems." | |
| "Boards" are home computers tied to home telephone lines, that can store and | |
| transmit data over the phone -- written texts, software programs, computer | |
| games, electronic mail. Boards were invented in the late 70s, and, while the | |
| vast majority of boards are utterly harmless, some few piratical boards swiftly | |
| became the very backbone of the 80s digital underground. Over half the | |
| attendees of CyberView ran their own boards. "Knight Lightning" had run an | |
| electronic magazine, "Phrack," that appeared on many underground boards across | |
| America. | |
| Boards are mysterious. Boards are conspiratorial. Boards have been | |
| accused of harboring: Satanists, anarchists, thieves, child pornographers, | |
| Aryan nazis, religious cultists, drug dealers -- and, of course, software | |
| pirates, phone phreaks, and hackers. Underground hacker boards were scarcely | |
| reassuring, since they often sported terrifying sci-fi heavy-metal names, like | |
| "Speed Demon Elite," "Demon Roach Underground," and "Black Ice." (Modern | |
| hacker boards tend to feature defiant titles like "Uncensored BBS," "Free | |
| Speech," and "Fifth Amendment.") | |
| Underground boards carry stuff as vile and scary as, say, 60s-era | |
| underground newspapers -- from the time when Yippies hit Chicago and ROLLING | |
| STONE gave away free roach-clips to subscribers. "Anarchy files" are popular | |
| features on outlaw boards, detailing how to build pipe-bombs, how to make | |
| Molotovs, how to brew methedrine and LSD, how to break and enter buildings, how | |
| to blow up bridges, the easiest ways to kill someone with a single blow of a | |
| blunt object -- and these boards bug straight people a lot. Never mind that | |
| all this data is publicly available in public libraries where it is protected | |
| by the First Amendment. There is something about its being on a computer -- | |
| where any teenage geek with a modem and keyboard can read it, and print it out, | |
| and spread it around, free as air -- there is something about that, that is | |
| creepy. | |
| "Brad" is a New Age pagan from Saint Louis who runs a service known as | |
| "WEIRDBASE," available on an international network of boards called "FidoNet." | |
| Brad was mired in an interminable scandal when his readers formed a spontaneous | |
| underground railroad to help a New Age warlock smuggle his teenage daughter out | |
| of Texas, away from his fundamentalist Christian in-laws, who were utterly | |
| convinced that he had murdered his wife and intended to sacrifice his daughter | |
| to -- Satan! The scandal made local TV in Saint Louis. Cops came around and | |
| grilled Brad. The patchouli stench of Aleister Crowley hung heavy in the air. | |
| There was just no end to the hassle. | |
| If you're into something goofy and dubious and you have a board about it, | |
| it can mean real trouble. Science-fiction game publisher Steve Jackson had his | |
| board seized in 1990. Some cryogenics people in California, who froze a woman | |
| for post-mortem preservation before she was officially, er, "dead," had their | |
| computers seized. People who sell dope-growing equipment have had their | |
| computers seized. In 1990, boards all over America went down: Illuminati, | |
| CLLI Code, Phoenix Project, Dr. Ripco. Computers are seized as "evidence," but | |
| since they can be kept indefinitely for study by police, this veers close to | |
| confiscation and punishment without trial. One good reason why Mitchell Kapor | |
| showed up at CyberView. | |
| Mitch Kapor was the co-inventor of the mega-selling business program LOTUS | |
| 1-2-3 and the founder of the software giant, Lotus Development Corporation. He | |
| is currently the president of a newly-formed electronic civil liberties group, | |
| the Electronic Frontier Foundation. Kapor, now 40, customarily wears Hawaiian | |
| shirts and is your typical post-hippie cybernetic multimillionaire. He and | |
| EFF's chief legal counsel, "Johnny Mnemonic," had flown in for the gig in | |
| Kapor's private jet. | |
| Kapor had been dragged willy-nilly into the toils of the digital | |
| underground when he received an unsolicited floppy-disk in the mail, from an | |
| outlaw group known as the "NuPrometheus League." These rascals (still not | |
| apprehended) had stolen confidential proprietary software from Apple Computer, | |
| Inc., and were distributing it far and wide in order to blow Apple's trade | |
| secrets and humiliate the company. Kapor assumed that the disk was a joke, or, | |
| more likely, a clever scheme to infect his machines with a computer virus. | |
| But when the FBI showed up, at Apple's behest, Kapor was shocked at the | |
| extent of their naivete. Here were these well-dressed federal officials, | |
| politely "Mr. Kapor"- ing him right and left, ready to carry out a war to the | |
| knife against evil marauding "hackers." They didn't seem to grasp that | |
| "hackers" had built the entire personal computer industry. Jobs was a hacker, | |
| Wozniak too, even Bill Gates, the youngest billionaire in the history of | |
| America -- all "hackers." The new buttoned-down regime at Apple had blown its | |
| top, and as for the feds, they were willing, but clueless. Well, let's be | |
| charitable -- the feds were "cluefully challenged." "Clue-impaired." | |
| "Differently clued...." | |
| Back in the 70s (as Kapor recited to the hushed and respectful young | |
| hackers) he himself had practiced "software piracy" -- as those activities | |
| would be known today. Of course, back then, "computer software" hadn't been a | |
| major industry -- but today, "hackers" had police after them for doing things | |
| that the industry's own pioneers had pulled routinely. Kapor was irate about | |
| this. His own personal history, the lifestyle of his pioneering youth, was | |
| being smugly written out of the historical record by the latter-day corporate | |
| androids. Why, nowadays, people even blanched when Kapor forthrightly declared | |
| that he'd done LSD in the Sixties. | |
| Quite a few of the younger hackers grew alarmed at this admission of | |
| Kapor's, and gazed at him in wonder, as if expecting him to explode. | |
| "The law only has sledgehammers, when what we need are parking tickets and | |
| speeding tickets," Kapor said. Anti-hacker hysteria had gripped the nation in | |
| 1990. Huge law enforcement efforts had been mounted against illusory threats. | |
| In Washington DC, on the very day when the formation of the Electronic Frontier | |
| Foundation had been announced, a Congressional committee had been formally | |
| presented with the plotline of a thriller movie -- DIE HARD II, in which hacker | |
| terrorists seize an airport computer -- as if this Hollywood fantasy posed a | |
| clear and present danger to the American republic. A similar hacker thriller, | |
| WAR GAMES, had been presented to Congress in the mid-80s. Hysteria served no | |
| one's purposes, and created a stampede of foolish and unenforceable laws likely | |
| to do more harm than good. | |
| Kapor didn't want to "paper over the differences" between his Foundation | |
| and the underground community. In the firm opinion of EFF, intruding into | |
| computers by stealth was morally wrong. Like stealing phone service, it | |
| deserved punishment. Not draconian ruthlessness, though. Not the ruination of | |
| a youngster's entire life. | |
| After a lively and quite serious discussion of digital free-speech issues, | |
| the entire crew went to dinner at an Italian eatery in the local mall, on | |
| Kapor's capacious charge-tab. Having said his piece and listened with care, | |
| Kapor began glancing at his watch. Back in Boston, his six-year-old son was | |
| waiting at home, with a new Macintosh computer-game to tackle. A quick | |
| phone-call got the jet warmed up, and Kapor and his lawyer split town. | |
| With the forces of conventionality -- such as they were -- out of the | |
| picture, the Legion of Doom began to get heavily into "Mexican Flags." A | |
| Mexican Flag is a lethal, multi-layer concoction of red grenadine, white | |
| tequila and green creme-de-menthe. It is topped with a thin layer of 150 proof | |
| rum, set afire, and sucked up through straws. | |
| The formal fire-and-straw ritual soon went by the board as things began to | |
| disintegrate. Wandering from room to room, the crowd became howlingly rowdy, | |
| though without creating trouble, as the CyberView crowd had wisely taken over | |
| an entire wing of the hotel. | |
| "Crimson Death," a cheerful, baby-faced young hardware expert with a | |
| pierced nose and three earrings, attempted to hack the hotel's private phone | |
| system, but only succeeded in cutting off phone service to his own room. | |
| Somebody announced there was a cop guarding the next wing of the hotel. | |
| Mild panic ensued. Drunken hackers crowded to the window. | |
| A gentleman slipped quietly through the door of the next wing wearing a | |
| short terrycloth bathrobe and spangled silk boxer shorts. | |
| Spouse-swappers had taken over the neighboring wing of the hotel, and were | |
| holding a private weekend orgy. It was a St Louis swingers' group. It turned | |
| out that the cop guarding the entrance way was an off-duty swinging cop. He'd | |
| angrily threatened to clobber Doc Holiday. Another swinger almost punched-out | |
| "Bill from RNOC," whose prurient hacker curiosity, naturally, knew no bounds. | |
| It was not much of a contest. As the weekend wore on and the booze flowed | |
| freely, the hackers slowly but thoroughly infiltrated the hapless swingers, who | |
| proved surprisingly open and tolerant. At one point, they even invited a group | |
| of hackers to join in their revels, though "they had to bring their own women." | |
| Despite the pulverizing effects of numerous Mexican Flags, Comsec Data | |
| Security seemed to be having very little trouble on that score. They'd | |
| vanished downtown brandishing their full-color photo in TIME magazine, and | |
| returned with an impressive depth-core sample of St Louis womanhood, one of | |
| whom, in an idle moment, broke into Doc Holiday's room, emptied his wallet, and | |
| stole his Sony tape recorder and all his shirts. | |
| Events stopped dead for the season's final episode of STAR TREK: THE NEXT | |
| GENERATION. The show passed in rapt attention -- then it was back to harassing | |
| the swingers. Bill from RNOC cunningly out-waited the swinger guards, | |
| infiltrated the building, and decorated all the closed doors with globs of | |
| mustard from a pump-bottle. | |
| In the hungover glare of Sunday morning, a hacker proudly showed me a | |
| large handlettered placard reading PRIVATE -- STOP, which he had stolen from | |
| the unlucky swingers on his way out of their wing. Somehow, he had managed to | |
| work his way into the building, and had suavely ingratiated himself into a | |
| bedroom, where he had engaged a swinging airline ticket-agent in a long and | |
| most informative conversation about the security of airport computer terminals. | |
| The ticket agent's wife, at the time, was sprawled on the bed engaging in | |
| desultory oral sex with a third gentleman. It transpired that she herself did | |
| a lot of work on LOTUS 1-2-3. She was thrilled to hear that the program's | |
| inventor, Mitch Kapor, had been in that very hotel, that very weekend. | |
| Mitch Kapor. Right over there? Here in St Louis? Wow. | |
| Isn't life strange. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| CyberView '91 Guest List | |
| ~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Those known best by handles: Those not: | |
| Bill From RNOC / Circuit / The Conflict / Dead Lord Dorothy Denning | |
| Dispater / Doc Holiday / Dr. Williams / Cheap Shades Michael Godwin | |
| Crimson Death / Erik Bloodaxe / Forest Ranger / Gomez Brad Hicks | |
| Jester Sluggo / J.R. "Bob" Dobbs / Knight Lightning Mitch Kapor | |
| Malefactor / Mr. Fido / Ninja Master / Pain Hertz Bruce Sterling | |
| Phantom Phreaker / Predat0r / Psychotic Surfer of C&P | |
| Racer X / Rambone / The Renegade / Seth 2600 / Taran King | |
| Tuc <Tuc gets his own line just because he is cool!> | |
| _______________________________________________________________________________ | |