home *** CD-ROM | disk | FTP | other *** search
- *****************************************************************************
- * *
- * From the March 1990 edition of Harper's Magazine *
- * *
- * IS COMPUTER HACKING A CRIME? *
- * *
- * Typed by Warlock, March 13. *
- * *
- *****************************************************************************
-
- The image of the computer hacker drifted into public awareness in the
- middle Seventies, when reports of Chinese-food-consuming geniuses working
- compulsively at keyboards began to issue from MIT. Over time, several of
- these impresarios entered commerce, and the public's impression of hackers
- changed: They were no longer nerds but young, millionaire entrepreneurs.
- The most recent news reports have given the term a more felonious
- connotation. Early this year, a graduate student named Robert Morris Jr. went
- on trial for releasing a computer program known as a worm into the vast
- Internet system, halting more than 6,000 computers. The subsequent public
- debate ranged from the matter of proper punishment for a mischievous kid to
- the issue of our rapidly changing notion of what constitutes free speech -- or
- property -- in an age of modems and data bases. In order to allow hackers to
- speak for themselves, Harper's Magazine recently organized an electronic
- discussion and asked some of the nation's best hackers to "log on," discuss
- the protean notions of contemporary speech, and explain what their powers and
- talents are.
-
- The following forum is based on a discussion held on the WELL, a computer
- bulletin board system based in Sausalito, California. The forum is the result
- of a gradual accretion of arguments as the participants -- located throughout
- the country -- opined and reacted over an eleven day period. Harper's Magazine
- senior editor Jack Hitt and assistant editor Paul Tough served as moderators.
-
- ADELAIDE is a pseudonym for a former hacker who has sold his soul to the
- corporate state as a computer programmer.
-
- BARLOW is John Perry Barlow, a retired cattle rancher, a former Republican
- county chairman, and a lyricist for the Grateful Dead, who currently is
- writing a book on computers and consciousness entitled Everything We Know Is
- Wrong.
-
- BLUEFIRE is Dr. Robert Jacobson, associate director of the Human Interface
- Technology Laboratory at the University of Washington and a former
- information-policy analyst with the California legislature.
-
- BRAND is Russell Brand, a senior computer scientist with Reasoning Systems, in
- Palo Alto, California.
-
- CLIFF is Clifford Stoll, the astronomer who caught a spy in a military computer
- network and recently published an account of his investigation entitled The
- Cuckoo's Egg.
-
- DAVE is Dave Hughes, a retired West Pointer who currently operates his own
- political bulletin board.
-
- DRAKE is Frank Drake, a computer-science student at a West Coast university and
- the editor of W.O.R.M., a cyberpunk magazine.
-
- EDDIE JOE HOMEBOY is a pseudonym for a professional software engineer who has
- worked at Lucasfilm, Pyramid Technology, Apple Computer, and Autodesk.
-
- EMMANUEL GOLDSTEIN is the editor of 2600, the "hacker's quarterly."
-
- HANK is Hank Roberts, who builds mobiles, flies hang gliders, and proofreads
- for the Whole Earth Catalog.
-
- JIMG is Jim Gasperini, the author, with TRANS Fiction Systems, of Hidden
- Agenda, a computer game that simulates political conflict in Central America.
-
- JRC is Jon Carroll, daily columnist for the San Francisco Chronical and
- writer-in-residence for the Pickle Family Circus, a national traveling circus
- troupe based in San Francisco.
-
- KK is Kevin Kelly, editor of the Whole Earth Review and a cofounder of the
- Hacker's Conference.
-
- LEE is Lee Felstein, who designed the Osborne-1 computer and cofounded the
- Homebrew Computer Club.
-
- MANDEL is Tom Mandel, a professional futurist and an organizer of the Hacker's
- Conference.
-
- RH is robert Horvitz, Washington correspondent for the Whole earth Review.
-
- RMS is Richard Stallman, founder of the Free Software Foundation.
-
- TENNEY is Glenn Tenney, an independant-systems architect and an organizer of
- the Hacker's Conference.
-
- ACID PHREAK and PHIBER OPTIK are both pseudonyms for hackers who decline to be
- identified.
-
- A Hacker's Lexicon
-
- Back Door: A point of entry into a computer system -- often installed there by
- the original programmer -- that provides secret access.
-
- Bomb: A destructive computer program, which, when activated, destroys the
- files in a computer system.
-
- Chipper: A hacker who specializes in changing the programming instructions of
- computer chips.
-
- Cracker: A hacker who breaks illegally into computer systems and creates
- mischief; often used pejoratively. The original meaning of cracker was
- narrower, describing those who decoded copyright-protection schemes on
- commercial software products or to modify them; sometimes known as a software
- pirate.
-
- Hacker: Originally, a compulsive computer programmer. The word has evolved in
- meaning over the years. Among computer users, hacker carries a positive
- connotation, meaning anyone who creatively explores the operations of computer
- systems. Recently, it has taken on a negative connotation, primarily through
- confusion with cracker.
-
- Phone phreak: One who explores the operations of the phone system, often with
- the intent of making free phone calls.
-
- Social engineering: A nontechnical means of gaining information simply by
- persuading people to hand it over. If a hacker wished to gain access to a
- computer system, for example, an act of social engineering might be able to
- contact a system operator and to convince him or her that the hacker is a
- legitimate user in need of a password; more colloquially, a con job.
-
- Virus: A program that, having been introduced into a system, replicates itself
- and attaches itself to other programs, often with a variety of mischievous
- effects.
-
- Worm: A destructive program that, when activated, fills a computer system with
- self-replicating information, clogging the system so that its operations are
- severely slowed, sometimes stopped.
-
- The Digital Frontier
-
- HARPER'S [Day 1, 9:00 A.M.]: When the computer was young, the word hacking was
- used to describe the work of brilliant students who explored and expanded the
- uses to which this new technology might be employed. There was even talk of a
- "hacker ethic." Somehow, in the succeeding years, the word has taken on dark
- connotations, suggestion the actions of a criminal. What is the hacker ethic,
- and does it survive?
-
- ADELAIDE [Day 1, 9:25 A.M.]: the hacker ethic survives, and it is a fraud. It
- survives in anyone excited by technology's power to turn many small,
- insignificant things into one vast, beautiful thing. It is a fraud because
- there is nothing magical about computers that causes a user to undergo
- religious conversion and devote himself to the public good. Early automobile
- inventors were hackers too. At first the elite drove in luxury. Later
- practically everyone had a car. Now we have traffic jams, drunk drivers, air
- pollution, and suburban sprawl. The old magic of an automobile occasionally
- surfaces, but we possess no delusions that it automatically invades the
- consciousness of anyone who sits behind the wheel. Computers are power, and
- direct contact with power can bring out the best or worst in a person. It's
- tempting to think that everyone exposed to the technology will be grandly
- inspired, but, alas, it just ain't so.
-
- BRAND [Day 1, 9:54 A.M.] The hacker ethic involves several things. One is
- avoiding waste; insisting on using idle computer power -- often hacking into a
- system to do so, while taking the greatest precautions not to damage the
- system. A second goal of many hackers is the free exchange of technical
- information. These hackers feel that patent and copyright restrictions slow
- down technological advances. A third goal is the advancement of human
- knowledge for its own sake. Often this approach is unconventional. People we
- call crackers often explore systems and do mischief. The are called hackers by
- the press, which doesn't understand the issues.
-
- KK [Day 1, 11:19 A.M.]: The hacker ethic went unnoticed early on because the
- explorations of basement tinkerers were very local. Once we all became
- connected, the work of these investigations rippled through the world. today
- the hacking spirit is alive and kicking in video, satellite TV, and radio. In
- some fields they are called chippers, because the modify and peddle altered
- chips. Everything that was once said about "phone phreaks" can be said about
- them too.
-
- DAVE [Day 1, 11:29 A.M.]: Bah. Too academic. Hackers hack. Because the want
- to. Not for any higher purpose. Hacking is not dead and won't be as long as
- teenagers get their hands on the tools. There is a hacker born every minute.
-
- ADELAIDE [Day 1, 11:42 A.M.]: Don't forget ego. People break into computers
- because it's fun and it makes them feel powerful.
-
- BARLOW [Day 1, 11:54 A.M.]: Hackers hack. Yeah, right, but what's more to the
- point is that humans hack and always have. Far more than just opposable
- thumbs, upright posture, or excess cranial capacity, human beings are set apart
- from all other species by an itch, a hard-wired dissatisfaction. Computer
- hacking is just the latest in a series of quests that started with fire
- hacking. Hacking is also a collective enterprise. It brings to our joint
- endeavors the simultaneity that other collective organisms -- ant colonies,
- Canada geese -- take for granted. This is important, because combined with our
- itch to probe is a need to connect. Humans miss the almost telepathic
- connectedness that I've observed in other herding mammals. And we want it
- back. Ironically, the solitary sociopath and his 3:00 A.M. endeavors hold the
- most promise for delivering species reunion.
-
- EDDIE JOE HOMEBOY [Day 1, 4:44 P.M.]: Hacking really took hold with the advent
- of the personal computer, which freed programmers from having to use a big
- time-sharing system. A hacker could sit in the privacy of his home and hack to
- his heart's and head's content.
-
- LEE [Day 1, 5:17 P.M.]: "Angelheaded hipsters burning for the ancient heavenly
- connection to the starry dynamo in the machinery of night" (Allen Ginsberg,
- "Howl"). I still get an endorphin rush when I go on a design run -- my mind
- out over the edge, groping for possibilities that can be sensed when various
- parts are held in juxtaposition with a view toward creating a whole object:
- straining to get through the epsilon-wide crack between What Is and What Could
- Be. Somewhere there's the Dynamo of Night, the ultra-mechanism waiting to be
- dreamed, that we'll never get to in actuality, (think what is would weigh!) but
- that's present somehow in the vicinity of those mental wrestling matches. When
- I re-emerge into the light of another day with the design on paper -- and with
- the knowledge that if it ever gets built, things will never be the same again
- -- I know I've been where artists go. That's hacking to me: to transcend
- custom and to engage in creativity for its own sake, but also to create
- objective effects. I've been around long enough to see the greed creeps take
- up the unattended reins of power and shut down most of the creativity that put
- them where they are. But I've also seen things change, against the best
- efforts of a stupidly run industry. We cracked the egg out from under the
- Computer Priesthood, and now everyone can have omelets.
-
- RMS [Day 1, 5:19 P.M.]: The media and the courts are spreading a certain image
- of hackers. It's important for us not to be shaped by that image. But there
- are two ways that it can happen. One way is for hackers to become part of the
- security-maintenance establishment. The other, more subtle, way is for a
- hacker to become the security-breaking phreak the media portray. By shaping
- ourselves into the enemy of the establishment, we uphold the establishment. But
- there's nothing wrong with breaking security if you're accomplishing something
- useful. It's like picking a lock on a tool cabinet to get a screwdriver to fix
- your radio. As long as you put the screwdriver back, what harm does it do?
-
- ACID PHREAK [Day 1, 6:34 P.M.]: There is no one hacker ethic. Everyone has
- his own. To say that we all think the same way is preposterous. The hacker
- of old sought to find what the computer itself could do. There was nothing
- illegal about that. Today, hackers and phreaks are drawn to specific, often
- corporate, systems. It's no wonder everyone on the other side is getting mad.
- We're always one step ahead. We were back then, and we are now.
-
- CLIFF [Day 1, 8:38 P.M.]: RMS said, "There's nothing wrong with breaking
- security if you're accomplishing something useful." Huh? How about, There's
- nothing wrong with entering a neighbor's house if you're accomplishing
- something useful, just as long as you clean up after yourself. Does my
- personal privacy mean anything? Should my personal letters and data be open to
- anyone who knows how to crack passwords? If not my property, then how about a
- bank's? Should my credit history be available to anyone who can find a back
- door to the private computers of TRW, the firm that tracks people's credit
- histories? How about a list of AIDS patients from a hospital's data bank? Or
- next week's prime interest rate from a computer at the Treasury Department?
-
- BLUEFIRE [Day 1, 9:20 P.M.]: Computers are everywhere, and they link us
- together into a vast social "cybernetia." The grand skills of the hackers,
- formidable though they may have been, are incapable of subverting this
- automated social order. The networks in which we survive are more than copper
- wire and radio waves: They are the social organization. For every hacker in
- revolt, busting through a security code, ten thousand people are being wired up
- with automatic call-identification and credit-checking machines. Long live the
- Computer Revolution, which died aborning.
-
- JRC [Day 1, 10:28 P.M.]: We have two different definitions here. One speaks
- of a tinkerer's ecstasy, an ecstasy that is hard to maintain in the corporate
- world but is nevertheless at the heart of Why Hackers Hack. The second is
- political, and it has to do with the free flow of information. Information
- should flow more freely (how freely is being debated), and the hacker can make
- it happen because the hacker knows how to undam the pipes. This makes the
- hacker ethic -- of necessity -- antiauthoritarian.
-
- EMMANUEL GOLDSTEIN [Day 2, 2:41 A.M.]: It's meaningless what we call
- ourselves: hackers, crackers, techno-rats. We're individuals who happen to
- play with high tech. There is no hacker community in the traditional sense of
- the term. There are no leaders and no agenda. We're just individuals out
- exploring.
-
- BRAND [Day 2, 9:02 A.M.]: There are two issues: invariance and privacy.
- Invariance is the art of leaving things as you found them. If someone used my
- house for the day and left everything as he found it so that there was no way
- to tell he had been there, I would see no problem. With a well-run computer
- system, we can assure invariance. Without this assurance we must fear that the
- person picking the lock to get the screwdriver will break the lock, the
- screwdriver, or both. Privacy is more complicated. I want my medical records,
- employment records, and letters to The New Republic private because I fear that
- someone will do something with the information that is against my interests.
- If I could trust people not to do bad things with information, I would not need
- to hide it. Rather than preventing the "theft" of this data, we should
- prohibit its collection in the first place.
-
- HOMEBOY [Day 2, 9:37 A.M.]: Are crackers really working for the free flow of
- information? Or are they unpaid tools of the establishment, identifying the
- holes in the institutional dike so that they can be plugged by the
- authorities, only to be tossed in jail or exiled?
-
- DRAKE [Day 2, 10:54 A.M.]: There is an unchallenged assumption that crackers
- have some political motivation. Earlier, crackers were portrayed as failed
- revolutionaries; now Homeboy suggests that crackers may be tools of the
- establishment. These ideas about crackers are based on earlier experiences
- with subcultures (beats, hippies, yippies). Actually, the contemporary
- cracker is often middle-class and doesn't really distance himself from the
- "establishment." While there are some anarcho-crackers, there are even more
- right-wing crackers. The hacker ethic crosses political boundaries.
-
- MANDEL [Day 2, 11:01 A.M.]: The data on crackers suggests that they are either
- juvenile delinquents or plain criminals.
-
- BARLOW [Day 2, 11:34 A.M.]: I would far rather have everyone know my most
- intimate secrets than to have noncontextual snippits of them "owned" by TRW
- and the FBI -- and withheld from me! Any cracker who is entertained by
- peeping into my electronic window is welcome to the view. Any institution that
- makes money selling rumors of my peccadilloes is stealing from me. Anybody who
- wants to inhibit that theft with electronic mischief has my complete support.
- Power to the techno-rats!
-
- EMMANUEL [Day 2, 7:09 P.M.]: Calling someone on the phone is the equivalent of
- knocking on that person's door, right? Wrong! When someone answers the phone,
- you are inside the home. You have already been let in. The same with an
- answering machine, or a personal computer, if it picks up the phone. It is
- wrong to violate a person's privacy, but electronic rummaging is not the same
- as breaking and entering. The key here is that most people are unaware of how
- easy it is for others to invade their electronic privacy and see credit
- reports, phone bills, FBI files, Social Security reports. The public is
- grossly underinformed, and that's what must be fixed if hackers are to be
- thwarted. If we had an educated public, though, perhaps the huge -- and now
- common -- date bases would never have been allowed to exist. Hackers have
- become scapegoats: We discover the gaping holes in the system and then get
- blamed for the flaws.
-
- HOMEBOY [Day 2, 7:41 P.M.]: Large, insular, undemocratic governments and
- institutions need scapegoats. It's the first step down the road to fascism.
- That's where hackers play into the hands of the establishment.
-
- DAVE [Day 2, 7:55 P.M.]: If the real criminals are those who leave gaping
- holes in their systems, the the real criminals in house burglaries are those
- who leave their windows unlatched. Right? Hardly. And Emmanuel's analogy to
- a phone being answered doesn't hold either. There is no security protection in
- making a phone call. A computer system has a password, implying a desire for
- security. Breaking into a poorly protected house is still burglary.
-
- CLIFF [Day 2, 9:06 P.M.]: Was there a hacker's ethic and does it survive?
- More appropriately, was there a vandal's ethic and does it survive? As long as
- there are communities, someone will violate the trust that binds them. Once,
- our computers were isolated, much as eighteenth-century villages were. Little
- was exchanged, and each developed independently. Now we've built far-flung
- electronic neighborhoods. These communities are built on trust: people
- believing that everyone profits by sharing resources. Sure enough, vandals
- crept in, breaking into systems, spreading viruses, pirating software, and
- destroying people's work. "It's okay," they say. "I can break into a system
- because I'm a hacker." Give me a break!
-
- BARLOW [Day 2, 10:41 P.M.]: I live in a small town. I don't have a key to my
- house. Am I asking for it? I think not. Among the juvenile delinquents in my
- town, there does exist a vandal's ethic. I know because I once was one. In a
- real community, part of a kid's rite of passage is discovering what walls can
- be breached. Driving 110 miles per hour on Main Street is a common symptom of
- rural adolescence, publicly denounced but privately understood. Many teenagers
- die in this quest -- two just the night before last -- but it is basic to our
- culture. Even rebellious kids understand that risk to one's safety is one
- thing, wanton vandalism or theft is another. As a result, almost no one locks
- anything here. In fact, a security system is an affront to a teenage psyche.
- While a kid might be dissuaded by conscience, he will regard a barricade as an
- insult and a challenge. So the CEOs who are moving here (the emperor of
- PepsiCo and the secretary of state among them) soon discover that over the
- winter people break into their protected mansions just to hang out. When
- systems are open, the community prospers, and teenage miscreants are satisfied
- to risk their own lives and little else. When the social contract is enforced
- by security, the native freedom of the adolescent soul will rise up to
- challenge it in direct proportion to its imposition.
-
- HANK [Day 2, 11:23 P.M.]: Barlow, the small town I grew up in was much like
- yours -- until two interstate highways crossed nearby. The open-door style
- changed in one, hard summer because our whole town became unlocked. I think
- Cliff's community is analogous to my little town -- confronted not by a new
- locked-up neighbor who poses a challenge to the local kids but by a sudden,
- permanent opening up of the community to many faceless outsiders who owe the
- town no allegiance.
-
- EMMANUEL [Day 3, 1:33 A.M.]: Sorry, I don't buy Dave's unlatched-window
- analogy. A hacker who wanders into a system with the ease that it's done today
- is, in my analogy, walking into a house without walls -- and with a cloaking
- device! Any good hacker can make himself invisible. If housebreaking were
- this easy, people would be enraged. But we're missing the point. I'm not
- referring to accessing a PC in someone's bedroom but about accessing credit
- reports, government files, motor vehicle records, and the megabytes of data
- piling up on each of us. Thousands of people legally see and use this
- ever-growing mountain of data, much of it erroneous. Whose rights are we
- violating when we peruse a file? Those of the person we look up? He doesn't
- even know that information exists, that it was compiled without his consent,
- and that it's not his property anymore! The invasion of privacy took place
- long before the hacker ever arrived. The only way to find out how such a
- system works is to break the rules. It's not what hackers do that will lead us
- into a state of constant surveillance; it's allowing the authorities to impose
- on us a state of mock crisis.
-
- MANDEL [Day 3, 9:27 A.M.]: Note that the word crime has no fixed reference in
- our discussion. Until recently, breaking into government computer systems
- wasn't a crime; now it is. In fact, there is some debate, to be resolved in
- the courts, whether what Robert Morris Jr. did was actually a crime [see "A
- Brief History of Hacking"]. Crime gets redefined all the time. Offend enough
- people or institutions and, lo and behold, someone will pass a law. That is
- partly what is going on right now: Hackers are pushing buttons, becoming more
- visible, and that inevitably means more laws and more crimes.
-
- ADELAIDE [Day 3, 9:42 A.M.]: Every practitioner of these arts knows that at
- minimum he is trespassing. The English "country traveler ethic" applies: The
- hiker is always ethical enough to close the pasture gates behind him so that no
- sheep escape during his pastoral stroll through someone else's property. The
- problem is that what some see as a gentle trespassing others see as theft of
- service, invasion of privacy, threat to national security -- take your pick.
-
- BARLOW [Day 3, 2:38 P.M.]: I regard the existence of proprietary data about me
- to be theft -- not just in the legal sense but in a faintly metaphysical one,
- rather like the belief among aborigines that a photograph steals the soul. The
- crackers who maintain access to that data are, at this level, liberators.
- Their incursions are the only way to keep the system honest.
-
- RMS [Day 3, 2:48 P.M.]: Recently, a tough anti-hacker measure was proposed in
- England. In The Economist I saw a wise response, arguing that it was silly to
- treat an action as worse when it involves a computer that when it does not.
- They noted, for example, that physical trespassing was considered a civil
- affair, not a criminal one, and said that computer trespassing should be
- treated likewise. Unfortunately, the U.S. government was not so wise.
-
- BARLOW [Day 3, 3:23 P.M.]: The idea that a crime is worse if a computer is
- involved relates to the gathering governmental perception that computer viruses
- and guns may be related. I know that sounds absurd, but they have more in
- common than one might think. For all its natural sociopathy, the virus is not
- without philosophical potency -- like a gun. Here in Wyoming guns are part of
- the furniture. Only recently have I observed an awareness of their political
- content. After a lot of frothing about prying cold, dead fingers from
- triggers, the sentiment was finally distilled to a bumper sticker I saw on a
- pickup the other day: "Fear the Government That Fears Your Gun." Now I've read
- too much Ghandi to buy that line without misgivings, but it would be hard to
- argue that Tiananmen Square could have been inflicted on a populace capable of
- shooting back. I don't wholeheartedly defend computer viruses, but one must
- consider their increasingly robust deterrent potential. Before it's over, the
- War on Drugs could easily turn into an Armageddon between those who love
- liberty and those who crave certainty, providing just the excuse the control
- freaks have been waiting for to rid America of all that constitutional
- mollycoddling called the Bill of Rights. Should that come to pass, I will want
- to use every available method to vex and confuse the eyes and ears of
- surveillance. The virus could become the necessary instrument of our freedom.
- At the risk of sounding like some digital posse comitatus, I say* Fear the
- Government That Fears Your Computer.
-
- TENNEY [Day 3, 4:41 P.M.]: Computer-related crimes are more feared because
- they are performed remotely -- a crime can be committed in New York by someone
- in Los Angeles -- and by people not normally viewed as being criminals -- by
- teenagers who don't look like delinquents. They're smart nerds, and they don't
- look like Chicago gangsters packing heat.
-
- BARLOW [Day 4, 12:12 A.M.]: People know so little of these things that they
- endow computers and the people who do understand them with powers neither
- possesses. If America has a religion, its ark is the computer and its
- covenant is the belief that Science Knows. We are mucking around in the
- temple, guys. It's a good way to catch hell.
-
- DAVE [Day 4, 9:18 A.M.]: Computers are the new American religion. The public
- is in awe of -- and fears -- the mysteries and the high priests who tend them.
- And the public reacts just as it always has when faced with fear of the unknown
- -- punishment, burning at the stake. Hackers are like the early Christians.
- When caught, they will be thrown to the lions before the Roman establishment:
- This year the mob will cheer madly as Robert Morris is devoured.
-
- KK [Day 6, 11:37 A.M.]: The crackers here suggest that they crack into systems
- with poor security BECAUSE the security is poor. Do more sophisticated
- security precautions diminish the need to crack the system or increase it?
-
- ACID [Day 6, 1:20 P.M.]: If there was a system that we knew was uncrackable,
- we wouldn't even try to crack it. On the other hand, if some organization
- boasted that its system was impenetrable and we knew that was media hype, I
- think it would be safe to say we'd have to "enlighten" them.
-
- EMMANUEL [Day 6, 2:49 P.M.]: Why do we insist on cracking systems? The more
- people ask those kinds of questions, the more I want to get in! Forbid access
- and the demand for access increases. For the most part, it's simply a mission
- of exploration. In the words of the new captain of the starship Enterprise,
- Jean-Luc Picard, "Let's see what's out there!"
-
- BARLOW [Day 6,4:34 P.M.]: Tell us, Acid, is there a system that you know to be
- uncrackable to the point where everyone's given up?
-
- ACID [Day 6, 8:29 P.M.]: CICIMS is pretty tough.
-
- PHIBER OPTIK [Day 7, 2:36 P.M.]: Really? CICIMS is a system used by Bell
- operating companies. The entire security system was changed after myself and a
- friend must have been noticed in it. For the entire United States, there is
- only one such system, located in Indiana. The new security scheme is flawless
- in itself, and there is no chance of "social engineering" i.e., bullshitting
- someone inside the system into telling you what the passwords are. The system
- works something like this: You log on with the proper account and password;
- then, depending on who you are, the system asks at random three of ten
- questions that are unique to each user. But the system can be compromised by
- entering forwarding instructions into the phone company's switch for that
- exchange, thereby intercepting every phone call that comes in to the system
- over a designated period of time and connecting the call to your computer. If
- you are familiar with the security layout, you can emulate its appearance and
- fool the caller into giving you the answers to his questions. Then you call
- the system yourself and use those answers to get in. There are other ways of
- doing it as well.
-
- BLUEFIRE [Day 7,11:53 P.M.]: I can't stand it! Who do you think pays for the
- security that the telephone companies must maintain to fend off illegal use? I
- bet it costs the ratepayers around $10 million for this little extravaganza.
- The cracker circus isn't harmless at all, unless you don't mind paying for
- other people's entertainment. Hackers who have contributed to the social
- welfare should be recognized. But cracking is something else -- namely, fun at
- someone else's expense -- and it ain't the folks who own the phone companies
- who pay; it's us, me and you.
-
- BARLOW [Day 8, 7:35 A.M.]: I am becoming increasingly irritated at this idea
- that you guys are exacting vengeance for the sin of openness. You seem to
- argue that if a system is dumb enough to be open, it is your moral duty to
- violate it. Does the fact that I've never locked my house -- even when I was
- away for months at a time -- mean that someone should come in and teach me a
- lesson?
-
- ACID [Day 8, 3:23 P.M.]: Barlow, you leave the door open to your house? Where
- do you live?
-
- BARLOW [Day 8, 10:11 P.M.]: Acid, my house is at 372 North Franklin Street in
- Pinedale, Wyoming. Heading north on Franklin, go about two blocks off the main
- drag before you run into a hay meadow on the left. I'm the last house before
- the field. The computer is always on. But do you really mean to imply what
- you did with that question? Are you merely a sneak looking for easy places to
- violate? You disappoint me, pal. For all your James Dean-on-Silicon, you're
- just a punk.
-
- EMMANUEL [Day 9, 12:55 A.M.]: No offense, Barlow, but your house analogy
- doesn't stand up, because your house is far less interesting than a Defense
- Department computer. For the most part, hackers don't mess with individuals.
- Maybe we feel sorry for them; maybe they're boring. Institutions are where
- the action is, because they are compiling this mountain of data -- without
- your consent. Hackers are not guardian angels, but if you think we're what's
- wrong with the system, I'd say that's precisely what those in charge want you
- to believe. By the way, you left out your zip code. It's 82941.
-
- BARLOW [Day 9, 8:34 A.M.]: Now that's more like it. There is an ethical
- distinction between people and institutions. The law makes little distinction.
- We pretend that institutions are somehow human because they are made of humans.
- A large bureaucracy resembles a human about as much as a reef resembles a coral
- polyp. To expect an institution to have a conscience is like expecting a horse
- to have one. As with every organism, institutions are chiefly concerned with
- their own physical integrity and survival. To say that they have some higher
- purpose beyond their survival is to anthropomorphize them. You are right,
- Emmanuel. The house analogy breaks down here. Individuals live in houses;
- institutions live in mainframes. Institutions are functionally remorseless and
- need to be checked. Since their blood is digital, we need to be in their
- bloodstreams like an infection of humanity. I'm willing to extend limitless
- trust to other human beings. In my experience they've never failed to deserve
- it. But I have as much faith in institutions as they have in me. None.
-
- OPTIK [Day 9, 10:19 A.M.]: In other words, Mr. Barlow, you say something,
- someone proves you wrong, and then you agree with him. I'm getting the feeling
- that you don't exactly chisel your views in stone.
-
- HANK [Day 9, 11:18 A.M.]: Has Mr. Optik heard the phrase "thesis, antithesis,
- synthesis"?
-
- BARLOW [Day 10, 10:48 A.M.]: Optik, I do change my mind a lot. Indeed, I
- often find it occupied by numerous contradictions. The last time I believed in
- absolutes, I was about your age. And there's not a damn thing wrong with
- believing in absolutes at your age either. Continue to do so, however, and
- you'll find yourself, at my age, carrying placards filled with nonsense and
- dressing in rags.
-
- ADELAIDE [Day 10, 6:27 P.M.]: The flaw in this discussion is the distorted
- image the media promote of the hacker as "whiz." The problem is that the one
- who gets caught obviously isn't. I haven't seen a story yet on a true genius
- hacker. Even Robert Morris was no whiz. The genius hackers are busy doing
- constructive things or are so good no one's caught them yet. It takes talent
- to break into something. Nobody calls subway graffiti artists geniuses for
- figuring out how to break into the yard. There's a difference between genius
- and ingenuity.
-
- BARLOW [Day 19, 9:48 P.M.]: Let me define my terms. Using hacker in a
- midspectrum sense (with crackers on one end and Leonardo da Vinci on the
- other), I think it does take a kind of genius to be a truly productive hacker.
- I'm learning PASCAL now, and I am constantly amazed that people can string
- those prolix recursions into something like PageMaker. It fills me with the
- kind of awe I reserve for splendors such as the cathedral at Chartres. With
- crackers like Acid and Optik, the issue is less intelligence than alienation.
- Trade their modems for skateboards and only a slight conceptual shift would
- occur. Yet I'm glad they're wedging open the cracks. Let a thousand worms
- flourish.
-
- OPTIK [Day 10, 10:11 P.M.]: You have some pair of balls comparing my talent
- with that of a skateboarder. Hmm... This was indeed boring, but nonetheless:
- [Editor's note: At this point in the discussion, Optik -- apparently having
- hacked into TRW's computer records -- posted a copy of Mr. Barlow's credit
- history. In the interest of Mr. Barlow's privacy -- at least what's left of it
- -- Harper's Magazine has not printed it.] I'm not showing off. Any fool
- knowing the proper syntax and the proper passwords can look up credit history.
- I just find your high-and-mighty attitude annoying and, yes, infantile.
-
- HOMEBOY [Day 10, 10:17 P.M.]: Key here is "any fool."
-
- ACID [Day 11, 1:37 P.M.]: For thirty-five dollars a year anyone can have
- access to TRW and see his or her own credit history. Optik did it for free.
- What's wrong with that? And why does TRW keep files on what color and religion
- we are? If you didn't know that they kept such files, who would have found out
- if it wasn't for a hacker? Barlow should be grateful that Optik has offered
- his services to update him on his personal credit file. Of course, I'd hate to
- see my credit history up in lights. But if you hadn't made our skins crawl,
- your info would not have been posted. Everyone gets back at someone when he's
- pissed; so do we. Only we do it differently. Are we punks? Yeah, I guess we
- are. A punk is what someone who has been made to eat his words calls the guy
- who fed them to him.
-
- ****************************************************************************
-
- A Brief History of Hacking
-
- September 1970 - John Draper takes as his alias the name of Captain Crunch
- after he discovers that the toy whistle found in the cereal of the same name
- perfectly simulates the tone necessary to make free phone calls.
-
- March 1975 - The Homebrew Computer Club, an early group of computer hackers,
- holds its first meeting in Menlo Park, California.
-
- July 1976 - Homebrew members Steve Wozniak, twenty-six, and Steve Jobs,
- twenty-one, working out of a garage, begin selling the first personal computer,
- known as the Apple.
-
- June 1980 - In one week, errors in the computer system operating the U.S.
- air-defense network cause two separate false reports of soviet missile
- launches, each prompting an increased state of nuclear readiness.
-
- December 1982 - Sales of Apple personal computers top one billion dollars per
- year.
-
- November 1984 - Steven Levy's book Hackers is published, popularizing the
- concept of the "hacker ethic": that "access to computers, and anything that
- might teach you something about the way the world works, should be unlimited
- and total." The book inspires the first Hacker's Conference, held that month.
-
- January 1986 - The "Pakistani Brain" virus, created by a software distributor
- in Lahore, Pakistan, infects IBM computers around the world, erasing data
- files.
-
- June 1986 - The U.S. Office of Technology Assessment warns that massive,
- cross-indexed government computer records have become a "de facto national data
- base containing personal information on most Americans."
-
- March 1987 - William Fates, a Harvard dropout who founded Microsoft
- Corporation, becomes a billionaire.
-
- November 1988 - More that 6,000 computers linked by the nationwide Internet
- computer network are infected by a computer program known as a worm and are
- crippled for two days. The worm is traced to Robert Morris Jr., a twenty-four-
- year-old Cornell University graduate student.
-
- December 1988 - A federal grand jury charges Kevin Mitnick, twenty-five, with
- stealing computer programs over telephone lines. Mitnick is held without bail
- and forbidden access to any telephones without supervision.
-
- March 1989 - Three West German hackers are arrested for entering thirty
- sensitive military computers using home computers and modems. The arrests
- follow a three-year investigation by Clifford Stoll, an astronomer at the
- Lawrence Berkeley Laboratory who began tracing the hackers after finding a
- seventy-five-cent billing error in the lab's computer system.
-
- January 1990 - Robert Morris Jr. Goes on trial in Syracuse, New York, for
- designing and releasing the Internet worm. Convicted, he faces up to five
- years in prison and a $250,000 fine.
-
-
- *****************************************************************************
- * *
- * Part 2: Hacking The Constitution *
- * *
- *****************************************************************************
-
- HARPER'S [Day 4, 9:00 A.M.]: Suppose that a mole inside the government
- confirmed the existence of files on each of you, stored in the White House
- computer system, PROFS. Would you have the right to hack into that system to
- retrieve and expose the existence of such files? Could you do it?
-
- TENNEY [Day 4, 1:42 P.M.]: The proverbial question of whether the end
- justifies the means. This doesn't have much to do with hacking. If the file
- were a sheet of paper in a locked cabinet, the same question would apply. In
- that case you could accomplish everything without technological hacking.
- Consider the Pentagon Papers.
-
- EMMANUEL [Day 4, 3:55 P.M.]: Let's address the hypothetical. First, I need to
- find out more about PROFS. Is it accessible from off site, and if so, how?
- Should I update my 202-456 scan [a list of phone numbers in the White House's
- exchange that connect incoming calls to a computer]? I have a listing for
- every computer in that exchange, but the scan was done back in 1984. Is PROFS
- a new system? Perhaps it's in a different exchange? Does anybody know how
- many people have access to it? I'm also on fairly god terms with a White House
- operator who owes me a favor. But I don't know what to ask for. Obviously,
- I've already made up my mind about the right to examine this material. I don't
- want to debate the ethics of it at this point. If you're with me, let's do
- something about this. Otherwise, stay out of the way. There's hacking to be
- done.
-
- ACID [Day 4, 5:24 P.M.]: Yes, I would try to break into the PROFS system. But
- first I'd have someone in the public eye, with no ties to hacking, request the
- info through the Freedom of Information Act. Then I'd hack in to verify the
- information I received.
-
- DRAKE [Day 4, 9:13 P.M.]: Are there a lot of people involved in this
- antihacker project? If so, the chances of social engineering data out of
- people would be far higher than if it were a small, close-knit group. But yes,
- the simple truth is, if the White House has a dial-up line, it can be hacked.
-
- EMMANUEL [Day 4, 11:27 P.M.]: The implication that a trust has been betrayed
- on the part of the government is certainly enough to make me want to look a
- little further. And I know I'm doing the right thing on behalf of others who
- don't have my abilities. Most people I meet see me as an ally who can help
- them stay ahead of an unfair system. That's what I intend to do here. I have
- a small core of dedicated hackers who could help. One's specialty is the UNIX
- system, another's is networks, and another's is phone systems.
-
- TENNEY [Day 5, 12:24 P.M.]: PROFS is an IBM message program that runs on an
- operating system known as VM. VM systems usually have a fair number of holes,
- wither to gain access or to gain full privileges. The CIA was working on, and
- may have completed, a supposedly secure VM system. No ethics here, just facts.
- But a prime question is to determine what system via what phone number.
- Of course, the old inside job is easier. Just find someone who owes a favor or
- convince an insider that it is a moral obligation to do this.
-
- BARLOW [Day 5, 2:46 P.M.]: This scenario needs to be addressed in four parts:
- ethical, political, practical I (from the standpoint of the hack itself), and
- practical II (disseminating the information without undue risk).
- Ethical: Since World War II, we've been governed by a paramilitary
- bureaucracy that believes freedom is too precious to be entrusted to the
- people. These are the same folks who had to destroy the village in order
- to save it. Thus the government has become a set of Chinese boxes.
- Americans who believe in democracy have little choice but to shred the
- barricades of secrecy at every opportunity. It isn't merely permissible
- to hack PROFS. It is a moral obligation.
- Political: In the struggle between control and liberty, one has to avoid
- action that will drive either side to extreme behaviour. The basis of
- terrorism, remember, is excess. If we hack PROFS, we must do it in a way
- that doesn't become a pretext for hysterical responses that might
- eventually include zero tolerance of personal computers. The answer is to
- set up a system for entry and exit that never lets on we've been there.
- Practical I: Hacking the system should be a trivial undertaking.
- Practical II: Having retrieved the smoking gun, it must be made public in
- such a way that the actual method of acquisition does not become public.
- Consider Watergate: The prime leaker was somebody whose identity and
- information-gathering technique is still unknown. So having obtained the
- files, we turn them over to the Washington Post without revealing our own
- identities or how we came by the files.
-
- EMMANUEL [Day 5, 9:51 P.M.]: PROFS is used for sending messages back and
- forth. It's designed not to forget things. And it's used by people who are
- not computer literate. The document we are looking for is likely an electronic
- message. If we can find out who the recipient or sender is, we can take it
- from there. Since these people frequently use the system to communicate, there
- may be a way for them to dial into the White House from home. Finding that
- number won't be difficult: frequent calls to a number local to the White House
- and common to a few different people. Once I get the dial-up, I'll have to
- look at whatever greeting I get to determine what kind of system it is. Then we
- need to locate someone expert in the system to see if there are any built-in
- back doors. If there aren't, I will social engineer my way into a working
- account and then attempt to break out of the program and explore the entire
- system.
-
- BRAND [Day 6, 10:06 A.M.]: I have two questions: do you believe in due process
- as found in our Constitution? And do you believe that this "conspiracy" is so
- serious that extraordinary measures need to be taken? If you believe in due
- process, then you shouldn't hack into the system to defend our liberties. If
- you don't believe in due process, you are an anarchist and potentially a
- terrorist. The government is justified in taking extreme action to protect
- itself and the rest of us from you. If you believe in the Constitution but
- also that this threat is so extreme that patriots have a duty to intercede,
- then you should seek one of the honest national officials who can legally
- demand a copy of the document. If you believe that there is no sufficiently
- honest politician and you steal and publish the documents, you are talking
- about a revolution.
-
- ACID [Day 6, 1:30 P..]: This is getting too political. Who says that hacking
- has to have a political side? Generalizing does nothing but give hackers a
- false image. I couldn't care less about politics, and I hack.
-
- LEE [Day 6, 9:01 P.M.]: Sorry, Acid, but if you hack, what you do is
- inherently political. Here goes: Political power is exercised by control of
- information channels. Therefore, any action that changes the capability of
- someone in power to control these channels is politically relevant.
- Historically, the one in power has been not the strongest person but the one
- who has convinced the goon squad to do his bidding. The goons give their power
- to him, usually in exchange for free food, sex, and great uniforms. The
- turning point of most successful revolutions is when the troops ignore the
- orders coming from above and switch their allegiance. Information channels.
- Politics. These days, the cracker represents a potential for making serious
- political change if he coordinates with larger social and economic forces.
- With out this coordination, the cracker is but a techno-bandit, sharpening his
- weapon and chuckling about how someday... Revolutions often make good use of
- bandits, and some of them move into high positions when they're successful.
- but most of them are done away with. One cracker getting in won't do much
- good. Working in coordination with others is another matter -- called
- politics.
-
- JIMG [Day 7, 12:28 A.M.]: A thought: Because it has become so difficult to
- keep secrets (thanks, in part, to crackers), and so expensive and
- counterproductive (the trade-off in lost opportunities is too great), secrets
- are becoming less worth protecting. Today, when secrets come out that would
- have brought down governments in the past, "spin-control experts" shower the
- media with so many lies that the truth is obscured despite being in plain
- sight. It's the information equivalent of the Pentagon planto surround each
- real missile with hundreds of fake ones, rendering radar useless. If hackers
- managed to crack the White House system, a hue and cry would be raised -- not
- about what the hackers found in the files but about what a threat hackers are
- to this great democracy of ours.
-
- HARPER'S [Day 7, 9:00 A.M.]: Suppose you hacked the files from the White House
- and a backlash erupted. Congressmen call for restrictions, arguing that the
- computer is "property" susceptible to regulation and not an instrument of
- "information" protected by the First Amendment. Can we craft a manifesto
- setting forth your views on how the computer fits into the traditions of the
- American Constitution?
-
- DAVE [Day 7, 5:30 P.M.]: If Congress ever passed laws that tried to define
- what we do as "technology" (regulatable) and not "speech," I would become a
- rebellious criminal immediately -- and as loud as Thomas Paine ever was.
- Although computers are part "property" and part "premises" (which suggest a
- need for privacy), they are supremely instruments of speech. I don't want any
- congressional King Georges treading on my cursor. We must continue to have
- absolute freedom of electronic speech!
-
- BARLOW [Day 7, 10:07 P.M.]: Even in a court guided by my favorite oxymoron,
- Justice Rehnquist, this is an open-and-shut case. The computer is a printing
- press. Period. The only hot-lead presses left in this country are either in
- museums or being operated by poets in Vermont. The computer cannot fall under
- the kind of regulation to which radio and TV have become subject, since
- computer output is not broadcast. If these regulations amount to anything more
- than a fart in the congressional maelstrom, then we might as well scrap the
- whole Bill of Rights. What I am doing with my fingers is "speech" in the
- clearest sense of the word. We don't need no stinking manifestos.
-
- JIMG [Day 8, 12:02 P.M.]: This type of congressional action is so clearly
- unconstitutional that "law hackers" -- everyone from William Kunstler to Robert
- Bork -- would be all over it. The whole idea runs so completely counter to our
- laws that it's hard to get worked up about it.
-
- ADELAIDE [Day 8, 9:51 A.M.]: Not so fast. There used to be a right in the
- Constitution called "freedom from unreasonable search and seizure," but, thanks
- to recent Supreme Court decisions, your urine can be demanded by a lot of
- people. I have no faith in the present Supreme Court to uphold any of my
- rights of free speech. The complacent reaction here -- that whatever Congress
- does will eventually be found unconstitutional -- is the same kind of
- complacency that led to the current near-reversals of Roe v. Wade.
-
- JRC [Day 8, 10:05 A.M.]: I'd forgo the manifestos and official explanations
- altogether: Fight brushfire wars against specific government incursions and
- wait for the technology to metastasize. In a hundred years, people won't have
- to be told about computers because they will have an instinctive understanding
- of them.
-
- KK [Day 8, 2:14 P.M.]: Hackers are not sloganeers. They are doers,
- take-things-in-handers. They are the opposite of philosophers: They don't wait
- for language to catch up to them. Their arguments are their actions. You want
- a manifesto? The Internet worm was a manifesto. It had more meaning and
- symbolism than any revolutionary document you could write. To those in power
- running the world's nervous system, it said: Wake up! To the underground of
- hackers, crackers, chippers, techno-punks, it said: You have power; be careful.
- To the mass of citizens who find computers taking over their telephone, their
- TV, their toaster, and their house, it said: Welcome to Wonderland.
-
- BARLOW [Day 8, 10:51 P.M.]: Apart from the legal futility of fixing the dam
- after it's been breached, I've never been comfortable with manifestos. They
- are based on the ideologue's delusion about the simplicity, the
- figure-out-ability, of the infinitely complex thing that is Life Among the
- Humans. Manifestos take reductionism for a long ride off a short pier.
- Sometimes the ride takes a very long time. Marx and Engels didn't actually
- crash until last year. Manifestos fail because they are fixed and
- consciousness isn't. I'm with JRC: Deal with incursions when we need to, on
- our terms, like the guerrillas we are. To say that we can outmaneuver those
- who are against us is like saying that honeybees move quicker than Congress.
- The future is to the quick, not the respectable.
-
- RH [Day 8, 11:43 P.M.]: Who thinks computers can't be regulated? The
- Electronic Communications Privacy Act of 1986 made it a crime to own "any
- electronic, mechanical, or other device [whose design] renders it primarily
- useful for the purpose of the surreptitious interception of wire, oral, or
- electronic communication." Because of the way Congress defined "electronic
- communication," one could argue that even a modem is a surreptitious
- interception device (SID), banned by the ECPA and subject to confiscation.
- It's not that Congress intended to ban modems; it was just sloppy drafting.
- The courts will ultimately decide what devices are legal. Since it may not be
- possible to draw a clear bright line between legal and illegal interception
- devices, the grey area -- devices with both legitimate uses and illegitimate
- uses -- may be subject to regulation.
-
- BARLOW [Day 9, 8:52 A.M.]: I admit with some chagrin that I'm not familiar
- with the ECPA. It seems I've fallen on the wrong side of an old tautology:
- Just because all saloon keepers are Democrats, it doesn't follow that all
- Democrats are saloon keepers. By the same token, the fact that all printing
- presses are computers hardly limits computers to that function. And one of
- the other things computers are good at it surreptitous monitoring. Maybe
- there's more reason for concern than I thought. Has any of this stuff been
- tested in the courts yet?
-
- RH [Day 9, 10:06 P.M.]: My comments about surreptitous interception devices
- are not based on any court cases, since there have not been any in this area
- since the ECPA was enacted. It is a stretch of the imagination to think that
- a judge would ever find a stock, off-the-shelf personal computer to be a
- "surreptitous interception device." But a modem is getting a little closer to
- the point where a creative prosecutor could make trouble for a cracker, with
- fallout affecting many others. An important unknown is how the courts will
- apply the word surreptitious. There's very little law, but taking it to mean
- "by stealth; hidden from view; having its true purpose physically disguised,"
- I can spin some worrisome examples. I lobbied against the bill, pointing out
- the defects. Congressional staffers admitted privately that there was a
- problem, but they were in a rush to get the bill to the floor before Congress
- adjourned. They said they could patch it later, but it is a pothole waiting
- for a truck axle to rumble through.
-
- JIMG [Day 10, 8:55 A.M.]: That's sobering information, RH. Yet I still think
- that this law, if interpreted the way you suggest, would be found
- unconstitutional, even by courts dominated by Reagan appointees. Also, the
- economic cost of prohibiting modems, or even restricting their use, would so
- outweigh conceivable benefits that the law would never go through. Finally,
- restricting modems would have no effect on the phreaks but would simply manage
- to slow everybody else down. If modems are outlawed, only outlaws will have
- modems.
-
- RH [Day 10, 1:52 P.M.]: We're already past the time when one would wrap
- hacking in the First Amendment. There's a traditional distinction between
- words -- expressions of opinions, beliefs, and information -- and deeds. You
- can shout "Revolution!" from the rooftops all you want, and the post office
- will obligingly deliver your recipes for nitroglycerin. But acting on that
- information exposes you to criminal prosecution. The philosophical problem
- posed by hacking is that computer programs transcend this distinction: They
- are pure language that dictates action when read by the device being
- addressed. In that sense, a program is very different from a novel, a play,
- or even a recipe: Actions result automatically from the machine reading the
- words. A computer has no independent moral judgement, no sense of
- responsibility. Not yet, anyway. As we program and automate more of our
- lives, we undoubtedly will deal with more laws: limiting what the public can
- know, restricting devices that can execute certain instructions, and
- criminalizing the possession of "harmful" programs with "no redeeming social
- value." Blurring the distinction between language and action, as computer
- programming does, could eventually undermine the First Amendment or at least
- force society to limit its application. That's a very high price to pay, even
- for all the good things that computers make possible.
-
- HOMEBOY [Day 10, 11:03 P.M.]: HACKING IS ART. CRACKING IS REVOLUTION. All
- else is noise. Cracks in the firmament are by nature threatening. Taking a
- crowbar to them is revolution.
-
- ******************************************************************************
-
-