Thomas, Douglas - Hacker Culture
Thomas, Douglas - Hacker Culture
Thomas, Douglas - Hacker Culture
HACKER CULTURE
Douglas Thomas
Copyright 2002 by the Regents of the University of Minnesota All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Published by the University of Minnesota Press 111 Third Avenue South, Suite 290 Minneapolis, MN 55401-2520 http://www.upress.umn.edu Printed in the United States of America on acid-free paper The University of Minnesota is an equal-opportunity educator and employer. Library of Congress Cataloging-in-Publication Data Thomas, Douglas, 1966 Hacker culture / Douglas Thomas. p. cm. ISBN 0-8166-3345-2 1. Computer programming Moral and ethical aspects. hackers. I. Title. QA76.9.M65 T456 2002 306.1 dc21
2. Computer
2001005377 10 09 08 07 06 05 04 03 02 10 9 8 7 6 5 4 3 2 1
Contents
Acknowledgments Introduction Part I. The Evolution of the Hacker 1. Hacking Culture 2. Hacking as the Performance of Technology: Reading the Hacker Manifesto 3. Hacking in the 1990s Part II. Hacking Representation 4. Representing Hacker Culture: Reading Phrack 5. (Not) Hackers: Subculture, Style, and Media Incorporation Part III. Hacking Law 6. Technology and Punishment: The Juridical Construction of the Hacker Epilogue: Kevin Mitnick and Chris Lamprecht Notes Index
Acknowledgments
This book was written with the help of a great number of people, many of whom I met only in passing, either at conventions and court hearings or in IRC chat and LISTSERV discussions. They contributed to the book in ways that are impossible to measure or account for here. Equally important are the people who have been a part of hacker culture or who have thought long and hard about it and took the time to share their insights. I especially want to thank Katie Hafner, John Perry Barlow, Jonathan Littman, John Markoff, Jericho, Mike Godwin, Wendy Grossman, Bruce Sterling, Chris Painter, David Schindler, Kevin Poulsen, Eric Corley, Don Randolph, Lewis Payne, Greg Vinson, Evian S. Sim, Michelle Wood, Kimberly Tracey, Mudge, The Deth Vegetable, Oxblood Rufn, and many other members of the cDc and the L0pht for their help. I also owe a debt of thanks to my colleagues at the Annenberg School for Communication, particularly Bill Dutton and Sandra Ball-Rokeach, who have been remarkably helpful and who have supported my work in countless ways. Lynn Spigel and Marsha Kinder both offered me help and insight in critical areas. My friends Peggy Kamuf, Philippa Levine, and Curt Aldstadt have offered their support, insight, and ideas throughout the writing of the book. I am grateful to the Online Journalism Program at the University of Southern California, especially Larry Pryor and Joshua Fouts, who always gave me free rein to explore and write about hacking for the Online Journalism Review. The essays I wrote for the review allowed me to think through some difcult and complex questions, and their editorial style made that work much easier than I had any right to expect. James Glave, at Wired News, also provided an outlet for stories when they seemed to matter the most. The Southern California Studies Center helped fund a portion of the research through
vii
viii / Acknowledgments
a junior faculty grant. For that I thank the centers director, Michael Dear. The writing of this book was greatly assisted by Doug Armato and Will Murphy as well as by the comments from the reviewers at the University of Minnesota Press, who offered creative and constructive advice. I beneted enormously from the careful readings offered by my friends Marita Sturken and Dana Polan. I thank them for their help and their friendship. A special debt of gratitude goes to Kevin Mitnick and Chris Lamprecht, who shared their stories with me and helped me understand, in ways I had never imagined, what it meant to be a hacker in the 1990s. Finally, I want to thank Ann Chisholm, who is the love of my life, who provides me with my inspiration, and who suggested, so long ago, that I might want to think about a hacker project.
Introduction
Since the 1983 release of the movie WarGames, the gure of the computer hacker has been inextricably linked to the cultural, social, and political history of the computer. That history, however, is fraught with complexity and contradictions that involve mainstream media representations and cultural anxieties about technology. Moreover, hacking has its own history, which is itself as complex as it is interesting. In tracing out these intricate, intertwining narratives, this book is an effort to understand both who hackers are as well as how mainstream culture sees them. Part of the complexity is a result of the fact that these two constructions, hacker identity and mainstream representation, often reect on each other, blurring the lines between fact and ction. The term hacker has its own historical trajectory, meaning different things to different generations.1 Computer programmers from the 1950s and 1960s, who saw their work as breaking new ground by challenging old paradigms of computer science, think of hacking as an intellectual exercise that has little or nothing to do with the exploits of their 1980s and 1990s counterparts. Indeed, this older generation of hackers prefer to call their progeny crackers in order to differentiate themselves from what they perceive as their younger criminal counterparts. The younger generation take umbrage at such distinctions, arguing that todays hackers are doing the real work of exploration, made necessary by the earlier generations selling out. In some ways, these younger hackers argue, they have managed to stay true to the most fundamental tenets of the original hacker ethic. Accordingly, the very denition of the term hacker is widely and ercely disputed by both critics of and participants in the computer underground. Indeed, because the term is so highly contested, it gives a clue to both the signicance and the mercurial nature of the subculture itself. Moreover, there seems to be little agreement within
ix
x / Introduction
the academic literature on what constitutes hacking. In accounts that range from Andrew Rosss characterization of the hacker underground as protocountercultural to Slavoj Zizeks notion that hackers operate as a circle of initiates who exclude themselves from everyday normality to devote themselves to programming as an end in itself to Sandy Stones exposition of style at the Atari labs, whenever the complexity and intensity of technology are discussed, hackers are a primary cultural signier.2 On top of the generational differences, hackers themselves, especially new-school hackers (of the 1980s and 1990s), have difculty in dening exactly what hacking is. To some, it is about exploration, learning, and fascination with the inner workings of the technology that surrounds us; to others, it is more about playing childish pranks, such as rearranging someones Web page or displaying pornographic images on a public server. It is, in all cases, undoubtedly about the movement of what can be dened as boy culture into the age of technology. Mastery over technology, independence, and confrontation with adult authority, traits that Anthony Rotundo has identied as constitutive of boy culture, all gure prominently in the construction of hacker culture. Even tropes of physical superiority and dominance have their part in the world of electronic expression. Such ndings are hardly surprising, as the hacker demographic is composed primarily (but not exclusively) of white, suburban boys. There are relatively few girls who participate in the hacker underground, and those who do so oftentimes take on the values and engage in the activities of boy culture just as readily as their male counterparts. While the old-school hackers were usually graduate students at large universities, their new-school counterparts are substantially younger, usually teenagers who have a particular afnity for technology. A primary reason for the difference in age has to do with access to and availability of technology. Where hackers of the 1950s, 1960s, and 1970s had little or no access to computers outside of a university environment, hackers in the 1980s and 1990s had access to the personal computer, which brought the technology that enabled hacking into their homes and schools. As a result, the newest generation of hackers have been able to work out a number of boy
Introduction /
xi
issues online, including the need to assert their independence and the testing of the boundaries of adult and parental authority. The introduction of the personal computer into the home, in the 1980s and 1990s, transformed a predominantly male, university culture into a suburban, youth culture and set these two histories, in part, against each other. The present work is an effort to situate and understand hacking as an activity that is conditioned as much by its history as by the technology that it engages. It is an effort to understand and at some level rethink the meaning of subculture in an electronic age, both through the means by which that subculture disputes meaning and makes meaning and through mass-mediated and cultural representations.
xii / Introduction
allowed for a new kind of anonymity, one that could be exploited and used to a hackers advantage. With these discoveries, the new-school hackers began to reach out to one another and create their own culture, a culture that expressed a general dissatisfaction with the world, typical of teenage angst, but also a dissatisfaction with ways technology was being used. For teenage boys discovering the ways that computers could be used to reach out to one another, there was nothing more disturbing than seeing those same computers being used to systematically organize the world. Groups of hackers began to meet, to learn from one another, and to form a subculture, which was dedicated to resisting and interrupting the system. As the underground was developing into a bona de subculture, popular culture was not letting the hacker phenomenon go unnoticed. In the early 1980s a new genre of science ction literature emerged that began to color the undergrounds ethos. It, and particularly the work of William Gibson, was the literature of cyberpunk which would give hackers a set of heroes (or antiheroes) to emulate. The world of cyberpunk portrayed a high-tech outlaw culture, where the rules were made up by those on the frontier not by bureaucrats. It was a digital world, where the only factor that mattered was how smart and talented you were. It was in this milieu that Gibson would coin the term cyberspace: Cyberspace. A consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts. . . . A graphic representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data. Like city lights, receding . . . 3 Gibson called those who roamed this space console cowboys, data jockeys who could manipulate the system toward the ends of digital espionage or personal gain. These hackers believed they were describing a future where they would feel at home, even if that home was a dystopia where the battle over information had been fought and lost, a world of what Thomas M. Disch calls pop de-
Introduction /
xiii
spair, in which the dystopian view of the future is ameliorated only by two elements: fashion and an interior life lived in cyberspace.4 What is intriguing about Gibsons characters is not that they exist in this world, but that they dont seem to mind it. Gibsons neer-do-well protagonists completely accept the world they inhabit. They do not protest or even desire to see things differently. Instead, they inhabit and rule a world in which they exercise near-complete control. As Bruce Sterling points out, it is the ideal model for disaffected suburban youth culture.5 Where the suburban landscape provides little of interest for youth culture, the world of computers and networks provides a nearly innite world for exploration.6 The typical hacker is a white, suburban, middle-class boy, most likely in high school. He is also very likely self-motivated, technologically procient, and easily bored. In the 1980s and even the 1990s, computers became a tool for these youths to alleviate their boredom and explore a world that provided both an intellectual challenge and excitement. But it was also a world that was forbidden a world of predominantly male authority into which they could trespass with relative ease, where they could explore and play pranks, particularly with large institutional bodies such as the phone companies. It was a world of excitement that allowed them to escape the home and be precisely the noise in the system that they had fantasized about. It would take nearly a decade for mainstream culture to catch up with the hacker imagination. In 1989, Clifford Stoll wrote The Cuckoos Egg, a tale of international espionage that detailed his manhunt for hackers who had broken into U.S. military computers and had spied for the KGB. Stolls tale was part high-tech whodunit, part cautionary tale, and all high drama. The Cuckoos Egg stayed on the New York Times bestseller list for four months. Soon after, Katie Hafner and John Markoff published Cyberpunk, which told stories about three hackers Robert Morris, Kevin Mitnick, and Pengo, each of whom achieved notoriety for hacking exploits ranging from crashing computer systems to international espionage. Stolls and Hafner and Markoffs books captured the national imagination and portrayed hackers in highly dramatic narratives, each of which ended with the hackers capture, arrest, and prosecution.
xiv / Introduction
With the publication of these two books, the image of the hacker became inextricably linked to criminality. Fear was driving the popular imagination, and hackers were delighted to go along with the image. After all, what high school kid doesnt delight in the feeling that he or she rules a universe that their parents, teachers, and most adults dont understand? One thing teenagers understand is how to make their parents uncomfortable. Like loud music, teen fashion, and smoking cigarettes, hacking is a form of rebellion and an exercise of power. The difference rests in the fact that the 1990s represented such a fundamental break between youth and mainstream culture that hacking was unable to be successfully assimilated into the narratives of youth rebellion without being either wildly exaggerated or completely trivialized. Parents intuitively understand the deance of music, youth fashion, and cigarettes; they did similar things themselves. With hacking, they are faced with an entirely new phenomenon. That gap, between what hackers understand about computers and what their parents dont understand, and more importantly fear, makes hacking the ideal tool for youth cultures expression of the chasm between generations. Hacking is a space in which youth, particularly boys, can demonstrate mastery and autonomy and challenge the conventions of parental and societal authority. Divorced from parental or institutional authority, the PC enabled the single most important aspect of formative masculinity to emerge, independent learning, without the help of caring adults, with limited assistance from other boys, and without any signicant emotional support.7 Hackers used the personal computer to enter the adult world on their own terms. In doing so, they found a kind of independence that was uniquely situated. Hackers had found something they could master, and unlike the usual rebellious expressions of youth culture, it was something that had a profound impact on the adult world. The 1980s and 1990s also saw the productions of a several lms that had hackers as primary gures, further imbedding their status as cultural icons. In 1982, TRON captured the public imagination with the vision of the ultimate old-school hacker, who creates, according to Scott Bukatman, a phenomenological interface between human subject and terminal space, a literal fusion of the pro-
Introduction /
xv
grammer and the computer, the ultimate cyberpunk fantasy.8 More recently, Pi (1999) provided a dark mirror of the cyberpunk vision, where the hacker is driven mad by his obsession with technology and its ability to decipher nature and the world. In other narratives, hackers often served as technologically savvy protagonists. In lms like Sneakers (1992), The Net (1995), and The Matrix (1999), hackers serve as central gures who are able to outwit the forces of evil based on an extraordinary relationship to technology. Television presented a similar view the lone gunmen on the X-Files and series such as The Net, VR5, and Harsh Realm all presented hackers as technologically sophisticated protagonists able to perform acts of high-tech wizardry in the service of law enforcement or the state. Although the gure of the hacker was widespread in media representation, two lms in particular inuenced the hacker underground and, to a large degree, media representation of it. Those lms, WarGames (1983) and Hackers (1995), had a disproportionate inuence on hacker culture, creating two generations of hackers and providing them with cultural touchstones that would be, at least in part, the basis for their understanding of hacking. While lms like Sneakers and The Net are of great interest to hackers, they are often evaluated based on their factual accuracy or technical sophistication, rather than as cultural touchstones for hacker culture. A primary difference is the opportunities for identication that each lm provides. While WarGames and Hackers had male, teenage protagonists, Sneakers and The Net provided barriers to identication: in Sneakers, Robert Redfords character was in his late forties or even early fties, according to the chronology of the lms narrative, and The Net starred Sandra Bullock, presenting a female protagonist whom teenage boys were more likely to see as an object of desire than of identication. As a result, hackers, when discussing lms that interest them, are much more likely to speak of WarGames and Hackers in terms of inuence, while referring to lms such as The Net, Sneakers, and Johnny Mnemonic in terms of how much they liked or disliked the lm or whether or not it accurately represented hackers and technology itself.
xvi / Introduction
Introduction /
xvii
While both generations of hackers enact these values, they do so in different ways. For hackers in the university context, a premium was placed on absolute mastery over the machine; hacking was seen as a way of life; and battles over autonomy and authority took place within the connes of the institution, usually between the hackers and their professors or university administrators.12 As the PC entered the home in the 1980s, however, hacking became a viable means for groups of predominantly white, teenage boys to create a space for their own youth culture. These new-school hackers saw technology as a means to master both the physical machines and the social relations that were occurring through the incorporation of technology into everyday life (such as ATM machines, institutional records becoming computerized, the growth of the Internet, and so on). Their control over computers, they realized, was an ideal vehicle for teenage boy mayhem. It was also a tool for testing and reinforcing boundaries. The computer was in the home but was also a connection to a world outside the home. It could touch the world in playful, mischievous, and even malicious ways.
xviii / Introduction
is merely the translation of thought into a codied and distributable form. But at present, the material system of production impinges on that knowledge directly. The distribution of software (which requires little more than making it accessible on the Internet) is hindered by the physical processes characteristic of earlier modes of production: copying the software, putting it on disks or CD-ROMs, packaging the software, shipping it to retail outlets, and so on. In short, software is sold as if it were hardware. Knowledge, which has always needed to be commodied into some material form (for example, books), now can be transmitted virtually without any material conditions at all. For the rst time, we are seeing an actualization of the basic principle that knowledge is virtual. What hackers explore is the means by which we are beginning to redene knowledge in computerized societies.16 In this sense, hackers can help us understand the manner in which culture is both resistant to the transformation of knowledge and inevitably shaped by it. I also argue that hackers help us understand the transformations taking place around us not only through their analysis of and reaction to them but also by the manner in which they are represented in mainstream media and culture. The second issue has to do with postmodernitys relationship to the body and identity, two themes that I argue are at the heart of the intersection between hacker and mainstream culture. One of the primary means by which modern culture has been questioned and destabilized by postmodernity is through a radical questioning of the idea of a stable identity. Much of the postmodern critique centers on the idea that neither the body nor identity can be seen as a stable or unied whole.17 Instead, identity is composed in a fragmentary manner, suggesting that it is both more uid and more complex than had been previously theorized. Postmodernism also questions the manner in which the body has been utilized to construct stable positions of identity (such as sex, gender, race, class, and so on). Such challenges disrupt the sense of certainty that characterizes modernity. Accordingly, theories of postmodernism provide an ideal tool to examine hacker culture in the sense that the hacker underground targets and exploits stable notions of identity and the body in its hacking activities (for example, the idea that knowing a secret such
Introduction /
xix
as a password can conrm the physical identity of a person). As such, hacking becomes more than a simple exercise of computer intrusion; instead, in this broader context, it enacts a challenge to a host of cultural assumptions about the stability of certain categories and cultural norms regarding identity and the body. In most cases, hackers are successful because they are able to play upon assumptions about stability of identity and bodies while actively exploiting precisely how uid and fragmented they actually are.
Hacking Culture
In writing this book, I have often found myself at the nexus of several positions: between ethnographer and participant, between academic and advocate, between historian and storyteller. It became apparent to me very early on that it would be impossible to divorce my own personal experience and history from this book and that to attempt to do so would make for an overly cautious book. What I attempt to offer here is part genealogy, part ethnography, and part personal and theoretical reection. As a genealogy, this book is an effort to produce what Michel Foucault referred to as local criticism, as criticism that is an autonomous, noncentralised kind of theoretical production, one that is to say whose validity is not dependent on the approval of the established regimes of thought.18 Local criticism takes as its focus the insurrection of subjugated knowledges. These are knowledges that have been buried and disguised and that through examination allow us to examine the ruptures and ssures in what is assumed to be a coherent and systematic regime of thought, history, or theory. Indeed, local criticism is an effort to recover precisely those ideas that have either been excluded, forgotten, or masked in the process of creating historical narratives. Those ideas are also a kind of popular knowledge, which is not meant in the sense of popular culture, but, rather, is dened as being a differential knowledge that cannot be integrated or uniformly woven into a single narrative. Its force is generated by the very fact that it opposes the conventional narratives that surround it.19 Taking such a perspective enacts what Foucault dened as genealogy, as
xx / Introduction
the union of erudite knowledge and local memories which allows us to establish a historical knowledge of struggles and to make use of this knowledge tactically today.20 In the case of hacker culture, these two knowledges, both buried and popular, are found in the discourses of the underground itself, on the one hand, and of the media, popular culture, and law, on the other hand. As a result, this work has been pulled in two directions at once rst, toward the erudition and excavation of buried and subjugated knowledges that the study and examination of the discourse about hackers demand, and, second, toward the more ethnographic and personal research that is required to understand the discourse of hackers. This work explores the computer underground through an examination of the subculture of hackers and through an understanding of hackers relationship to mainstream contemporary culture, media, and law. In particular, I argue that hackers actively constitute themselves as a subculture through the performance of technology. By contrast, I contend that representations of hackers in the media, law, and popular culture tell us more about contemporary cultural attitudes about and anxiety over technology than they do about the culture of hackers or the activity of hacking. Although these media representations of hackers provide an insight into contemporary concerns about technology, they serve to conceal a more sophisticated subculture formed by hackers themselves. Through an examination of the history of hacking and representations of hackers in lm, television, and journalistic accounts, and through readings of key texts of the hacker underground, I detail the ways in which both the discourse about hackers and the discourse of hackers have a great deal to tell us about how technology impacts contemporary culture. Hacker subculture has a tendency to exploit cultural attitudes toward technology. Aware of the manner in which it is represented, hacker culture is both an embracing and a perversion of the media portrayals of it. Hackers both adopt and alter the popular image of the computer underground and, in so doing, position themselves as ambivalent and often undecidable gures within the discourse of technology. In tracing out these two dimensions, anxiety about technology and hacker subculture itself, I argue that we must regard technology
Introduction /
xxi
as a cultural and relational phenomenon. Doing so, I divorce the question of technology from its instrumental, technical, or scientic grounding. In fact, I will demonstrate that tools such as telephones, modems, and even computers are incidental to the actual technology of hacking. Instead, throughout this work, I argue that what hackers and the discourse about hackers reveal is that technology is primarily about mediating human relationships, and that process of mediation, since the end of World War II, has grown increasingly complex. Hacking, rst and foremost, is about understanding (and exploiting) those relationships. Accordingly, the goal of this work is one that might be called strategic, in Foucaults sense of the word, an intervention into the discourse of hackers and hacking that attempts to bring to light issues that have shaped that discourse. Therefore, this book positions hackers and hacker culture within a broader question of the culture of secrecy that has evolved since the 1950s in the United States. Hackers, I contend, can help us better understand the implications of that aspect of secrecy in culture. Conversely, the emerging culture of secrecy can help us better understand hackers and hacker culture. In the past twenty years, the culture of secrecy, which governs a signicant portion of social, cultural, and particularly economic interaction, has played a lead role in making hacking possible. It has produced a climate in which contemporary hackers feel both alienated and advantaged. Although hackers philosophically oppose secrecy, they also self-consciously exploit it as their modus operandi, further complicating their ambivalent status in relation to technology and contemporary culture. The present project explores the themes of secrecy and anxiety in relation to both contemporary attitudes toward technology and the manner in which hackers negotiate their own subculture and identity in the face of such cultural mores. The book begins by examining the culture of secrecy and the basic representation of a hacker with which most readers will be familiar the high-tech computer criminal, electronically breaking and entering into a bank using only a computer and a phone line. This representation is problematized through a repositioning of hacking as a cultural, rather than technical, activity. The oldschool hackers of the 1960s and 1970s who are generally credited
xxii / Introduction
with the birth of the computer revolution and who subscribed to an ethic of free access to technology and a free and open exchange of information are thought to differ from their 1980s and 1990s counterparts, generally stereotyped as high-tech hoodlums or computer terrorists. Historically, however, the two groups are linked in a number of ways, not the least of which is the fact that the hackers of the 1980s and 1990s have taken up the old-school ethic, demanding free access to information. Further problematizing the dichotomy is the fact that many old-school hackers have become Silicon Valley industry giants, and, to the new-school hackers mind-set, have become rich by betraying their own principles of openness, freedom, and exchange. Accordingly, the new-school hackers see themselves as upholding the original old-school ethic and nd themselves in conict with many old schoolers now turned corporate.
Overview
In the 1980s, hackers entered the public imagination in the form of David Lightman, the protagonist in the hacker thriller WarGames (1983), who would inspire a whole generation of youths to become hackers, and later, in 1988, in the form of Robert Morris, an oldschool hacker who unleashed the Internet worm, bringing the entire network to a standstill. These two gures would have signicant inuence in shaping hacker culture and popular media representations of it. From the wake of these public spectacles would emerge the new school, a generation of youths who would be positioned as heroes (like Lightman in WarGames) and villains (like Morris) and who, unlike the old-school hackers two decades earlier, would nd little or no institutional or government support. The new school emerged in an atmosphere of ambivalence, where hacking and hackers had been seen and celebrated both as the origins of the new computerized world and as the greatest threat to it. New-school hackers responded by constituting a culture around questions of technology, to better understand prevailing cultural attitudes toward technology and to examine their own relationship to it as well.
Introduction /
xxiii
This book traces out the history and origins of hacker culture in relation to mainstream culture, the computer industry, and the media. Chapter 1 introduces the basic questions that motivate this study: Will hackers of the new millennium exert the same level of inuence on the computer industrys new pressing concerns (such as privacy, encryption, and security) as the old-school hackers of the 1960s did in their time by creating the industry itself? Are hackers still the central driving force behind innovation and design in the rapidly changing computer industry? And what effects will the children of the 1980s, raised on WarGames and the legend of Robert Morris, have on the future of computing as they too leave college, run systems of their own, and take jobs with computer companies, security rms, and as programmers, engineers, and system designers? Chapter 2 explores the manner in which hacker culture negotiates technology, culture, and subculture, beginning with a discussion of the relationship between hackers and technology. Hackers discourse demonstrates the manner in which they perceive technology as a revealing of the essence of human relationships. In this sense, technology reveals how humans are ordered by the technology that they use. Or, put differently, hackers understand the ways in which technology reveals how people have been dened by technology. In detailing the implications of this argument, I analyze the various ways that hackers use language, particularly through substitutions and transformations of different letters to mark the technology of writing as something specically technological. In particular, I examine the manner in which particular letters and numbers, which are often substituted for one another, can be traced to specic technologies (such as the keyboard) as a reexive commentary on the nature and transformations of writing in relation to technology itself. An example of this kind of writing would be the substitution of the plus sign (+) for the letter t, the number 1 for the letter l, and the number 3 for the letter E. In one of the more common examples, the word elite becomes 3l33+. I also examine the manner in which hackers exploit their understanding of human relationships. One such strategy, referred to by hackers as social engineering, is a process of asking questions or
xxiv / Introduction
posing as gures in authority to trick people into giving them access or telling them secrets. This sense of revealing is further reected in the text The Conscience of a Hacker (often called The Hacker Manifesto). Written by The Mentor and published in Phrack shortly after its authors arrest, it is an eloquent description of, among other things, how hackers regard contemporary society and its relationship to technology. The essay is widely cited and quoted and appears on Web pages, on T-shirts, and in lms about hackers. In my reading of the document, I argue that it illustrates a sophisticated understanding of the relationship between hacking and culture, particularly in relation to issues of performance. The third chapter explores the new directions that hacking has taken in the past decade. The growth of the Internet, the development of PC hardware, and the availability of free, UNIX-like operating systems have all led to signicant changes in hackers attitudes toward technology. The growth of LINUX, a free clone of the UNIX operating system, in the past ve years has made it possible for hackers to run sophisticated operating-system software on their home computers and, thereby, has reduced the need for them to explore (illegally) other peoples systems. It has made it possible, as well, for anyone with a PC and an Internet connection to provide a web server, e-mail, access to les, and even the means to hack their own systems. Most important, however, has been the relationship between hackers and the computer industry. As many hackers from the 1980s have grown older, they have entered the computer industry not as software moguls or Silicon Valley entrepreneurs but as system managers and security consultants. Accordingly, they still nd themselves in conict with the industry. Many hackers see themselves in the role of self-appointed watchdogs, overseeing the computer industry and ensuring that the industrys security measures meet the highest standards. These hackers are not above either shaming companies into making changes or even forcing improvements by publicly releasing les that crack the security of what they perceive to be inferior products. Hackers have also become more social in the late 1980s, the
Introduction /
xxv
1990s, and the rst years of the twenty-rst century. Previously conned to electronic contact, hackers have started organizing conventions, or cons, which feature speakers, vendors, events such as Hacker Jeopardy, and even a spot the Fed contest in which hackers can win T-shirts for identifying federal agents. These conventions have become an important means of sharing and disseminating information and culture. As hacking events have become more social, hackers have started to band together around areas of common concern, and such gatherings have begun to politicize hacker culture in the process. As battles over the restriction of the export and creation of encryption become more focused, hackers are nding new issues to explore. In relation to secrecy, hackers are working to nd better and faster ways to break encryption routines, but of equal concern is the manner in which encryption is being put to use. At the most radical level, one of the oldest (and most amboyant) groups in the computer underground, the Cult of the Dead Cow, has undertaken a project of supplying a group of Chinese dissidents, who call themselves the Hong Kong Blondes, with encryption software to secure their communications against government eavesdropping and with computer intrusion techniques to perform acts of resistance in response to human rights violations. As the corporate computer industry, the government, and hackers come into increasing contact, the hacker underground is continually reshaping itself as a response to those relationships. General principles regarding the nature and role of technology continue to shape a hacker ethic, which promises to reinvent itself with each new set of developments and each shift in cultural attitudes toward and anxieties about technology. An examination of hackers relationships to technology reveals the ways in which technology serves as both the basis for the constitution of their own subculture and the point of division from mainstream culture. That distinction is further reected in chapters 4 and 5, which analyze the long-standing journal Phrack and the ways in which hackers deploy technology as resistance. These chapters continue the examination of hacker culture through a reading of the online journal Phrack, a journal written by and for the computer
xxvi / Introduction
underground, and through a comparative analysis of a hacker video and the MGM lm Hackers (1995). In my reading of Phrack, I explore the ways in which hacker culture is both understood and disseminated through the creation of an electronic sense of style. As a subculture, the hacker underground is reected by the various meanings and styles represented in Phrack, not only in its articles and features but also in its interaction with the broader social culture. To that end, I examine two cases: rst, the prosecution of a Phrack editor for publishing a supposedly secret BellSouth 911 document, copied by a hacker from a BellSouth computer system; and, second, Phracks institution of a copyright statement that rendered the magazine free to hackers but forced law enforcement and corporations to subscribe. In each case, what is revealed is Phracks relationship to the social, cultural, and political dimensions of technology and the hacker undergrounds negotiation with contemporary culture. The comparison of a video made by hackers (documenting the breaking into and subsequent hacking of a telephone control ofce) and the lm Hackers illustrates the manner in which hacker style is both dened by hackers and incorporated by mainstream culture. Each lm marks a particular take on the phenomenon of hacking, and while the events in each are often parallel, the style illustrates a marked difference. The chapter concludes with an examination of the efforts of hackers to hack the MGM Web page announcing the release of the lm as an act of resistance and as an effort to resist the incorporation of hacker style. Chapter 6 comes backs to the question of the representation of hackers in popular and juridical discourse, focusing on depictions of hackers that emphasize criminality. I develop the idea that discourse about hackers criminality is centered on issues of the body, addiction, and performance. In particular, I esh out these themes by reading the cases of specic hackers (Kevin Mitnick, Kevin Lee Poulsen, and members of the Legion of Doom and the Masters of Deception) who were tracked and, ultimately, captured and jailed. The book concludes by examining the cases of two hackers: Chris Lamprecht (aka Minor Threat), the rst hacker to be banned from the Internet, and Kevin Mitnick, who was convicted on a twenty-
Introduction /
xxvii
ve-count federal indictment for copying proprietary software from a cellular phone manufacturer and who has been the subject of numerous books, articles, and an upcoming feature lm. By tracing out hacker culture, from its origins in the 1950s and 1960s through the various transformations it has taken in the 1980s and 1990s, Hacker Culture marks the various and complex ways in which technology has played a pivotal role in the formulation of the hacker underground and in the public, popular, and legal representation of it. Marking such transformations not only provides a sense of where hacker culture has come from but also comments on the role of technology in mainstream culture and illustrates the ways in which technology has been woven into the fabric of American society. Over the next decade, we can expect to see changes in the roles that hackers take on, the manner in which they negotiate their identity, and the ways in which they inform culture about the role of technology in the practice of everyday life.
Part I
Chapter 1
Hacking Culture
Fry Guy watched the computer screen as the cursor blinked. Beside him a small electronic box chattered through a call routine, the numbers clicking audibly as each of the eleven digits of the phone number was dialed. Then the box made a shrill, electronic whistle, which meant the call had gone through; Fry Guys computer . . . had just broken into one of the most secure computer systems in the United States, one which held the credit histories of millions of American citizens. Paul Mungo and Bryan Clough, Approaching Zero
This is the common perception of todays hacker a wily computer criminal calling up a bank or credit card company and utilizing mysterious tools to penetrate simply and effortlessly the secure system networks that hold our most important secrets. However, any attempt to understand todays hackers or hacking that only examines the blinking cursors and whistling boxes of computing is destined to fail. The reason is simple: hacking has never been just a technical activity. Perhaps the most striking illustration of this is that William Gibson, who in his book Neuromancer coined the term cyberspace and who invented a world in which hackers feel at home, for nearly a decade refused to have an e-mail address. In fact, Neuromancer, the book that has been (rightly or wrongly) held accountable for birth of the new breed of hackers, is rumored to have been written on a manual typewriter.1 Hacking, as Gibsons work demonstrates, is more about the imagination, the creative uses of technology, and our ability to comment on culture than about any tool, computer, or mechanism. The hacker imagination, like the literature that it is akin to, is rooted in something much deeper than microchips, phone lines, and keyboards. The current image of the hacker blends high-tech wizardry and criminality. Seen as the source of many evils of high-tech computing,
6 / Hacking Culture
from computer espionage and breaking and entering to the creation of computer viruses, hackers have been portrayed as the dangerous other of the computer revolution. Portrayals in the media have done little to contradict that image, often reducing hackers to lonely, malicious criminals who delight in destroying sensitive computer data or causing nationwide system crashes. In both the media and the popular imagination, hackers are often framed as criminals. As Mungo and Clough describe them, hackers are members of an underworld who prowl through computer systems looking for information, data, links to other webs and credit card numbers. Moreover, hackers, they argue, can be vindictive, creating viruses, for instance, that serve no useful purpose: they simply cripple computer systems and destroy data. . . . In a very short time it has become a major threat to the technology-dependent societies of the Western industrial world.2 At least part of the reason for this impression rests with the media sensations caused by a few select cases. Clifford Stoll, as documented in his book The Cuckoos Egg, for example, did trace a European hacker through the University of California at Berkeleys computer systems, ultimately revealing an attempt at international espionage, and the cases of Kevin Mitnick and Kevin Lee Poulsen, two hackers who were both arrested, prosecuted, and sent to prison for their hacking, gained considerable attention in the media and in subsequent books published about their exploits. Most of these accounts are journalistic in style and content and are more concerned with describing the events that took place than with analyzing the broader context out of which hackers have emerged. While the image of the hacker as a criminal seems to have taken over in the popular imagination, the broader context of the computer underground and, most important, the historical context force us to question such an easy categorization of this complex and varied subculture.
Hacking Culture /
nection between hacking and criminality. As Joe Chidley describes them in an article for Macleans Magazine, Hackers are people who simply love playing with computers, but there is a malicious subset of the hacker community, who intrude on computer networks to do damage, commit fraud, or steal data, and these hackers now have an arsenal of technologies to help them in their quest for secrets.3 Within such a limited framework, which reduces hackers to criminals with their arsenal of technologies, it makes little sense to speak of a culture of hacking. Hacking appears to be, like most crime, something that malicious people do for reasons that dont always seem to make sense. Why would a talented computer programmer choose to write a virus rather than write a program that might be more useful and, potentially, economically more rewarding? Why would hackers break into unknown systems when their talents could be employed in many other more productive ways? These questions make the hackers goals and motivations difcult to decipher. Rather than attempting to understand the motivation behind hacking, the media and computer industry instead focus on the manner in which computers are hacked. At this level, hackers are easy to understand they have a specialized set of tools, and they use those tools to commit crimes. This basic theme was central to the protest against the release of SATAN (Security Administrator Tool for Analyzing Networks), a network-analysis tool that tests systems for security aws. The program, which was written to make system administrators aware of security aws that were already well known and often exploited by hackers, was publicly released by its authors, Dan Farmer and Wieste Venema, in April 1995. The release was met with an outpouring of anxiety about the future of Net security and fear that the public availability of the tool would turn average computer users into criminals. As the Los Angeles Times remarked, SATAN is like a gun, and this is like handing a gun to a 12-year-old.4 Other newspapers followed suit, similarly invoking metaphors of increasing repower Its like randomly mailing automatic ries to 5,000 addresses. I hope some crazy teen doesnt get a hold of one, wrote the Oakland Tribune, only to be outdone by the San Jose Mercury Newss characterization: Its like distributing
8 / Hacking Culture
high-powered rocket launchers throughout the world, free of charge, available at your local library or school, and inviting people to try them out by shooting at somebody.5 The computer industry was more sober in its analysis. The real dangers of SATAN, as one advisory argued, arise from its ease of use an automated tool makes it very easy to probe around on the network.6 The basic objection to the release of SATAN was that it provided a tool that made system intrusion too easy, and making the program publicly available prompted outcries from those afraid that anyone with the tools could (and would) now invade systems. Omitted from most stories was the fact that SATAN had been available in a less powerful form as freeware (a freely distributed software package, accessible to anyone) on the Internet for years, along with several other programs that provided similar functions, not to mention a host of more powerful programs that were already widely available for the express purpose of unauthorized system entry. Additionally, SATAN only tested computer systems for well-known, previously discovered (and easily xed) security holes. SATAN was nothing new, but the discussion of it was. This response illustrated how convinced the general public was that the threat of hacking rested in the tools. While the apocalyptic effects of SATANs release failed to materialize (no signicant increase in any system intrusion has been reported, nor has any been attributed to SATAN since its release), the anxieties that SATAN tapped into are still present. The response to SATAN was in actuality a response to something deeper. It was a reaction to a basic cultural anxiety about both the complexity of technology and the contemporary cultures reliance upon that technology. SATAN appears to give anyone who wants it the tools to disrupt the system that very few people understand yet that everyone has come to rely on in their daily lives. A cursory examination of both public and state responses reveals a paranoia regarding the hacker that one can easily attribute to a Luddite mentality, a generation gap, or a pure and simple technophobia that seems to pervade U.S. culture. While these aspects are a very real part of contemporary culture, such a simple set of answers covers over more than it reveals. Most of the responses to hackers and hacking have served to lower the level of public discussion by con-
Hacking Culture /
fusing hackers with the tools that they use and making hyperbolic equations between computer software and high-power munitions. Like any other social and cultural phenomenon, the reasons for the growth of hacking in the United States (and as an international phenomenon) are myriad, and the reactions to hacking often reect a wide range of reactions, from hope and fear to humor and dismay. The responses to hacking in the popular imagination and in the minds of agents of law enforcement and the criminal justice system, a response documented in court records, TV shows, movies, newspapers, books, and even Web pages reveal more about contemporary culture than about hackers and hacking. However, much as was the case with SATAN, public reaction to hackers both tells us a great deal about the public that is reacting and, ironically, shields us from an understanding of the complexities and subtleties of the culture of the computer underground. By simply equating hackers with the tools they use, the media and popular representations of hackers have failed to understand or account for even the most basic motivations that pervade hacker culture. In trying to determine what hacking is and what hacker culture looks like, I make a distinction between technology, as a broad, relational, and cultural phenomenon, and the technical or scientic, the products of technology itself (for example, telephones, computers, and modems).7 In doing so, I am also separating hackers culture and motivation, which are very much about technology, from the idea of tools or specic technical items, which are for the most part incidental to the idea of hacking. These two concepts, technology and the technical, are different in kind, and to understand what constitutes hacking, we need to be careful to examine these two ideas as separate entities. Technology should be considered a cultural phenomenon, and in that sense, it tells us primarily about human relationships and the manner in which those relationships are mediated. The technical, by contrast, is concerned only with the instrumental means by which those relationships occur. It makes sense to speak of the technology of the telephone allowing people to have long-distance relationships. It also makes sense to discuss the technical aspects of telephones in comparison to the postal system. Both the phone and the mail as technology mediate human relationships in the same way insofar as
10 / Hacking Culture
they allow us to communicate at great distances. Yet as technical phenomena they are completely distinct. To pose questions with respect to technology is to pose cultural and relational questions. To pose questions with respect to the technical is to pose instrumental questions. Put differently, to answer the question, What is hacking? properly, we cannot simply examine the manner in which hacking is done, the tools used, or the strategies that hackers deploy the instrumental forces that constitute hacking. Instead we must look at the cultural and relational forces that dene the context in which hacking takes place.
Hacking Culture /
11
door is an outrage. Just as information should be clearly and elegantly transported within the computer, and just as software should be freely disseminated, hackers believed people should be allowed access to les or tools which might promote the hacker quest to nd out and improve the way the world works.9 The old hacker of the 1960s and 1970s is often characterized with no small amount of nostalgia and is frequently seen as a counterpoint to the emergence of the new breed of hacker, the cyberpunk or cracker. The old hackers, in this romanticized telling, were a certain breed of programmers who launched the computer revolution, but just cant seem to be found around anymore. . . . [A]ccording to these old-school hackers, hacking meant a willingness to make technology accessible and open, a certain love affair with the computer which meant they would rather code than sleep. It meant a desire to create beauty with computers, to liberate information, to decentralize access to communication.10 In short, the old-school hacker was dedicated to removing the threat of high technology from the world by making that technology accessible, open, free, and beautiful. To the 1960s hacker, hacking meant rendering technology benign, and hackers themselves not only were considered harmless but were framed as guardians of technology scientists with an ethic that resembled Isaac Asimovs Laws of Robotics: above all else, technology may never be used to harm human beings. Moreover, these hackers effected a strange anthropomorphism information began to be personied, given a sense of Being usually reserved for life-forms. The old-school hacker was frequently motivated by the motto Information wants to be free, a credo that attributed both a will and an awareness to the information itself. Interestingly, it is these two things, will and awareness, that seem to be most threatened by the evolution of technology. In an era when the public is concerned both with a loss of freedom to technology and with a fear of consistently nding themselves out of touch with the latest technological developments, there is a transference of our greatest fears about technology onto the idea of information. The hacker ethic remedies these concerns through the liberation of information. The logic is this: if technology cannot even conne information, how will it ever be able to conne us? Within
12 / Hacking Culture
the framework of this initial question we can begin to trace out the history of hacking as a history of technology.
A Genealogy of Secrecy
One of the primary issues that hackers and hacker culture negotiates is the concept of secrecy that has evolved signicantly and rapidly since World War II. Indeed, hackers relationships to technology can be understood as a cultural phenomenon and cultural response to the evolution of secrecy, particularly in relation to the broader political and social climate, the birth, growth, and institutionalization of the computer industry, and the increasing import of multinationalism in industry. The concept of secrecy seems to change from generation to generation. What secrecy means and particularly its value shift as social, political, and economic contexts change over time, but what has always remained stable within hacker culture is the need to negotiate the relationship between the technical aspects of the machines themselves and the cultural value of secrecy. One of the rst connections between secrecy and machines arose during the Allies work to break German codes during World War II. Until this point, most cryptography had utilized methods of simple substitution, meaning that letters in the alphabet would be substituted for other letters, scrambling a clear text message into a ciphertext. For example, substituting the letter a for the letter r, b for e, and c for d would produce the ciphertext abc for the word red. The problem with such a system of simple substitution is that the English language tends to utilize letters with fairly regular frequencies, and for that reason, no matter what substitutions are made, it becomes fairly easy to guess what has been encoded just by knowing how often certain letters appear in the message. Machines that encoded or decoded substitution schemes only helped speed up the process of encoding and decoding; they didnt actually perform the act of encoding in a meaningful way. That would all change with the German Enigma Machine, the rst machine that actively encoded messages. The Enigma Machine consisted of eight code wheels that would rotate each time they were used. That meant that each time a substitution was made, the wheel making that substitution would
Hacking Culture /
13
rotate forward so the next time that letter was to be used, the substitution would be different. To complicate things further, each of the eight wheels had a different set of substitutions. The only way to decode the message was to have an Enigma Machine on the other end, with the wheels set to the original position, and feed the message back through to decode it. The process of World War II code-breaking spawned the rst generation of computer scientists and committed the evolution of the machine to the interests of secrecy and national security. From World War II on, two of the primary functions of the computer would be code-making and code-breaking. Indeed, it is not too far a stretch to claim that the rst computer scientists (including Alan Turing, the father of modern computer science) who broke the Enigma Machines coding process were, in the most basic sense, the rst computer hackers and that the origin of computers rests with the need to keep and, perhaps more important, break secrets. The breaking of the Enigma codes would lead to the development of Colossus, what the museum at Bletchley Park (the site in Britain where the Enigma cipher was broken) calls the worlds rst computer. Secrecy has always been a signicant concern for the military. Ever since Caesar scrambled messages sent to his troops, the military has recognized the need for secrecy. In the late 1930s and early 1940s, the stakes of military secrets were raised enormously with the invention and, ultimately, the use of the rst atomic weapons. In that climate, the Department of Defense in the late 1950s turned to universities as the means to advance the study of computer science and engineering and, in turn, spawned what is generally acknowledged as the rst generation of computer hackers. Funded almost exclusively by the Department of Defense, hacking began its difcult and oftentimes contradictory relationship to secrecy. As opposed to their forerunners, who worked exclusively in secrecy as they broke codes at Bletchley Park, hackers of the 1950s and 1960s, who worked in an environment of learning and academic freedom on university campuses, abhorred the notion of secrecy. And it was, in large part, that distaste for secrecy that led to most of the major advances that hackers would later make in the computer labs of MIT and other universities. A free exchange of information, Levy writes, partic-
14 / Hacking Culture
ularly when the information was in the form of a computer program, allowed for greater overall creativity.11 Such an ethic led to cooperation among programmers and a nearly constant evolution of ideas and programming techniques. The goal was not just to write original programs but to improve on the work of others. The most skillful hack was not writing a new line of code but nding a way to do something in someone elses code that no one had seen before to eliminate code, making the program run faster and more elegantly. While the ethic belonged to the hackers, the product belonged to the Department of Defense. That conict, which most hackers of the 1950s and 1960s were either sheltered from or in denial about, represented the ultimate irony work produced in the climate of absolute freedom would be deployed by the military in absolute secrecy. One hacker described the reaction to the realization that the funding and the results of those funded projects were military: I got so upset I started crying. . . . Because these people had stolen my profession. They had made it impossible to be a computer person. They sold out. They sold out to the military uses, the evil uses, of the technology. They were a wholly owned subsidiary of the Department of Defense.12 Although these hackers were the heroes of the computer revolution, as Levy argues, they were also the brain trust that developed most of the hardware and software that would drive the military-industrial complex throughout the late twentieth century and create innovations that would be deployed in the name of secrecy and surveillance.13 The climate that hackers envisioned as the realization of the hacker dream with sophisticated machines, shielded from the bureaucratic lunacy of the outside world, was only realized up to a point. All the late-night hacks, high jinks, and clever pranks that characterized the 1960s hackers were furthering another agenda, which would have wider cultural impact than the hackers working on those projects imagined. An example that Levy cites is the funding of speech recognition by the ARPA (the Department of Defenses Advanced Research Project Agency), a project that directly increased the governments ability to mass-monitor phone conversations at home and abroad.14 Perhaps most signicant was ARPAs funding of ARPAnet, the foundation of the modern-day Internet, which was originally designed as a decen-
Hacking Culture /
15
tralized communication network intended to maintain command, control, and communication abilities in the event of nuclear war. In essence, these early hackers designed a secure communications system funded by the Department of Defense to ensure survivability in nuclear war. To the hackers of the 1960s, secrecy meant the freedom to share code in the computer lab, the spirit of cooperation in program design, and the right to tinker with anything and everything based on ones ability to improve upon it. For instance, In a perfect hacker world, Levy writes, anyone pissed off enough to open up a control box near a trafc light and take it apart to make it work better should be perfectly welcome to make the attempt.15 Freedom and secrecy were decontextualized to the point of solipsism. The hacker ethic, a matter of secrecy and freedom, was conned to the labs where hackers spent most of their waking hours and was naive about or ignorant of the greater context that was allowing that ethic to ourish. The shift that would make that navet most apparent was the move from the university to the corporate world. The second generation of hackers, the hackers of the 1980s, viewed secrecy differently. Without military funding and without corporate secrets to protect, these hackers took up the spirit of the original hacker ethic, but from a point of view that fully contextualized it in terms of politics, economics, and cultural attitudes. These hackers held to the tenets of freedom and abhorred the notion of secrecy, just as their predecessors did, but they lacked the solipsistic environment of the 1960s computer lab or the nearly unlimited government funding that made the original hacker ethic not only possible but also relatively risk-free.
Yesterdays Hackers
These original hackers of the 1950s and 1960s are generally recognized as the ancestors of the modern computer underground. There was, however, a second strain of hacker, one that is much more closely allied with the tradition of contemporary hacking. As Bruce Sterling writes, the genuine roots of the modern hacker underground probably can be traced most successfully to a now
16 / Hacking Culture
much-obscured hippie anarchist movement known as the Yippies.16 The modern underground, then, had its roots in a leftist political agenda that grew out of 1960s counterculture and was fueled by the antiwar protest movements of the 1960s and 1970s. The Yippies, who took their name from the largely ctional Youth International Party [YIP], carried out a loud and lively policy of surrealistic subversion and outrageous political mischief. Their basic tenets were agrant sexual promiscuity, open and copious drug use, the political overthrow of any powermonger over thirty years of age, and an immediate end to the war in Vietnam, by any means necessary.17 Jerry Rubin and Abbie Hoffman were two of the most high-prole members of YIP, but it would be two hackers, Al Bell and Tom Edison, who would take over the newsletter (initially called Party Line) and transform it into TAP (Technical Assistance Program). The vision of TAP became increasingly less political as it began to focus increasingly on the technical aspects of telephony. Ultimately, TAPs primary mission became the distribution of information, for example, tips on such topics as lock picking, the manipulation of vending machines, do-it-yourself payphone slugs and free electricity.18 Although the war in Vietnam had served as the origin for TAP, by the time the war had ended, TAP had become a technical journal completely divorced from politics. In the late 1960s and early 1970s, while the hackers of TAP were busily disseminating information, hackers at MIT were busy creating information. The majority of funding for most, if not all, of these hackers projects was coming from ARPA. The entire purpose of ARPA, begun in the early 1960s, was to create military applications for computers and computer networks. Although most of the hackers working at MIT either were blind to such considerations or found them irrelevant, hackers of the 1960s at major research universities were a signicant portion of the technological side of the military-industrial complex (MIC). Hacker involvement in government projects with military application did not escape the attention of students protesting the war in Vietnam, and as a result computer labs at some major universities were the site of major protests and wound up being shielded by steel plating and halfinch-thick bulletproof Plexiglas.19 The role of the MIC was central,
Hacking Culture /
17
although unintentional and unanticipated, to the formation of what constitutes the computer underground. On the one hand, the MIC produced an underground coming out of the protest movement of the 1960s. On the other hand, the MIC was funding the projects that would create hacker culture. Partially out of navet and partially because of the novelty of computers, the hackers of the 1960s and 1970s were able to avoid the obvious contradiction between their highly antiauthoritarian mind-set (Information wants to be free) and the fact that the people they were designing systems and software for were not likely to respect that basic tenet. Because they were producing the vast majority of new technology, the old-school hackers were able to maintain the illusion that they were also controlling it. Within a decade, the old school had moved to the Silicon Valley and started to build an industry that would look and operate increasingly less like the labs at MIT and Harvard and more like the corporations and organizations against which the 1960s hackers had rebelled.
It may seem odd to think about hacking and hacker culture in relation to three of the most important gures from the personal computer (PC) industry. The computer industry has always been and in many ways continues to be the very antithesis of hacker culture, which is also the reason that it plays an important role in the forma-
18 / Hacking Culture
tion of hacker culture. Without the hackers of the 1960s, there never would have been a PC; without the PC, there never would have been a PC industry; without a PC industry, there never would have been the hackers of the 1980s and 1990s. Without a military-industrial complex, which funded most of the computer research in the 1950s, 1960s, and 1970s, it is likely there would never have been a PC or a hacker culture. One cannot hope to understand the hacker in his or her modern incarnation without understanding at least a little bit about where the PC originated. Steven Jobs and Steven Wozniak, inventors of the rst massmarketed PC, get a lot of mileage out of the story that they began as hackers, or, more specically, as phone phreaks. Phone phreaks are to telephones what hackers are to computers they possess a basic understanding of how the phone system works and as a result can do things such as place long-distance calls for free. One of the rst phone phreaks was John Draper, aka Captain Crunch, who took his handle from his discovery that in the early 1970s the whistle that came with Captn Crunch cereal sounded the tone (2600 Hz) that would allow one to take control of the phone line and place long-distance calls for free. Not long after that, this discovery was harnessed in a more technical manner through what became known as a blue box, a small electronic device that would emit the 2600 Hz tone. In contrast to Draper, Jobs and Wozniak learned about blueboxing from a 1971 Esquire article20 and built their own box. They not only used the boxes to make free calls but also went on to sell them to students in the Berkeley dorms.21 In short, Jobs and Wozniak copied a device someone else had originated and then sold those copies. This is a pattern Jobs and Wozniak would follow in building the rst Apple. In contrast to the long-standing hacker ethic that freely distributed information and knowledge and resisted the impulse toward commodication, Jobs and Wozniak openly embraced it. Before there was the Apple, however, there was the Altair. The Altair was the very rst PC. It came in parts, cost between four hundred and ve hundred dollars, and had to be built (and not just assembled, but soldered) by the end-user. These limitations meant that PCs were
Hacking Culture /
19
limited to computer hobbyists, and most of those hobbyists belonged to the rst generation of old-school hackers. These were computer enthusiasts who did everything from soldering the wires to programming the machine. One of those enthusiasts was Bill Gates. Gates, along with his friend Paul Allen, began writing the rst language for the Altair, what would become Altair BASIC. BASIC, however, was not Gates and Allens invention, but rather a programming language that had been put into the public domain a decade earlier by Dartmouth researchers Thomas Kurtz and John Kemeny. Gates and Allens contribution was making BASIC, a language designed for a large mainframe computer, run on the Altair. Almost all of the software for the Altair was written by hobbyists, who routinely shared their programs with other hackers at meetings of computer clubs across the country. The sharing of information became one of the central tenets of the hacker ethic, and this would be the central organizing principle of one of the rst computer clubs, the Homebrew Computer Club of Menlo Park, California. Later, as the early pioneers of hacking would make their mark in the corporate world, a new ethic would emerge that would change everything. The transformation was intensied as the process of commodication increased. With commodication, the earliest computer hackers, those who had built their computers themselves and shared every tidbit of information that might help to improve their machines or programs, were in competition with each other, ghting to create and to maintain market share. The result was dramatic competition in the marketplace retarded Homebrews time-honored practice of sharing all techniques, refusing to recognize secrets, and keeping information going at an unencumbered ow. . . . All of a sudden, they had secrets to keep.22 That transition marks the dividing point between the old-school hackers of the 1960s and 1970s and the new-school hackers of the 1980s and 1990s.
20 / Hacking Culture
its roots in the rst e-mail discussion list that emerged early in the life of ARPAnet (the precursor of todays Internet). That list was SF-LOVERS, a list of people devoted to the discussion of science ction. But like the shift from the 1960s hackers to the 1990s hackers, sci- literature also underwent a radical shift. The 1960s hackers inspiration was found in the literature of Isaac Asimov, Philip K. Dick, Norman Spinrad, or Harlan Ellison, all writers who depicted a future of possibility, who wrote cautionary tales. These tales usually begin in an unfamiliar world, one that isnt your own but threatens to be. Often set in the future, but not too far in the future, these novels present anything from an alternative history to a fantasy world where the strange and unusual are commonplace. For example, Philip K. Dicks 1969 novel Ubik begins with the line, At three-thirty a.m. on the night of June 5, 1992, the top telepath in the Sol System fell off the map in the ofces of Runciter Associates in New York City.23 Dicks world is both familiar and strange it contains elements we know and some we do not know. New York and all the familiar conventions are intact time, date, and a business with a realistic name. Yet the description also points to the unfamiliar: in this new world telepathy is not only possible but has become a commodity. We are, in essence, introduced to a world of possibility that is familiar enough to be recognizable yet strange enough for us to take notice of the ways in which our future might change. In comparison, the mainstay of the 1990s hacker was the literature of cyberpunk, represented by William Gibson and Jon Brunner. Their novels are predominantly dystopic, describing a battle that has already been fought and lost. Consider Gibsons opening to Neuromancer: The sky above the port was the color of television, tuned to a dead channel.24 Immediately we know that Gibsons vision is going to challenge the basic model of the cautionary tale. From the outset, what it presents is threatening, and the dystopia of Gibsons ction is taken as preordained. The literature of cyberpunk so dominated the imagination of the 1990s hackers that, in many ways, they came to see themselves as antiheroes, based on the prototype of Gibsons characters and others. These characters live in a world dened, even in its geography, by information. In Neuro-
Hacking Culture /
21
mancer, Gibson describes a world that the hackers of today have adopted as their own: Home. Home was BAMA, the Sprawl, the Boston-Atlanta Metropolitan Axis. Program a map to display frequency of data exchange, every thousand megabytes a single pixel on a very large screen. Manhattan and Atlanta burn solid white. Then they start to pulse, the rate of trafc threatening to overload your simulation. Your map is about to go nova. Cool it down. Up your scale. Each pixel a million megabytes. At a hundred million megabytes per second, you begin to make out certain blocks in midtown Manhattan, outlines of hundred-year-old industrial parks ringing the old core of Atlanta.25 In such an account, we can begin to see the manner in which the exchange of information and data begins to code more common points of reference. Not only have old, familiar locales (Manhattan, Atlanta) been recoded as data, but our entire way of seeing them has been transformed. The way we look at a map no longer is about distance but rather is about the density of information. The map not only is not the territory it has lost its relationship to the territory in terms of representation. The map is no longer a scale model of space. What is represented is the frequency of data exchange. This is a revealing term. Frequency, a term of temporality, not location, is the rst focus, and exchange is the second. What is lost in this mapping is any sense of place. Place is erased, making it possible for Gibson to write of home as a place without place, home as a system of exchange.26 The literature of cyberpunk teaches, or reects, the value of information both as data and as a social fabric, a medium of exchange, and a relational concept. Cyberpunk represents a world where information has taken over, and the literature provides a sense of the fears, dangers, anxieties, and hopes about that new world. As opposed to the earlier hackers who sought to liberate information, hackers of the 1990s see themselves as trapped by information. As a result, the hacker ethic, which took as its most basic tenet that
22 / Hacking Culture
information wants to be free, needs to be radically transformed. While the spirit of the ethic remains intact, the letter of it must necessarily change. Where the hackers of the 1960s had a great deal of control over the information that they created and utilized, the hackers of the 1990s and the beginning years of the twenty-rst century nd themselves in a world so overwhelmed by information that control itself becomes the contested issue. Most important to the later hackers is the concept that information is now their home, and secrecy of information is the equivalent of connement or prison. The original ethic is, for the most part, still intact, but its meaning, value, and application have been radically altered by the ways in which the world has changed. The cyberpunk vision of the future has radically reshaped the vision of the latter-day hacker. In one document currently being circulated on the Internet, the Declaration of Digital Independence, one hacker describes the Internet as the next battleground for the regulation of information, and hence freedom. It [the Internet], he writes, should be allowed to make its own rules. It is bigger than any world you can and cant imagine, and it will not be controlled. It is the embodiment of all that is free; free information, friendship, alliances, materials, ideas, suggestions, news, and more.27 The hackers of the 1960s, inspired by the utopian science ction of their day, saw the battle in terms of free information and felt encouraged by that literature to experiment, learn, and develop. In contrast, the hackers of today, with the dystopic vision of cyberpunk, see this battle as already lost and as something that can only be rectied by revolution. In part, this is the result of the increasing commodication of information, which has created a media that they describe as the propaganda vending machine of today, which, as a whole, trip over themselves, feeding lies to the ignorant.28 These hackers hold that the commodication of information has led to an increasing investment of power in the media. Accordingly, they argue, a transformation has taken place. The media, who enjoy the power of managing information in an era of commodication of information, are no longer interested in the freedom of information, but, rather, are invested in the careful control and dissemination of information. As Paul Virilio argues, the commodication of infor-
Hacking Culture /
23
mation has had an ironic effect: [T]he industrial media have gone the way of all mass production in recent years, from the necessary to the superuous. . . . [T]heir power to denounce, to reveal, to aunt has been growing endlessly to the detriment of the now precarious privilege of dissimulation so much so that currently the real problem of the press and television no longer lies in what they are able to show as much as in what they can still manage to obliterate, to hide.29 The point is not so much that the media do not break news or reveal secrets as much as it is that they are selective about which secrets can and will be revealed. As media power is increasingly consolidated, media outlets have a possessive investment in particular stories and a similar investment in keeping other stories quiet. The more centralized the media become, the more power they have to self-regulate what constitutes news. Todays hackers, who follow this dystopic vision, contrast the medias approach to the management of information with their own sense of boundless curiosity. As the Digital Declaration of Independence illustrates: Everyone has the need to know, the curiosity of the caveman who invented re, but some have been trained like monkeys, not ever knowing its there. They simply accept things, and do what is expected of them, and this is sad. They are those who never ght back, and never open their minds. And they are, unfortunately, usually the governing bodies; the teachers, bosses, police, federal agents, congressmen, senators, parents, and more. And this, my friend, must change.30 Such a call to action denes the problem in terms of curiosity and recognizes that such curiosity is problematic within contemporary culture. Curiosity becomes dangerous and even subversive not to any particular group or organization but in principle. Curiosity is precisely what threatens secrecy, and in doing so, it challenges the economic structure, the commodication, of information.
Blurring the Lines between Old and New: WarGames, Robert Morris, and the Internet Worm
In 1988, the distinction between the old and the new hacker was clearly staked out. This difference was revealed through two g-
24 / Hacking Culture
ures: David Lightman, the protagonist from the lm WarGames and the prototype for the new-school hacker; and Robert Morris, a quintessentially old-school hacker. The new-school hacker was introduced into the popular imagination through the 1983 release of the lm WarGames, featuring Lightman (played by Matthew Broderick) as a curious kid exploring computers and computer networks who unwittingly starts the U.S. military on the road to World War III by playing what he thinks is a game global thermonuclear war. WarGames opens, somewhat ominously, with a scene in which U.S. soldiers in missile silos are ordered to re their weapons at the Soviet Union, beginning what they believe will be the third, and undoubtedly last, world war. The soldiers are uncertain as to whether the order is part of a training exercise or not. As a result, a large percentage of the soldiers, uncertain about the effects of their actions, choose not to re their missiles. The orders are part of a simulation, designed to test U.S. military battle-readiness. Their failure results in the implementation of a new program, wherein humans are removed from missile silos and replaced by electronic relay switches and strategic decisions about nuclear warfare are to be made by a stateof-the-art computer named WOPR (pronounced whopper) War Operations Planned Response. The machine is devoted to constantly replaying World War III in an effort to maximize the effectiveness of U.S. missiles and minimize U.S. casualties. In effect, its job is to gure out how to win a nuclear war. The young hacker, David Lightman, stumbles across WOPR quite accidentally while searching for a game company called Protovision. Using a modem and computer program (since termed a WarGames dialer), the hacker scans every open phone line in Sunnyvale, California (in the heart of the Silicon Valley), looking for modem access to Protovision. He comes across a system and, through hours of research (principally learning about the systems designer, Stephen Falken) and hacking, gains access. The initial game continues to run even after Lightman is disconnected from the system, and, as Lightman soon discovers, the computer is unable to distinguish the game from reality. In less than three days time, WOPR will calculate a winning strategy and re its
Hacking Culture /
25
weapons. In the meantime, Lightman is arrested. On the verge of being charged with espionage, he escapes custody and searches out the system designer with the help of his girlfriend, Jennifer Mack (played by Ally Sheedy), to convince him to help persuade NORAD (North American Air Defense command) not to believe the information that the computer is sending them. Falken, the system designer, has become a recluse since the death of his son, Joshua (whose name is the secret password that gains Lightman access and the name that Lightman and Falken use to refer to the WOPR computer). Eventually, after several incidents that put the world on the brink of a nuclear holocaust, Lightman manages to teach the computer (now Joshua) the meaning of futility by having it play ticktacktoe in an innite loop sequence. The computer concludes, after exhausting the game of ticktacktoe and learning from it, that nuclear war is also unwinnable and that the only winning move is not to play. The lm demonstrates a tremendous anxiety about technology, represented both by the missiles that threaten to destroy the United States and the Soviet Union and by the machines that control those missiles.31 The hacker, however, is represented in a more ambivalent manner. On the one hand, the harmlessness of Lightmans actions early on (using his computer to make faux airline reservations or even nding a banks dial-in line) is made clear by his good nature and curiosity. That sense of playing a game is radically transformed when the machine he hooks up to (the WOPR) is unable to distinguish between a game and reality. On the other hand, Lightman and his understanding of playing a game (in this case ticktacktoe) ultimately are able to save the day. In the lm, the hacker is positioned as dangerous because he is exploring things about which he has little or no understanding. It is easy in a world of such great technical sophistication, the lm argues, to set unintended and potentially disastrous effects into motion even accidentally. But equally important is the characterization of the hacker as hero. WOPR, above all else, is a thinking machine, an articial intelligence, and that thinking machine needs guidance and instruction in its development. Technology is infantilized in the lm (underscored by the use of the name of Falkens deceased son, Joshua), and the message of the lm is that Lightman, the hacker, is
26 / Hacking Culture
the most appropriate educator for the technology of the future. Not the generals, the system administrator, or even the system designer himself is able to teach the machine, but Lightman, the hacker, can. The hacker stands at the nexus between the danger and the promise of the future of technology. Thus, the intersection of hacker culture and popular culture is clearly and conspicuously marked. With the release of WarGames, hacker culture had a national audience. That culture, however, was as much a product of the lm (and the response to the lm) as it was a reality. While there certainly had been a long history of hacking and phreaking that predated WarGames, the hacking community itself was small, exclusive, and rather inconspicuous. With WarGames that all changed. As Bruce Sterling describes it, with the 1983 release of the hacker-thriller movie WarGames, the scene exploded. It seemed that every kid in America had demanded and gotten a modem for Christmas. Most of these dabbler wannabes put their modems in the attic after a few weeks, and most of the remainder minded their Ps and Qs and stayed well out of hot water. But some stubborn and talented diehards had this hacker kid in WarGames gured for a happening dude. They simply could not rest until they had contacted the underground or, failing that, created their own.32 To varying degrees, hackers themselves admit to this, although none would probably state it in precisely Sterlings terms. One of the primary differences between the lms depictions and Sterlings is that the lm WarGames has absolutely no representation, or even suggestion of, an underground. Undoubtedly, the lm had a greater impact on hacker culture than any other single media representation. Hackers such as Shooting Shark and Erik Bloodaxe, in discussing their early inuences, both confess (somewhat reluctantly) that the lm had a major impact on them. Embarrassing as it is for Erik, his Pro-Phile reads, WarGames really did play a part in imbedding the idea of computer hacking in his little head. (As it did for hundreds of others who are too insecure to admit it.)33 Shooting Sharks chagrin is equally obvious, Worse yet, WarGames came out around this time. Ill admit it, my interest in hacking was largely inuenced by that lm.34 Many hackers took their handles from the lm, including David
Hacking Culture /
27
Lightman and a whole spate of Professor Falkens or, more often, Phalkens, named for the computer genius who invented the WOPR. The lm has even been held as the inspiration for one of the most serious instances of hacking in the 1980s, the exploits of a West German hacker who inltrated U.S. military computers and sold U.S. government information to the Soviets.35 The fact of the matter is that while many teens may have been intrigued by the possibility of breaking into high-security military installations, that aspect was never glamorized in the lm. More likely, what intrigued young hackers-to-be was an earlier scene, where Matthew Broderick logs on to the local schools computer using a modem from his PC at home and changes his grades in order to avoid having to take classes in summer school. The lure for the young hacker was never with starting World War III, but rested, instead, with the ability to make local conditions (for example, school work) more tolerable. This narrative presents the good-natured, well-intentioned hacker innocently wreaking havoc as a result of his explorations. If Lightman is the introduction of the hacker to the popular imagination, Robert Morris would be the turning point in the perception of what kinds of threats hackers pose to society. Perceptions of who and what hackers are underwent another transformation in the late 1980s, and that moment can be marked quite clearly in the popular imagination by a single case the day the Internet shut down, November 8, 1988. Although the Internet was only a fraction of the size that it is today, it was an information infrastructure that had grown large enough that many government agencies (not the least of which was the military) and especially colleges and universities had come to rely on it. WarGames had provided the fantasy, the cautionary tale, but it all had ended well. There had been no disaster, and, even though the hacker had created the problem himself, it was also the hacker who saved the day, teaching the computer the lesson of futility by giving it a game (ticktacktoe) that it couldnt win, by becoming the educator of the technology of the future. The hacker, in the old-school tradition, saved the day by rendering technology itself (in that case WOPR) benign. Such was not the case with Robert Morris. In 1988, Morris launched what has come to be known as
28 / Hacking Culture
the Internet worm, a computer program that transmitted itself throughout the Internet, eating up an increasing number of computing cycles as it continually reproduced itself. Morriss intent was to have the worm reproduce at a rate that would allow it to continue throughout the system, unnoticed for years. With each system it entered, it would exploit a security hole, discover user passwords, and mail those passwords back to Morris. Morris, however, made a small error that had a great effect, and the worm reproduced itself at a rate much faster than he had anticipated. Rather than telling the worm to stop running when it encountered a copy of itself, which would have stopped it from spreading, Morris coded the worm so that one in every seven worms would continue to run even if other copies of the worm were found on the machine. The ratio was too high by a factor of a thousand or more, and Morriss worm replicated itself at an astonishing rate, essentially eating up computing cycles at such a rate that the machines could do nothing but run Morriss program.36 Morriss worm spread throughout the nations computer systems at an alarming rate. The day after the worm was released, a significant portion (no one is really sure of the exact number) of those computer systems hooked to the Internet had ground to a dead stop. The only remedy was to disconnect from the network and wait for the experts working around the country to nd a way to counteract the program. What makes this case special apart from the fact that it focused national attention on issues of computer security, Net vulnerability, and the degree to which we have come to depend on computers in our daily lives was the ambivalent stature of the programmer himself. By all rights, Robert Morris was an old-school hacker. A computer-science graduate student at Cornell, he had spent most of his college career (and early years) working with computers, devising clever workarounds for difcult problems, and engaging with his special fascination, computer security. The son of Bob Morris, the chief scientist at the National Security Agencys National Computer Security Center, Robert learned the ins and outs of computer and system security at a very early age and possessed a natural talent for nding system bugs and holes he could exploit to gain access.37
Hacking Culture /
29
Even the worm itself was never intended as anything more than an exposition of the aws in UNIX system design. Morriss prank, however, was extraordinarily similar to the most malicious activity that was being attributed to the new breed of hackers, the computer virus. The difference between a worm and a virus was hotly debated within the computer community.38 Worms, which are independent programs that move under their own power, are generally considered to be benecial things. First developed by researchers at Xerox, worms were programs that would run throughout a system performing useful tasks. The name is taken from John Brunners 1975 novel, Shockwave Rider, where the protagonist feeds a tapeworm into the governments computer, as a means to counter government surveillance. The act, in Brunners case, is one of heroism in the face of an oppressive, tyrannical government. In that sense, worms carry with them the connotation of performing a useful function, usually in line with the traditional hacker ethic. Many were reluctant, it seems, to label Morriss program a worm because of the positive connotations that the term carried. Viruses, in contrast, are generally considered to be malicious. The connotations of viruses as sickness, illness, and even death (particularly in the age of AIDS and Ebola) provide an interesting counterpoint to the discussion of the Internet worm. Many who argued for the classication of Morriss program as a virus did so on the ground that it was harmful and caused great damage. The community was split both on how to refer to the program and on its ethical implications. The line between the old school and the new school had begun to dissolve. Morriss worm program spurred a great deal of speculation about his intentions and inuences (Morris refused to talk with the press) and a great deal of debate over the threat that technology posed to society if it fell into the wrong hands. As Katie Hafner and John Markoff put it, it also engaged people who knew nothing about computers but who were worried about how this new technology could be used for criminal ends.39 In the popular imagination, the line between the old and new hacker was already fuzzy, and Morriss worm program only made the distinction fuzzier. A second drama was also being played out around anxieties
30 / Hacking Culture
about technology. Those anxieties coalesced around the notions of secrecy and technology and were reected in popular cultures representations of hackers. For example, lms about hackers almost always deal with the question of secrecy. If we are to take WarGames as the prototypical hacker lm, it is easy to see exactly what this means. WarGames begins with David Lightman trying to break into Protovision in an effort to play the latest games before they are publicly released. In essence, Lightman seeks to break Protovisions corporate secret in order to have access to secret games. As the name suggests, Lightman wants to see something before anyone (or, more to the point, everyone) else does. While searching for Protovisions phone number, Lightman comes across a more interesting system, one that doesnt identify itself. Thinking that this is Protovisions dial-in number, Lightman attempts to hack into the system, even after he is warned by two system programmers that the system is denitely military. The crucial point about the basic theme underwriting the lm is that these two cultures of secrecy, Protovisions and NORADs, are virtually identical. The structure of WarGames depends on our understanding and acceptance of the confusion of a corporate computer-game manufacturers notion of secrecy with that of NORAD. In other words, corporate and military secrets are, at some level, indistinguishable. In the lms that followed WarGames, this theme was renewed and expanded upon. In Sneakers (1992), the confusion between corporate and government secrecy is complete when it is revealed that the only real governmental use for the black box agents have been sent to recover is to snoop on other U.S. governmental departments, rather than on foreign governments. What we witness throughout the lm, however, is that as a corporate tool, that black box is capable of everything from corporate espionage to domestic terrorism. Indeed, the project SETEC ASTRONOMY which is at the center of Sneakers, is an anagram for TOO MANY SECRECTS. And while it is a government project (funded by the NSA in the lm), it is revealed in the lms epilogue that the box will not work on other countries cryptographic codes, only on those of the United States. Accordingly, the message is clear: domestically, there are to be no more secrets kept from those in power.
Hacking Culture /
31
In two lms of the 1990s, Hackers (1995) and The Net (1995), secrecy plays a major role as well. In these lms, however, secrecy is what allows criminality to function in both the government and corporate worlds. In the case of Hackers, two employees (one a former hacker) of a major corporation are running a secret worm program to steal millions of dollars from the corporation. They are discovered when a hacker unwittingly copies one of their garbage les that contains the code for the worms program. The same plot in played out in The Net, but from a governmental point of view. Angela Bassett (played by Sandra Bullock) accidentally accesses and copies secret governmental les that reveal wrongdoing on the part of governmental ofcials, again demonstrating the manner in which the culture of secrecy is able to hide and allow for a deeper sense of criminality to ferment and function. In both cases, hackers, by violating the institutions secrecy, expose criminality by enacting criminality. The message from the later lms is that secrecy creates a space for the worst kinds of criminality, which, because of the culture of secrecy, can only be exposed by another type of criminality hacking.
Hackers of Today
As Steve Mizrach has noted, the split between the hackers of the 1960s and those of today is cultural and generational rather than technological: The main reason for the difference between the 60s and 90s hackers is that the GenXers are a post-punk generation, hence the term, cyberpunk. Their music has a little more edge and anger and a little less idealism. Theyve seen the death of rock n roll, and watched Michael Bolton and Whitney Houston try and revive its corpse. Their world is a little more multicultural and complicated, and less black-and-white. And it is one in which, while computers can be used to create beauty, they are also being used to destroy freedom and autonomy. . . . [H]ence control over computers is an act of selfdefense, not just power-hunger. Hacking, for some of the new
32 / Hacking Culture
hackers, is more than just a game, or means to get goodies without paying for them. As with the older generation, it has become a way of life, a means of dening themselves as a subculture.40 Born in the world that the 1960s hackers shaped, this new generation has been jaded precisely by the failure of the old-school hackers to make good on their promises. Technology has not been rendered benign, and information, while still anthropomorphized and personied, reveals that we are more like it conned, coded, and organized than information is like us. The cautionary tales, like Asimovs, that guided the 1960s hackers have been replaced with tales of a dystopian cyberpunk future that features technology no longer in the service of humankind, but humankind fused with technology through cybernetics, implants, and technological modications to the body. There seem to be two reasons for the shift. The rst is that the rate of technological growth has outstripped societys capacity to process it. A certain technophobia has emerged that positions technology as always ahead of us and that produces a fear that is embodied by the youth of contemporary culture doing things with computers that an older generation is unable to understand. Hacking promotes fear, but it is about a contained kind of fear, one that is positioned as a form of juvenile delinquency that these youth will, hopefully, grow out of. In that sense, hackers emerge as a type of vandal, a criminal who is often malicious, who seeks to destroy things, yet is terribly elusive. The threat, like the technology that embodies the threat, is decentralized, ambiguous, and not terribly well understood, but it doesnt need to be. We feel we can trust our information networks, for the most part, the same way we can trust our trains and buses. Occasionally, someone may spray paint them, atten a tire, or set a re on the tracks, but these things are inconveniences, not disasters. Hackers pose a similar type of threat: they may deface the surface of things, but the underlying faith in the system remains intact. Just as one does not need to understand how internal combustion engines work to trust that a car will function properly, one does not need to understand how information networks function in order to
Hacking Culture /
33
use them. The second reason for a fear of hackers is the result of a displacement of anxiety that the hackers of the 1960s have identied namely, the increasing centralization of and lack of access to communication and information. This new generation of hackers has come to represent the greatest fear about the 1960s dream of free and open information. John Perry Barlow, cofounder of the EFF (Electronic Frontier Foundation), wrote in the organizations manifesto, titled Crime and Puzzlement, about his rst interactions with two members of the New York hacking collective Masters of Deception. These two hackers, Phiber Optik and Acid Phreak, in an effort to demonstrate their online skills, threatened Barlow in one of their rst encounters in a most unusual way: Optik had hacked the core of TRW, an institution which has made my business (and yours) their business, extracting from it an abbreviated (and incorrect) version of my personal nancial life. With this came the implication that he and Acid could and would revise it to my disadvantage if I didnt back off.41 What is unusual about this threat is the manner in which it employs the vision of the 1960s hacker with a completely inverted effect. The threat is the removal of secrecy a true freedom of information. It is important to note that TRWs report was not something that Barlow had ever consented to, nor was it something that he had any control over. In making it free, accessible, and open, the hackers posed the greatest threat the ability to change the unchangeable, to access the secret, and to, in the process, disrupt a signicant portion of ones life. If nothing else, the importance of the secrecy of information is documented (not coincidentally) by the hacker in the most dramatic fashion. Indeed, downloading TRW reports is a common trick that hackers will employ to startle, scare, and even intimidate media personalities, interviewers, and, in some cases, judges and lawyers. What Barlow identies, with comic overtones, illustrates precisely what the implications of this reversal are. To a middle-class American, Barlow writes, ones credit rating has become nearly identical to his freedom.42 That is, freedom relies on secrecy. The culture of information that the 1960s hacker feared has come to pass. In a kind of
34 / Hacking Culture
Orwellian doublespeak, secrecy has become freedom, and the need for security (through implicit distrust of others) has become trust. Old-school hackers, such Clifford Stoll, a Berkeley astronomer and system administrator, put forth the thesis that computer networks are and should be built on trust, a principle that seems in line with the 1960s hacker ethic. When confronted with a hacker who explained that he had hacked into Stolls system to show that your security isnt very good, the latter replied, But I dont want to secure my computer. I trust other astronomers.43 However, hackers of the 1990s argue that it is precisely this sort of argument that illustrates the hypocrisy of the 1960s hackers, many of whom have become rich in the computer revolution precisely by betraying the principles of openness, access, and freedom that they argued for as their ethic. The most interesting example is, perhaps, one of the most illustrative as well. As Steve Mizrach argues, [Steven] Levy rants about those greatest hackers who founded Apple Computer and launched the PC revolution those same ex-phreaks, Jobs and Wozniak, who actually allowed their company to patent their system hardware and software!44 To this day, Apple has been extremely successful in keeping both its hardware and software proprietary. In essence, todays hackers argue, with a great deal of justication, that the hackers of the 1960s have become their own worst nightmare, the keepers of the secrets, those who block access to information and technology, all in the name of corporate self-interest. The new-school hacker, then, seems little more than the logical carryover from the earlier generation, a generation that spoke (and continues to speak) with such earnest commitment to the goodold days that they are unable to see how their own ethic implicates them in precisely that which they so fervently disavow. The connection, which the 1960s hackers are so loathe to make, is, in many ways, undeniable: Indeed, the 90s hackers pay a lot of homage to the rst generation. They have borrowed much of their jargon and certainly many of their ideas. Their modus operandi, the PC, would not be available to them were it not for the way the 1960s hackers challenged the IBM/corporate computer model and made personal computing a reality. In that sense, todays hackers are the children of the 1960s hackers, and that connection is not lost on the younger
Hacking Culture /
35
generation. In fact, todays hackers have inherited not only the tools from the older generation but much of their culture as well: [T]heir style, their use of handles, their love for late-night junk food, are all testaments to the durability and transmission of 1960s hacker culture.45 They have also inherited, for the most part, their ethic. That ethic has been transformed, undoubtedly, but so have the conditions under which that ethic operates. These conditions are, in many ways, the progeny of the 1960s as well. Exploring, which seemed so harmless to the 1960s hacker, was only harmless because the culture of secrecy had not fully taken hold. As Barlow describes his in-person meeting with Phiber Optik, he encountered an intelligent, civilized, and surprisingly principled kid of 18 who sounded, and continues to sound, as though theres little harm in him to man or data. His cracking impulses seemed purely exploratory, and Ive begun to wonder if we wouldnt regard spelunkers as desperate criminals if AT&T owned all the caves.46 This was the same hacker who had just days before threatened Barlow with a revision of his TRW credit report that threatened to destroy him nancially. How are we to explain this seemingly split personality? There are several reasons the current hacker comes across so brazenly, not the least of which is the proliferation of media in which hackers have begun to appear. While the 1960s hacker was conned to talking, predominantly, to other hackers, todays hacker is online in a world where there are few aspects of daily life that are not controlled or regulated by computers. Where computers were a novelty in the 1960s, today they are a desktop necessity. As computers entered the popular imagination, the hacker came along and was transformed with them. A primary difference between the hackers of the 1960s and those of today rests with the fact that the latter are, for want of a better term, media ready. For example, CuD (Computer Underground Digest), an online publication that tracks news of the underground, published an essay in response to a Fox News story on the Hollywood Hacker that eventually led to his arrest and prosecution. Although the essay does take up questions of the specics of how computer raids are conducted, how warrants are obtained, and so on, the rst two issues of concern, listed in the section Why Should
36 / Hacking Culture
the CU Care? are as follows: 1. The role of the media in inaming public conceptions of hacking seems, in this case, to exceed even the cynical view of sensationalistic vested interest. Of equal concern is the hacker hyperbole that accompanied the Fox news report. 2. A second issue of relevance for the CU is the denition of hacker. What is at stake for the computer underground is the very control of the term hacker and what constitutes hacking.47 To say that there is an awareness among hackers of how they are portrayed in the media would be a drastic understatement. Speaking of Phiber Optik and Acid Phreak, Barlow describes the phenomenon: They looked about as dangerous as ducks. But, as Harpers and the rest of the media have discovered to their delight, the boys had developed distinctly showier personae for their rambles through the howling wilderness of Cyberspace. These personae are not merely inventions of the media, but are formed in a kind of cooperative venture between the media and the hackers themselves. Glittering with spikes of binary chrome, Barlow writes, they strode past the klieg lights and into the digital distance. There they would be outlaws. It was only a matter of time before they started to believe themselves as bad as they sounded. And no time at all before everyone else did.48 Books, articles, newspaper reports, lms, and TV documentaries have tracked, with varying degrees of accuracy, the exploits of some of todays more high-prole hackers. One hacker, Kevin Mitnick, who has led authorities on several nationwide manhunts as a result of his hacking exploits, has been the subject of three books that detail his crimes and exploits. Others, such as Robert Morris, Phiber Optik, Kevin Poulsen, the members of the Legion of Doom, and the Masters of Deception have all been featured in books that range from the journalistic to high drama. These new hackers have captured the spotlight in a way that the hackers of the 1960s never did. Old hackers captured attention in complete anonymity, for example, by sneaking into the Rose Bowl prior to the game and substituting the cards held by fans during the game so that they read Cal Tech rather than Washington (as they were supposed to). It made no difference to the hackers that Cal Tech wasnt even playing that weekend.49 In contrast, in 1988, when AT&T suffered a major failure in long-distance telephone ser-
Hacking Culture /
37
vice that was found to be the result of a software glitch, reports immediately circulated that the interruption of service was the result of a hacker in the New York area who had broken into AT&Ts computer system as a protest against the arrest of Robert Morris.50 The media, as well as the public, have learned to expect the worst from hackers, and as a result, hackers usually offer that image in return, even if their own exploits are no more than harmless pranks or explorations grounded in curiosity. If hacking is about imagination, then the reasons hackers hack are probably as numerous as the hackers themselves, and the means by which they accomplish their tasks range from the highest end of the technological spectrum to the lowest. But if we are to understand what hacking is and who hackers are, we need to separate out the people from the machines. To divorce hacking from its technical aspects, however, is not to divorce it from technology altogether. Hacking is about technology; arguably it is about nothing but technology. Hackers and hacking constitute a culture in which the main concern is technology itself and societys relationship to the concept of technology. Accordingly, I adopt the term culture of technology as a way to understand the cultural implications of technology from the hackers point of view as well as from a broader cultural standpoint. Hackers themselves rarely, if ever, talk about the tools they use. Indeed, their activity demonstrates that computer tools are above all mere vehicles for activity. In many cases, todays hackers utilize common UNIX servers as their goals, targets, and mechanisms for hacking that is, they utilize other peoples resources as a means to accomplish their goals. Even the most high-powered PC is little more than a dumb terminal that allows the hacker to connect with a more powerful corporate or university machine, an act that can be accomplished just as effectively with a fteen-year-old PC or VT100 terminal as it can with the fastest, highest-end multimedia machines on the market today. Hacking is not, and has never been, about machines, tools, programs, or computers, although all of those things may appear as tools of the trade. Hacking is about culture in two senses. First, there is a set of codes, norms, values, and attitudes that constitute
38 / Hacking Culture
a culture in which hackers feel at home, and, second, the target of hackers activity is not machines, people, or resources but the relationships among those things. In short, hacking culture is, literally, about hacking culture. As culture has become dependent on certain types of technology (computers and information-management technology, particularly), information has become increasingly commodied. And commodication, as was the case with the rst personal computer, is the rst step in the revaluing of information in terms of secrecy. As Paul Virilio maintains, along with commodication comes a new way of valuing information in the maelstrom of information in which everything changes, is exchanged, opens up, collapses, fades away, gets buried, gets resurrected, ourishes, and nally evaporates in the course of a day, duration no longer serves as an adequate means of valuation. Instead, he argues, speed guarantees the secret and thus the value of all information. Accordingly, American, and perhaps all of Western, cultures relationship to information has been undergoing radical change, moving from a culture that values duration to one that values secrecy. That transformation also marked the moment of emergence of the hacker, a moment Virilio situates as a data coup detat that originated with the rst military decoders to become operational during the Second World War. It was those machines, the ancestors of our computers and software systems, that produced the merging of information and data processing with the secret of speed.51 And, indeed, Virilio is right in the sense that World War II produced the rst machines that were capable of what we currently think of as cryptography and that were, perhaps, the beginning of the union of information and speed to produce secrecy. The employment of machines that were, in essence, rudimentary computers made complex coding and decoding efcient. This allowed for the production of codes that were much more complex and, therefore, much more difcult to break. As speed and information merge, secrecy becomes an increasingly important component of the culture in which we live. But such secrecy is precisely what hacker culture abhors. Secrecy is not limited to encryption schemes but begins, as Virilio points out, with the process of commodication. In 1975, when hobbyists were busily programming the Altair, coding was done on
Hacking Culture /
39
paper tape and had to t in 4K of memory. As noted earlier, one of the rst successes was Altair BASIC, a programming language written by two college students, Paul Allen and Bill Gates, that would allow others to develop software for the Altair. The difference between Allen and Gatess Altair BASIC and just about every other program written for the Altair was that Allen and Gates sold their program, rather than giving it away. This difference was enormous, since for computer hobbyists, the question was never one of prot, but one of access. Dan Sokol, the person who had obtained and copied the original version of Allen and Gatess BASIC, distributed the program at the next meeting of the Homebrew Computer Club and charged what in hacker terms was the proper price for software: nothing. The only stipulation was that if you took a tape, you should make copies and come to the next meeting with two tapes. And give them away.52 In no time, everyone had a copy of Allen and Gatess program. Bill Gates responded by sending an Open Letter to Hobbyists, which was published both in the Altair users newsletter and in the Homebrew Computer Club newsletter. As a majority of hobbyists must be aware, most of you steal your software, Gates wrote, accusing hobbyists of being thieves. What hobbyist, Gates continued, can put 3 man-years into programming, nding all the bugs, documenting his product and distributing for free?53 In essence, Allen and Gates treated the BASIC interpreter as a secret that could be purchased. Most other hackers didnt see it that way. And for them, ownership was precisely what was at stake. To violate the principle that computer programs belonged to everybody undercut every tradition of programming.54 For the rst generation of hackers, programming meant passing your work on for others to rewrite, rethink, debug and, generally, improve on. Secrecy and ownership, even at the level of commodication, made that impossible. This sense of secrecy that developed along with the evolution of the PC changed the climate in which hackers operated. Part of the transformation from duration to speed is also a distancing of information. As information is made secret, language adapts, and, increasingly, language reects the need for secrecy. Accordingly, as
40 / Hacking Culture
the technology of language accommodates the possibility of secrecy, it too grows more distant. The result is not simply a feeling of being misunderstood or of alienation. Rather, this distance produces a more radical sense of being out of sync with the world, insofar as while one may speak or be able to speak the language of the world, it is not your rst language; it is not your home language. In a culture of technology, the technology of language and the language of technology itself become more distant. But, for hackers, a subculture has emerged where the language of technology has taken over, where the language of technology is not distant but immediate. It is in this space that the hacker feels at home. For example, Warren Schwader, after spending over eight hundred hours working on a program, felt that he was inside the computer. . . . His native tongue was no longer English, but the hexadecimal hieroglyphics of LDX #$0, LDA STRING,X JSR $FDF0, BYT $0, BNE LOOP.55 Hacker culture emphasizes the degree to which technology denes culture. For hackers, the process of hacking exposes the manner and way in which culture relies on technology and the ways in which technology is constitutive of culture itself. In this sense, technology is the hackers home culture, and, as a result, the hacker is at home speaking the language of technology. While the hacker may feel at home in the language of technology, the evolution of secrecy has nonetheless distanced the technology of language. It is in this sense that hackers, even in a culture in which they feel at home, take hacking culture, which is to say the culture of secrecy, as their goal. Secrecy, in any form, is profoundly alienating. In fact, one of the basic conditions of secrecy is that one can never feel at home in relation to the secret. In order to remain a secret, information must be distanced through the technology of language, which can range from silence to commodication to patents and copyright to encryption. As information becomes more secretive, language itself become more inaccessible. Even the use of something as basic as an acronym illustrates the manner in which language can be made distant. In a visit to the doctors ofce, the transformation from central nervous system to CNS not only marks a change in the language that doctors and nurses use but serves to distance patients from the discourse about their own
Hacking Culture /
41
bodies. Companies, organizations, industry, and professions all develop coded languages that produce a sense of home for those who understand them and a sense of alienation or difference for those who do not. For the hacker, the question is broader in scope. In contemporary culture, technology is colonizing language so rapidly that it is becoming the lingua franca for society. The hacker takes culture as his or her object, revealing how language operates as a technology and what the implications and effects are of the incorporation of secrecy into the relationship between language and technology. Technology is the genesis of secrecy, so it is not surprising to nd that the technology of language is already prepared to deal with hackers assault on the emergence and growth of secrecy in relation to the discourse surrounding computers and computer networks. Perhaps the most crucial metaphor is that of the host and its relation to a sense of home. The dynamics of this construction renders the relationship between hackers and the broader social culture transparent and gives us a trope upon which we can start to play out the meaning of hacking culture. The notion of the host implies the existence of a guest, a stranger who is met with either a sense of hospitality or a sense of hostility. Accordingly, the host must determine the threat of the other if he or she comes as a guest, the other is met with hospitality; if she or he comes as an enemy, the other is met with hostility.56 How one determines how the other is met is often a proprietary piece of information a letter of introduction, a secret handshake, or a password. The metaphor of the host can also imply a discourse of infection within the language of computer networks themselves. The host serves as the basis for infection and gives rise to the notion of computer viruses: The word virus, one computer security book explains, is a biological term pertaining to infections submicroscopic nucleo-proteins known mostly for their ability to invade a host cell, alter its DNA to produce more of its own nucleo-proteins, and nally, release these new versions of itself to invade surrounding cells. If you are to make an analogy of a computer virus to that of one in the world of biology, most of the properties of the stages or phases of a biological virus are identical to those of a computer system.57 Although discussions of viruses
42 / Hacking Culture
are a fairly recent phenomenon, it seems the discourse of computer networks was already prepared for them. The language of computer systems has always relied on the tropes of hosts and guests, of users, of visitors and invaders. (For example, a host is any network computer that is able to receive and transmit network messages, and guest accounts are given to users whose identities are unknown or unconrmed, that is, to strangers.)58 The difference between the guest and the enemy is established by the knowledge of a secret, usually in the form of a password. These discourses suggest that even the language where hackers might feel most at home, the language of computers, computing, and networks, was already set up to presume them as outsiders. The language where they should be most at home had already dened them as strangers, as outsiders, as invaders they were, by denition, those who did not possess the secret.
The Ubiquity of the PC; or, Who Do You Want to Hack Today?
The strangeness that computer hackers feel is somewhat tempered today by the boom of the World Wide Web and the ubiquity of the PC. As technological savvy began to be associated with wealth in the wake of the Silicon Valley gold rush of the 1990s, representations of hackers became further bifurcated, and the essential curiosity and ethos of hacker culture were overwhelmed by the commercialization of hacking and hacker culture (the spirit of using technology to outsmart the system). This was brought about, on the one hand, by heightened images of criminality and, on the other hand, by several high-prole hacks and news stories that pushed hacking to the front pages of newspapers across the country. The fact of the matter is that as PC culture has become increasingly widespread, hacker culture has itself become increasingly divided. One set of divisions is between those who call themselves white-hat hackers, hackers dedicated to improving system security by seeking out aws and nding ways to repair them, and black-hat hackers, who seek out aws in order to exploit them. As hackers have grown up, left high school or college, and had to face things like mortgages, families, and
Hacking Culture /
43
jobs, many of them have turned to work as security professionals or as system administrators with responsibilities that include keeping hackers out of their own systems. A second division, however, has become equally important within the community, the split between hackers and what have become known as script kiddies. A script kiddie is someone who hacks, usually using someone elses prewritten hacking script or program, without really understanding what he or she is doing. As a result, one can think of at least two distinct levels at which hacking occurs. For example, on February 25, 1998, the Pentagon announced that it had been hacked (an admission that sparked speculation that the announcement was politically motivated, speculation that was conrmed when Janet Reno announced plans for a $64 million center to help secure the nations government and military networks against cyberterrorism and online attacks two days later). The incident allowed hackers to clarify among themselves and in the media the difference between true hacks and derivative hacks. A true hack, the most sophisticated form of hacking, means nding and exploiting a security hole that was previously unknown. It is, for hackers, a discovery of the rst order. True hacks are the result of understanding how things work (or, oftentimes, dont work) and taking advantage of those aws, oversights, or errors in an original way. This level of hacking requires intimate knowledge of computers, programs, and computer languages. These hacks are often discovered, reported, and patched by hackers themselves without ever using them to compromise some one elses computer or security. The achievement is in the process of discovery, exploration, and knowledge. Hackers who make, and are capable of making, such discoveries represent a very small percentage of the culture. This segment of the community came of age in the late 1990s, nding it much easier to make their reputations by publicly documenting security holes than by exploiting them. At the lowest level of sophistication is the derivative hack, which is simply the codied form of a true hack. Once a security hole is discovered, hackers write programs or scripts that allow the hack to be automated and run by just about anyone. No specialized programming knowledge is needed, and often the program will
44 / Hacking Culture
come with instructions for use. These programs are widely available on the Net and can be downloaded and used by anyone with the inclination and even a basic understanding of how computer operating systems, such as UNIX, work. These hacks require the hacker to be able to match his or her tools to the job knowing which machines have what bugs or holes and exploiting them. A smart kid with a rudimentary knowledge of computers can create a formidable arsenal in a matter of weeks using these programs and scripts. While these programs can be used to learn about systems and discover how things work, more often they are utilized by people who dont take the time to learn what they do. Hackers who spend the time exploring and learning about systems generally nd these kinds of hacks unimpressive. One hacker, Oxblood Rufn of the cDc, described them as applications hackers who do nothing more than download cracking and hacking utilities and start running them on their machines and all of a sudden they nd out that they can break into systems. These hackers often run programs with little or no idea of how the programs work or what their effects will be. As Oxblood Rufn explains it, the problem really is that they dont understand what they are doing. As a result, these programs are occasionally run with unintended consequences and cause accidental damage to systems, giving hackers a bad name. From a hackers point of view the attack on the Pentagon falls squarely in the second camp, a derivative or applications hack. At least one of the bugs used to attack government computers had been available since November 1997 and was available on the Net. The question from a hackers point of view becomes, Why didnt the government bother to patch these widely known security holes in its systems? Hackers believe that your security should be comparable to the value of the information you want to protect, and leaving gaping security holes is tantamount to an invitation to enter the system. What is rarely discussed is that true hacks, which do present a very real security threat, are almost always discovered for the purpose of increasing security. Hackers make their reputations by releasing these bugs and holes in basic security advisories, by publishing them in hacker journals, by posting them online at places like The L0pht (a Boston hacker collective), or by publishing them on mailing
Hacking Culture /
45
lists such as Bugtraq or RISKS Digest (the two most widely read security e-mail discussion groups). Derivative hacks, on the other hand, are seen as nothing more than joyriding. In most cases, hackers see nothing inventive or particularly clever about breaking into a system using tools that someone else created. It is a bit like stealing an unlocked car with the keys in the ignition. Even though the hackers who hacked the Pentagons computer (which turned out to hold nonsensitive accounting records) presented no risk to national security, the story was reported and sensationalized in most of the mainstream media. Even online media were not immune (though some, such as Wired News, did a much better job of clarifying and reporting the issue). For example, CNN.com didnt bother to verify the attacks or assess them in an independent way. Instead, they were reported as characterized by Pentagon ofcials, who admitted to knowing very little about computers themselves and who described the attacks as an orchestrated penetration and as the most organized and systematic attack the Pentagon has seen to date. The report was certainly sensational, but hardly accurate. In assessing the risk that such an attack posed, CNN.com reported Israeli prime minister Benjamin Netanyahus description of the young Israeli teen accused of the attacks. When asked, Netanyahu called Analyzer damn good . . . and very dangerous. In many ways Netanyahus response was predictable and politically expedient, but it begs the question as to whether or not the prime minister of Israel is qualied to assess the quality of Analyzers hacking abilities. The gure of the hacker, at least since the movie WarGames, has been the source of a great deal of anxiety in contemporary culture. The hacker is the personication of technology, representing mystery and danger. The hacker is mysterious because he or she appears to work magic with computers, phone lines, modems, and codes, and she or he is dangerous for precisely the same reasons. The hacker is the gure upon which we can heap all of our anxiety about technology, and when the news media report a break-in at the Pentagon, all of our worst fears appear to be realized. By treating such events as
46 / Hacking Culture
sensational, the media answer the question, How did an eighteenyear-old kid break into the Pentagon? by preserving the illusions of fantasy and science ction and by playing on misperceptions and basic fear of the unknown: he did it by magic. As a result, breaking into computers and the threat that hacked Web pages create to corporate images have come to symbolize the new age of hacking, though these feats are easily achievable by anyone who has a weekend to spare and the right Web page addresses to nd the scripts they need to exploit security aws. As Ira Winkler (a former NSA consultant and security expert) is fond of saying, I could teach a monkey how to break into a computer. Hackers, however, are much more interested in nding security aws and understanding how they threaten network and computer security. They are busy trying to understand how the system works, whether that be as a means to exploit it or to better understand it. Even as the phenomenon of hacking becomes more widespread, the core of the culture remains true to a basic set of beliefs.
Chapter 2
Pranks, such as the one described above, illustrate the fact that, for hackers, technology is a playground. It is a space for sophomoric, outrageous, and shocking behavior. A generation earlier, such pranks would have involved phone calls asking, Is your refrigerator running? or Do you have Prince Albert in a can? with the requisite punch line that would follow. As an integral part of boy culture, pranks, Anthony Rotundo argues, are more than just acts of vengeance. Instead, they function as skirmishes in a kind of guerrilla warfare that boys wage against the adult world.1 Like earlier pranks, such as petty theft, trespassing, and vandalism, hackers pranks are exercises in control. For hackers, however, they are also exercises in technological domination. Like other juvenile phone pranks, hackers play with technology (for example, 411 and the phone system), but what separates hackers pranks from other acts of youthful mayhem is that hackers play with the human relationships that are mediated, specically, by technology. The point of the prankish behavior is to assert two things:
47
49
Peoples relationship with technology is predicated on two assumptions: that technology is essentially hostile and that management of technology is a matter of expertise, control, and knowledge. In the rst case, the discourse of computers being user-friendly illustrates a basic assumption. User-friendly machines are, rst and foremost, exceptions the fact that they are user-friendly is the result of some sort of modication that appears to alter their essential nature. Whether it be a layer of software that shields the user from the complexities underneath or a series of wizard programs that automate complex tasks, the concept remains the same. The machine, assumed to be hostile, is transformed into something manageable, controllable, and benign. The modications that create a user-friendly environment, however, are usually nothing more than layers which serve to distance the user from the actual operation of the machine. Generally, those layers are simply programs that call other programs and tell them what to do. The user is shielded from lower-level programs that are actually doing the work.2 In recent years, there has been a shift in the metaphors that describe the users interface. Initially, especially with DOS machines, the user interface was a prompt, a symbol indicating that the computer was prompting the user for input. The metaphor that has replaced the prompt (which requires an interaction with the computer) is the desktop, which is based on spatial metaphors or arrangement, an interface where things are dragged and dropped rather than input directly into the computer. Dragging and dropping a le from one folder to another still executes a copy command, but the user never sees that part of the process. The degree to which machines are user-friendly, then, corresponds directly with the degree to which the user is ignorant of the computers actual operations. The second assumption, that the management of technology is a matter of expertise and mastery, presupposes certain things as well. Technology is represented as something essentially alien, something that must rst be understood and then, later, controlled. Books that purport to teach users how to use technology routinely utilize the language of control (for example, Mastering Word Perfect 7.0, Unleashing HTML) or the language of secrecy (for example, Secrets
51
a result of fear of the human, also awakens a concomitant fear of the technological. What appears to be the resolution of a particular human anxiety (for example, trusting decisions about nuclear war to a computer) returns as a form of technological domination, loss of control, or annihilation of the human. The fear is not new. The computer is merely the latest incarnation of the Frankenstein myth, where human technological invention outstrips our ability to control it. We create a monster, and that monster ends up threatening to overtake its creators. One of the most recent manifestations of such fear is the Terminator lms, where machines of the future threaten to make humans extinct. The machines become conscious and begin to perceive their human creators as a threat. SkyNet, the machine built by Cyberdyne Technologies, declares war on the human race and due to its efciency, lack of human emotions, and titanium-armored endoskeleton nearly extinguishes the human race. This, we are taught, is the future of technology. Between the narratives of ceding authority to machines and those of technological domination stands the gure of the hacker. In most cases, the identity of the hacker, as a gure both with and without authority, needs to be mediated in relation to a larger narrative. In lms where hackers have played central roles (WarGames, Sneakers, Hackers, The Net), hackers are, in almost every case, portrayed as outlaws or criminals. That sense of criminality, however, is negotiated through the narratives themselves. Hackers are positioned as minor criminals in relation to a greater sense of criminality of injustice that is being perpetuated either by government, the military, or corporate interests. In particular, the hackers criminality is never marked by intention. In no case does the hacker perceive him or herself that way, and in no case do we, as an audience, identify any criminal intention. At worst, hackers are seen as harmless pranksters breaking into corporations to play games (as in WarGames) or secretly transferring funds from malicious government interests to worthwhile charities (as in Sneakers). In lms where hackers serve as central protagonists, much like the real-life ethic of hackers, they never work for large-scale personal nancial gain, instead preferring to gain satisfaction from exploration, pranks, personal amusement, or designing ways to better their local conditions.
53
world the boundaries between the technological and the corporeal are completely erased. Like John Brunners Shockwave Rider before it, Gibsons work envisions a dystopia where access to technology is the primary motive for the hacker and the primary fear for the public. The technological dystopia that is envisioned around the notions of hacking has some of its origins in the mass-mediated technophobia of the 1960s. Gareth Branwyn cites the opening to the 1960s show The Prisoner as the classic example: Where am I? In the Village. What do you want? Information. Whose side are you on? That would be telling. We want . . . information . . . information . . . information. Well you wont get it. By hook or by crook, we will.5 As Branwyn argues, the connections between such cautionary tales of the 1960s and contemporary thinking about hacking are not difcult to make. The difference hinges on a single aspect, not information, as one might suspect, but on technology itself. One doesnt have to stretch too far to see the connection between The Prisoner and the subject at hand: hacking. With all the social engineering, spy skills, and street tech knowledge that #6 possessed, he lacked one important thing: access to the higher tech that enslaved him and the other hapless village residents. Todays techno-warriors are much better equipped to hack the powers that be for whatever personal, social or political gains.6 Or so the story goes.
55
types and, most clearly, hides any notion of interaction between the hacker and the typical user. Data input by the typical user, which then becomes unrecognizable to that person, is read and decoded by the hacker. Data is the buffer between these two worlds, and knowledge and mastery are what make that information inaccessible, on the one hand, and vulnerable, on the other. Such descriptions point out both what goes unsaid and, perhaps more important, what goes unchallenged in the discourse surrounding hacking. The positioning of hacking and hackers in relationship to the technological completely erases any analysis of societys relationship to them as well as any sense of interaction between hackers and computer users. Hackers themselves, not unlike Gibsons antiheroes, become instruments within the broader discourse of the technological.9 What such discourse of and around hacking reveals is our relationship (often characterized as technophobia) to technology as well as the desire to distance ourselves from any understanding of it. The notion of relationships, however, is presumed in and transformed by any notion of technology itself. Put simply, our relationship to technology can never be revealed in the discourse of and about hackers and hacking because a technical discourse, such as the one from Macleans, erases the very possibility of asking relational questions. The purpose of that discourse is to divorce hackers from any social space, relegating them to the world of data, 1s and 0s, and the arcane language of computers. What is erased is the relational question, the understanding of how hackers relate to the world and the people around them and how those relationships are central to understanding what hacking is and how hacking functions within a broader cultural context. Without a broader, cultural understanding, the only questions that we can ask about hackers and hacking within the framework of the technological are, What are they doing? and How can we stop them? In keeping with this thesis, what is needed is a reformulation of the question, a rethinking of hacking as a cultural and relational question. In so doing, we do not leave behind technology. Quite the opposite, by framing hacking as a cultural question, we begin to ask, as Heidegger might have it, the question concerning technology. It is only through such a reframing of the question that we can start
57
hackers, written as hAck3Rz, or some combination or permutation of letters, numbers, and capitalization. If Heidegger is right in his assessment that all ways of thinking, more or less perceptibly, lead through language in a way which is extraordinary,16 it seems that we might begin our questioning of technology at the level of language. What one nds in these substitutions are never merely substitutions, but rather translations. In choosing this word, which I do advisedly, I want to follow Walter Benjamin in his assessment of translation as a mode. While the questions that Benjamin works out differ signicantly from our own, he provides an important starting point. To comprehend [translation] as a mode, Benjamin writes, one must go back to the original, for that contains the law governing the translation: its translatability.17 The process of hacker translation does return to the law governing the translation, but it does so in a manner that is concerned neither with delity nor license but with questioning languages relationship to technology itself. Hacker language games are, for the most part, translations of language into technology, translations that are the direct heritage of the keyboard. On typewriters, for example, the letter l has traditionally been made to stand in for the number 1, and the very proximity of the letters o and e to the numbers 0 and 3, positioned directly below each other, respectively, almost suggests the substitutions themselves. These substitutions, though, constitute themselves as more than just substitutions. They are acts of translation in which, as in all acts of translation, something is lost. As Benjamin describes it, the transfer can never be total. There always remains the element that does not lend itself to translation,18 and that element presents a problem if one seeks to render the original faithfully. But what if that remainder is precisely what one seeks to render visible in the text? Such an act of translation, which is conscious of its own indelity, begins to reveal the manner in which hackers play upon the relationship of writing to technology. By rendering the remainder visible, one is reminded, rst and foremost, that writing itself is a kind of technology. As Plato argued (and illustrated) in Phaedrus, writing is a technology that is unable to defend itself once words are placed on the page, they are unable to speak, clarify, or respond
59
authors who are not merely the authors of their own works but who produce the possibilities and the rules for the formation of other texts. . . . [T]hey have created a possibility for something other than their discourse, yet something belonging to what they founded. The second point is linked to the juridical and institutional system that encompasses, determines, and articulates the universe of discourses to which a discourse belongs.20 In short, there are both historical and institutional articulations that necessarily remain embedded in the function of authorship. It is precisely those articulations that manifest themselves in the creation of the hackers proper name. For hackers, the proper name is recognized as the establishment of authorship, but it also serves as a means to comment on the very institutions that legitimize those notions of authorship. As such, it carries a kind of ideological baggage the author is the means by which in our culture, one limits, excludes, and chooses; in short, by which one impedes the free circulation, the free manipulation, the free composition, decomposition, and recomposition of ction.21 It is by troping on precisely this ideological sense of the author function that hackers both recognize and problematize the historical and institutional references that dene them. In this sense, the history and origins of computer hacking are embedded in the language of the hacker. As a point of historical reference, rarely does the letter F appear in hacker discourse. Instead, it is almost always replaced with the consonants ph. Such substitutions trope on the originary technology of hacking, telephony. Most accounts place the origins of hacking with TAP (Technological Assistance Program), a newsletter originating out of YIPL (Youth International Party Line), an earlier newsletter that provided information about hacking telephone networks. TAP, unlike most YIPL information, was strictly technical in nature and increasingly became divorced from the Yippie political agenda: TAP articles, once highly politicized, became pitilessly jargonized and technical, in homage or parody to the Bell systems own technical documents, which TAP studied closely, gutted, and reproduced without permission. The TAP elite reveled in gloating possession of the specialized knowledge necessary to beat the system.22 The founders of TAP and those who followed in their wake
61
(the decomposition and recomposition of discourse) is its own kind of regulation, but one that is hyper-aware of its regulatory function and one that reveals precisely what so much modern technology conceals. As Chris Goggans comments, You look at magazines like 2600 and just because theyre black letters on a white page instead of white letters on a black screen, they get away with a lot of stuff.23 It is through this troping on the very authority of authorship that the hacker effects a return to the origin whereby the entire discourse of technology is continually reinvented This return [to the origin], which is part of the discursive eld itself, never stops modifying it. The return is not a historical supplement which would be added to the discursivity, or merely an ornament; on the contrary, it constitutes an effective and necessary task of transforming the discursive practice itself.24 It is in this process of discursive reformulation that we nd again the question concerning technology. While there is little or nothing specically technological about these institutions of authorship, it would be a mistake to conclude that they are not about technology. In particular, the proper name, as signature, remains inextricably tied to the institution and technology of writing.
While language games identify the hacker culturally, the single most important skill for the hacker to possess is called social engineering.26 It is a form of technology, but, perhaps, of all hacker skills, it is the least technological. Social engineering is nothing more than using social skills to get people to tell the hacker things about system security. It is part research, part conversation, and part hunting
63
password. The meaning of technology is found not in our usage of it but in our relationship to it, and it is precisely that relationship that allows social engineering to work. Put in the language of the hacker, The secretary, or any other underpaid, overworked, menial user of the system, is a very weak link in the chain of security. The secretary doesnt understand computers and doesnt want to. All the secretary knows is that somethings gone wrong and youre going to x it.30 This technique relies not only on the instrumental view of the technological (something is broken and needs to be xed) but also on the rst component, that one doesnt understand computers and doesnt want to. Hackers exploit and even reinforce the social, gendered conventions whereby people are positioned and ordered by their relationships to technology. The assumption that secretaries are meant to understand their social place as one without technological knowledge, for example, is seen as an opening in an organizations infrastructure, a weakness in the system to be exploited. The manner in which the users relationship to technology is exploited is based on a combination of the fundamental mistrust of technology and deference to authority. A script for a socialengineering hack, according to Fiery, might go like this: Lets say you want to break into the mayors ofce. You call up his secretary, and you say something like this: Hello, this is Jake McConnel from Computers. We were wondering, have you been having any problems with the computer system? Of course shes been having some sort of problem with it theres always some problem with computers! From that point on, it is simply a matter of exploiting the secretarys relationship to technology: The secretary answers: Why, yes! First this was happening, then blah, blah, blah . . . You say: Yes! Thats exactly it! That wasnt your fault theres something wrong with the computers, and were having trouble xing it. When you rst turn on the computer, what do you type in to get started?31 The hacker has identied him or herself, is offering to help, and, most important, is performing the voice of authority. The voice of authority is a particularly gendered, male voice (which also explains in part why most hackers are male). Technological knowledge is coded as a particular form of masculine and
65
ers and programmers must separate the process of production and programming from the idea of use. As a result, the end-user is positioned as a consumer of both the hardware (the machine itself) and the software (the programs written for the machine). Computer culture thus became divided into two classes: programmers/engineers and end-users. By denition, the programmers and engineers know how things work, and the end-user does not. This division was essential for making the PC a user-friendly product and is what allowed the PC to gain a foothold in the business world. The computer became a tool for the end-user, a black box that performed functions that would gradually grow in importance in the users workplace and everyday life word processing, spreadsheet calculations, database management, e-mail, and so on. The philosophy that gave birth to the concept of the end-user, however, dictates that the end-user should have no idea how these functions are operating that is someone elses job. When things go perfectly, the philosophy of the end-user works. However, when things work less than perfectly (that is, most of the time), the philosophy of the end-user positions that user as helpless. The operation of the computer at that point becomes a secret that necessitates ceding authority over ones machine and, most important, ones data to someone who knows those secrets. That authority is dened by the users degree of helplessness, which the philosophy of the end-user strives to promote. The possibility of social engineering, for the hacker, is predicated on this split between the helplessness of the end-user and the authority of those with knowledge. Hackers do not necessarily need to know what they are talking about; they only need to sound like they do. For example, hackers do not need to be computer-repair personnel; they only need to make the end-user believe that they are and only for long enough to get the information they are truly after. To that end, hackers can take what seem to be innocuous pieces of information and use them to great advantage. For example, a copy of the organizations hierarchy chart found in the garbage or a company telephone book can be extremely valuable sources of information, as can personal schedules for the day before. As computers become an increasingly ubiquitous part of life and the workplace, the demands for ease of use by consumers as well as
67
to the records stored in the le the hackers had lifted off the system. In short, the Netcom credit card le provided a nearly inexhaustible source of Internet accounts from which to hack. There were very few reports of any of the Netcom credit card numbers ever being used (leading to the mistaken belief that the le was not widely distributed). The les value (and threat) was not to e-commerce or for credit card fraud; rather, the threat came from the ability to exploit its value as information. As one hacker explained, thats why those credit card numbers were never used. They had much greater value for hacking Netcom.
69
monly chosen to reect the concept of secrecy, with some of the more common examples being secret, password, and sesame, or to reect a basic relationship to technology, such as system, computer, or account. Since many of the early systems were at universities, common passwords might also include words like academia, algebra, beethoven, beowulf, berkeley, and so on. Robert Morriss initial password list that was part of the Internet worm program contained 432 commonly used words and phrases that had an extremely high success rate for cracking passwords on invaded systems. Essentially, users tend to pick bad passwords. In 1994, Fiery reported that out of 3,289 passwords on one system, 15 were single ASCII character, 72 were two characters, 464 were three characters, 477 were four characters, 706 were ve letters, all of the same case, and 605 were six letters, all lower case.36 As a result, 2,339 out of the 3,289 (roughly 70 percent) were easily guessable or subject to a random brute force attack. The rst 1,700 or so would only take 11 million (rather than 700 quadrillion) guesses, a feat easily performed by even a modest PC. The complexity of the system that allows for user and system security is short-circuited by a very simple premise people express their relationship to both technology and to the world in their choices of passwords. Rather than trying to decrypt or decode passwords, hackers would take long word lists (such as dictionaries), code every word in them, and compare the coded version with the encrypted version. In essence, hackers would attempt to log on to an account with every word in the dictionary as a password. As computers became faster and algorithms improved, such hacking became increasingly simple. But security kept up as well, and soon system administrators were no longer allowing dictionary words as passwords. Before long, hackers were starting to make educated guesses about the kinds of words that computer users might use as passwords. First was the information in the GECOS eld, which might include information like ones name, address, department, telephone number, and so on. In cracking programs, these would be checked rst. A surprising number of users, when prohibited from using dictionary words, would choose even less secure passwords, such as their own last name, phone number, or ofce number. Following
71
ship to technology and in the ways in which they domesticate or personalize it. To the hacking purist, however, brute force attacks are not, in and of themselves, hacking. Indeed, brute force is looked down upon by elite hackers. As Fiery explains: The thing is, the whole business of hacking has to do with skill and knowledge. Brute forcing passwords requires little of either. But no ones going to look down on a hacker who does some educated brute force work, especially if that hacker has a good reason for doing so. But dont rely on the computers brawn to do your dirty work: Use the ingenious computing power of your brain.37 At base, the hacker gains his advantage from outsmarting the end-user, not from allowing the machine to do the work. Skill and knowledge are markers of pride and are what separate hackers from their victims.
73
the most basic level. The opening is a parody of the ways in which hackers are represented in the media. But what may escape us is the fact that it is an accurate portrayal of the representation of hackers in the popular imagination. It marks the fundamental split between the technological (the hacker) and the cultural representation of the hacker. The Mentors words have already told us more about the social and popular construction of hackers than they have about hackers themselves. The split becomes more apparent in what follows: But did you, in your three-piece psychology and 1950s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world. . . . Here, the intent of this initial analysis is revealed representations of hackers are generated from outmoded, corporate psychology and a retrograde relationship not to technology itself but to our relationship to technology. The split is subtle but important. The accusation takes a primarily relational form. It is not about being out-of-date in terms of the technology; it is not a matter of being behind instrumentally; rather, it is about being out-of-step psychologically. It is not ones technology that is in question but ones technobrain. It is, in essence, about how one thinks about technology, not about how one utilizes the technological. As a document of youth culture, the manifesto is unique in two respects. First, it is addressed: it offers an invitation to the reader who is presumed to be an outsider. Second, it is a discourse that speaks in two voices: the voice of adult and parental authority and the voice of the hacker responding to the mischaracterization of hacker culture. What The Mentor promises is something characteristic of hacker discourse not a high-tech, whirlwind tour of algorithms and daring hacker exploits, but an understanding of the hackers relationship to technology and to the world of adult authority with which hackers so often nd themselves in conict. That understanding is an exposure of societys relationship to technology, a relationship that is often concealed and, most important, revealed in its attitudes toward and representations of the hacker. In doing so, the manifesto
75
technology as the hacker sees it. It is also the moment at which the blurring of boundaries occurs. The second voice, the voice of authority, reveals itself as hypocritical, unable to realize the cultural, pedagogical, or social import of technology itself. While the hacker has discovered what is most human about technology, culture at large insists on creating an oppositional discourse, one that alienates technology from the realm of culture and, in doing so, enacts precisely what it claims to abhor. The two voices in opposition and reection reveal the relational aspect: the conict over the assertion of male identity, the testing of boundaries of parental and adult authority, and the contested struggle between cultural and technological meaning. Technology, for the hacker, is both the source of the misunderstanding between the two voices (presented as two different views of instrumentality) and the source of liberation and independence for the hacker with the discovery of the computer. The hackers intelligence and boredom are nothing more than an expression of this ambivalent relationship to technology, but that expression is systematically and institutionally ignored, transformed, and labeled as something undesirable. (Damn underachiever. Theyre all alike.) Equally important is the stake that the hacker has in asserting his mastery or control over technology. In each statement, the second voice, the voice of adult authority, echoes the rst. In doing so, it translates and transforms the hackers voice, revealing a different (and less sophisticated) relationship to technology. The voice of the hacker, which sets out to engage technology, becomes, in its parental echo, the voice of a society that sees technology through a purely institutional lens. Those echoes, which seek only to order and condense the world (and everything in it) into an outdated institutional matrix, demonstrate precisely why the hacker cannot be integrated into the social fabric. The conict is at the heart of youth, and more specically boy, culture. It is a conict over boundaries and authority, those things that the boy must resist and overcome to claim his independence. The threat, as The Mentor realizes, is in the adoption of a new tool the computer, which the adult world is unable to capitalize upon. The hacker is seen by the institutional voice of authority
77
strumental, task-oriented view, which takes the computer as a simple means to type more quickly or process data. Such a view of technology presents only the question of how to order information and how to do so most productively and effectively. The second, and perhaps most important, reading of this line is in how it reveals what social discourse about hackers conceals namely, that what The Mentor is talking about is societys own responsibility for the hacker. It does what I want it to. If it makes a mistake, its because I screwed it up. Not because it doesnt like me. The it of that sentence remains ambiguous. If the hacker remains a depersonalized damn kid and one follows the refrain Theyre all alike, the it may just as easily refer to the hacker as to the computer. Indeed, one might read The Hacker Manifesto as the suggestion that we treat hackers no better than we treat our computers, treating them as objects rather than as people. In each case, we tend to blame the it when the reality of the situation is that If it [this time referring to the hacker] makes a mistake, it is because I screwed it up. As such, this commentary becomes a performance of technology, a revealing of what is concealed in our contemporary relationship to technology. That relationship is further expounded as the manifesto continues. Here, though, the hacker nds a new world, one where revealing is the standard. The contrast between the world of the hacker and world of the other is now most starkly dened: And then it happened . . . a door opened to a world . . . rushing through the phone line like heroin through an addicts veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought . . . a board is found. This is it . . . this is where I belong. . . . I know everyone here . . . even if Ive never met them, never talked to them, may never hear from them again. . . . I know you all. . . . Damn kid. Tying up the phone line again. Theyre all alike. . . . You bet your ass were all alike. . . . Weve been spoon-fed baby food at school when we hungered for steak. . . . The bits of meat that you did let slip through were pre-chewed and tasteless. Weve been dominated by sadists, or ignored by the apathetic. The few that had something to teach
79
nals. We explore . . . and you call us criminals. We seek after knowledge . . . and you call us criminals. We exist without skin color, without nationality, without religious bias . . . and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe its for our own good, yet were the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you cant stop us all. . . . After all, were all alike. The reversals are not simple ones. They are as complex as the question of technology itself. If we read the manifestos claims in relation to the previous questions we have raised concerning technology, however, one linkage becomes clear. The performance of technology is constituted as an act of criminality. Such an assessment betrays a deeper understanding of technology than the mere instrumentality of the technological admits or allows. What is expressed is a fundamental relationship to technology and a fundamental understanding of technology as technology. In such an understanding, the world is remade not in the image of technology but as the revealing of the essential nature of technology; it is a world of the electron and the switch and the beauty of the baud. By the end of the manifesto, a number of important reversals have occurred. It is no longer possible to read technology and culture as distinct. In contrast, the hacker insists that technology is what makes possible the blurring of those boundaries, and any effort to keep them distinct results not only in the misunderstanding of technology but in the diminishing of the quality of the world. The failings of culture (the crimes described by the hacker sexism, racism, intolerance) are the result not of technology but of the failure to embrace technology as part and parcel of culture. The hackers crime is that of erasing the boundaries between technology and culture and, in doing so, creating a space where one can perform technology as a subject of culture, rather than as a subject alienated from culture.
Chapter 3
The stereotype of the hacker, either as 1950s or 1960s college hacker or as 1980s criminal whiz kid, has been problematized by the recent and rapid technological developments centering on the growth of the Internet, the availability of networking software that will run on personal computers, and the explosion of related technologies (such as cellular telephones) that make hacking more challenging or that pose a new set of interesting problems or sometimes both. As opposed to the 1980s, the widespread availability of hacking software, access to computers, and availability of potential targets in the 1990s has led to a new generation of hackers and hacking. Where it was once a challenge just to nd a system to hack, today the Internet provides millions of interconnections to explore. The result has been an explosion of hackers of every type, from teen and preteen kids to old-school hackers in their forties and fties. This explosion has been the source of a clear divide between those hackers who consider themselves a subcultural elite and those who want easy answers to sometimes difcult or dangerous questions. As a result, hacking, as a term, has been stretched in ways as boundless as the technology it addresses. The narratives of hacking that have been explored thus far began to merge in interesting ways throughout the 1990s, particularly around notions of the commodication of information, corporate secrecy, and criminality. Throughout the 1990s there was a remarkable increase in the public nature of hacking, as a result of two related phenomena. First, hackers found ways to hack that do not necessitate breaking the law (although they may still facilitate law-breaking). Second, hacking took on a more public character as hackers began to make their reputations by announcing high-prole hacks designed to em-
81
83
doned but has been transformed within the context of a new series of technoscapes. These technoscapes both necessitate and allow for a globalized hacker politics that was not previously possible.
85
Windows was its simplicity. Windows is easy to learn because its graphical interface is consistent from one application to the next. When youve learned to use one application, such as Write, youve learned the essentials for using any other application with Windows.7 With the emergence of Windows 95, the focus on simplicity became even more rened: With Windows 95, all the things you do now will be easier and faster, and what youve always wanted to do is now possible.8 The difference between Linux and Windows rests in the way in which they treat the end-user. For Linux, the user is an integral part of the operating system; in order to operate the machine, he or she must understand how the computer and software work. In contrast, Windows uses a graphical interface to hide the workings of the machine from the end-user and, as a result, virtually excludes the user from the operating system. While Linux renders the computer and its operating system transparent, Windows makes the computer and its operating system opaque.9 Immediately, hackers came to view these two operating systems differently. On the one hand, Linux, which allowed them to work with technology in a hands-on fashion, held great fascination. On the other hand, Windows, which reduced the computer to little more than a black box that ran applications, seemed to hackers to violate the very nature of the machine. For hackers the choice was simple: Why would anyone choose to run a graphical environment that limited what you could do over a full-featured UNIX clone that could run on your PC? The choice was a matter of expertise, and hackers, who had that expertise, started running Linux on their machines in droves. Another feature of Linux made it extremely attractive to hackers. Linux was designed to imitate the operating systems that ran the big networks, including the Internet. It was designed essentially to network computers. Until this point, a hacker who wanted to explore networks needed to obtain accounts on large UNIX systems and often did so by hacking into those systems themselves. Before the growth of Internet service providers, most Internet access was controlled through university computing services, which were often notoriously sloppy about system security. In order to access
87
With a certain set of operating systems (all UNIX-based), there is an understanding among hackers, security professionals, and the industry. Programs of such complexity will always contain bugs, and part of what hackers do by nding them is to improve the state of security on the Internet and on systems generally. While they may exploit those holes in the interim, there is at least a civil relationship, where the hackers recognize the need for improved security and the industry recognizes the need to respond quickly to security threats. Both sides acknowledge the inherent insecurity of networks, and each, in its own way, has a role in improving the general state of security on the Internet. It is an uneasy, even thorny, alliance, but one that functions symbiotically. As a result, most hackers have respect for the industry that provides the machines and software they spend their days and nights trying to break into. Most companies understand that the most innovative security testing of their software is going to come from the hacker underground. Some software companies even offer challenges to hackers, rewarding them for nding problems and offering them nancial incentives to report bugs and aws. While this symbiotic relationship works well with most of the major UNIX-based companies, a completely different relationship exists with Windows-based companies, especially Microsoft. In fact, the relationship between Microsoft and the hacker underground is one of extreme hostility. This hostility stems, in part, from Microsofts unwillingness to admit to the insecurity of its products. The result is an antagonism that drives hackers to uncover problems and Microsoft to deny them. Microsoft Windows was not initially intended to function as a network operating system, and, as a result, its network operation is something of an afterthought. Unlike operating systems that have networking as their primary function, and hence account for security, for Windows, security is not a primary factor. Even Windows 95, which has built-in networking software, views the convenience of le-sharing and printer-sharing as the main functions of networking (as opposed to linking computers). The growth of the Internet and of the ofce LAN (local area network) forced Microsoft to incorporate these features later. Even the most basic security features, such as
89
response, Microsoft would be absolutely correct in stating that winhack.c does not exploit any bugs or holes in the Windows operating system. It does, however, force one to reconsider the feature that allows anyone on the Internet access to your les and personal information. Such a program that exploits one of Microsofts features depends on a number of things in order to function. First and foremost, the feature has to be designed without regard to security. Rather than preventing users from doing something that puts their data at risk, the features tend to be set to lead users to leave themselves open to such risks by default. Second, users must have limited knowledge of how the computer works (le-sharing in this case), so that they dont know that they are putting their data at risk whenever they log on to the Internet. Finally, there has to be a sizable gap in expertise between those who exploit the feature and those who are exploited. These programs exploit very basic security aws that are easily preventable if certain features are turned off or passwords are protected. As a result, those exploited tend to be users with the least knowledge and the least facility to protect their data. While these basic exploits operate in the space between experts and end-users, there are two other programs that expose much greater problems with Microsofts approach to security and that demonstrate the antagonism between hackers and Microsoft. These are the Cult of the Dead Cows Back Orice and the L0phts program L0phtCrack. The 1990s were a time when hacking moved away from individual practice toward notions of group identity and political action. In the 1970s and 1980s, hackers had limited political agendas, and most of their actions were directed against one industry in particular, the phone company. More recently, in the wake of the AT&T break up, with the rise of the Internet, and with the increasing globalization of technology, hackers have begun to engage in more concerted political action, at both local and global levels. The results have manifested themselves in hacker groups engaging in political intervention, the formation of hacker collectives focused on enhancing hardware and software security, and the emergence of annual social events and hacker conventions.
91
such as Blottoland, LOD, FOD, and so on. Today there is Catch 22 and a new LOD BBS, supposedly being run by King Blotto. The current member list of the group is as follows: Legion Of Hackers Blue Archer Gary Seven Kerrang Khan Lex Luthor Master Of Impact Silver Spy (Sysop of Catch 22) The Marauder The Videosmith Legion Of Doom Phucked Agent 04 Compu-Phreak
LOD/H is known for being one of the oldest and most knowledgeable of all groups. In the past they have written many extensive g-philes about various topics.10 Such a description would give other hackers several crucial pieces of information. It provides a bit of history, indicating the origins of the group and the groups founder or founding members; it identies them with particular BBS systems or networks; and it provides a listing of current members, making it more difcult for hackers to pose as members of the group as a means to increase their credibility. Making it into such a listing gave hackers and hacker groups a kind of public certication and legitimacy and, because Phrack was being distributed nationwide, solidied hackers reputations on a national scale. Third, and nally, hackers can make a name for themselves (for good or ill) by getting busted. Nothing legitimates a hackers reputation more quickly than having law enforcement take an interest in her or his activities. Most commonly, hackers who are arrested face derision at the hands of their fellow hackers, for not being savvy enough, for being careless, or generally, for making stupid decisions that led to their apprehension. There is no doubt, however, that this is the primary means by which hackers gain public attention. It is also the basis for nearly every published, journalistic account of hackers and hacking. Hackers proled in books, articles,
93
1980s would range from a handful to a few dozen hackers, the conventions of the 1990s would become full-scale events. The most widely known and recognized hacker Con is held in Las Vegas over the summer. Organized by Jeff Moss (Dark Tangent), DefCon is a three-day meeting that brings together hackers, security experts, law enforcement, and industry specialists to hear lectures and engage in discussions about computer security. The attendees are predominantly males, teens to early twenties, who are recognized by their handles rather than their names. Part of what makes DefCon unique is that it openly invites industry and law enforcement to the gathering. There are even goodnatured games, such as Spot the Fed, where conference goers are invited to identify someone they think is a federal agent or law enforcement personnel and bring them up to the stage. The hacker states his reasons for thinking the person is the fed, and the audience votes. If a general consensus is reached (or the suspected individual confesses), the hacker receives an I spotted the Fed T-shirt, and the fed receives an I am the Fed T-shirt. The contest is held between each speaker, and there is generally no shortage of willing participants on either side. While speakers talk on issues ranging from how to hack the Las Vegas gaming industry to how to con your way into rst-class travel, there are a range of games, including a hacker scavenger hunt, electronic capture the ag, where hackers take over one anothers systems, and Hacker Jeopardy, hosted by InfoWar author Winn Schwartau. Conventions are seen increasingly as places to share knowledge, meet elite hackers, and buy the latest hacker T-shirts. But they are also serving the purpose of organizing hackers in a way that had previously been impossible. The days events and lectures are lled with messages about law, privacy, surveillance, and multinational corporations dominance. Hackers are growing to see themselves as politically motivated out of necessity. A signicant motivation has been the growth and dominance of Microsoft, a corporation that has been under the skin of hackers since Gatess initial confrontation with hackers over pirated software in the 1970s. In the 1990s, hackers began to respond not only by hacking Microsofts software
95
Well. . . . There are those that would say that the Cult of the Dead Cow is simply the modern incarnation of an ancient gnostic order that dates back to the cult of Hathor, the cow goddess, in ancient Egypt. Others may tell you that the Cult of the Dead Cow always has been, and always will be. A Universal Constant, if you will. Of course, all these people are wrong. In his book, 1984, George Orwell predicted a dystopia, peopled by soulless, spiritless, powerless drones, herded by a clique of absolute rulers, concerned only with maintaining their OWN POWER AT ALL COSTS. . . . 1984. . . . Ronald Reagan is President, it is a New Mourning in America. In Texas, the heartland of America, the bastion of Patriotism and Old Time Religion, a small cabal of malcontents meet in secret. They gather in a dark hovel, decorated with crude pornography, satanic iconography, heavy metal band posters and, most ominously, the skull of a DEAD COW. . . . As pirated copies of speedmetal and hardcore punk music play in the background, these malcontents speak of their disillusion with The American Way and their obsession with their new computers. As the music plays, they form an unholy alliance, dedicated to the overthrow of all that is Good and Decent in America. Realizing that a bunch of punk kids from Lubbock have as much chance of that as Madonna becoming Pope, they then decide to dedicate their lives to pissing off the establishment, becoming famous, and getting on TV. Thus was born the Cult of The Dead Cow, scourge of the Computer Underground, Bete Noir of high school computer teachers worldwide, The Pivot of Evil for all who seek to blame the messenger, as well as their message.13 What makes the cDcs statement distinct from most hacker commentary is that it is positioned in terms of politics (for example, Reagan and mourning in America), and it uses a merger of discontent and
97
in the Peoples Republic of China (PRC) who are utilizing hacking as a strategy for intervention. As Oxblood Rufn described them: The Hong Kong Blondes are a group of computer scientists and human rights activists who are committed to social change and democratic ideals in the Peoples Republic of China. They are especially interested in the relationship of the PRC to Hong Kong and are following the so-called one china, two policies doctrine quite closely. The Blondes are currently monitoring government networks and gathering data to be shared with other activists. . . . They would also be prepared to disrupt government/military networks in retaliation of any egregious human rights violation. . . . As to the risks involved, they are rather apparent: death, relocation, and loss of employment for family members, etc. The blondes are in this for the long haul and are hoping to contribute to the extremely difcult and very slow process of democratizing their country.15 The statement recognizes the power of both the globalization of technology and the globalization of resistance. In one incident, Lemon Li, a member of the Blondes, was arrested in China. As Blondie Wong, director of the Hong Kong Blondes, describes it: Lemon was questioned in Beijing. She was released after a few hours but I couldnt take any chances so our associates moved her out of China. She is in Paris now. . . . She is acting more like trafc co-ordinator now. Much of our work is happening from the inside and she steers our efforts in the right direction.16 Technological networking, the use of secure encryption techniques, and exploiting bugs and holes in network operating systems are allowing the Blondes to effectively communicate and coordinate political action around human rights violations. While the cDc and the Hong Kong Blondes are working globally, cDc hackers have been working locally. On August 3, 1998, at DefCon, an annual meeting of hackers in Las Vegas, the Cult of the Dead Cow released a program called Back Orice, a play on Microsofts NT software package Back Ofce, which exposed major security aws in Microsofts Windows 95 and Windows 98 software. As the name indicates, the product was designed to rudely confront Microsoft and to force it to take notice of the program
99
security issues. As one member of the Cult of the Dead Cow explained, The holes that Back Orice exposes arent even really bugs, but more fundamental design aws. Of course, Microsoft calls them Features.18 As a result, Back Orice does not do anything that the Windows 95/98 operating system was not intended to do. It does not take advantage of any bugs in the operating system or use any undocumented or internal APIs. It uses documented calls built into Windows.19 In addition to allowing for complete remote control of another persons machine, remote keyboard logging, and network monitoring, Back Orice has the ability to nd and display cached passwords. These are passwords stored on the computers hard drive, usually in an unencrypted form, to make the system more userfriendly. The kinds of passwords typically cached might include passwords for web sites, dialup connections, network drives and printers, and the passwords of any other application that sends users passwords to Windows so the user wont be inconvenienced by having to remember his passwords every time he uses his computer.20 Again, it is essentially an exploitation of social relations, between the expert and the end-user, that makes such hacking possible. It is also the place where cDc takes aim at Microsoft. As one member of the cDc explains: Microsoft seeks to buffer the user from the actual workings of the computer. They give you a nice little gui [graphical user interface], integrated web-browser and all the bells and whistles. But why is there this le with all my passwords cached in plain text? Isnt that bad? Now-Now-Now, dont worry your head about that. Just watch the pretty pictures. Sleep . . . Sleep. The problem is that if Microsoft wants to buffer their customers from the workings of the computer, then they have to do a hell of a lot better of a job of protecting them from other people who do understand the workings of their computer.21 The issue is one of trade-offs. As Microsoft would later admit, Windows 95 and Windows 98 offer security features tailored to match consumer computer use. This consumer design center balances security, ease of use and freedom of choice.22 In essence, Microsoft
101
tal in creating. At a practical level, Microsoft is creating problems for hackers interested in securing their own networks, but at a philosophical level, Microsoft is violating the most basic tenets of computer culture. Most segments of computer culture, including the computer industry, have always been able to operate within the general connes of an ethic. This ethic was driven, for the most part, by the concept of a social conscience, a dedication to the principle that computers could make peoples lives better. While that ethic has always been negotiated and even violated (early hackers taking Department of Defense money, Apple keeping its hardware proprietary, and so on), there has always been a genuine belief among hackers and industry that technology was doing more good than harm. That has also been a large part of the justication for hackers to remain politically neutral in all but the most local and immediate circumstances. Microsoft changed all that by embracing corporate policy that violated much of what hackers (and even industry) considered to be for the social good. Most hackers and hacker groups would view those justications as enough of a reason to release hacker programs, embarrass Microsoft, and force it to implement changes in its software. But for the cDc, the local and the global merge around the question of politics. Microsoft, hackers would argue, has become the high-tech corporation that they had always feared multinational in scope and amoral in character. Companies such as Apple that had violated basic tenets of computer culture by keeping the hardware proprietary had also shown remarkable commitments to education, and Steve Wozniak, one of Apples founders, had retired from Apple to teach at a local school. These kinds of balancing acts were often enough to keep hackers on the political sidelines. Whatever arguments one might have with Sun, Apple, or Intel, there was always something else to redeem them. With Microsoft, the situation was different. Microsoft from the very beginning had operated in opposition to the ethic that animated hacker culture. When Microsoft challenged hackers on the grounds of their own ethics, however, a movement in the hacker underground was created that recognized politics as an essential part of a newly constituted hacker ethic. In response to Microsofts chal-
103
States, at least there was the threat of losing trade relations, of some form of punishment. Now this just doesnt exist. Beijing successfully went around Congress and straight to American business, so in effect, businessmen started dictating foreign policy. There are huge lobbies in Washington that only spend money to ensure that no one interferes with this agenda. Its very well organized, and it doesnt end there.27 The intervention Wong suggests is exposing them. By naming them and possibly worse, suggesting that hackers ought to use their skills to make business difcult for American companies trading with China. Indeed, the strategy of hacking as intervention is designed to make things messy for American businesses. But it is also a strategy for empowerment of youth culture: Human rights is an international issue, so I dont have a problem with businesses that prot from our suffering paying part of the bill. Perhaps then they will see the wisdom of putting some conditions on trade. But I think, more importantly, many young people will become involved in something important on their own terms. I have faith in idealism and youth. It took us a long way in 1989. I believe that it will help us again.28 While visibility is an issue for the cDc, as self-described media whores, it functions differently for members of the Hong Kong Blondes. When asked why he gave the interview, Blondie Wong responded: Not for the kind of publicity you might think. We just need to have people know that we exist for now. It is like an insurance policy you could say. If anyone [of the Hong Kong Blondes] were arrested the possibility of execution or long imprisonment is quite real. In China, so much happens quietly, or behind closed doors. If someone is known, sometimes just that is enough to keep them alive, or give hope. So for that reason Im saying we exist, that [we are doing] certain things. . . . It is not for fame, no. So this insurance policy, it is something that no one wants to use, but sometimes it is good to take precau-
105
hardware and software hacking. Their projects have ranged from hacking the MacIntosh computer to translating old software to run on handheld PCs such as the Palm Pilot. What they are best known for, however, is nding and exploiting holes in UNIX-based and Microsoft operating systems and software applications. Mudge, one of the L0phts best-known hackers, is also responsible for one of the best-known, and most often exploited, bugs in the UNIX environment. The bug, called a buffer overow, exploits a certain feature in the way that UNIX executes programs. Certain software is written to handle information in terms of a buffer. Buffers set expectations for the computers memory. For example, if I create a variable called name and expect it to always be less than 256 letters long, I might set the buffer for the variable name to 256. If someone enters a name longer than 256 characters, the program gets an error and stops running; the program crashes. What is interesting to the hacker mind-set is what happens when the program crashes. As Mudge discovered, the program will attempt to execute whatever code is left over. If you have written your program carefully, then, you can simply ll up that buffer with two things: garbage and a program. By lling up the buffer with garbage until it overloads, you make the program crash. When the program crashes, it executes whatever code is left over. If you calculated correctly, what is left over is your program. So to run a program, you simply ll up the buffer with garbage, put the code on top of it, and crash the program. There are some programs that a common user is not allowed to run because they present security risks. The advantage of the buffer overow is that the hacker can use it to run programs not normally accessible to the average user. Because the system (rather than the user) is running the program, the hacker can use such a trick to take control of the system. For instance, when a program needs to access system resources that generally arent available to the average user (for example, hidden password information), the program automatically changes to a super-user status, giving the program access to everything on the machine. If the buffer overow targets that program, it also runs the hackers code as a super-user, giving him or her unlimited access to the machine. Such programs are based a fusion of two discoveries, both of
107
it would ask the machine making the request which form to use the new NT password system or the older, less secure LANMAN system. If LANMAN was chosen, it would convert the new, more secure NT password into the less secure LANMAN version. One of the primary differences in passwords was the length and case of the text that was used. Windows NT allowed for passwords up to sixteen characters in length, including both upper- and lowercase letters, but LANMAN had only allowed for eight characters, all in one case. A password such as ThisIsMyPassword (an acceptable NT password) would be truncated and converted to THISISMY for the LANMAN system. With a basic desktop computer, it is possible to run through a list of one-case, eight-letter passwords in a matter of a few days. A list of passwords sixteen characters long, both upper- and lowercase, in contrast, cant be broken in a reasonable amount of time. Again, Microsofts desire to have machines that were backward-compatible with 1980s technology resulted in a system that was much less secure. When the bug was discovered, the hackers informed Microsoft, which responded by denying that the problem was serious. The ofcial press release from Microsoft read as follows: Use of the L0phtcrack tool requires getting access to the Administrator account and password. This is not a security aw with Windows NT, but highlights the importance of protecting Administrator accounts and reinforces the importance of following basic security guidelines. If customers follow proper security policies, there is no known workaround to get unauthorized Administrator access.30 Sensing a potential public relations problem, Microsoft took the position that if system administrators were careful there would be no problem, an approach that would come back to haunt the corporation. Because the L0pht hackers had programmed the cracking program in a UNIX environment, and because it required a complex command structure and was seen as difcult to master, the press wasnt terribly interested either. So a few hackers, computer geniuses, can break into a server? We already know they can do that. The hackers at the L0pht took a page from Microsofts PR book. If
109
it targets Microsoft so directly and yet has none of the criminal or underground dimensions that usually characterize hacker software. It is a serious piece of software that security professionals might purchase to check out their own systems. And, indeed, the L0pht is marketing it that way. The reason that Microsoft attracts these hackers attention and inspires their wrath is precisely that the corporation seems to have little or no concern for security. It ignores warnings, avoids making xes until absolutely forced into it, and winds up supplying inadequate xes when it does release them. In sum, Microsoft relies on complexity and secrecy to maintain any level of security for its systems, and when its secrets are exposed, Microsoft simply denies that they were secrets at all. The hackers of the L0pht see themselves as providing a public service. They are truly concerned about security and believe that the only way a company such as Microsoft will ever make its products secure is to be shamed into it. As Mudge explained in response to an article in Mass High Tech, which accused hackers and the L0pht of being crackers who inict chaos: I was completely specic on what type of chaos, as you put it, the L0pht inicts (thank you for two words with negative connotations). The exact same type that consumer reports does. To wit: if I am using a piece of software and nd it to be awed we go public with it. This alerts the general populace to the problem and forces the company to x it. So . . . out of this chaos you, as an end-user, see technological and security related enhancements. Sorry if that is so evil.33 The members of the L0pht see themselves as educators about issues of security, fullling the same function as Consumer Reports, and they see themselves doing this in a similar manner. While, as a group, the L0pht may be doing important security work, they are also very much engaged in other aspects of hacker culture, projects ranging from creating secure wireless communications to nding new and better ways to make pornography run on Palm Pilot, handheld computers. Hackers such as those at the L0pht are working essentially to expose what amounts to corporate secrets, hidden from public view.
Part II
Hacking Representation
Hacking Representation
This part explores hacker culture through an examination of hackers relationship to mainstream contemporary culture. In particular, what such analysis reveals is that hackers actively constitute themselves as a subculture through the performance of technology and that representations of hackers in the media, law, and popular culture tell us more about contemporary cultural attitudes about and anxiety over technology than they do about the culture of hackers or the activity of hacking. Although these representations provide an insight into contemporary concerns about technology, they serve to conceal a more sophisticated subculture formed by hackers themselves. In particular, I explore hacker culture through a reading of the online journal Phrack (the title is a neologism combining the terms phreak and hack), a journal written by and for the computer underground, and by examining the ways in which hackers have responded to and occasionally embraced cultural representations of hacker culture. One of the principal factors that makes hacking possible is the contemporary culture of secrecy that governs a signicant portion of social, cultural, and particularly economic interaction. This culture of secrecy has produced a climate in which contemporary hackers feel both alienated and advantaged. Although hackers philosophically oppose secrecy, they also self-consciously exploit it as their modus operandi, further complicating their ambivalent status in relation to technology and contemporary culture. This part explores the themes of secrecy and anxiety in relation to both contemporary attitudes toward technology and the manner in which hackers negotiate their own subculture and identity in the face of such cultural mores.
113
Chapter 4
115
117
tation. Reading these documents as representative of hacker culture, however, requires a basic introduction to the ways in which hackers think about the literature they produce.
119
gregate, share information, learn from one another, and build their reputations. The tradition of passing les from one system to another was the central means of disseminating information about hacking, as well as about hacker culture. Files that explained the technical aspects of hacking would also discuss the cultural, ideological, and even political aspects of it. These collections of les would be the genesis of the rst underground hacker publications. What 2600 had put down on paper, Phrack was doing online. Since the early 1980s, 2600 has been dedicated to the dissemination of forbidden knowledge, focusing particularly on the knowledge of how things work and function. One of the premises that guides Goldsteins thinking is that it is much more difcult for institutions and governments to do bad things when they are held to public scrutiny. Cynicism also underwrites this thinking. Governments and institutions will continue to do bad things unless their secrets are exposed and they are confronted by their own misdeeds. 2600 has been the champion of hackers who have been arrested, convicted, and imprisoned and has done a great deal to bring public attention to such cases. 2600, while published in New York, runs in each issue a list of meetings that take place all over the country. These meetings are a way for hackers to nd one another, to share and trade information, and to generally make connections in the hacker underground. The meetings are often scheduled in in-yourface locations. For example, the New York meeting takes place in the lobby of the Citicorp Center, near the payphones. Should a hacker be unable to attend, the meeting list usually provides the number of the nearby payphones so he or she might call in. 2600s message is not just being spread in the United States. Nearly half of the listings are for international meetings, including those in Argentina, India, Russia, and South Africa, in addition to most major European countries. In many ways, 2600 has taken up the mantle of the 1970s and 1980s but has continued it in 1980s and 1990s style, adding publications to the Internet, holding two hacker conferences (H.O.P.E. [Hackers on Planet Earth] and H2K [H.O.P.E 2000]), running In-
Reading Phrack
In 1985, two hackers going by the handles Knight Lightning and Taran King began putting together a resource for the computer underground that appeared on their BBS, The Metal Shop AE. Those resources were collected into Phrack, which would publish informational articles of interest and use to hackers and phone phreaks. Three things make Phrack unusual as a part of underground hacker culture and different from periodicals such as TAP and 2600. First and foremost, with minor (and a few major) interruptions, Phrack has continued in basically the same form, spanning more than fteen years. Electronic journals have no material infrastructure no
121
phones, no buildings, no presses, no trucks to deliver them, no stores to sell them. As a result, they tend to spring up, publish a few issues, and vanish. Unlike most electronic underground journals that disappear routinely, Phrack has had staying power. It has even survived the changing of hands through several editors and a high-prole court case. Second, even though it is one of the most popular and widely read hacker journals, it has always remained free and accessible in electronic form. Indeed, it has never moved from its original mode of distribution, a collection of les electronically distributed. Third, Phrack has always provided a dual function. While one of its primary purposes is to disseminate information about hacking and phreaking, it also serves as a cultural focus for the hacker community it tells the members of the underground what is going on, who has been arrested, who is angry with whom, and so on. Unlike its predecessors, TAP and 2600, Phrack is designed to organize what had previously been a loose confederation of people, les, ideas, and gossip that had found their way onto various BBSes or computer les. It can be said that Phrack has had its nger on the pulse of hacker culture. Three main features compose Phracks cultural side: the brief or alternatively rambling introductions to each issue that explain, more often than not, what is going on with the editors and staff of Phrack, most often with a justication why the issue is later than expected; the Phrack Pro-Philes, which provide biographies of selected hackers, detailing what got them interested in hacking, as well as their various explorations, exploits, and afliations; and, perhaps most important, the Phrack World News, which details the rumors, gossip, and news of the hacker underground. The two initial editors of Phrack, Knight Lightning (Craig Neidorf) and Taran King (Randy King), did little of the technical writing for the journal, instead calling on the general hacker community for contributions. Like 2600, many of the initial articles were less technological in focus and were more about forbidden knowledge. Articles ranging from How to Pick Master Locks, by Gin Fizz and Ninja NYC, to How to Make an Acetylene Balloon Bomb, by The Clashmaster, were the focal points of the rst issue of Phrack. The informational content would evolve, but it was signicantly
123
125
and theft of it from the corporations computers constituted a major crime. The document was valued, according to BellSouth ofcials, at $79,449. How the gure was arrived at was not known until well after the trial, but as John Perry Barlow remarked, one can imagine an appraisal team of Franz Kafka, Joseph Heller, and Thomas Pynchon.12 There were two problems with the prosecutions case. First, the information, which was considered so dangerous and proprietary, was already available as a BellSouth publication to anyone who took the time to call in on the corporations 800 number and request it. And, second, the document that contained everything that Phrack had printed and a whole lot more cost thirteen dollars. Neidorf was cleared of all charges but was left with legal bills of more than one hundred thousand dollars. The E911 document would emerge again later, this time in the trial of Robert Riggs (The Prophet) and two others. This time, the E911 document would be valued at $24,639.05. (As Mungo and Clough point out, the 5 cents [was] presumably included to indicate that the gure had been very accurately determined.)13 The value of the stolen E911 document was of crucial concern to law enforcement and prosecution teams. The initial $79,449.00 value was calculated by Kim Megahee, working for BellSouth. To arrive at the nal gure, she simply added up all the costs of producing the document, including $7,000 for writing the document, $6,200 for a project manager to oversee the writing of the document, $721 for typing it, costs for editing, mailing labels, indexing, and so on. Of course, those were only the basic costs; there were also hardware costs, including $850 for a computer monitor, $31,000 for the VAXstation II that the document was written on, $22,000 for a copy of Interleaf software, and $2,500 for the VAXs VMS operating system.14 The number would later be reduced to reect research-and-development costs, reducing the total to the $24,639.05, which would be the nal amount used to prosecute Riggs. The importance of the question of the documents value can not be emphasized enough, but the answer to that question follows the wrong course if we pose it rst in monetary terms. What is really at stake in the value of the E911 document? Two things, both of which point to a single conclusion: the value of the document is the
127
stuff about packet switching networks, and it was a big slap in the face to B. T. Tymnet. I had a whole lot of fun with that issue.16 The point of Phrack for Goggans is to violate the secrecy that preserves the proprietary structure of Tymnet. The value of the information Phrack provides for the hacker community is only partly about use. The greatest value attached to the information is the idea that Phrack is telling big corporations secrets. The slap in the face, as Goggans describes it, is the informational value of Phrack. It is the violation of secrecy that makes Phrack a valuable source of information, not merely the information itself. The use of the copyright, and the subsequent effects it produced, should be viewed as more that a simple game of tit for tat. What is revealed in the institutional structures of privacy and secrecy tells us a great deal about societys relationship to technology and the culture of secrecy that is so ensconced within that relationship.17 The copyright is nothing more than the mobilization of an entire institutional structure that is designed to continually reinforce and reinstitutionalize secrecy. A copyright does more than simply demarcate authorship: it species the means, manner, and ability to disseminate the information. It is the very condition of the secret. Secrecy never operates as an absolute principle. In order to be a secret, information must, at some level, be shared. There must be those who know in order for the secret to function. If information is not shared, secrecy loses its force, even its meaning. The true power of the secret is in its disclosure, and in that sense, like technology, secrecy is relational rather than technical. The copyright agreement in Phrack gains its force not from what is communicated in Phrack but because of who receives it, because of the relationships it fosters, generates, sustains, and, in some cases, even makes possible: Corporate/Institutional/Government: If you are a business, institution or government agency, or otherwise employed by, contracted to or providing any consultation relating to computers, telecommunications or security of any kind to such an entity, this information pertains to you. You are instructed to read this agreement and comply with its terms and immedi-
129
and, of course, none of them even contacted me for registration. I had a riot with it. It was a lot of fun.19 As a journal that stands in violation of the very principle of secrecy and the proprietary nature of information, it seems extraordinarily odd that Phrack would choose to copyright its information. But that oddity begins to make a great deal of sense upon closer examination. The idea of the copyright is deployed against those who utilize it for protection of the secrecy that Phrack seeks to dismantle. As Goggans tells the story, After I took it [Phrack] over, I went ahead and registered it with the Library of Congress and I lled a DBA as Phrack magazine and for the rst issue I put out a license agreement, sort of, at the beginning saying that any corporate, government, or law enforcement use or possession of this magazine without prior registration with me was a violation of the Copyright Law, blah, blah, blah, this and that and Phrack was free to qualied subscribers; however, in order to qualify as a qualied subscriber, one must be an amateur hobbyist with no ties to such a thing.20 In short, Goggans deployed the institution of secrecy against those who have constructed it. Phrack was able, at least in principle, to operate in secrecy (or at least have knowledge of those persons who were receiving Phrack and who might have government, corporate, or law enforcement interests) by claiming the same sort of ownership of information that had been used against it in the case of the E911 document several years earlier. If Phrack was to be watched or monitored, this agreement was designed to make sure that those who ran Phrack could monitor the monitors. The effect that Phracks copyright produced was perhaps even more interesting and revealing than the copyright itself. The copyright never prohibited anyone from getting Phrack but only charged a fee of one hundred dollars for a subscription to government, law enforcement, and corporate organizations. According to Goggans, the copyright went over like a ton of bricks with some people. A lot of corporate people immediately sent back, Please remove my name from the list. But perhaps the most interesting responses came from corporate people who, in an effort to negotiate the problems of secrecy, responded by saying, Were going to pay, but dont tell anybody were going to pay. With one exception, no one ever
131
Once a hacker has the ability to demonstrate these prociencies, he or she must nd a way to attach his or her pseudonym to those particular prociencies. For example, a hacker particularly adept at programming may write and release a program that makes routine a set of complex or laborious hacker tasks (such as the repeated dialing of phone numbers when searching for modems in a particular phone exchange). A hacker who understands packet-switched networks may write an article or phile describing how these networks operate. If the information is considered valuable enough, it might come to be included in an issue of Phrack and thereby be disseminated on boards throughout the country. The articles that generate the most attention, from hackers as well as computer security experts, are the ones that go a step beyond the dissemination or consolidation of already available information. These articles, such as the E911 document, serve as evidence that the hacker is able to go one step farther he or she can tell you something that isnt available elsewhere, something that someone doesnt want you to know. That is, the elite hacker is capable of violating the culture of secrecy that denes the current state of technology. What denes the value of the information is not necessarily how useful the information is but, rather, how secret the information is. Some of the most potent hacks garner completely useless information from a practical standpoint, but they are invaluable in exposing precisely what it is that technology has kept hidden. In this way, a doubled sense of the idea of knowledge emerges. Knowledge of technology means both knowing how technology works (in a practical sense) and knowing what technology hides. This doubled sense of knowing is most fully realized by the hacker not as a binary construction but, rather, as a supplementary one technology works because technology hides. As a result, the technological always stands in relationship to the hidden or secret, and it is that relationship that is always open to exposure and exploitation. Hackers who understand the relationship between technology and secrecy possess not just knowledge but a kind of knowledge that sets them apart. But that setting apart, in relation to knowledge, is about authority and authorship. As a technology itself, authorship participates in the dual sense of knowledge. It both performs a
133
a diverse and disjointed (and self-described anarchic) community. Second, they function normatively to help dene what constitutes acceptable and unacceptable hacking behavior, both in terms of the activity (for example, what constitutes malicious hacking) and culturally (for example, what sort of music hackers enjoy). Third, the Pro-Philes construct and elevate hackers as cultural icons or heroes. Of particular interest throughout the Pro-Philes are moments of origin, which function as narrative accounts of the rise (and oftentimes the fall) of the hacker. In almost every case, Phrack Pro-Philes begin with the heading, Origins in the Phreak/Hack World, a section that documents that particular hackers relationship not necessarily to hacking but to technology itself. For example, one of the earliest hackers to be pro-philed, Karl Marx, describes his entre to hacking as such: Manufacturing Explosives He wanted to blow up his High School.23 More often, though, the narrative unfolds as one of exploration and discovery: A friend of Bloodaxes father bought a MicroModem II to get information from Dialog for his legal practice. He still remembers the rst time he used it. His friends dad used Dialog through Telenet. Once he saw Telenet, he began trying various addresses. One of the rst things he ever did was get into a 212 VAX/VMS with GUEST/GUEST.24 The introductions to these Pro-Philes are littered with references to the rst generation of personal home computers Atari 400s, Apple IIs, TRS-80s, Amiga 1000s, Commodore 64s, and so on. In that sense, the history of hacking is tied directly to the birth of popularly available PCs. But there is a second category that shares equally in the birth of hacking, the Origins in Phreak/Hack BBSes. While the technology was important, almost every one of the pro-philed hackers had an interest beyond the technology itself their interest was in networks. With few exceptions, these hackers ran a BBS (bulletin board system) out of their homes, and all of them participated on various pirate software or hacker-related BBSes. The history of hacking is tied to the practical aspects of technology (computers and networks), but it also has its root in the culture of secrecy. Most narratives detailing hackers early exploits involve them piercing through a veil of secrecy usually by means of a happy accident or via an introduction to enter a world that was known to only
135
which makes it difcult or impossible for them to continue hacking. It is also a culturally constructed narrative of male sacrice for the community. Accordingly, Phrack Pro-Philes constitute a certain kind of death of the hacker (or the hackers handle) that is culturally celebrated. Such transformations not only are inevitable but are, in fact, part of the structure of authorship itself the age-old conception of Greek narrative or epic, which was designated to guarantee the immortality of the hero. The hero accepted an early death because his life, consecrated and magnied by death, passed into immortality; and the narrative redeemed his acceptance of death.28 What is at stake for the hacker is the very question of authorship. In current speculation about the state of authorship, there is a repeated refrain that the author is dead or has disappeared. Foucault calls for us to use this critical moment and to reexamine the empty space left by the authors disappearance; we should attentively observe, along its gaps and fault lines, its new demarcations and the reapportionment of this void; we should await the uid functions released by this disappearance.29 Nowhere could Foucaults call be more apt than with the discourse on hackers and writing. The hacker, after all, must disappear in order to hack, and yet must not disappear in order to be a hacker. The hacker, through the use of a handle, calls attention to the act of authorship, announcing that she or he both is and is not who he or she claims to be. Quite self-consciously, then, the name of the hacker, like the name of an author, remains at the contours of texts separating one from the other, dening their form, and characterizing their mode of existence. It points to the existence of certain groups of discourse and refers to the status of this discourse within a society and culture.30 What this troping on authorship allows is for the hacker to both be known and yet remain anonymous. What the Phrack Pro-Philes allow for is the reemergence of the author after the fact. Once retired or out of the scene, the hackers handle is both sacriced and immortalized as the author reemerges, no longer a hacker, but now an author. No longer is he or she anonymous; instead, she or he reemerges to claim the acts done under another name. The technology of authorship, for the hacker, serves the practical function of naming and dening discrete
137
Followed by Overlord 313 Busted: Step-dad turns him in. Overlords stepdad always would be checking his computer to see what was on it and what was nearby. Last week he noticed the credits in Overlords le on Wiretapping, which can be seen in this issue of Phrack. He reported his ndings to Overlords mom. She had a talk with him and he promised to stop his evil ways. His step-dad didnt believe him for a second.31 Ironically, at this point in Phracks history, the second story was probably the more important of the two. In later years, particularly as hackers began to grab national headlines, the nature of Phrack World News would change. The only standard for reporting is whether or not the news is of interest to hackers and the hacker community. Important information includes what BBSes are up or down, who has been arrested, what new groups have formed, which have disbanded, and what hackers have chosen to retire. Phrack World News serves as a lter that doesnt distinguish mainstream news from events of hacker culture, and oftentimes information, reports, or news stories are reframed, titled, or retitled by hackers in order to make a particular point. In one instance, a copy of the San Diego police departments Investigators Follow-Up Report titled Damage Assessment of and Intelligence Gathering on Illegal Entry (Hacking) Computer Systems and the Illegal Use of Credit Cards was included in Phrack World News under the title Multiplexor and the Crypt Keeper Spill Guts. The details of the investigation and arrest of the two hackers are given in several sections, including follow-up reports from investigators, e-mails, and an Aftermath section. The story is followed by a letter sent from Kevin Marcus, titled The Crypt Keeper Responds, in which he provides a detailed explanation of the events surrounding his arrest. The letter ends with an explanation as to why he is not a nark and a mea culpa: If I were a nark, then I would probably have given him a lot more information, wouldnt you think? I sure do.
139
Phrack World News was both inauthentic (because it was not the news that the majority of the population would see) and more authentic (because it told both sides of the story in much greater detail). As a result, Phrack World News provided both a detailed accounting of events and an accounting of how those events were being reported. As hackers increasingly made their way into the mainstream media, Phrack World News changed substantially, transforming from an informational resource in its earliest incarnation to a media watchdog in its later form. In both cases, however, Phrack World News has served an important role of reporting the news and recontextualizing it in a way that hackers can use to better understand their position in mainstream culture and as a forum to respond to that position. As hackers found themselves more frequently in the news, they also found the underground disappearing. And as Phrack became more widely available, its mission changed. In issue 56 (May 2000) Shockwave Rider in his Pro-Phile pronounced the death of the underground at the hands of the Internet: The underground is no longer underground. Forums which once existed for the discussion of hacking/phreaking, and the use of technology toward that end, now exist for bands of semi-skilled programmers and self-proclaimed security experts to yammer about their personal lives, which exist almost entirely on the awful medium known as IRC. The BBS, where the hack/phreak underground grew from, is long since dead. Any chump can buy access to the largest network in the world for $19.95 a month, then show up on IRC or some other equally lame forum, claiming to be a hacker because they read bugtraq and can run exploits (or even worse, because they can utilize denial-of-service attacks). The hacker mindset has become a nonexistent commodity in the new corporate and media-friendly underground.33 The sheer volume of hacking news has made it impractical for Phrack to keep up-to-date with events as they happen and has spawned a secondary site, attrition.org, that specializes in monitor-
Conclusions
Phrack has played an essential role in the creation and maintenance of the computer underground. It has survived a high-prole court case and has continually responded to changes both in the computer underground and in mainstream culture. Phrack, perhaps more than any other single vessel, has communicated the standards of the underground and has functioned to create an elite class of hackers who would gain prominence by spreading information or being the subject of Pro-Philes or news. Phrack demonstrates that the computer undergrounds culture is a rich one, with heroes and villains, mythologies and lore, and a worldview that, while fundamentally at odds with that of mainstream culture, both colors and is colored by news and current events. In short, while Phrack does impart information to the hacker underground in its articles and exploits, its more important function has been in creating a culture for the underground and in transmitting news, gossip, and lore about the hacks and hackers that dene hacker culture. In doing so, Phrack established itself as essential reading for the culture of the underground and as a result had a central and dening role in shaping what that culture would look like for nearly fteen years. For hackers, Phrack has provided a venue in which they could be known without facing the risks of being known. Phrack served as the means to legitimate hackers for the underground, both by presenting them as celebrated heroes to the readers that made up the underground and by simultaneously taunting a larger audience of government ofcials, institutions, and corporations by presenting forbidden information and exposing secrets.
Chapter 5
141
(Not) Hackers /
143
things are to be done, to a world of responsibility, where youth make decisions for themselves. The transition is marked by rebellion, deance, and a seemingly single-minded focus on difference. The importance of online culture particularly in the 1980s, 1990s, and up to the present for youth culture is grounded in three factors. First, the youth of the 1980s and 1990s are the rst generation to grow up more computer-literate (and generally technologically literate) than their parents. For that reason alone, technology represents a way of doing things, a style, that is radically different from that of their parents. Second, technology, and computer culture more specically, is constantly in ux. Such a uid environment not only allows for radical recontextualization but demands it. Computer culture and computer style are in many ways the ideal hotbed for youth rebellion, as they require constant change in keeping with hardware and software developments. Third, and perhaps most important, the semiotic space that technology presents is one that is considerably less material than the traditional outlets of expression. Fashion, music, and literature, three primary outlets of youth culture expression, require a primary material component that is able to be marked, transformed, or reappropriated by mainstream culture. Computer culture, in contrast, is much less material in nature. While the hardware, the actual technological component itself, is material, the software and the style (the means by which one does things) are not. If we contrast something as fundamental to youth culture as music with the Internet, it becomes clear that the difference of expression rests on materiality. For music to be expressed, it needs a material venue. Whether that venue be a public performance, a nightclub, a recording studio, or a local gathering, that material element represents a point of intersection between subculture and parent culture. That point of intersection is one that allows for the parent culture to prohibit expression (for example, arresting a performer for indecent lyrics) or to recontextualize that expression itself (for example, the moment when rap music is integrated into advertising campaigns). These two cultural responses, which Hebdige has dened as incorporation, are the means by which mainstream and parent cultures recoup meaning.2 The rst, ideological, incorporation is the means
(Not) Hackers /
145
This way of thinking about problems, which necessitated thinking in nontraditional, often outrageous ways, was at odds with the dominant thinking about computer programming. While the students were busily hacking late at night in the labs, their professors were offering courses in structured programming, a style that presumed that a single, superior, mathematically precise solution existed for each problem encountered. The conict is exemplied by an interchange between Richard Greenblatt, one of MITs original hackers, and Edsger W. Dijkstra, a mathematician and an original proponent of structured programming. As Sherry Turkle describes the legendary interchange: In Dijkstras view, rigorous planning coupled with mathematical analysis should produce a computer program with mathematically guaranteed success. In this model, there is no room for bricolage. When Dijkstra gave a lecture at MIT in the late 1970s, he demonstrated his points by taking his audience step by step through the development of a short program. Richard Greenblatt was in the audience, and the two men had an exchange that has entered into computer culture mythology. It was a classic confrontation between two opposing aesthetics. Greenblatt asked Dijkstra how he could apply his mathematical methods to something as complicated as a chess program. I wouldnt write a chess program, Dijkstra replied, dismissing the issue.3 The problem, as it turns out, with Dijkstras position is that people, ultimately, did want chess programs and lots of other programs as well, which made it necessary to think differently about programming. The difference, however, was not necessarily about programming. The triumph of bricolage is, ultimately, an end-user phenomenon. People prefer to play with computers, rather than program them. This dichotomy has been true since the rst PC was massmarketed. I have described the Altair 8800, the rst PC (ca. 1974), a number of times above. Here I simply want to point to the way it emphasized programming not only did the machine have to be assembled and soldered together by the hobbyist; it also came with
(Not) Hackers /
147
intuition through the manipulation of virtual objects. Instead of having to follow a set of rules laid down in advance, computer users are encouraged to tinker in simulated microworlds. There, they learn about how things work by interacting with them. One can see evidence of this change in the way businesses do their nancial planning, architects design buildings, and teenagers play with simulation games.4 I want to further Turkles analysis by suggesting that the shift from a culture of bricolage in the production of computer software to the culture of bricolage (and what she calls simulation) in the consumption of computer software represents an important moment of incorporation of hacker-subculture style. At this moment, bricolage was transformed. What started as a blockage in the system of representation, a radical new way of doing things and thinking about computers and programming, had been reduced to a commodied form of style, mass-marketed for popular consumption. Bricolage, or tinkering, was also constitutive of a certain element of computer culture that relies on invention and innovation, two ideals that were lost in the transformation to a publicly marketable style. Bricolage becomes a system of massmarketed tinkering, by which anyone and everyone becomes a hacker. It is the moment when hacker culture is commodied and, in the process, emerges as its opposite. Where bricolage originally was a way for the hacker to be close to the machine, tinkering with its various elements and operations, as a commodied form of software, bricolage serves to separate the user from the machine, effectively rendering the computer as an opaque object. Within this system of representation, the computer, as an object, has been transformed from the ultimate transparent machine, built and programmed by its owner, into a black box. As Jay David Bolter and Richard Grusin describe it, the process of technological innovation is always one of remediation, a process that follows a dual logic in which our culture wants to both multiply its media and to erase all traces of mediation: ideally, it wants to erase its media in the very act of multiplying them.5 As the computer undergoes the process of remediation, it becomes an increasingly opaque technol-
(Not) Hackers /
149
say it is a subculture of information. From the 1980s to the present, hackers have developed a style that is suited to the digital medium. This electronic sense of style transcends the more traditional notions of style in several important respects. Electronic style is made possible by the transformation from a material to an information medium. That transformation means the primary site of production for subcultural style rests in the subculture itself, rather than in a parent culture. Because hacker subculture relies on information as the medium of representation, it is able to produce a style that is independent of the material elements of mainstream or dominant culture. The separation of production does not mean that there is no interaction between the subcultural and parent-culture systems of representations. Instead, it merely means that, as an information subculture, hackers maintain a higher degree of control over the means of the production of their own codes and systems of representation. From this notion of primary control ows the second implication of electronic style. With a premium placed on the uidity of this style of representation, hacker subculture utilizes the more traditional notion of subcultural style as a means of resistance to incorporation. Hacker cultures ability to maintain control over a primary system of representation allows for the creation of a highly exible and uid process of resistance, which subverts efforts to incorporate, freeze, or integrate it. Traditional subcultural style grows from what Hebdige has identied as bricolage, the science of the concrete, which is a system of structured improvisation.9 In essence, bricolage denes a style that reacts to contemporary culture by rearranging it, by reassembling elements of cultural signicance (or insignicance) in ways that recode them, producing new meanings that are often subversive or represent reversals of commonly held beliefs. For hacker culture, bricolage is deployed as a secondary rather than primary strategy of resistance. The anthropological origins of bricolage also illustrate precisely why we need to go beyond the traditional notion of both bricolage and subcultural style in understanding hacker culture. Bricolage, as originally conceived, presumes a certain disposition toward technology. Specically, according to T. Hawkes, bricolage is situated by
(Not) Hackers /
151
that reinterprets that moment of material production into a cultural discourse. At that point (for example, when computers are themselves commodied), it is mainstream culture that continually reacts to hacker style. The effect appears to be the same, mainstream culture creating a dominant discourse and set of cultural codes that can then be made into commodities, but the difference in origin is signicant. This difference in origin, coupled with the fact that hacker culture exists in a highly uid electronic medium, means that hacker culture is extremely resistant to both commodity and ideological forms of incorporation. In a second, perhaps more powerful, sense, hacker subculture relies on the fact that most people, even people who are considered computer-literate or computer experts by popular culture, actually have very little understanding of how their computers function. As a result, regardless of the degree to which hacker culture is commodied or incorporated, hackers still maintain a level of expertise over the machine and, as a result, over a particular dynamic. The roots of hacker subculture are in knowledge, particularly the knowledge that they understand how the systems that nonexperts are using function at a basic level. As a result, they are able to utilize, manipulate, and control those systems. The force of hacker subculture comes from the fact that, ironically, as it is commodied and incorporated as its opposite (a kind of surface tinkering that renders the technology increasingly opaque), it is continually increasing the gulf between hackers and end-users. Even as the system of commodication works to incorporate hackers culture, it also opens up possibilities for hackers. It is precisely that gap in knowledge, expertise, and experience that hackers exploit in their endeavors. Tendencies toward increasingly transparent interfaces are most commonly discussed in terms of the ways in which they make the technology more manageable, yet less accessible. What most analyses fail to examine is the space opened up between the expert and the end-user. In other words, most analyses look at the relationship to technology, not the relations between people that result from the technology. Hackers generally oppose such commodication and simplication but also recognize that the more layers that
(Not) Hackers /
153
user, and because the hacker appears to know what he or she is talking about, it was (and still is) extremely easy to compromise a UNIX account through IRC. In fact, most IRC servers post warnings telling users never to issue commands that they dont understand. Nevertheless, because a complexity exists that is masked by most popular IRC programs (such as mIRC), IRC is always open to exploitation because the very culture that made IRC possible through a difcult and complex system of tinkering has been commodied, stripped of that complexity, and placed on the surface. But in any such exchange, there is always a remainder, and that remainder, the space between expertise and end-users, is open to exploitation in a way that makes hacker culture continually able to renew itself and to exploit even its own commodication.
(Not) Hackers /
155
corporations (Microsoft in particular) have attempted to naturalize hacker exploits by claiming that software glitches that allowed hackers to break codes, steal passwords, and even take remote control of users computers were, in fact, features and not bugs. Interestingly, a majority of Microsofts press releases about security come from the marketing department, rather than programmers or software engineers. Attempts at naturalization have done little to alter what hackers do or how hackers are perceived. Instead, such attempts have generally angered hackers and made Microsoft more of a target than ever for the hacker community. In fact, the only way in which hackers have been effectively sold is through a combination of the commodity and ideological forms of incorporation. It is hackers exoticism that is sold. (For example, an IBM ad for security features a tattooed teen hacker with several prominent body piercings confessing to hacking for no discernible reason.) This exoticism is what renders hackers threatening, dangerous, and worthy of attention. Such a move makes their difference marketable. Difference is no longer a means of dismissal but is, instead, a warrant for attention and the reason we must pay attention. Hackers are a threat not only because we dont understand them, but also because they understand something important to us (our computers) in a way we dont. As a result, capitalist strategies of incorporation have found a way to rely upon, rather than break down, difference. In that sense, we can argue that hacker subculture has maintained a powerful form of resistance. The incorporation that results from difference, although a very real form of incorporation, does not strip meaning from the subculture or in any way determine that subculture other than as an aftereffect. In essence, hacker subculture has found a way to subsist within a structure of incorporation that, instead of freezing, neutralizing, or dismantling it, relies on it to operate as difference. Industry, in that sense, relies on hacker cultures ability to invent and reinvent itself as a threat in order to sell security to consumers. The more sophisticated technology becomes, and the more reliant the user grows on it, the more important the gure of the hacker becomes. As a result, hacker culture has, at least to this point, survived alongside, even become enmeshed with, the cor-
(Not) Hackers /
157
ticeable amounts from the system. The computer security expert is a former hacker who goes by the name The Plague, and when the group of hackers discover his plan, The Plague releases a computer virus in his own system that will cause worldwide ecological disaster. The Plague blames the hackers for the virus, and the gang is then pursued by Secret Service agent Richard Gill, a technophobic G-man, who is used by The Plague to track down the renegade hackers. Gill, who is little more than a puppet of the corporation, is shown to be a bumbling incompetent, unable to understand or navigate the world of technology he is supposed to be policing. The stage is set for a showdown of good versus evil, with the group of elite high school hackers taking on the evil computer genius, The Plague, to clear their names and save the world from ecological disaster. While the plot is pure Hollywood, the lms attention to detail about hackers and hacker culture helped it gain the attention of some hackers in the underground. Of all the lms about hackers, Hackers makes the most concerted effort to portray the hacker scene in some detail, even going so far as to get permission from Emmanuel Goldstein, the publisher of the hacker quarterly 2600, to use his name for one of the characters in the lm. In the lm, hackers, for example, go by handles, rather than their real names; there is an abundance of references to the computer underground (some accurate, some wildly fantastic); and there is an effort to portray hacker culture as both an intellectual and a social system. These hackers are not isolated loners or misunderstood teens; they are cutting-edge techno-fetishists who live in a culture of eliteness dened by ones abilities to hack, phreak, and otherwise engage technological aspects of the world (including pirate TV and video games). The lm, although making some effort to portray hackers realistically, is hyperbolic in its representations of hackers, law enforcement, technology, and underground culture. Accordingly, Hackers serves as a classic example of incorporation, the transformation of subcultural style into commodity forms (fashion, in particular) and into ideological forms (subcultural style regured as meaningless exotica).13 In contrast, hackers themselves have occasionally documented their own culture in an effort to resist media interpretations of their
(Not) Hackers /
159
phone company. In this lm, however, the hackers are neither wanted criminals nor imperiled innocents, wrongly accused. Instead, they are kids roaming around in a technological playground. The only moment of drama, a phone call from a security agent, whom they outwit with social-engineering tricks, is itself staged by the hackers. The hacking done in the lm is unlike that in Hackers elementary, and there is no mystery and few risks (other than those manufactured by the hackers themselves) for the boys. In comparing these two lms, the differences in hacker style become apparent immediately. In Hollywoods version, hacker style is about hackers relationship to technology, manifested in their clothing, their appearance, and, ultimately, their bodies. Accordingly, Hackers reduces hacker style to techno-fetishism. At one point in the lm, the two protagonists (and ultimately love interests) have the following discussion: [Dade typing at Kates computer] Kate: Its too much machine for you. Dade: Yeah? Kate: I hope you dont screw like you type. Dade: It has a killer refresh rate. Kate: P6 chip, triple the speed of the Pentium. Dade: Yeah. Its not just the chip. It has a PCI bus. But you knew that. Kate: Indeed. RISC architecture is going to change everything. Dade: Yeah, RISC is good. [Pauses, looking at Kate]. You sure this sweet machine is not going to waste? As a result of the conversation, Kate challenges Dade to a hacking contest. If she wins, he is forced to become her slave; if he wins, she has to go out with him on a date and, to add insult to injury, wear a dress. Kates and Dades discussion, technically, makes no sense. But as a matter of style it indicates the manner in which Hollywood lm translates every aspect of hacker style, even the most basic social interactions, into technology. Throughout the lm, all of the hackers
Kate and Dade discuss computers and sex in the glow of the machine.
social interactions are mediated through and by technology. Early in the lm, when the corporate evil hacker, The Plague (played by Fisher Stevens), needs to send a message to the lms protagonist, he does so by having a laptop delivered to him. When opened, the laptop projects an image of The Plagues face and issues a warning to Dade, threatening his family if he doesnt turn over a disk containing information about The Plagues plot to embezzle from the corporation for which he works. As fantastic as such an interaction may be, it illustrates precisely the way the lm views hackers interactions. Hackers are seen as gures who are only able to communicate about and through technology. While communication in the lm is conditioned by technology, there is an even more profound element that illustrates the manner in which technology dominates the narrative the relationship of technology to the hackers body.
Fashion as Style
In the lm, hacker style is manifested in the wardrobe of the hackers. While several characters dress in typical teenage garb, the two
(Not) Hackers /
161
lead hackers (played by Johnny Lee Miller and Angelina Jolie) prefer a high-tech vinyl and leather techno-fetish look. Millers character (Dade Murphy, aka Zero Cool, aka Crash Override) and Jolies character (Kate Libby, aka Acid Burn) serve as representatives of the hacker-elite sense of style. Their look is urban very slick and ultracool. The female protagonist, Kate Libby, is every bit one of the guys, and even the eventual romance that develops between Kate and Dade is deferred until the nal sequence of the lm. Like most instantiations of boy culture, affection between Dade and Kate is displayed in a series of contests rst video games and later a series of hacks against Secret Service agent Richard Gill. In the process of creating mayhem (everything from ruining Gills credit to having him pronounced dead), the contest becomes the means by which Dade and Kate express affection for each other, begrudgingly acknowledging each others technical skills and cleverness. While Kates character is female, the role she plays is masculine, a hacker superior to everyone in her circle of friends, until she is challenged by the newcomer, Dade. Like the boys around her, all of Kates sexual impulses are redirected toward technology. In fact, when a sexual encounter with her boyfriend is interrupted, she chooses to show off her new machine to her friends, rather than remain with her partner. The transformation is marked most clearly when the hackers, in the lms climax, engage in their nal assault. Behind Kate is a sign signaling the message that has been made clear throughout the lm, Obey Your Technolust. As the lm progresses, the protagonists become increasingly enmeshed with technology. Initially, Dade interacts with his computer as a discrete machine; he types, and images and messages are reected on the screen. The relationship is one with which we are familiar; the computer and user are separate and distinct entities. As the narrative moves forward and the hackers get closer to the prized data that they seek, their images begin to merge with the data itself. The image of a hackers face is superimposed with the image of ying data, letters, numbers, and mathematical symbols. In the nal scene, Dade no longer relies on either a computer screen or the merging of images but instead becomes physically integrated with the technology itself. For the nal hacking scene, he wears an eyepiece, strapped
to his head, reminiscent of a kind of cyborg merger of man and machine. There is no longer a distance between Dade and the object of his hack; he has become the machine that he seeks to invade. Fashion in Hackers is designed to mark the integration of humans and machines, allowing us to view hackers as technological creations. Thus, hacker style becomes integrated into a techno-fetishism that denes hackers and hacker culture by their relationship with technology and through the tools they use, the clothes they wear, and, eventually, the ways in which their bodies merge with data and machinery as they become completely absorbed in the machinery of hacking. In contrast, hackers from Minor Threats lm behave in a manner that betrays a more common theme in hacker culture, that of the outlaw. Reminiscent of Jesse James and the Old West, these hackers wear bandannas to cover their faces and conceal their identities. Rather than hiding their identities through high-tech wizardry, they, instead, carefully put on latex gloves before touching the computer
(Not) Hackers /
163
A visit to the phone company: (a) playing the switch; (b) experimentation; and (c) adding a few features.
console they hack to avoid leaving ngerprints. They have taken on the traits of criminals, burglars, or high-tech espionage agents. Unlike the characters in Hackers, these hackers engage with the technology in a decidedly more hands-on approach, offering a tour through the telephone switches and tinkering with different pieces of technology along the way. What is different about the hackers in this lm is both the manner in which technology is represented and the distance that hackers keep from the objects they seek to invade. But Minor Threats lm can also be read as something more than a simple recording of a break-in to a telephone company control ofce. It is also a discourse to be read in opposition to the dominant media interpretation of hacker culture. The themes of the two lms are so strikingly parallel that it is hard not to compare them at the levels of representation and reality. I want to resist such an impulse and suggest that the relationship between these two lms is more complex than it might seem at rst glance. Hackers did have a signicant impact on the hacker community, whereas Minor Threats lm, which
was routinely and secretly shown at hacker conventions, functioned much more to celebrate hacker culture than to document it. Hackers was, by all accounts, a critical and commercial failure. Unlike WarGames, which captured national attention and the public imagination, Hackers was largely ignored. What makes Hackers important is the discourse that it put into circulation about the relationship between hackers and corporate culture. Where the discourse of WarGames was about the Cold War and the threat of nuclear annihilation, Hackers is about the 1990s discourse of global technology and capital and the rise (and power) of multinational corporations. It essentially explains why hackers resist corporate ideology, particularly that which can regulate or restrict access to information and communication (such as the ideology of the phone company). In short, Hackers is a discourse of justication for and, in part, explanation of what happens in Minor Threats lm. Hackers helps to explain why someone would break into a telephone company control ofce and exercise control over the switch.
(Not) Hackers /
165
At that level, it is impossible to simply separate the representation of hackers offered in the lm Hackers from the reality of hackers in Minor Threats lm. What Hackers illustrates is the threat of multinational corporations, and what Minor Threats lm documents is the ability of hackers to intercede in that threat at the local level. In fact, to the new generation of hackers, Minor Threats hacking demonstrates the promise and possibility of achieving a global hacking community (represented in Hackers by cuts to stereotypes of hackers all logging on: a Frenchman in a caf, two Japanese hackers in ceremonial kimonos, and so on). The discourse of Hackers, at least in part, animates the lm by Minor Threat. By having the larger context of corporate control and dominance read in Hackers, hackers are provided with a justication for targeting the phone company and are provided further justication for understanding hackers and hacking in relation to U.S. corporate culture.
Social Engineering
Even though Hackers was not a critical or commercial success, it did manage to attract the attention of hackers who were busy hacking, phreaking, and, generally, building their reputations. In response to what these hackers read as an unequivocal attempt to label, dene, and commodify their culture, they accessed the lms Web site and redesigned it in protest. This was a strategy of resistance that has been gaining popularity in the computer underground. Although most hackers dismiss hacking Web pages as prankish behavior, as not a serious hack, it does remain an important part
(Not) Hackers /
167
THEYVE LIED ABOUT US . . . ARRESTED US . . . AND OUTLAWED US. BUT THEY CANT KEEP US OUT . . . AND THEY CANT SHUT US DOWN. From that point on, the hackers trope on the industry lingo in an effort to rewrite the meaning of the lm. Rather than a high-tech thriller, these hackers see the release of the lm this way: Hackers, the new action adventure movie from those idiots in Hollywood, takes you inside a world where theres no plot or creative thought, theres only boring rehashed ideas. Dade is a half-wit actor whos trying to t into his new role. When a seriously righteous hacker uncovers MGMs plot to steal millions of dollars, Dade and his fellow throwbacks of thespianism, Kate, Phreak, Cereal Killer and Lord Nikon, must face off against hordes of hackers, call in the FBI, and ponder a sinister UNIX patch called a Trojan. Before its over, Dade discovers his agent isnt taking his calls anymore, becomes the victim of a conspiracy, and falls in debt. All with the aid of his VISA card. Want the number? What Kool-Aid was to Jonestown . . . What the 6502 is to the Cellular Telephone Industry . . . Hackers is to every Cyberpunk movie ever made. Check out the site and see for yourself. There are two basic points of critique in this Web page hack. First, the hackers assert that the lm is in some way unrepresentative of hacker culture and threatens to damage more serious or proper presentations of hacker culture. In fact, they argue that the lm threatens to undermine an entire system of representations that describe hacker culture and with which hackers themselves identify. With the growth of the Internet, older hackers had already begun to witness an explosion of a new generation of hackers, who they regarded as uninformed and lazy. Unlike their generation, who had to explore and learn on their own, these new hackers, they feared, had it too easy. Terms such as script kiddies, lamers, and wannabes gained currency, describing hackers who had run sophisticated hacker programs (scripts) without understanding them
Original Web page image for the lm Hackers and modied image.
and had performed lame hacks without purpose or understanding. The hack occurred before the lms release, which accounts for the hackers dire predictions (Kool-Aid being the vehicle Jim Joness cultists used to commit mass suicide and 6502 CPU being the processor that allowed hackers to hack and clone cellular phones). Most of this older generation, themselves the product of WarGames, understood the inuence of media on hacker culture. The argument is made with equal force through a hacking of one of the lms title images, adding a carat and the word Not in front of the title Hackers. The hackers also further defaced the images of the lms stars, scribbling over their faces and adding colorful features. As a point of contrast, the hacked page displays a group of hackers (taken at DEFCON, the yearly hacker convention) drinking at a bar, their identities concealed by narrow black bands over their eyes, calling up associations with victims who need to have their identities protected. A second critique embedded in the hack of the lms Web page has to do with the very premise of the lm. Those who hacked the Web page argue that MGM (or any multinational corporation) cannot make a lm about hackers and global capitalism without implicating itself. MGMs intent in making the lm MGMs plot to steal millions of dollars mirrors the lms essential argument. The hackers point, then, is that MGM had to make a
(Not) Hackers /
169
Real hackers.
movie that followed its own ideology; it couldnt make a movie about real hackers because that would undermine its corporate viewpoint. MGM had too much at stake to describe in any accurate or reliable way what multinational capitalism is or hackers relationship to multinationals. The critique is as much a disavowal of the lms argument as it is a protest against unfairness or inaccuracy of representation. In that disavowal, however, there is also a reassertion of hackers identity, of what it means to be a real hacker. At base, as is the case with most media and hackers, there is a contradiction. Hackers want the exposure, even if it only provides them the opportunity to critique it. Almost as if they could predict the impact on the next generation of hackers, the page closes with the following warning: KNOWLEDGE ISNT FREE DONT HACK THE PLANET DONT SEE HACKERS IT SUCKS BUY TEACH YOURSELF C IN 21 DAYS INSTEAD The phrase Hack the planet is a mantra throughout Hackers, contrasting the movement of global capital and the globalization of technology, positioning the hacker at the global/local nexus. These
Conclusions
Just as computer culture has undergone a radical shift through the process of incorporation, hacker culture has changed as well. While hackers have proven enormously resistant to incorporation from the computer industry, the inuence of popular culture has been a more contested arena. Hacker identity is created and shaped by the split between a culture of expertise and a culture of end-users, but it is also heavily inuenced and dened by images from popular culture, even among hackers themselves. In examining how the industry and media shape the computer underground, several things become clear. First, the shift from a material to an information subculture has afforded hackers new strategies for reformulating subcultural identity and engaging in new strategies of resistance. Second, the threat of incorporation, traditionally structured as an economic and socially normative phenomenon, needs to be rethought around the thematic of information
(Not) Hackers /
171
rather than material production. In keeping with that hypothesis, it is not surprising to nd that the site of vulnerability for hacker culture and identity is not one of material production but one of information in the form of popular media and popular culture. Finally, it is not enough to understand hacker culture either as an entity separate from the representation of it or as a subculture formed exclusively in relation to those representations. Further, hacker culture, in shifting away from traditional norms of subculture formation, forces us to rethink the basic relationships between parent culture and subculture. In what follows, I illustrate how this fusion of subcultural identity and its ambivalent relationship to material culture and parent culture problematizes the gure of the hacker in terms of broader cultural norms and representations, particularly in relation to the state, law, and law enforcement.
Part III
Hacking Law
Hacking Law
This part returns to the question of the representation of hackers in popular and, most important, judicial discourse to explore how hackers are dened both popularly and legally in terms of criminality. In tracing out the discourse of computer crime, I argue that discourse about hackers criminality is focused on issues of the body, addiction, and performance. The domain of hackers is generally considered a virtual space, a space without bodies. The technology of punishment, however, has its roots rmly established in mechanisms that relate almost exclusively to the body. Even surveillance, which takes the body and the visual as its target, is problematized by the notion of virtual space. As a result, hackers, as noncorporeal criminals, have corporeality juridically forced upon them. Crimes, such as trespassing, that occur in virtual space need to be documented in the physical world and attached to bodies. Attaching these crimes to the hackers bodies does two things: rst, it focuses on acts of possession rather than performance, and, second, it focuses attention on the hackers body through metaphors of hunting and violence. Reading legal rulings regarding hackers and hacking and examining three cases of hackers who were tracked and, ultimately, captured and jailed, I illustrate the difculty that the legal system has in the representation of hackers as criminals. Accordingly, it is the possession of secrets (such as passwords) that law prohibits, not the actual use of them. Criminality becomes dened by possession, rather than action. There are striking parallels between the discourse of computer crimes and that regarding illegal drugs. Hackers are often seen as addicts, unable to control their compulsions virtual beings who sacrice their bodies to the drug of technology. The physical connection to technology is seen as the source of their criminality, as a performance of addiction, and courts have gone as
175
Chapter 6
The image of Secret Service agent Richard Gill in the movie Hackers reects both the hyperbole with which hackers are represented and the shallowness with which they are understood. Gills description of hackers becomes something of a mantra, repeated continually throughout the lm, making clear the fact that Gill, like many of the law enforcement ofcers he represents, has no idea what he is talking about. Instead, he is reciting a canned speech that is both sensationalistic and wildly inaccurate. For all the hyperbole of Gills statement, one aspect rings true law enforcements obsession with the corporeal. The highly sexualized metaphors of penetration and ravaging set against the delicacy of sensitive computers and data suggest that hackers are rapists and that computers are feminine. Further, this juxtapositioning makes a clear connection to the personication of information and makes it impossible to consider hackers solely in terms of the tools that they use. Technology, even to law enforcement, has become a problem of human relations, not merely a question of the tools that hackers use. The separation of technology, conceived of as a problem of human relations, from the technical, formulated as a problem of instrumentality and utility, forces us to rethink several key aspects of the concepts of law and punishment. The problem has often been discussed as a technical one, presenting law and disorder on the elec-
177
179
with possession of technology possession of the computer itself became the crime. It is important to note the fact that the possession of technology has become equated with and even been made to go beyond the performative act of its use. Here, the illegal performative act is ownership of the technology itself not its use. Hacking, then, is constituted as a crime around the notion of the possession of technology. The reasons for this are simple. Hacking is an act that threatens a number of institutionally codied, regulated, and disciplined social mechanisms, not the least of which is the law. Hacking, as an activity, enters and exposes the foundational contradictions within the very structure of social existence. Two of those primary structures are the relationships between technology, law, and the body and the importance of the notion of secrecy in the operation of culture. In many ways, hacking at once performs and violates these central tenets. Hackers are continually using secrecy to reveal secrets and often nd themselves in violation of the law without actually hacking. In this sense, hackers exist in a gray area where it is difcult to apply familiar standards of law and jurisdiction and hackers take delight in taunting law enforcement, trying to exist outside the laws reach.
181
has done much to analyze the fundamental relationship between law, technology, and punishment. In Discipline and Punish, Foucault examines the history of modern incarceration, tracing out the various technologies that have made connement and modern surveillance possible. Foucault sets out several guiding principles for understanding the relationships between technology and punishment. First, he writes, Do not concentrate the study of punitive mechanisms on their repressive effects alone, on their punishment aspects alone, but situate them in a whole series of their possible positive effects, even if these seem marginal at rst sight. As a consequence, regard punishment as a complex social function.5 As a methodological precaution, this makes a great deal of sense, particularly in terms of the relationship between technology and punishment. If the goal of law enforcement is to protect us from high-tech hoodlums, as is so often claimed, the questions remain, What is it that is being protected? and What does it mean to be protected? and What are the positive effects of protection? Such questions seem easily answered at rst sight, until one realizes that almost all of the high-prole cases that have been prosecuted do not involve common crimes. Hackers who enter systems and do nothing more than look around, or even copy les, do not prot from their crimes, generally do not do anything harmful or malicious, and do not cause any loss to the companies, organizations, or businesses that they intrude upon. Most often what hackers are accused of and prosecuted for is trespassing and possession of unauthorized access devices. That is, they are prosecuted for their presence, virtual though it may be. Thus, the juridical system is protecting citizens not from the actions of hackers but from the presence, or the possibility of the presence, of hackers. Here, we can identify one of the primary problems that confronts law enforcement: if presence is to be considered a crime, one needs something to be present. That presence can never be merely virtual, but instead must be linked in some real manner to the physical world. In short, hacking needs a body. This body, however, cannot just be any body. It must be a body that has a particular call to the exercise of punishment, discipline, or regulation, which leads us to Foucaults second methodological premise: Analyze punitive meth-
183
technology is a relational, rather than a technical, phenomenon, it becomes even more clear that it functions as one of the more complex networks of power. Relationships with technology infect every aspect of human communication, and technology mediates nearly every form of relationship. Even the most basic forms of face-to-face communication can be subject to recording, eavesdropping, or some other form of electronic snooping. In that sense, all human communication has at some level become public, insofar as all human relationships are mediated by and through technology that always threatens/promises to make that communication and those relationships public. Technology has become nothing more than the sum of and ordering of human relations that are in some manner mediated. The connection between technology and punishment is as old as human civil relations. As Nietzsche argued, it is precisely the connection between technology and punishment that allowed human relations to become codied and regulated. One can read Nietzsches On the Genealogy of Morals, perhaps one of the most insightful treatises on the relationship between culture and punishment, in just this light. Nietzsche insists on the separation of origins and utilities of things (particularly punishment), arguing that the cause of the origin of a thing and its eventual utility, its actual employment and place in a system of purposes, lie worlds apart. Nowhere is this more clearly established than in his reading of the origins of punishment. Technologies of punishment evolved from the need to create a memory in the human animal, and accordingly, the answers and methods for solving this primeval problem were not precisely gentle.8 What Nietzsche provides for us is the initial connection between human relations and technology: if one is to live in a civil society, one must follow certain rules, rules that are contrary to nature and even contrary to human survival. Hence, we nd the very possibility of a civil society rooted in the technology of memory. To call memory a technology is to suggest that it operates through a kind of mechanism that mediates human relations, and, as Nietzsche argues, punishment is precisely the technical mechanism by which we mediate all human relations through memory: Man could never do without blood, torture, and sacrices when he felt the need to create a memory for himself; the most dreadful sacri-
185
mentation of coercion but when the subject of punishment actually incorporates the system of punishment into his or her own life and begins to do it to him or herself. Most hackers understand both these principles. They understand that if the crime cannot be connected to a body, it cannot be punished. Moreover, they realize that, for the most part, the connection between technology and punishment is, at least in one sense, very tenuous. For the most part (and until recently), it was common for those who enforce the law to have little understanding of the technology that is used to break the law. As one hacker, Chris Goggans, describes his visit by federal agents: So they continued on in the search of my house and when they found absolutely nothing having to do with computers, they started digging through other stuff. They found a bag of cable and wire and they decided they better take that, because I might be able to hook up my stereo, so they took that.11 Indeed, law enforcement realizes that the information that will catch hackers and allow for their prosecution is not going to be computers, disks, or stereo cable, but instead the most valuable information will usually come from other hackers. Most hackers who are caught and/or sentenced are apprehended as a result of being turned in by another hacker. It is a hackers relationship with other hackers, coupled with the threat of severe penalties for lack of cooperation, that provides information for most arrests. One of the ways that law enforcement monitors hackers is by keeping careful watch on the relationships and networks that hackers set up among themselves. Evidence from and of these networks, usually the testimony of other hackers, is the most powerful evidence marshaled in criminal prosecutions of hackers. The most notorious hacker informer is Justin Tanner Peterson (Agent Steal), who worked for the FBI in the early 1990s, informing on dozens of hackers. However, in most cases, the principal evidence comes from hackers who have been bullied into cooperation by unusually high penalties and the threat of lengthy prison sentences. There is an additional side to technologys relationship to the body that demands exploration. While it is the hackers body that must be found, identied, and ultimately prosecuted, the relationship of hacking to the law has become curiously incorporeal in another sense.
187
constitutive becomes undecidable the act (if we can call it an act) of knowing a secret is indistinguishable from the act of performing an identity. It is this separation of body and identity that makes the act of hacking possible and it is this separation that is taken up by the law. The hacker does not have to perform anything to violate this law. The only quality that the hacker needs to manifest is a constitutive one proof that the hacker knows a secret that he or she is not supposed to know. How he or she got that information and whether or not it is used, which is to say performed, is of no consequence. The law itself afrms a crucial moment of secrecy, where simply knowing someone elses secret constitutes, legally, the performance of their identity.
189
This secrecy is regulated by a system of panopticism, an all-seeing system of surveillance that serves to instill a sense of always being watched in those who are subjected to it. Panopticism generates its power not by continually monitoring but by making it impossible to determine if you are being monitored at any given time. As a result, it is always possible that you are being watched, and it is impossible to determine with certainty if you are not being watched. It is the process by which subjects learn to govern and discipline themselves, internalizing the thought that they are continually under observation. The structure of panopticism exploits the secret in two ways through the dynamic of surveillance. Those who monitor do so by exploiting a secret whether or not one is being watched. The secret, then, whether or not someone is actually monitoring, preserves the power of the panoptical gaze. That gaze, however, is aimed precisely at the notion of secrecy itself. Panopticisms goal is the complete removal of the space where secrecy can operate ideally, in a panoptical space, no one operates in secret because it is always possible that ones actions are being watched. What is watched, and this is of crucial importance, is the body and the space that the body occupies. In terms of hackers, however, that body and that space are rendered unwatchable. One can watch a hackers actions, even monitor them, online, but this means nothing until they can be attached to a real body and therefore are prosecutable. The hacker can be read in this respect as a gure who both deploys and disturbs the notion of the secret, particularly in relation to the law. In short, hackers use of the secret is made possible by the space that the broader culture of secrecy opens up. The law targets the connection of the secret to the hackers body. Simply nding the body is not enough the law must attach the body to a secret. In one case in March of 1990, Chris Goggans was raided by Secret Service agents in just such a quest. As he recalls the events, Agent Foley approached him after a thorough search of the premises and confronted him with some business cards he had made up that read Eric Bloodaxe, Hacker, along with a small U.S. Treasury logo. Goggans responded to Foley: Well, it doesnt say anywhere on there Chris Goggans, Special Agent. It says, Eric Bloodaxe, Hacker. Whoever this Erik Bloodaxe character is. It might be me, it might not. Im Chris Gog-
191
punishment is not conned, however, to the world of the future. In the everyday world of hacking and computer crime, the elimination of the technological is the greatest threat the hacker faces, and, not unlike Cases employers, judges are fond of proscribing penalties for hackers that include forbidding them to access technology such as telephones, computers, or modems.19 The modern judicial system attempts to legally produce the equivalent of Cases neurological damage. The 1988 arrest, trial, and conviction of Kevin Mitnick for breaking into the phone companys COSMOS system (the computer system that controls phone service) provide a striking parallel to Gibsons character Case. During the trial itself, the judge sharply restricted his telephone access, allowing Mitnick to call only those numbers that had been approved by the court. After Mitnick was found guilty (and served prison time), his relationship to the technological was diagnosed as compulsive, and after his release he was prohibited from touching computers. A short time after, when it was determined that he could control his behavior, Mitnick was allowed to use computers again and even to look for employment in computer-related elds, but he was still not allowed to use a modem.20 Even more striking are the conditions of probation for Kevin Poulsen, another Los Angeles hacker. Poulsen was convicted of fraud for using his computer to illegally x radio call-in contests (among other things) and was given the following special conditions of supervision for probation: [Y]ou shall not obtain or possess any drivers license, social security number, birth certicate, passport or any other form of identication without the prior approval of the probation ofcer and further, you shall not use for any purpose or in any manner, any name other than your legal true name; you shall not obtain or possess any computer or computer related equipment or programs without the permission and approval of the probation ofcer; and you shall not seek or maintain employment that allows you access to computer equipment without prior approval of the probation ofcer.21
193
modems and his weight loss is presented as mininarrative in and of itself, a narrative that suggests both a causal connection between his lack of access to technology and his weight as well as the broader notion that technology is somehow harmful to the body. While the rst connection is obvious on the face of things, the second is a bit more elusive. Hacking, according to the judicial system, is akin to substance abuse (the actual term deployed by Mariana Pfaelzer, the sentencing judge for the U.S. district court in Mitnicks case). The judges decision was the result of the tactics of Mitnicks attorney, who argued that his clients computer behavior was something over which his client had little control, not unlike the compulsion to take drugs, drink alcohol or shoplift. As a result, Mitnick was sentenced to a one-year prison term with six months of rehabilitation to be served in a halfway house. Mitnick continued attending meetings for codependent children and children of alcoholics following his release from the halfway house.28 What is interesting about this treatment is the manner in which the law and the structures of punishment remain blind to the social dimensions of technology. In Mitnicks case, the computer is viewed as an object that is essentially negative in character. It is not a value-neutral tool, one that can be used benecially or maliciously. It is positioned not as a substance but as a dangerous substance. Computers are likened to drugs and alcohol. The shift is subtle but important, and it betrays an underlying anxiety and hostility toward technology. It is also, most likely, the reason why the plea was successful. The problematic nature of drugs has centered (at least since Platos time) on the undecidability of their nature. Drugs have traditionally been regarded as substances that, when taken, have the ability either to poison or to cure.29 Particularly in the wake of national hysteria, including the War on Drugs and the Reagan administrations Just Say No campaigns, drugs have taken on a fundamentally negative symbolic valance. There are at least two reasons for this transformation. First, the national campaigns dating from the mid1970s and 1980s have heavily coded drugs as dangerous, deadly, and addictive. Second, in the wake of HIV and AIDS, drugs have begun
195
periods of pursuit, there is a mechanism for describing hackers that deploys a well-embedded narrative that fosters clear perceptions of who the hacker is and what threat she or he poses. It is commonly framed in the basic cops and robbers vernacular, where the hacker is often described in criminal, but nonviolent, terms. Those who pursue him are often characterized as sleuths, trackers, or hunters. The hacker is a cyberthief or, for high drama, a master cyberthief, and the pursuit invokes the language of the hunt (tracking, snaring, tracing, or retracing). Often this narrative will feature hackers as fugitives who elude, and, repeatedly, they will be described (once apprehended) as being caught in their own web. In some cases, hackers are even given honoric titles such as Prince of Hackers or Break-in Artist. The most compelling aspect of these narratives is the manner in which the metaphors of the hunt are enacted. The hunt is not, as one might immediately suspect, a strategy of depersonalization the hacker is not reduced to some animal form that is tracked, hunted, and captured or killed. In fact, the discourse of the hacker is less about the hunted and more about the hunter. As we read about the hunt, we uncover two dynamics: rst, the drama of the hunt, which always seems to hold a particular narrative fascination; and, second, the narrative of the hunter, who, in order to catch his or her prey, must learn to think like them. Part of our fascination is with the act of repetition, which we live out vicariously, through the hunt. We watch as the hunter learns to think like the hunted, and it is through that process that information about the hackers motives, intentions, and worldview is disclosed. The drama of the hunt is an extremely familiar narrative, and it presumes a great deal of information: the activity is adversarial; there is are hunter, a hunted, and a gamelike quality that relies on deception, sleight of hand, illusion, and misdirection. Indeed, the notion of a trap relies, at its heart, on the act of deception. It must look like something appealing, when in fact it presents great danger. The manner in which the hunt is described, and often enacted, is also about how one thinks, particularly how the hunted thinks. Will he or she be smart enough to see the trap in advance? Will he or she outsmart the hunter? The structure of the hunt, then, is primarily a
197
tention because of their media exposure and high prole. Each of these cases is unusual, in part, because the subjects of them received jail time, an unusual penalty for hacking offenses, particularly for young adults. The rst, the story of Kevin Mitnick, has been the subject of at least three recent books and tells the tale of federal agents, who were led on a series of cross-country manhunts, and of Mitnick, who went by the handle Condor, nally being apprehended by Tsutomu Shimomura, a computer security expert at the NSCA center in San Diego. The second, the story of hacker Mark Abene, also known as Phiber Optik, explores the underground war between rival hacker groups, the LOD (Legion of Doom) and the MOD (Masters of Deception). In the aftermath, Abene would be charged with a series of crimes and end up spending more than two years in jail. The third story is about Kevin Poulsen, a Los Angeles hacker who was arrested after being featured on Unsolved Mysteries, a TV program that helps law enforcement capture fugitives from justice. What is unusual about these three cases is not what the hackers themselves did but rather the reactions that their actions prompted and the manner in which each was described, reported, and detailed in the popular press and media.
Mitnicks arrest was the result, in part, of the work and technical expertise of computer security expert Tsutomu Shimomura. Shimomura believes that on Christmas day, 1994, Mitnick hacked his system and downloaded Internet security programs as well as programs designed to hack cellular telephone equipment. Shimomuras investigation (as well as several prank phone calls allegedly from Mitnick himself) revealed Mitnicks identity. From that point on, Shimomura began his own personal manhunt (with the help of the FBI, local telephone companies, long-distance service providers, colleagues from the San Diego Supercomputer Center, and independent computer consultants), which led them rst to The Well, a Sausalito-
199
based Internet service provider where Mitnick had stashed the les he had downloaded from Shimomuras machine. From there, the trail led to Netcom, the San Jose provider that had recently had its more than twenty thousand credit card numbers lifted by someone who was assumed to be Mitnick (even though the le of credit card numbers, which Netcom had stored online, unencrypted, had been circulating on the Internet for months prior to Mitnicks use of the system). At this point federal investigators had pinned down Mitnicks location. They were certain he was operating from somewhere in Colorado (almost two thousand miles away from his actual center of operations). Shimomura was able to identify two other points of operation Minneapolis and Raleigh, each of which had Netcom dial-in numbers. As telephone records were searched, investigators were able to narrow the search to Raleigh, where calls were being made with a cellular modem. Calls were moving through a local switching ofce operated by GTE Corp. But GTEs records showed that the calls looped through a nearby cellular phone switch operated by Sprint. . . . Neither company had a record identifying the cellular phone.36 By using cellular tracking equipment, investigators (primarily Sprint technicians) were able to locate the building and eventually the apartment from which Mitnick was operating. As Markoff told the story in the New York Times: On Tuesday evening, the agents had an address Apartment 202 and at 8:30 p.m. a federal judge in Raleigh issued the warrant from his home. At 2:00 a.m. Wednesday, while a cold rain fell in Raleigh, FBI agents knocked on the door of Apartment 202. It took Mitnick more than ve minutes to open it. When he did, he said he was on the phone with his lawyer. But when an agent took the receiver, the line went dead. Subsequently, Mitnick has been charged with two federal crimes: illegal use of a telephone access device, punishable by up to 15 years in prison and a $250,000 ne, and computer fraud, [which] carries penalties of 20 years in prison and a $250,000 ne.37 The story of Mitnicks capture and arrest has been chronicled in a host of newspaper articles and magazine stories and recently in two books, Takedown: The Pursuit and Capture of Kevin Mitnick, Americas Most Wanted Computer Outlaw by the Man Who Did It (by Tsutomu Shi-
201
of which carried a possible sentence of fteen years, charges only made possible by the connection of Mitnick to computer intrusion by physical evidence. Where Shimomura had seen only a contest in virtual space between himself and a hacker, law enforcement had seen criminality. Even as Shimomura considered Mitnick to be petty and vindictive, guilty of invasion of other peoples privacy and pursuit of their intellectual property, he still remained ambivalent about Mitnicks arrest Strangely, he writes, I felt neither good or bad about seeing him on his way to jail, just vaguely unsatised. It wasnt an elegant solution not because I bought some peoples claims that Mitnick was someone innocently exploring cyberspace, without even the white-collar criminals prot motive, but because he seemed to be a special case in so many ways.41 In many ways, Shimomuras analysis details precisely the crime of which Mitnick was guilty a crime of identity, the crime of being Kevin Mitnick. The threat that Mitnick posed was also the thing that made him so difcult to track down and capture. It was a case of fraud in which no one was defrauded, in which nothing of value was taken or destroyed, and which likely would have been entirely a noncriminal matter had Mitnick, in fact, been someone else. What the case of Mitnick makes clear is that the criminal dimension of hacking is entirely dependent on the connection of a virtual identity to a corporeal presence who is anyone other than who they claim to be. This virtual/corporeal split is what animates the metaphor of the hunt and what demands that the hackers body be the subject of law and representation in juridical discourse. The body that both law enforcement and the media chased, however, was a body that had been in large part the invention of the Southern California media.
Creating Kevin: The Darkside Hacker and the Southern California Media (From Los Angeles to New York and Back Again) Remember, I didnt make up the term dark-side hacker; that was an invention of the Southern California press. John Markoff
Mitnicks story has been told, it seems, by just about everyone but Mitnick himself. The story, which began as a local-interest piece on
203
always sought to maintain a low prole, even refusing to talk with Hafner and Markoff while they were writing Cyberpunk. As a result, Hafner and Markoff relied extensively on sources who portrayed Mitnick as a malicious, petty, and evil person who tampered with celebrities telephone lines, altered credit reports, and accessed and changed police les, accusations that Mitnick denies. Two of the main sources for Hafner and Markoffs account were Susan and Roscoe, two of Mitnicks fellow hackers who, as Hafner and Markoff write, cooperated with us in the understanding that their true names would not be revealed. In a nal touch of irony, the authors end the book with the line, We respect their right to privacy. One of the two, Roscoe, would later claim that much of the information he provided to Hafner and Markoff was intended to deceive them. The most damning accusations against Mitnick were not his hacking exploits. What colored perception of Mitnick most thoroughly were the little things, most of which, Mitnick claims, were untrue and used for the purpose of spin and to assign motive to his actions. The accusation that seems to bother him most is the claim that he stole money from his mothers purse to further his hacking exploits, an incident that he refers to as absolute ction. What has damned Mitnick in the eyes of both the public and law enforcement is not his hacking, but his personality. That characterization of Mitnick is built almost entirely on secondhand accounts from people who had either served as informants against him or had an investment in vilifying him to suit their own agendas. Turning Mitnick into the archetypal dark-side computer hacker is a move that has suited a number of agendas, most recently Shimomuras and Markoffs. Since Cyberpunk, Markoff has kept the Mitnick story alive in the pages of the New York Times, referring to Mitnick as Cyberspaces Most Wanted, a computer programmer run amok, and the Prince of Hackers. Markoff also covered the break-in of Shimomuras system, which spurred the manhunt that would ultimately lead to Mitnicks arrest. Initially, the two stories were unrelated, the rst describing how Mitnick was eluding an FBI manhunt (July 4, 1994) and the second detailing how Shimomuras computer system
205
Mitnick remained a Los Angeles story. He was imprisoned in the Los Angeles Metropolitan Detention Center as a pretrial detainee for four years awaiting trial. During his detention, stories circulated about Mitnick that raised concerns so grave that Judge Marianne Pfaelzer went as far as denying him the right to a bail hearing. For those four years, Mitnick was held in a maximum-security facility, permitted visits only from his attorneys and his immediate family. His only contact with the outside world was on the telephone. Government attorneys refused to provide evidence to be used against him, citing its proprietary nature, and an attorney of Mitnicks (a court-appointed panel attorney) was denied his fees (billed at the rate of sixty dollars per hour) by the court over the summer of 1997 because the judge ruled them excessive. Pfaelzer told attorney Don Randolph, You are spending too much time on this case. In an earlier case, Pfaelzer had prohibited Mitnick from unsupervised access to telephones while awaiting trial. The Ofce of Prisons found that the only way it could comply with the judges order was to keep Mitnick separated from the general population. As a result, Mitnick spent eight months awaiting trial in solitary connement. In many senses, Kevin Mitnick can be seen as a creation of the press and the other media. The images they have generated have attached themselves to Mitnicks body and have had real and material effects. Most specically, the denial of a bail hearing, which left Mitnick incarcerated for a period of more than four years awaiting trial, and his incarceration in solitary connement both speak to the kinds of effects that such representations have had on his life. While the media portrayal of Kevin Mitnick focuses on fears of the evil genius or lone computer hacker, there is a second story and hunt that focus on youth culture, rebellion, and fears of youth violence, particularly in urban settings.
207
sault. The contest, which began as an eruption of tensions between two aspects of boy culture, would become something quite different by the conicts end. As members of the LOD began to outgrow boy culture and needed to make the transition to the adult world, they found their rivals in the MOD doing everything in their power to make that transition difcult. Both the LOD and the MOD have written histories that document the groups origins, developments, active membership, and past or retired members. In these documents, each group presents its own historical narrative, mainly, as The History of LOD/H indicates, to present an accurate picture of events and people who have been associated with this group.46 The LOD text also illustrates how squarely the group t in the mold of boy culture. The groups name (and most probably the idea for the group itself) originated with Lex Luthor. Chris Goggans describes the creation of the group: The person whose idea it was to start the group, his handle was Lex Luthor, and from the DC comics, Lex Luthors infamous group of antiheroes was The Legion of Doom, so it was a pretty natural choice. A lot of stuff has been attributed to it lately, such as it being a sinister type name. Well, Lex Luthor couldnt possibly have called his group anything other than the Legion of Doom. Anybody who has ever read a Super Friends comic knows thats exactly what it was called.47 Luthor conrms the names origin in The History of LOD/H. He writes, The name Legion of Doom obviously came from the cartoon series which pitted them against the Super Friends. I suppose other group names have come from stranger sources. My handle, Lex Luthor, came from the movie Superman I. In the cartoon series, LOD is led by Lex Luthor and thus, the name was rather tting.48 As the LOD grew, so did its reputation. Although there have been relatively few actual members of the group, many hackers have claimed either to be members or to be in some way afliated with the group in order to boost their own reputations in the underground. According to Goggans, throughout the late 1980s and early 1990s, the reps of everybody involved in the group kind of sky rocketed due mainly to the fact that, as a group, they all worked together and therefore had a better resource of knowledge than many of the other hackers working
209
In distinction to the LOD, the MOD was formed later, in 1987, was a much smaller group, and was locally based in New York. The three original members were Acid Phreak, the Wing, and Scorpion. Later Phiber Optik would join the group, and by August of 1990, the MOD had grown to fourteen members. The MOD shared few characteristics with the LOD, either geographically or experientially, and the differences between the two cultures would be the basis for the hacker war that followed. The most interesting, and certainly most detailed, account of the rivalry between the LOD and the MOD is that in Michelle Slatalla and Joshua Quittners book, Masters of Deception: The Gang That Ruled Cyberspace. Slatalla and Quittner put forth a narrative driven by racial conict that portrays the rivalry between the LOD and the MOD as a gang war. As Slatalla and Quittner describe it, the conict between the LOD and the MOD was motivated by two main factors. First, there was an incident over a phone conference bridge (an event where a group of hackers gather on phone lines and do the equivalent of a conference call) in which an LOD member called an MOD member (John Lee) a nigger. This, Slatalla and Quittner contend, changed a friendly rivalry into an all-out gang war, a highly illegal battle royal.52 The second factor, which seems particularly odd for a discussion of cyberspace, was, according to Slatalla and Quittner, geographical. In fact, Slatalla and Quittner subsume the rst event within the second. As background to this second point, it should be noted that the LOD had members from Texas. They were on the line during the crucial conference bridge when John Lee of the MOD (as this point he was using the handle Dope Fiend from MOD) joined the conversation. One of the Texans noted over the phone that the newcomer did not have an accent common to these [that is, Texas] parts. The newcomer spoke in a distinctly non-white, non-middle-class, non-Texas inection. As Slatalla and Quittner report the event, One of the Texans (who knows who) takes umbrage. Get that nigger off the line! 53 At that moment, as the narrative unfolds, John Lee (an African American) decided that he would take revenge on the LOD With that one word, war had been declared. As Slatalla and Quittner argue, You dont survive on the street by allowing white boys to
211
mer LOD members computer security business. Just as Goggans and others were moving out of their boy culture and into the world of corporate responsibility, they would nd MOD members making their lives difcult. The boy war had escalated into something beyond hacker one-upmanship. Goggans and other LOD members were trying to make a living, while MOD members were still waging warfare as youths struggling for control. At that point, LOD members did the unthinkable: they called the authorities. The narrative construction of the conict between the LOD and the MOD as a matter of gang warfare serves to dene hackers in terms of corporeality and physical space. Slatalla and Quittners characterization reconnects the concepts of hacking and the body through race and the threat of violence. Equally important are the connections to geography, highlighted through the narrative of class the MODs urban, street-smart hackers, versus the privileged suburbanite kids from Texas. What Slatalla and Quittner miss, however, is the shift that was occurring in the hacker underground. The boys of the LOD were becoming adults, and making that transition meant entering the world of adult responsibility and adult authority. The indictment that would lead to the sentencing of the members of the MOD, however, was completely unrelated to any sense of corporeality or geography. It contained eleven counts, which could result in up to fty-ve years in jail and almost three million dollars in nes. The formal indictment charged unauthorized access to computers, possession of unauthorized access devices, four counts of interception of electronic communications, and four counts of wire fraud.57 The most interesting charge leveled against the hackers was one of conspiracy. It was alleged that the members of the MOD had conspired to gain access to and control of computer systems in order to enhance their image and prestige among computer hackers.58 For the rst time, hackers were accused of organized crime. By elevating the indictment to include conspiracy, prosecutors had criminalized one of the oldest and most basic components of the computer underground the desire to build and maintain a reputation based on group afliation. The effect of the indictment was to suggest that the hackers of the MOD were in fact violent criminals who were
Kevin Poulsen
The third type of characterization of hackers carries the suggestion that hackers are by the very act of hacking violating national security. In these narrative constructions, hackers are seen as notorious, as rogues, as Most Wanted, as invaders and intruders, even as computer terrorists. In contrast to depictions of hackers
213
as master criminals or even gang members, these constructions are, perhaps, the most serious and the most exaggerated of the three. In many ways the most interesting narrative of the pursuit and capture of a hacker is that involving Kevin Poulsen. Poulsen, who used the handle Dark Dante, was accused of, among other things, intercepting Pacic Bell security conversations and embezzlement of government information, including stealing a computer printout that contained information about how phone numbers were assigned (rendering them vulnerable to phone taps) and even the phone numbers of celebrities and leaders such as Ferdinand Marcos. A number of his discoveries, it would turn out, were targets of highly condential FBI investigations, and, as a result of this and other offenses, Poulsen would be charged, ultimately, with espionage.59 Although most of the more serious charges (including espionage and most of the wiretap charges) were dismissed, Poulsen was still convicted of a host of charges and sentenced to ve years in jail. Like most hackers, Poulsens interest in computer networks started as a matter of curiosity, but quickly turned into something more. My intrusions, he explains, particularly physical ones, were more than just ways of gaining knowledge. I think, in a way, part of me saw the network as something mystical and arcane. Exploring a telephone switching center, immersed in the sights and sounds of rooms full of equipment, was a kind of transcendence for me. A chance to become something greater than myself.60 As a consequence of his hacking, Poulsen was red from his job in Northern California and moved back to Los Angles in 1988. Unemployed, he continued hacking as a means to generate income, even developing an elaborate scam to utilize disconnected escort-service phone numbers to supply Los Angeles pimps with a steady supply of customers. When escort services would go out of business (usually as a result of police raids), their numbers would be disconnected. What Poulsen gured out was that their advertising, particularly in the Yellow Pages, meant that customers were still calling. It was merely a matter of reconnecting and redirecting the calls for services that were already advertised and marketed. Some of Poulsens exploits had received the attention of federal investigators, however. After discovering he was under investiga-
215
hacker.65 To law enforcement, however, what makes Poulsen dangerous is not the secrets he knows but, rather, the kinds of secrets he knows. In many ways, the information that Poulsen uncovered in his surveillance of the FBI was incidental. The disturbing thing about Poulsen was the knowledge he had gained about the kinds of people that were under surveillance. Poulsen exposed not the secret per se but the secret that guards all secrets. In a panoptical environment, the power of the gaze is dened by its possibility, by the fact that it is always possible that at any given time one could be seen. Poulsens discovery, and therefore his threat, was the ability to know, at any given moment, who was and was not being watched. Poulsens threat was not to any particular secret but to the very structure of secrecy itself. The need to brand Poulsen as a threat to national security was based, at least in part, on his ability to elide surveillance, and what that ability reveals is the degree to which surveillance denes the state of national security in the digital age. Ironically, the government turned to Unsolved Mysteries, revealing the manner in which such shows are complicit with strategies of government surveillance in part through encouraging citizen participation. Poulsens response to the show enacted an intervention into the mechanisms of surveillance. Poulsen had been informed of the time and date that the show would run and realized that the attention it would bring would potentially lead to his arrest. In response, he formulated a plan to short-circuit the system. Tempted initially to knock out Channel Four, by cutting cables at the transmitter tower to block the airing of the show in Los Angeles, Poulsen reconsidered, realizing that it would guarantee a repeat appearance on every segment of Unsolved Mysteries.66 Instead, Poulsens response was more creative. Littman reports the following about the night of the shows Los Angeles airing: On schedule, NBC plays the shows eerie theme music followed by a quick preview of that nights episodes. . . . Then, in a matter of seconds, everything changes. Im dead! calls out an operator, peeling off her headset. Me, too! another cries, and then like an angry ock of blue jays the voices squawk. Im dead!
217
is fear of violence, race, or class, as was the case with the MOD, or the threat to national security and secrecy, as was the case with Kevin Poulsen, hackers are continually branded as criminals in remarkably exible and varied ways. While this anxiety is recorded throughout the greater part of human history, it reached a certain peak in the latter half of the twentieth century, particularly in response to what we might consider the proliferation of computer technology brought about by the home computer or personal computer (PC) as computers have entered the home, workplace, and schools. Anxiety manifests itself around the notion of an expectation, whereby we nd, according to Freud, a general apprehensiveness, a kind of freely oating anxiety which is ready to attach itself to any idea that is in any way suitable, which inuences judgment, selects what is to be expected, and lies in wait for any opportunity that will allow it to justify itself. In other words, anxiety is related to a sense of the unknown and of uncertainty. This particular form of anxiety what Freud called expectant anxiety clearly manifests itself around the notion of technology. Such anxiety is different from what we commonly think of as a phobia. With computer technology, people are not, necessarily, afraid of the machines themselves. What they fear is the future as Freud argues, they foresee the most frightful of all possibilities, interpret every chance event as a premonition of evil and exploit every uncertainty in a bad sense.68 The anxiety over technology, as an expectant anxiety aimed at the future, calls into question almost every aspect of daily human interaction. Accordingly, such anxiety triggers the process of displacement, whereby the expectant anxiety over something important can be rethought and managed in relation to something unimportant. Computers, being both part of everyday experience and a ubiquitous part of daily life, are the idea vessel for such displacement. The process of displacement occurs through allusion. In such an act, the object onto which anxiety is displaced is easily intelligible (unlike allusions in dreams, for example), and the substitute must be related in its subject-matter to the genuine thing it stands for.69 Technology, in most every sense, is not the cause of these fears but rather the object tied to anxiety by allusion or proximity. In the discourse surrounding hackers and hacking, the main site of displacement is the
219
law and in doing so are able to elude the gaze of state surveillance. The criminalization of virtual identity becomes both the goal of law enforcement and the primary locus of discussion about the threat of hackers and cyberspace to society. As law enforcement describes it, the loss of the body to virtual identity not only serves to make the body of the hacker disappear but also makes the hacker legally unaccountable, providing a space from which the hacker may then inict violence on bodies (or even on the social body, as with the threat of espionage) with impunity. As the cases of these hackers make clear, there is an investment in creating stories and images of hackers that serve to allow a greater social displacement of anxiety upon them. As part of that system of representation, law enforcement, media, and the state are heavily invested in the manner and style in which hackers are represented. Those representations, whether translated into law or broadcast on Unsolved Mysteries, are useful vessels for the displacement of anxiety about crime and technology and, ultimately, provide a powerful diversion to allow the progression of state surveillance, observation, and regulation and to include and encourage citizen involvement in the processes and mechanisms of surveillance.
Epilogue
220
Epilogue /
221
have resulted in more than twenty years in prison. Stories, including half a dozen books and a lm set to be released by Miramax, about Mitnicks case have all focused on his capture and arrest. What has been less publicized has been the aftermath of Mitnicks case, which has included a number of important legal matters and has spawned a unied hacker movement that has focused on the political issues surrounding his incarceration. A generation of hackers, some in their early teens, were the force behind the Free Kevin movement, which held protests, engaged in a public awareness campaign, and even created a legal defense fund for Mitnick. While Mitnicks hacking may have had an impact on the underground, his arrest and imprisonment shaped the attitudes and opinions of an entire generation of hackers who came of age in this ve-year period. What Mitnicks case reveals, more than anything, is the manner in which secrecy is tied to technology. The most serious charges against Mitnick involved the copying of proprietary information from cellular phone companies. The violation was not breaking into the system, nor was it the actual copying or possession of les from the system. Instead, what was violated was the proprietary nature of those les. Mitnick broke the code of secrecy, which, according to the corporations in the indictment, had made the information worthless.
222 / Epilogue
Mitnicks case raised a number of important issues that were hotly debated in pretrial motions but never litigated. Four central issues leading up to the plea bargain made his case unique and reveal a great deal about legal and public attitudes toward hackers. First, Mitnicks pretrial detention and lack of a bail hearing were used by Mitnicks supporters as a fundamental rallying point. Second, advocates of the Free Kevin movement argued that the governments effort to deny Mitnick and his attorneys access to the evidence to be presented at trial was a violation of his fundamental rights. Third, there were a number of moments of resistance where hackers sent messages to the larger computer community, the most visible being a hack of the New York Times Web page, done the weekend the Starr report (on dealings of President Clinton) was released. Finally, the plea bargain itself, which came in the wake of several defense motions accusing the government of illegally gaining evidence against Mitnick, drew the case to a close, but not without a media feeding frenzy, which included serious leaks to the media.
Epilogue /
223
the Free Kevin movement under the principle that he was denied his constitutional right to a bail hearing. From that point on, the focus would be not on his guilt or innocence but on the process by which his case proceeded. It was also the moment at which Mitnicks own attitude in his case shifted and he began to describe himself as a political prisoner. Mitnick and others close to his case were convinced that he was being treated harshly to send a message to other would-be hackers. In the months that followed, the court and the government would face new legal issues, many of which had previously been undecided, making it exceedingly difcult for Mitnick and the defense team to gain access to the information that would be presented against Mitnick at trial.
Kevins Computer
After Mitnicks arrest in 1995, the government was in possession of two of Kevins laptop computers, containing thousands of les and nearly ten gigabytes of data. When attorneys for Mitnick and his codefendant, Lewis DePayne, asked to review the evidence, they were provided with a 187-page list of lenames with no summary or explanatory information defense attorney Richard Sherman described the data as incomprehensible. Although the government claimed to have examined each piece of data, it claimed no record of what is actually on the computer hard drives. The investigators, the government claimed, who sorted through the thousands of les took no notes and made no record of what they found. The question of access to a computer was only surprising insofar as it is an issue at all. Nearly all of the evidence in this case is in electronic form, and it is patently clear that Mitnicks expertise was undoubtedly useful, if not essential, in preparing his own defense. With roughly ve million pages of material (a large percentage of it, 70 to 80 percent according to prosecutors, containing source code or software programs), electronic searching and retrieval were extremely useful in cataloging and analyzing the information. These were Mitnicks les, after all, and he was probably the best person to decipher what is on his own hard disks. What causes concern is that the computer was being targeted as
224 / Epilogue
such a threatening device. While it is true that Mitnick used a computer to commit crimes, it is hard to imagine a judge prohibiting someone accused of forgery from using a pen, or a bookie from making phone calls, even if that is how she or he took bets. Without a modem or network card, the threat a computer poses is minimal to nonexistent. Perhaps prosecutors were wary because they didnt understand that, or perhaps they were being punitive, knowing what an important part computers have played in Mitnicks life. Perhaps (as one report has it) they were afraid Mitnick would spend time playing computer games, rather than preparing his defense. In any event, it was not the rst time that Mitnick had been put in a difcult position because of his technological savvy. Earlier, he had spent eight months in solitary connement as a way to prohibit him from using the telephone, out of fear that he would whistle a computer virus over the phone lines. Later, while in jail, he was again sent to solitary connement and all of his items were conscated after it was suspected that he was modifying a Sony Walkman to create a transmitter or electronic eavesdropping device. Both these imagined tricks were technologically impossible; authorities belief that they could be accomplished was prompted by an overreaction based on a fear of technology, generally, and a fear of hacking, specically. The data in this case was unusual and presented more than a few problems for both Mitnick and the court. What makes these problems unusual (a fact that Judge Pfaelzer steadfastly denied, claiming there was nothing unusual about the case at all) is the nature of the data itself. The important data fell into three categories. The rst is the least interesting and, probably, the most damaging. Although the government gave little indication of any of the evidence that would be presented, it was clear that some of it would be composed of correspondence and text les that document illegal activity that was undertaken by the defendants. Files containing stolen passwords and credit card numbers, for example, would have been necessary for the government to make its case on most of the indictments. This data, which the government must have known about, should have clearly followed traditional rules of discovery, which is to say, it should have been provided to the defense just as any other documents or evidence must be. That, however, didnt happen until much later (three and
Epilogue /
225
a half years) in the case, and the reason for that was related to the second two categories of evidence. The second category, what was labeled proprietary software, consisted of the objects that Mitnick was accused of stealing. It was also the source of most of the damages for which Mitnick was being held accountable. This software, it is alleged in count 15 of the indictment, is valued in the millions of dollars and is the source of the massively inated jail time (up to two hundred years) that Mitnick was faced with. Because he was charged with wire fraud (in addition to computer fraud), the sentence was based on the damage done, rather than the offense. Because he had compromised proprietary software, the prosecutors charged, he made that software, very expensive software, worthless. What Mitnick had violated was its proprietary nature, and that, the government claimed, was what gave it its value. It did not matter that Mitnick did not deprive the company of the information or that there was no evidence that he would sell or distribute it. What mattered in this case was that the value of the software was generated by its secrecy, and by copying it, Mitnick had violated that secrecy, rendering it worthless. This proved a problem for the rules of evidence as well. The government, however, argued that because this software was proprietary, it couldnt make copies to provide to the defense. Copying it, they said, would amount to a commission of the same crime for which Mitnick was under indictment. The companies involved, the government argued, were none too happy about having a second copy of their source code produced. The prosecutors offered to let the defense team look at the evidence at the government ofces, but because it is proprietary they were unwilling to copy it. Of course, this presented a problem for Mitnick in particular; being held in the Metropolitan Detention Center made it impossible for him to visit the government law ofces. The third category of evidence presents an altogether new challenge encryption. At least a portion of the les on Mitnicks hard disks was encrypted, and Mitnick was not forthcoming with the password. The government claimed that it had no way of knowing what was in those les, so it didnt plan to use them. Therefore, they argued, there was no need to provide them to the defense. Legally,
226 / Epilogue
this presented a problem. The defense claimed that some of that information could be exculpatory that is, it might be very useful in Mitnicks defense. They wanted a copy of the encrypted les to nd out. But if that was allowed, the prosecution, suspecting that some of the most damaging information was probably encrypted, wanted to look as well. This, the defense argued, violated Mitnicks right to not incriminate himself. The government had data it couldnt use, and what the defense might be able to use, it couldnt have. The issue was resolved by the judge based on an appeal made by the prosecution. Those les, the prosecution claimed, could contain a virus or damaging software, and that virus or software could be released by Mitnick if the les were returned to him. Judge Pfaelzer saw the encrypted les as a clever move on Mitnicks part and ultimately refused the defense team access to the les unless Mitnick revealed the password to decrypt the les. The nature of the electronic data, for which there had been no case law or precedent, was used by the government as a justication for not providing copies of any of the electronic evidence to be used against Mitnick to the defense. The complexity that technology brought to the case was used by the government as a smoke screen to deny basic access to information about the case. The government also used the technological nature of the evidence as a way to restrict access to it. In response to industry and government concerns about distributing proprietary software to the defense team and to Mitnick, in particular, both sides agreed to place the proprietary software under a protective order, meaning that the evidence could not be discussed outside of the defense team and their experts. Government attorneys, however, wanted to extend that protective order to cover all the evidence in the case, including the categories of hacker tools and Mitnicks personal correspondence. A protective order that covered all of the evidence to be used in this trial would have prohibited Mitnick from discussing any aspect of the case publicly and would, in essence, have prohibited him from being able to tell his own side of the story at a later date. Even if he were found to be not guilty, the protective order would make it impossible for Mitnick to discuss the charges against him or the indictment without being held in contempt of court. As a result,
Epilogue /
227
Mitnick has refused to sign the protective order, which he believed was an attempt to chill free speech in the future. As the initial hearing proceeded, other facts began to come to light. The defense claimed that one of the witnesses against Mitnick, Ron Austin, had been working as a government informant while he was employed by Mitnicks former attorney, Richard Sherman, and during that time was privy to privileged attorney/client communication. In 1994, the defense claimed, Austin was surreptitiously (and apparently illegally) tape-recording conversations with Kevin Mitnick as part of his cooperation agreement with the government. Although the government lings indicate that Austins employment in Shermans ofce was unbeknownst to the government, Assistant U.S. Attorney David Schindler authorized Austin to continue to surreptitiously record his telephone conversations with Mitnick to facilitate the investigation in 1994. The defense argued in a ling that governments failure to cease all interviews with Mr. Austin immediately upon the disclosure of his relationship with Mr. Sherman constitutes, in itself, a serious abrogation of the governments professional, ethical, and legal obligations. According to Mitnicks attorneys, the conditions of Ron Austins plea bargain, which they requested in October of 1996, were not made available to them for nearly two years after the initial request. Such information, Don Randolph says, can be essential in impeaching witness testimony. Shortly before Mitnicks plea deal was struck, the defense team introduced two motions to suppress evidence. In the motions, they argue, the search warrant that was used in Mitnicks arrest was so overly broad (it failed to include an address, physical description the building, or other identifying information) and was so badly executed that it should be considered invalid. More damaging, though, were allegations that Shimomura was acting as a government agent (conrmed in a statement by FBI director Louis Freeh) when he illegally monitored and intercepted several of Mitnicks communications. Since that was the grounds for probable cause, the defense argued, anything resulting from those illegally intercepted communications must also be suppressed. If successful, this would suppress nearly all of the evidence against Mitnick, making a con-
228 / Epilogue
viction extremely difcult. The motions were taken seriously enough by prosecutors to request a delay in having them heard so that they could formulate a response. That response would not be led. Instead, that week, prosecutors and defense attorneys led a plea agreement with the court that ended the case before a decision could be rendered on either motion. While the legal issues presented new challenges both for the court and for the attorneys, the case also produced a range of responses in the hacker community, which ranged from indifference to outrage. In a few instances, hackers took matters into their own hands. There were protests, editorials, Web pages, and bumper stickers and T-shirts with the Free Kevin logo. The most dramatic incident was a high-prole hack, which took down the New York Times Web site for the better part of a day. While hacked Web pages are fairly commonplace, and occur with surprising regularity, they usually fall into the category of juvenile pranks, where no damage is done Web page images are either replaced with pornographic ones or hackers leave messages to document their hacking talents. The Times web hack was different, primarily because it was done as a political hack.
Epilogue /
229
prior to elections), this was the rst hacking incident that could be considered a political intervention in this case, a major media outlet was nancially damaged because of the public perception that its coverage was unfair. Although much of the text of the hacked Web page centered on the hackers dispute with Carolyn Meinel, author of The Happy Hacker, much of the criticism directed at Meinel can and should be seen as hacker inghting. What the pages comments reveal is that these hackers were concerned with the larger question of how they were being portrayed. The real reason we put any blame on Carolyn Meinel, the hackers write, is because of her obtuse overdramatizations of our actions. At the heart of the dispute was Mitnicks case, and at issue, for these hackers, was the question of John Markoffs coverage of Mitnicks case. As discussed earlier, Mitnick was the subject of several New York Times stories written by Markoff and ultimately the subject of a best-selling novel co-authored by Markoff and Tsutomu Shimomura, the San-Diego-based security expert who helped the FBI track and capture Mitnick. Hackers alleged that Markoff used his position at the Times to hype the story of Mitnicks arrest and capture and to demonize Mitnick in the public imagination. These perceptions, according to the hacker community, accounted in large part for Mitnicks long incarceration in a maximum-security jail and his denial of the right to a bail hearing. In short, the message that hackers left on the New York Times Web site could be boiled down to one simple fact: they felt that the way hackers are covered by the mainstream media generally, and the New York Times specically, is unfair. They were disturbed both by what had been written about them and by what stories had been overlooked. The battle over such representations continued to be played out, ironically enough, in the coverage of the hack itself. Mitnick learned of the incident over a local Los Angeles news radio station, where he heard the hack described as an act of Internet terrorism. Mitnick, who was, at the time, only four months from trial, was upset by both the incident and the subsequent coverage of it. The message that the hackers left that Sunday came in two parts,
230 / Epilogue
the page that was displayed on the Timess Web site and the comments left in the HTML code, which were far more articulate than the hacker-speak that appeared on the surface, as the hackers themselves indicate in their P.S.: 0UR C0MMENTS ARE M0RE LEET THAN 0UR TEXT. DOWNLOAD THE SOURCE T0 TH1S PAGE AND P0NDER 0UR W1ZD0M. The hackers described the comments embedded in the pages source code as the real meaning of the page, including supporting quotations from Tennyson, Voltaire, and Milton. The hackers central grievance stemmed from what they saw as Markoffs involvement in the pursuit and capture of Mitnick. The Web pages message targeted Markoff specically, asking: D0 YOU HAV3 N1GHTMAR3S ABOUT H3LP1NG 1MPRIS0N K3VIN? KN0WING THAT Y0UR LI3S AND D3C3IT H3LP3D BR1NG D0WN TH1S INJUST1C3? What lies beneath the code in the comments spells out the hackers complaint more directly: The injustice Markoff has committed is criminal. He belongs in a jail rotting instead of Kevin Mitnick. Kevin is no dark side hacker. He is not malicious. He is not a demon. He did not abuse credit cards, distribute the software he found, or deny service to a single machine. Is that so hard to comprehend? Markoff denied that his coverage of Mitnicks case was anything other than objective. After years of covering Mitnick and because of his close connections with Shimomura, Markoff found himself with access to remarkable events that he says I wrote about as accurately and clearly as I could. There were no dilemmas, he said. I told my Times editors what I was doing every step of the way. Regarding the decision to hype the story, Markoff responded, I didnt place the story. If hackers were upset about how the story was hyped, Markoff thought they were targeting the wrong person: Their quarrel is with the Times editors, not me. The hacks effect was also hotly debated. Markoff thought the hack had the potential to do tremendous damage to Kevin. If Kevins defenders wanted to make the claim that Kevin and people like him are harmlessly wandering through cyberspace, Markoff said, an event like this was the clearest example to contradict that. Emmanuel Goldstein, editor of 2600, saw things differently. Its not
Epilogue /
231
what I would have done, Goldstein said, but it got the story out. It is a story that has been suppressed for so long. The popular sentiment among hackers is that the coverage of the Mitnick case hyped his arrest and capture, referring to him as the Internets Most Wanted, as a cyberthief, and in some cases as a terrorist, but paid little or no attention to issues of Mitnicks pretrial incarceration, to the denial of his right to a bail hearing, or to the fact that the government had failed to provide Mitnick with access to the evidence to be presented against him. Even Markoff, who insists that he played no part in putting Kevin in jail, indicated that he had a lot of sympathy for Kevin, acknowledging that Mitnick was in a difcult situation and was faced with a grim set of alternatives, but he rejected the notion that anyone but Mitnick himself was responsible for his situation: Kevin made himself what he is. The ofcial statement from Mitnicks attorney was just as succinct: Kevin Mitnick appreciates the support and good wishes of those who speak out against his continued state of incarceration for years without bail. However, he does not encourage any individuals to engage in hacking pranks on his behalf. Kevin believes other avenues exist that can be more benecial to his circumstances, and he directed supporters to the Mitnick Web site at www.kevinmitnick.com. The hack of the New York Times Web page did demonstrate a number of things. First, and most important, hackers were becoming activists. The hack of the Times was not just a prank to show the hackers skills or for bragging rights; they had a message. Second, the movement that was unifying hackers was harking back to their early roots in the underground. In New York and Los Angeles, groups of hackers had held protests outside of Miramax ofces to protest the lming of Takedown (the lm based on Markoff and Shimomuras book); they had created an activist culture; and they had been organizing. The Kevin Mitnick mailing list was lled with all sorts of ideas, from door-to-door canvassing to yer distribution at malls to making and selling Free Kevin mouse pads. Hackers were even willing to spend time outside of NBC studios in New York holding Free Kevin signs in the hopes that they would get air time
232 / Epilogue
on the Today show. The protests over the initial screenplay (which had been leaked to the hacker underground) resulted in a series of new scripts which corrected factual errors and resulted in a script which was much more sympathetic to Mitnick than earlier versions had been. The legacy of Mitnicks case will be twofold. First, even though Mitnicks case never went to trail, a number of legal issues were confronted for the rst time, giving a taste of what is to come in the future. Second, the Free Kevin movement, which his supporters vow will continue until he is totally free, taught hackers how to organize and how to create a movement that intervened politically, socially, and culturally over issues of law, justice, and representation. While Mitnicks case tested the boundaries of legal issues in court and started a hacker movement that may well continue on, another hacker, arrested at almost the same time, was ghting a different set of battles in federal court on appeal.
Epilogue /
233
ing time right where he is in federal prison. The problem with his sentencing was that Chris was also sentenced for being a hacker, something for which he has never been charged, tried, or prosecuted. This was not the rst time that a hacker had been prohibited from using a computer as a condition of supervised release. Similar penalties had been meted out in other hacker cases. Both Mitnick and Poulsen had restrictions placed on their computer usage as conditions of their release. What makes Chriss case different is both that he was banned specically from the Internet and that his case was entirely unrelated to hacking or computers. In essence, Chris has been banned from the Internet for being a hacker, not for anything he has done or because his hacking in some way violated the law. The information about Chris (Minor Threat) that caused him the most trouble came from two sources, his PSR (presentencing report) and tapes of a phone call made while he was in prison. In the case of the PSR, it had been discovered that Chris was a hacker of some stature in the computer underground. He had recently, in fact, been pro-philed in Phrack, where he espoused a philosophy of noncooperation with authorities, particularly turning in friends and fellow hackers. This became prima facie evidence of Chriss noncooperation, even though he had in actuality cooperated with authorities as a condition of his plea, providing them with information and evidence of his own crimes that they would have never discovered or had any reason to suspect. Chriss PSR had little relevance to his case, but instead focused on the fact that he was a hacker, and that would, ultimately, be the thing for which Chris was sentenced. The second element, the recorded conversation, was even more damaging. A friend of Chriss, during a phone call to him, suggested a form of electronic retaliation against the police involved in his arrest. Chris rejected the idea, indicating that he didnt believe that such action was appropriate. The only problem was that the tape, which was never provided to the defense, was never played in court. Instead, the prosecution had a jail ofcial testify to what the conversation was about. While the conversation was about retaliation, the fact that Chris opposed such action was omitted, leaving the judge with the impression that Lamprecht had, in fact, suggested, rather than rejected, the idea.
234 / Epilogue
Based on this information, the judges response made sense: this was a known hacker talking about retaliating against those who arrested and prosecuted him. (And, for all the judge knew, there might also be retaliation against the person who sentenced him.) But Lamprecht was not only banned from the Internet he was also prohibited from serving as a computer programmer, troubleshooter, or installer, the three jobs that he held before his arrest. This was in spite of the fact that his former employer offered to hire him back following his release. So why might a judge make such a decision? After the sentence and the conditions of his supervised release were announced, Chris was given an opportunity to respond. His remarks were short: I mean, computers are my life. To this the judge responded, I understand that. And thats why I put these conditions in, if you want to know the truth. It is a long way from selling stolen goods to being banned from the Internet and your profession of choice. The move, as the judges comments reveal, seems to be purely punitive. Punishment, however, is not the goal of supervised release. The goal of supervised release is to reintegrate the convict into society and make him or her a productive member of that society. Banning someone from the area where they are most likely to be productive seems counterintuitive at best. It also promises to make it very difcult for Chris to nish his degree in computer science at the University of Texas. Other hackers, denied the opportunity to make a living at what they did best and enjoyed the most, have often returned to hacking and occasionally did so with raised stakes. It is almost as if courts are intentionally working to turn hackers into what authorities fear most. Making it more difcult for hackers to take on legitimate jobs and turn their hobbies and obsessions into productive (even lucrative) careers is a recipe for disaster. By prohibiting hackers from using computers once released from prison, the judicial system is cutting off their only means for going straight. In fact, most hackers who stay in the scene after college usually end up working as programmers, security consultants, or running their own systems. The case is particularly acute in Lamprechts situation. Chris is already a talented programmer. In the early 1990s, he wrote a program called ToneLoc, a phone dialing program that was modeled
Epilogue /
235
on the program Matthew Broderick uses in the movie WarGames to nd open modem lines in telephone exchanges. The program was sophisticated enough to be embraced by both hackers and security experts, many of whom Chris helped to install and test the program, looking for security holes in their own systems. Later, two of these security experts, both from government agencies, were prohibited from testifying as character witness at Chriss trial: one explicitly, the other by being told he could not use government stationery to write a letter on Chriss behalf. Chris, since owning his rst computer, has taught himself to program in BASIC, Assembly, C, C++, and, since he has been in prison, Java. If allowed to work with computers again, he estimates that it will take him six months to get up to speed in Java to the point where he will be able to begin developing software. After his release, he wants to nish his degree and get a job programming his true devotion. As things stand right now, none of those options is possible. These circumstances raise serious issues that transcend the scope of Lamprechts case in particular. In a recent decision, the Supreme Court held that the Internet is the most democratic form of expression and deserves the highest degree of protection. It is, in essence, the medium of free speech for the twenty-rst century. To ban someone from the Internet, for an offense related neither to computers nor to the Internet itself, is at best punitive and at worst unconstitutional. But, perhaps more important, Chriss sentence reveals how deeply embedded is the fear of hackers in the American judicial system. In this case, Chris pleaded guilty to one thing and was sentenced for something completely different and unrelated to his crime. In short, Lamprecht was found guilty of stealing (in several forms) and was (and should have been) punished for those crimes, but he was sentenced for being a hacker. What we need to question is how easily the gure of the hacker is transformed into a criminal, even when, as a hacker, the person has done nothing demonstrably wrong. Most recently, Lamprecht got a rude awakening when he appeared in court in 1999. Chris, who has been in prison since 1995, appeared in court to argue that the government had breached its 1995 plea agreement, which led to Lamprechts initial sentencing. What he
236 / Epilogue
wasnt prepared for was a government response to a second brief he had led, which challenges the conditions of his supervised release. As a result of his initial sentencing, Lamprecht will have as a condition of his supervised release a restriction that prohibits him from utilizing any computer network, including the Internet, effectively making him the rst person to be banned from the Internet. In a brief led the day before the hearing, the prosecutors responded to Lamprechts motion to have those restrictions lessened, a tactic that caught Lamprecht and his attorney, Robert Kuhn, off-guard. We were ambushed, Lamprecht said. We had no notication and we were not ready to rebut their claims. Since his incarceration, Michele Wood, Lamprechts mother, has been maintaining a Web page that has provided information about Lamprechts case and informed people about his Internet ban. This Web page was at the center of the controversy around his 1999 court appearance. They talked about me having a Web page like it was a horrible thing, Lamprecht said. Upon recommendation of his attorney, Lamprecht has decided to have the Web page taken down. I guess the government has silenced me, he said. I didnt think that this is how the rst amendment was supposed to work. Prosecutors see things differently, in large part stemming from an earlier incident where the underground hacker journal Phrack published the name and social security number of an IRS agent who had testied against Lamprecht. According to prosecutors, the agent suffered numerous incidents of harassment, including having his credit rating ruined. Lamprecht commented that publishing his name in Phrack was the wrong thing to do. Im sorry I ever did it, but he doesnt believe that it justies an Internet ban. If Phrack had been mailed, would they have banned me from using the mail? Of course not. The incident has left federal judge Sam Sparks and U.S. attorneys concerned about similar retaliations. Prosecutors accused Lamprecht of running his Web page from prison, a claim he emphatically denies. The page, he says, was run and maintained by his mother for the sole purpose of educating people about his case. What is clear is that the Web page has generated media attention about Lamprechts Internet ban, prompting several news stories and TV interviews with the jailed hacker.
Epilogue /
237
Because of the last-minute nature of the governments ling, Lamprecht was not able to produce any witnesses on his behalf, nor was he able to testify, citing threats from prosecutors that he would be examined about alleged crimes not covered under his plea agreement if he were to take the stand on his own behalf. Although the court did not demand that Lamprecht remove his Web page, Lamprecht felt pressured. I nally decided to take the page down, so I might be able to have a chance of using the Net when I get out next year. Overall, Lamprechts concerns are practical. When he is released from prison, he plans to continue his studies at the University of Texas, where he was majoring in computer science. The Internet ban, he fears, will make completing his degree next to impossible. Lamprechts case continues, and, recently, he won back his right to direct appeal, something he had given up as a condition of his initial plea bargain. Regarding the Internet ban, Lamprecht said, Im still going to ght like hell. Ill just have to do it without a Web page. The issues that Mitnicks and Lamprechts cases raise are new legal, social, and cultural matters that will need to be faced in the coming years. Hacking is changing as fast as the technology that accompanies it. The issues that remain, however, will always be ones that focus primarily on human relationships and cultural attitudes toward technology, change, and difference. By tracing out hacker culture, from its origins in the 1950s and 1960s through the various transformations it has taken in the 1980s and 1990s, this work has illustrated the complex ways in which technology has played a pivotal role in the formulation of the hacker underground and in the public, popular, and legal representation of it. Marking such transformations not only provides a sense of where hacker culture has come from but also comments on the role of technology in mainstream culture and illustrates the ways in which technology has been woven into the fabric of American society. Over the next decade, we can expect to see changes in the roles that hackers take on, the manner in which they negotiate their identity, and the ways in which they inform culture about the role of technology in the practice of everyday life.
Notes
Introduction
1. For an example of the debate over the nature of the term hacker, see Paul Taylor, Hackers: Crime in the Digital Sublime (London: Routledge, 1999), 1315. 2. Andrew Ross, Hacking Away at the Counterculture, in Technoculture, ed. Constance Penley and Andrew Ross (Minneapolis: University of Minnesota Press, 1991), 121; Slavoj Zizek, From Virtual Reality to the Virtualization of Reality, in Electronic Culture: Technology and Virtual Representation, ed. Timothy Druckrey (New York: Aperture, 1996), 293; Allucquere Rosanne Stone, The War of Desire and Technology at the Close of the Mechanical Age (Cambridge, Mass.: MIT Press, 1996). For more extended accounts, see Sherry Turkle, The Second Self: Computers and the Human Spirit (New York: Simon and Schuster, 1984), especially chapter 6. 3. William Gibson, Neuromancer (New York: Ace Books: 1983). 4. Thomas M. Disch, The Dreams Our Stuff Is Made Of: How Science Fiction Conquered the World (New York: Free Press, 1998), 220. 5. Bruce Sterling, personal interview, May 14, 1998. 6. A similar theme is explored in relation to skateboard culture and the reconstruction of space in Michael Nevin Willard, Seance, Tricknowlogy, Skateboarding, and the Space of Youth, in Generations of Youth: Youth Cultures and History in Twentieth Century America, ed. Joe Austin and Michael Nevin Willard (New York: NYU Press, 1998), 327 46. 7. E. Anthony Rotundo, Boy Culture, in The Childrens Culture Reader, ed. Henry Jenkins (New York: NYU Press, 1998), 349. 8. Scott Bukatman, Terminal Identity: The Virtual Subject in Postmodern Science Fiction (Durham, N.C.: Duke University Press, 1993), 18. 9. Rotundo, Boy Culture, 347 48. 10. Ibid., 349. For other discussions of boy culture, codes, and aggression, see William Pollack, Real Boys: Rescuing Our Sons from the Myths of Boyhood (New York: Random House, 1998); and Harvey Schwartz, Reections on a Cold War Boyhood, in Boyhood: Growing Up Male (Madison: University of Wisconsin Press, 1993), 16575. 11. See, for example, discussions of the production of youth culture and gendered identity in underground zines in Stephen Duncombe, Lets All Be Alienated Together: Zines and the Making of an Underground Community, and Willard, Seance, both in Generations of Youth. 12. See, for example, Turkle, The Second Self. Turkles discussion of hackers
239
1. Hacking Culture
1. See Scott Bukatman, Gibsons Typewriter, South Atlantic Quarterly (fall 1993): 627. 2. Paul Mungo and Bryan Clough, Approaching Zero: The Extraordinary
Notes to Chapter 1 /
241
World of Hackers, Phreakers, Virus Writers, and Keyboard Criminals (New York: Random House, 1992), xvii, xviii. 3. Joe Chidley, Cracking the Net, Macleans Magazine (May 22, 1995): 54. 4. Amy Harmon, Computer World Expects Devil of a Time with Satan Program, Los Angeles Times, March 1, 1995. 5. Raising Hell on the Internet, Oakland Tribune and San Jose Mercury News, March 1, 1995. 6. SAGE (System Administrators Guild) Advisory, Whats All This about SATAN? n.d.; available at http://www.vsenix.org/sage. 7. A similar argument is made by Arnold Pacey regarding the technical, organizational, and cultural aspects of technology; see his Cultures of Technology (Cambridge, Mass.: MIT Press, 1985). 8. Steven Levy, Hackers: Heroes of the Computer Revolution (New York: Anchor/Doubleday Press, 1984), 2733. 9. Ibid., 91. 10. Steve Mizrach (aka Seeker1), Old Hackers, New Hackers: Whats the Difference?; electronic publication available at http://www.eff.org. 11. Levy, Hackers, 27. 12. Ibid., 159. 13. For an extensive examination of the relationship between technological and military industrialization, see Manuel de Landa, War in the Age of Intelligent Machines (Cambridge, Mass.: Zone Books, 1992). 14. Levy, Hackers, 143. 15. Ibid., 27. 16. Bruce Sterling, The Hacker Crackdown (New York: Bantam, 1992), 43. 17. Ibid. 18. Katie Hafner and John Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier (New York: Simon and Schuster, 1991), 20. 19. Levy, Hackers, 123. 20. The original article was titled Secrets of the Black Box, by Ron Rosenbaum. It appeared in a 1971 issue of Esquire. It is reprinted in Rosenbaums Rebirth of the Salesman: Tales of the Song and Dance 70s (New York: Doubleday, 1979). 21. Levy, Hackers, 242. 22. Ibid., 266. 23. Philip K. Dick, Ubik (New York: Vintage, 1969), 3. 24. William Gibson, Neuromancer (New York: Ace Books, 1984). 25. Ibid., 43. 26. Derrida makes much of this point in his Given Time I: Counterfeit Money, trans. Peggy Kamuf (Chicago: University of Chicago Press, 1992). See particularly his discussion of the relationship between the notions of oikos (home) and nomos (law) in the construction of economy (oikonomia) (p. 6). These notions are explored through the thematics of the gift and of time in the remainder of that work. 27. Anarchy and AoC, Declaration of Digital Independence. 28. Ibid.
Notes to Chapter 2 /
243
57. N. Derek Arnold, UNIX Security: A Practical Tutorial (New York: McGraw Hill, 1993), 196. 58. Olaf Kirch, Linux Network Administrators Guide (Seattle: Specialized Systems Consultants, 1994), 268.
Notes to Chapter 3 /
245
29. Ibid. 30. Ibid., 54. 31. Ibid. 32. Robert Cringely, Accidental Empires: How the Boys of Silicon Valley Make Their Millions, Battle Foreign Competition, and Still Cant Get a Date (New York: Harper Business, 1996), 61. 33. Ibid., 62. 34. For an extensive discussion of the nature of ubiquitous computing, see Jay David Bolter and Richard Grusin, Remediation: Understanding New Media (Cambridge, Mass.: MIT Press, 1999), 21319. 35. Most systems have implemented a security system called shadowing, which hides the encrypted portion of the password le, making the passwd le worthless to the hacker. Such a system signicantly improved UNIX system security. 36. Fiery, Secrets of a Superhacker, 40. 37. Ibid., 48 38. Donna Haraway, Interview with Donna Haraway, in Technoculture, ed. Andrew Ross and Constance Penley (Minneapolis: University of Minnesota Press, 1991), 6. 39. Haraways notion of cyborg identity has been taken up and widely discussed from a number of vantage points. See, for example, Chris Hables Gray et al., The Cyborg Handbook (New York: Routledge, 1996). My intention is not to argue that hackers are or are not in fact cyborgs, but instead to situate the notion of a hybrid/deconstructive identity position within the discourse of technology and culture. 40. The Mentor, The Conscience of a Hacker, Phrack 1, no. 7, le 3 (1985). Originally published in Phrack in 1985, the essay has taken on a life of its own. In most cases, it is still attributed to The Mentor, but the title is often changed to The Hacker Manifesto or, in one case, Mentors Last Words.
Notes to Chapter 5 /
247
Phreakers, Virus Writers, and Keyboard Criminals (New York: Random House, 1992). 8. Mungo and Clough, Approaching Zero, 211. 9. Sterling, Hacker Crackdown, 124. 10. Ibid. 11. Ibid., 126. 12. John Perry Barlow, Crime and Puzzlement (1990), electronic publication posted to The Well. 13. Mungo and Clough, Approaching Zero, 220. 14. These costs are documented in Sterlings account in Hacker Crackdown, 246 47. 15. Phrack copyright, 1996. 16. Interview with Chris Goggans at Pumpcon, 1993, Gray Areas (fall 1994): 2750. 17. For extensive discussions of issues of privacy and copyright, see Philip E. Agre and Marc Rotenberg, Technology and Privacy: The New Landscape (Cambridge, Mass.: MIT Press, 1998) and Whiteld Dife and Susan Landau, Privacy on the Line (Cambridge, Mass.: MIT Press, 1998). 18. Phrack registration le. 19. Interview with Chris Goggans, 28. 20. Ibid. 21. Ibid. 22. Phrack Pro-Phile II (Broadway Hacker), Phrack 2, no. 5, le 1. 23. Phrack Pro-Phile XXII (Karl Marx), Phrack 2, no. 22, le 2. 24. Phrack Pro-Phile XXVIII (Eric Bloodaxe), Phrack 3, no. 28, le 2. 25. Ibid. 26. Phrack Pro-Phile XXIII (The Mentor), Phrack 2, no. 23, le 2. 27. Phrack Pro-Phile XXII (Karl Marx). 28. Michel Foucault, What Is an Author? in The Foucault Reader, ed. Paul Rabinow (New York: Pantheon Books, 1984) 11516. 29. Ibid., 121. 30. Ibid., 123. 31. Phrack 1, no. 3, le 10. 32. Phrack 4, no. 40, le 12. 33. Phrack 10, no. 56, le 4.
5. (Not) Hackers
1. Dick Hebdige, Subcultures: The Meaning of Style (New York: Routledge, 1979), 3, 87. 2. Ibid., 92. 3. Sherry Turkle, Life on the Screen: Identity in the Age of the Internet (New York: Simon and Schuster, 1995), 57. 4. Ibid., 52. 5. Jay David Bolter and Richard Grusin, Remediation: Understanding New Media (Cambridge, Mass.: MIT Press, 1999), 5. 6. Hebdige, Subcultures, 95.
Notes to Chapter 6 /
249
Sterling, The Hacker Crackdown: Law and Disorder on the Electronic Frontier (New York: Bantam, 1992). 20. Hafner and Markoff, Cyberpunk, 342, 343. 21. Letter from Marc J. Stein, U.S. probation ofcer, to Kevin Lee Poulsen, May 22, 1996. Poulsens saga continued after his release. 22. Kevin Poulsen, Many Happy Returns (http://www.kevinpoulsen.com). 23. John Markoff, Cyberspaces Most Wanted: Hacker Eludes FBI Pursuit, New York Times, July 4, 1994. 24. Hafner and Markoff, Cyberpunk, 26. 25. See Markoff, Cyberspaces Most Wanted. 26. Ibid. 27. Joshua Quittner, Time, February 27, 1994. 28. Hafner and Markoff, Cyberpunk, 343, 344. 29. On this point, particularly, see Jacques Derridas essay Platos Pharmacy, in Dissemination, trans. Barbara Johnson (Chicago: University of Chicago Press, 1983). 30. Mike Godwin, in Douglas Fine, Why Is Kevin Lee Poulsen Really in Jail? Posting to The Well, 1995. 31. John Markoff, interview, January 19, 1995. 32. U.S. Marshals Service, NCIC entry number NIC/W721460021. 33. John Markoff, A Most-Wanted Cyberthief Is Caught in His Own Web, New York Times, 15 February, 1995. 34. For a detailed account of Mitnicks deeds and misdeeds, see Hafner and Markoff, Cyberpunk, 13138. Hafner and Markoff chronicle Mitnicks life as a dark-side hacker, which has been considered by some (in particular Emmanuel Goldstein and Lewis DePayne) to be a misnomer. Advocates for Mitnick are quick to note that Mitnicks hacks, while occasionally malicious, were never intended to cause harm to the victims or produce any nancial gain for Mitnick. 35. John Markoff, A Most-Wanted Cyberthief. 36. Ibid. 37. Ibid. 38. Jonathan Littman, The Fugitive Game: Online with Kevin Mitnick (New York: Little Brown, 1997). 39. Tsutomu Shimomura and John Markoff, Takedown: The Pursuit and Capture of Kevin Mitnick, Americas Most Wanted Computer Outlaw by the Man Who Did It (New York: Hyperion, 1996), 308. 40. Ibid., 309. 41. Ibid., 310. 42. Charles Platt, Anarchy Online: Net Crime (New York: Blacksheep Books, 1996). 43. As LOD members are quick to point out, LOD was originally a group of phone phreaks. As phone phreaking evolved and began to involve computers, the group formed a hacker splinter group, who called themselves LOD/H, or Legion of Doom/Hackers, to distinguish themselves from the original phonephreaking group. 44. E. Anthony Rotundo, Boy Culture, in The Childrens Culture Reader, ed. Henry Jenkins (New York: NYU Press, 1998), 349.
Epilogue
1. These reports are based entirely on conversations with the principal parties involved over a period of four years, including Kevin Mitnick, Ron Austin, Don Randolph, Greg Vinson, David Schindler, Richard Sherman, Chris Lamprecht, Michele Wood, Evian S. Sim, Robert Pitman, Kevin Poulsen, and Emmanuel Goldstein.
Index
Abene, Mark (Phiber Optik), 33, 35, 36, 60, 197, 208 Acid Burn. See Libby, Kate Acid Phreak, 33, 36, 208 Addiction, 175, 190 96 Adult authority, 48, 211, 212 Advanced Research Project Agency (ARPA), 14, 16, 86 Agent Steal. See Peterson, Justin Tanner Al Bell, 16, 60 Allen, Paul, 19, 39 Altair, 1719, 3839, 64, 145, 146 Altair BASIC, 17, 19, 39, 146 Amiga 1000s, 133 Amp jobs, 52 Antihero, 52, 55 Anxiety, 212, 216 19 about technology, ix, xii, 25, 45, 48, 51, 179 80, 193, 21718 Appadurai, Arjun: on technoscapes, 82 Apple, 1719, 34, 82 proprietary hardware and, 101 Apple II, 17, 64, 133 Applications hackers, 44 Approaching Zero (Mungo and Clough), 5, 123 ARPA. See Advanced Research Project Agency ASCII characters, 56, 69 Asimov, Isaac, 11, 20, 32 Assembly, 235 AT&T, 35, 89, 136 failure for, 36 37, 123, 124 Atari 400s, 133 attrition.org, 139 40 Austin, Ron, 227, 250n1 Authority, xiv, xvi, xvii ceding, 65 institutional, 7576 male, xiii, 64 resistance to, xi, 10, 74, 142 43 voice of, 63 64, 74, 75 Authorship, 60, 13536 establishment of, 59, 61 AUTOCAD, 146 Back Ofce, 97, 99 Back Orice, 52, 89 Microsoft hacking and, 94 104 Barlow, John Perry, 33, 35, 125, 243n4 BASIC, 17, 19, 39, 146, 235 Bassett, Angela (The Net), 31 BBSes. See Bulletin board systems BellSouth, 124 25, 126 See also E911 document Bell Systems Tech Journals, 134 Benjamin, Walter: on translations, 57 Bernie S. See Cummings, Ed Bill From RNOC, 92 Bit Master, 92 Black boxes, 30, 65, 85, 147 Bletchley Park, 13 Blottoland, 91 Blue Archer, 91 Blue boxes, 18, 134 Body criminality and, 190 data/machinery and, 162 identity and, 187 memory and, 18287 secret and, 188, 190 space and, 189 technology and, 160, 18586 threats to, 218 Bolter, Jay David, 147, 243n2 Books, computer technology, 49 50 Boy culture, 7576, 158, 161, 206, 239n10 hacking as, x, xvixvii LOD and, 207, 210, 212 transformation of, 80 underground and, 210 Boy war, 200, 206 Branwyn, Gareth, 53 Break-in Artist, 195
251
252 / Index
Bricolage, 145, 149 50 commodication of, 148 revaluation of, 146 47 Broderick, Matthew (WarGames), 24, 27, 118, 235 Brunner, Jon, 20, 29, 53 Brute force attacks, 6871 Buffer overow, 105, 106 Bugs, 86, 89, 97, 99, 105, 106, 110 nding, 28, 44 responding to, 87, 88 trading, 188 Bugtraq, 45 Bukatman, Scott, xiv Bulletin board systems (BBSes), 91, 92, 11718, 121, 133, 134, 137, 139 hacker culture and, 70, 118 hacking, 152 Internet and, 118 LOD/H, 90 Phrack and, 120 Bulletins, 44, 88, 98 Bullock, Sandra (The Net), xv, 31 C (language), 130, 235 California Department of Motor Vehicles, 198 Capital, labor/politics and, 82 Captain Crunch. See Draper, John Catch 22, 91 cDc. See Cult of the Dead Cow Cellular phones, hacking/cloning, 67, 81, 168, 198 Cellular Telephone Industry, 167 Cellular tracking equipment, 199 Central nervous system (CNS), 40 Cereal Killer (Hackers), 167 CERT. See Computer Emergency Response Team Cheap Shades, 92 Cheshire Catalyst, 60 Chidley, Joe, 7 Clashmaster, The, 121 Clinton, Bill, 222 Clothes, hacker, 16163 Clough, Bryan, 5, 6, 123 on E911 document, 124, 125 CNN.com, Pentagon hacks and, 45 CNS. See Central nervous system Code, 13, 3839, 84, 198, 243n9 breaking, 13, 155 bumming, 144, 146 eliminating, 14 sharing, 15, 115 Codec, havoc by, 158 Colossus, development of, 13 Colossus: The Forbin Project (movie), 50 Commercial exploitation, creativity/originality of, 148 Commodication, 19, 2223, 40, 150, 153 hackers and, 151, 154, 156, 165 incorporation and, 154 55 secrecy and, 3839 Commodity incorporation, 153 56, 157 Commodore 64s, 133 Communication, 50, 218 access to, 11, 33 BBS and, 118 networked, 156 securing, 15 technology and, 83, 160, 183 Communications Decency Act, 228 comp.os.minix, 83 Compu-Phreak, 60, 91 Computer crime, 175, 180, 191, 200 201, 224, 225 dened, 178, 194 hackers and, 248n19 Computer culture, 65, 143, 152, 170 commodied, 166 hacks and, 144 ideology of, 82 incorporation of, 94 Computer Emergency Response Team (CERT), 86 Computer industry, xxiii, 7 hackers and, xxiv, xxv, 146 underground and, 170 71 Computer interfaces, simplication of, 153 54 Computer jacks, 52 Computer revolution, xxii, 6, 11, 34 Computers, xiii, 16, 38, 42 access to, 10, 65 66 discovery of, 76 incorporation of, 153 language of, 42
Index /
metaphors of, 177, 193 military, 27 playing with, 145 remediation of, 147 48 user-friendly, 49, 50 Computer underground, 94, 95, 211 changes for, 140 computer industry/media and, 170 71 emergence of, 141 politics and, 96 secrecy and, 130 Computer Underground Digest. See CuD COMSEC, 208 Condor. See Mitnick, Kevin D. Conscience of a Hacker, The (The Mentor), xxiv, 72, 245n40 Conservative Party, hacking, 22829 Constitutive, performative and, 186 87 Control, xvi, 240n12 Control C, 92 Control Ofce Administration of Enhanced 911 Service. See E911 document Conventions, 2, 82, 9293, 119 Copyright, 40, 123 30, 247n17 secrecy and, 128, 129 Corley, Eric (Emmanuel Goldstein), 60, 116, 119, 157, 249n34, 250n1 on knowledge/freedom/power, 120 on Markoff, 230 31 Corporate culture, 34 hackers and, 154, 158, 164, 165 COSMOS, 191 photo of, 165 Counterculture, 16, 166 C++, 235 Crackers, ix, 11 Cracking, 68, 69 Crash Override. See Murphy, Dade Creating Kevin: The Darkside Hacker and the Southern California Media (From Los Angeles to New York and Back Again), 201 Credit card fraud, 66, 67 Crime and Puzzlement (Barlow), 33 Criminality, xxvi, 7, 51, 52, 79, 81 body and, 190 hacker, xiiixii, 31, 78, 94, 175, 176, 178, 185
253
social understandings of, 182 technology and, 219 Criminal justice, 9, 185 Criminals, xxi, 79, 81, 163 cyber, 195, 200, 206, 231 master, 213 noncorporeal, 175 Cringely, Robert: on Apple, 64 Critical theory, technology and, 240n16 Cryptography, 12, 30, 3839, 248n14 Cuckoos Egg, The (Stoll), xiii, 6 CuD (Computer Underground Digest), 35 Cult of the Dead Cow (cDc), xxv, 44 Back Orice and, 89, 97 Hong Kong Blondes and, 96 97 Microsoft hacking and, 94 104 Cultural codes, 150, 151 Cultural values, 74, 76 Culture, 10 alienation from, 79 hacker, xv, xx, xxi, xxvii, 3, 40 hacking and, xxiv, 3738, 55, 56, 113 media and, xviii online, 142, 143 operation of, 179 sharing/disseminating, xvii, xxii, xxv social, xxvi, 41 technology and, xvii, xx, xxi, 9, 37, 40, 74, 75, 79 understanding, xxi, 55, 182 Cummings, Ed (Bernie S.): charges against, 178 Cyberbody, rethinking, 190 96 Cyberdyne Technologies, 51 Cybernetics, 32 Cyberpunk, xii, 11, 19 23, 31, 167 dystopian, 22, 32 literature, xv, 20, 2122, 190, 243nn47 Cyberpunk (Hafner and Markoff), xiii, 47, 203 Cyberspace, xiii, 36, 166, 243n4 characterizations of, 194 95 dened, xii, 5 threat of, 219 three hunts in, 196 216 Cyberterrorism, 43 Cyberthrillers, 166 67 Cyborgs, 71, 245n39
254 / Index
Dan The Operator, 92 Dark Dante. See Poulsen, Kevin Lee Darkside hacker, 56, 201, 202, 203, 206, 249n34 Dark Side Hacker Seen as Electronic Terrorist (Los Angeles Times), 202 Dark Tangent. See Moss, Jeff Darth Vader, 202, 206 Data, 21, 55, 162, 226 Database management, 65 Data Line, 92 Decentralization, 10, 32 Declaration of Digital Independence (Internet), 22 Decoding, 55 Decomposition, 59, 60 Decryption, 68 DEC VMS, 125, 198 DefCon, 92, 93, 97, 168 Denial-of-service attacks, 139 Department of Defense, 13 ARPA and, 14 hackers and, 101 secure communications for, 15 Department of Justice Web page, hacking, 228 DePayne, Lewis, 223, 249n34 Derivative hacks, 43 44, 45 true hacks and, 43 Derrida, Jacques, 241n26, 242n56 Devious Xevious, Software Blue Box and, 134 Dick, Philip K., 20 Dickens, Charles, 70 Digital Declaration of Independence (Internet), 23 Dijkstra, Edsger W.: Greenblatt and, 145 Disch, Thomas M.: on pop despair, xiixiii Discipline and Punish (Foucault), 181 Discourse, 59, 190 cultural, 142, 151 decomposition/recomposition of, 61 hacker, xx, xxvi, 73, 188, 201, 216 17 incitement to, 188 juridical, 201 oppositional, 74, 75 social, 77, 142 technology, xx, 61 Disk Jockey, The, 92 Doom Prophet, 92 DOS (Disk Operating System), 49, 84, 153 Dragging and dropping, 49 Draper, John, 18 Drives, password-protected, 100 Drugs power/nature of, 193, 194 technology and, 194 Dummies series, 50 Dumpster diving, 62 Dystopia, xii, 20, 22, 23, 32, 104 E911 document, xxvi, 123 30, 131 contents of, 123 value of, 12526 Eavesdropper, The, 123 Eavesdropping devices, 224 E-commerce, 66, 67 Edwards, Paul, 243n3 EFF (Electronic Frontier Foundation), 33, 194 Ellison, Harlan, 20 E-mail, xxiv, 65, 118, 141 Emmanuel Goldstein. See Corley, Eric Encryption, xxiii, 40, 97, 245n35 breaking routines of, xxv challenging, 22526 one-way, 68 password, 67 End-users, 18, 64, 85, 89, 100 101, 109, 145 commodication of, 154 culture of, 170 experts and, 82, 153 hackers and, 66, 100, 151, 152 outsmarting, 71 philosophy of, 65 Enigma Machine, 1213 Erik Bloodaxe. See Goggans, Chris Espionage, xiii, 6 Esquire, on blue boxing, 18 Ethic, 22 hacker, 21, 29, 34, 35, 51, 83, 1012, 110 old-school, xxii, 11, 120 Ethos, 4, 122 Experts, 89 commodication of, 154 end-users and, 82
Index /
Falken, Joshua (WarGames), 25 Falken, Stephen (WarGames), 24, 25, 27 Fantasy, 19 20 Farmer, Dan, 7 Fashion, hacker, 160 65 FBI, 166, 167 hacking of, 198, 214 investigation of, 213 Mitnick and, 199, 203, 229 Peterson and, 185 Poulsen and, 214, 215 T-shirts, 187 wiretaps by, 214 Federal Correctional Institution, Lamprecht at, 232 Fiery, Dennis (Knightmare), 69, 243n9 on brute force attacks, 71 on social engineering, 62, 244n26 Files, 89, 118, 119 Flaws, 7, 46, 86, 87, 88, 89, 99, 110 FOD, 91 Foley, Agent, 189, 190 Forest Ranger, 92 Foucault, Michel, xix, xxi, 58, 180, 188 on author disappearance, 135 methodological premises of, 18182 on technology/punishment, 18182 411 directory assistance, 47, 197 Fox News, 35 Freedom, 76 secrecy and, 15, 33 Freeh, Louis, 227 Free Kevin movement, 221, 222, 223, 23132 Freud, Sigmund: on expectant anxiety, 217 Fry Guy, 5 Fugitive Game: Online with Kevin Mitnick, The (Littman), 200 Games boy, 206 hacker, 93 knowledge, 61 67 language, 56 61 simulation, 147 video, 157, 218 Gang war, 206, 208, 209 10, 211, 212, 213 Garbage les, 31, 62
255
Gary Seven, 60, 91 Gates, Bill, 19, 93, 102, 146 Altair and, 39 BASIC and, 39 hackers and, 17, 100 GECOS eld, 67, 69 GenXers, 31 Gibson, hacking, 164 (photo) Gibson, William, xiii, 53, 55, 158, 243n4 on Case, 190 91 on cyberspace, xii, 5, 52 dystopia of, 20, 104 Gill, Richard, 157, 161, 177 Gin Fizz, 121 Global Domination Update, 94 Globalization, 97, 110, 164, 169, 170 Glossary Terminology for Enhanced 911 Service. See E911 document Godwin, Mike: on hackers/addiction, 194 Goggans, Chris (Erik Bloodaxe), 26, 133, 244n13 boy culture and, 211 copyright and, 126 27, 128, 129 30 on federal agents, 185 on information, 130 on LOD, 208, 210 Phrack and, 129, 244n13 pirated software and, 134 raid on, 189 90 on reps, 207 on 2600, 61 Gotti, John, 212 G-philes, 91, 208 Graphical user interface (gui), 84, 85, 99, 108 Greenblatt, Richard, 145, 148 Group/club memberships, 130 Grusin, Richard, 147, 243n2 GTE Corp, 199 gui. See Graphical user interface H2K, 72, 119 20 Hacker community, 121, 122, 140, 163 dening, 244n13 Mitnick and, 228 Phrack Pro-Philes and, 134 35 Hacker Crackdown, The (Sterling), 123, 244n12, 247n14
256 / Index
Hacker culture, xixxxii, 3 4, 12, 18, 35, 37, 41, 72, 109, 151, 15556, 171 complexities/subtleties of, 9 emergence of, xxiii, 17, 56, 148 incorporation and, 153 narrative of, 136 online presence for, 117 reading, 11720 secrets and, 38 technology and, xxiii, 4, 40 threats to, 170 tracing, xxvii, 237 understanding, xxvi, 82, 92, 117, 149, 157, 163, 171 Hacker groups, catalogued, 90 91 Hacker Jeopardy, xxv, 93 Hacker Manifesto, The (The Mentor), xxiv, 7180, 245n40 Hacker New Network, 140 Hackers arrest of, 134 35, 191, 21112 chronicles of, 216 cultural function of, 7172, 73, 15758 depersonalization of, 7778 disappearance of, xvi, 135, 136 elite, 71, 81, 86, 93, 117, 130 emergence of, 1517, 9094, 115 grievances of, 77, 230 hacking and, 4, 10 12, 18788 language of, 63 metaphors of, 177 real, 169 (photo) regulation of, 21819 technology and, xxi, xxiii, xxiv, xxv xxvi, 11, 12, 73, 75, 78, 113, 155 threat from, 3233, 154, 212, 219 understanding, ixx, xxi, 3, 18, 36, 141, 165, 220 vilication of, 148 virtual, 182, 21819 white-hat/black-hat, 42 Hackers (movie), xv, xxvi, 31, 51, 53, 104, 141, 164, 169 characters from, 163 described, 156, 166, 167 fashion in, 161 63 hacking, 156 60 quote from, 177 stereotypes in, 165 stills from, 162 (photo), 163 (photo), 164 (photo) Web page images of, 168 (photo) Hackers for Girlies, hacking by, 228 Hackers: Heroes of the Computer Revolution (Levy), 10, 56 Hackers Jargon Dictionary, 61, 244n25 Hacker underground, x, xxvii, 92, 123, 140 boy culture and, 210 literature of, 11516 Microsoft and, 87 roots of, 1516 Hacking, 36, 42 46, 69, 188 chronicles of, 216 fascination with, 179 fear of, 224 hackers and, 4, 10 12, 18788 history of, xvi, xx, 12, 26, 59 holy grail of, 6771 information and, 37 narratives of, 81 public nature of, 8182 as question of technology, 53 56 responses to, 9 signicance of, 52 as social/cultural phenomenon, 9 spread of, 46 technology and, xxi, 11, 37, 52, 5253, 71, 179 80 threat of, 179 Hacking contests, 159 60 Hacking the planet, 156, 169 70 Hacks, 113, 116 high-prole, 8182 lame, 168 Hafner, Katie, xiii, 29, 47 on hackers/magicians, 179 on Mitnick, 192, 202, 203, 249n34 Handles, 58, 130, 135 Happy Hacker, The (Meinel), 228 Haraway, Donna J.: on cyborgs, 71, 245n39 Hardware, 34, 101, 105, 143 Harpers, 36 Harsh Realm (television show), xv Hathor, 95 Hawkes, T.: on bricolage, 149 50
Index /
Hebdige, Dick, 154 55 on cultural form, 148 on incorporation, 143 44 on subculture, 142 Heidegger, Martin, 55, 56, 57 Heller, Joseph, 125 High-tech thrillers, 166 67 History of LOD/H, The, 207 Hobbyists, 19, 39, 145, 146 Hoffman, Abbie, 16 HoHoCon, 92 Holes, xxiv, 8, 28, 43, 44, 8586, 89, 235 Hollywood Hacker (Fox News), 35 Homebrew Computer Club, 19, 39, 100, 146 Hong Kong Blondes, xxv, 103, 246n16 cDc and, 96 97 hackers and, 104 social change and, 97 HOPE (Hackers on Planet Earth), 92, 119 20 HTML code, 230 Human relationship, 17778, 182 hacker exploitation of, xxiiixxiv technology and, 9 10, 48, 62, 183 Human rights, 97, 102, 103 Hunted, hunter and, 175, 19596, 200 Hyperbole, hacker, 36 IBM, 154 corporate computer model, 34 MCI and, 136 PCs, 153, 178 security features by, 155 Ideas, 14, 115 Identity, xviii, xix, xxvii, 171, 186, 191 body and, 187 crime of, 201 cyberpunk literature and, 243n7 group, 89 hacker, xxi, 51, 113, 141, 169, 170 hiding, 162, 248n13 subcultural, 94, 141, 170 user, 68 verication of, 66, 186, 187 virtual, 186, 201, 219 Imagination, hacker, 5, 1923, 37, 90, 91 Implants, 52
257
Incorporation, 150, 156 60 commodication and, 154 55 ideological, 143 44, 153 56 Independence, 74, 76, 80 Information, 38, 53, 91, 187, 195 access to, 33, 62, 67, 89, 130 commodication of, 2223, 81 culture of, 33, 149 embezzlement of, 213 free, 10, 13 14, 17, 33, 120 hacking and, 37 ownership of, 126, 128 password, 108 politics and, 96 regulation of, 110 repackaging of, 60 61, 177 secrecy and, 38, 130, 131, 188 sharing, xxii, xxv, 19, 21, 90, 115, 122 InfoWar (Schwartau), 93 Intel, 101 Internet, xvii, xxii, 3, 22, 85, 100, 117, 142, 154, 232 accessing, 89 accounts, 67 banning from, xxvi, 234 37 culture, 19 20 growth of, 81, 89, 152, 188, 204 older hackers and, 167 shut down of, 27 software on, xviii, 8 Internet Relay Chat (IRC), 139, 152, 153 Java, 235 Jobs, Steven Apple II and, 17, 64 blue boxing and, 18 Johnny Mnemonic (movie), xv, 53 Jolie, Angelina (Hackers), 161 Jones, Jim, 168 Journals, electronic, 16, 94, 120 21, 122 Juvenile delinquency, 32, 218 Kafka, Franz, 125 Kapor, Mitchell: on computer crime, 178 Karl Marx, 133, 134 Kemeny, John, 19 Kerrang Khan, 91 King, Randy (Taran King), 92, 118, 121 Phrack and, 120
258 / Index
King Blotto, 91 Knight Lightning. See Neidorf, Craig Knightmare. See Fiery, Dennis Knights of the Shadow, The, 210 Knowledge, xviii coded, xx, 63 64 freedom/power and, 120 games, 61 67 liberation of, 170 production/consumption of, 150 Kuhn, Robert: Lamprecht and, 236 Kurtz, Thomas, 19 L0pht, 44, 89, 104 10 hackers and, 109 10 rewriting by, 108 L0phtCrack, 89, 104 10 Labor, politics/capital and, 82 Labour Party, hacking, 22829 Lamers, 167 Lamprecht, Chris (Minor Threat), 176, 220, 250n1 banning of, xxvi, 233 37 havoc by, 158 movie by, 15859, 162, 163 64, 165 retaliation by, 233, 234 sentence for, 23237 ToneLoc and, 234 35 Web page of, 236, 237 Language, 54, 146 coded, 41 games, 56 61 technology and, 40, 41, 57, 58 LANMAN, 106 Las Vegas, hacking in, 93 Law hackers and, 113, 175, 18586 human relations and, 182 technology and, 17879, 181 Law enforcement, 9, 157, 171, 177, 178, 18182, 187, 190 hackers and, 138, 185, 188, 248n19 hunting by, 200 secrecy and, 132 surveillance technology for, 216 taunting, 179 virtual identity and, 219 Laws of Robotics (Asimov), 11 Lee, John: LOD and, 209 10 Leftist, The, 92 Legion of Doom (LOD), xxvi, 36, 56, 72, 90, 91, 94, 124 BBS, 91 boy culture and, 207, 210, 212 disbandment of, 208 g-philes by, 208 MOD vs., 197, 20512 origins of, 249n43 Phrack on, 208 pursuit/capture of, 176 Legion of Doom/Hackers (LOD/H), 90 91, 249n43 Legion Of Hackers, 91 Levy, Steven, 17, 34, 56 on computer revolution, 14 on free exchange, 13 14 on hackers, 10 11, 15 on moral code, 10 Lex Luthor, 60, 91, 92, 207, 210 LOD/H and, 90 Libby, Kate (Acid Burn) (Hackers), 166, 167 hacking contest and, 159 60 photo of, 160 technology and, 161 Library of Congress, Phrack and, 129 Lightman, David (WarGames), xxii, 24, 25, 26 27, 30 Linux, xxiv, 82, 85, 94 operating system by, 83 84 security and, 86 Li Peng, 102 Literature, underground, 11516 Littman, Jonathan Poulsen and, 214 15 on Shimomura, 200 on Unsolved Mysteries airing, 21516 Local area network (LAN), 87 LOD. See Legion of Doom LOD/H. See Legion of Doom/Hackers LOKI, 92 Long-distance service, 18, 36 37 Lord Nikon (Hackers), 167 Los Angeles Metropolitan Detention Center (MDC), Mitnick at, 205, 222, 225
Index /
Los Angeles Times on Mitnick, 202 on SATAN, 7 Lotus, 146 Lucifer 666, 92 Lysias, 58, 244n19 Mack, Jennifer (WarGames), 25 Macleans Magazine, 7, 54, 55 Mainstream culture, xiii, xxiii, xxvi, 4, 144, 150 51 hackers and, xiv, xviii, 72 technology and, xxvii Manhunts, 194, 197 Manifesto for Cyborgs, A (Haraway), 71 Marauder, The, 91 Marcos, Ferdinand, 213, 214 Marcus, Kevin, 137 Markoff, John, xiii, 29, 196 on hackers/magicians, 179 on Mitnick, 192, 199, 200, 202, 203, 204, 229, 230, 231 quote of, 47, 201 Mass High Tech, on hackers/L0pht, 109 Mastering Word Perfect 7.0, 49 Master of Impact, 91 Masters of Deception (MOD), xxvi, 33, 36, 56, 90 formation of, 208 LOD vs., 197, 20512 national security threats and, 217 pursuit/capture of, 176 virtual violence of, 212 Masters of Deception: The Gang That Ruled Cyberspace (Slatalla and Quittner), 209 Mastery, xvi, xvii, 240n12 Matrix, The (movie), xv MCI Telecommunications, IBM and, 136 MDC. See Los Angeles Metropolitan Detention Center Meaning, cultural/technological, 75 Media, xxiii, 7, 23, 37, 45, 55, 96, 117 culture and, xviii hackers and, 6, 33, 36, 73, 113, 197, 205, 222 information management by, 22 proliferation of, 35
259
representation by, ix, xv, xxii, 58 underground and, 170 71 Mediascapes, 96 Megahee, Kim: on E911 document, 125 Meinel, Carolyn: hacker inghting and, 228 Memory, 184 body and, 18287 Mentor, The, 72, 75, 245n40 on computers, 76 on hackers, 73, 77 on refuge, 78 Metal Shop AE, 118, 120 MGM Web page, xvi on Hackers, 166, 168 69 MIC. See Military-industrial complex Microbionics, 52 Microsoft, 4, 146 Apple and, 82 Back Orice and, 9899 cDc and, 99 computer culture and, 101 features of, 88, 89 growth/dominance of, 84, 93 hackers and, 87, 94 104, 109, 155 Internet and, 87 on L0phtcrack, 107 operating system by, 98 public relations problems for, 1078 security and, 88, 89, 99 100 software by, 93 94 Microsoft NT, Back Ofce and, 97 Military-industrial complex (MIC), 14, 15, 16, 18 Miller, Johnny Lee, 161 Milton, John, 230 Minor Threat. See Lamprecht, Chris Miramax Mitnick and, 202, 204, 221, 231 protestors at, 221 (photo) mIRC, 153 MIT, lab at, 13, 16, 17 Mitnick, Kevin D. (Condor), xiii, 6, 36, 220, 233 addiction of, 19192 arrest of, 176, 191, 197201, 203, 204, 223 bail hearing and, 205, 22223, 231 charges against, 196, 203, 225, 226 27
260 / Index
Mitnick, Kevin D. (Condor), continued computer of, 223 28 conviction of, xxvixvii, 191, 19293, 194, 227 defense by, 223, 224, 22526, 228 hunt for, 197205 legacy of, 2012, 203, 232, 237 media and, 202, 205, 222, 229 pretrial detainment of, 205, 220 23, 231 publicity/visibility for, 2023, 221 social engineering/phreaking of, 198 web site of, 231 Mizrach, Steve on hackers, 3132 on Jobs/Wozniak, 34 Mnemotechnics, 184 MocroModen II, 133 MOD. See Masters of Deception Morris, Bob, 28, 67 68 Morris, Robert (son), xiii, xxii, xxiii, 2331, 36, 37 worm and, 2728, 29, 68, 86 Moss, Jeff (Dark Tangent): DefCon and, 93 Mudge buffer overow and, 105 code breaking by, 110 on L0pht, 109 Multinationalism, 12, 93, 158, 164, 169 Mungo, Paul, 5, 123 on E911 document, 124, 125 on hackers, 6 Murphy, Dade (Zero Cool, Crash Override), 161, 162, 166, 167 hacking contest and, 159 60 photo of, 160 Muscle grafts, 52 National Computer Security Center (National Security Agency), 28 Naturalization, 154, 155 Neidorf, Craig (Knight Lightning), 92, 121, 136 E911 document and, 123 interrogation of, 124, 125 Phrack and, 120, 123, 124 Net, The (movie), xv, 31, 51, 53 Netanyahu, Benjamin, 45 Netcom, 66, 67, 199, 200 Network Associates, hackers and, 154 Networks, 16, 87 technological, 97 viruses and, 42 Neuromancer (Gibson), 5, 20 21, 52, 190 91 New-school hackers, xxi, xii, xvii, 24, 3132, 34, 167 emergence of, xxii old-school hackers and, xxii, 29 News II (Knight Lightning), 136 Newsletters, underground, 11516 New York Times, 138, 196 on Mitnick, 192, 199, 202, 203, 204, 229 Stoll and, xiii New York Times Web page, hacking, 222, 22832 Nietzsche, Friedrich, 180, 184 on punishment/technology, 183 1984 (Orwell), 60, 95 Ninja NYC, 92, 121 NORAD (North American Air Defense command), 25, 30 NSCA, 197 Oakland Tribune, 7 Ofce of Prisons, 205 Off the Hook (radio show), 120 Old-school hackers, xxi, xxixxiii, 17, 24, 27, 32, 34, 81, 8283, 104, 150 hobbyists and, 19 motto of, 11 new-school hackers and, xxii, 29 One china, two policies doctrine, 97 On the Genealogy of Morals (Nietzsche), 183 Open Letter to Hobbyists (Gates), 39 Open-source software movement, xi Operating systems, 44, 82, 83 89, 98, 104 commands/codes and, 106 rewriting, 108 UNIX-based, 105 VMS, 125 Organized crime, hackers and, 211, 212 Origins in Phreak/Hack BBSes, 133 Origins in the Phreak/Hack World, 132 Orwell, George, 60, 95
Index /
Other, hackers and, 7778 Overlord 313, 137 Ownership, xvi, 39 Oxblood Rufn on applications hackers, 44 on Hong Kong Blondes, 97 on politics/hacking, 96 Pacic Bell, hacking, 213, 214 Palm Pilot, 105, 109 Panopticon, hacking, 18790, 248n13 Parental culture, 142 43, 149, 171 Party Line (newsletter), 16 Passwords, xi, 28, 41, 42, 61, 62, 63, 88, 89, 98, 99, 105, 187 acceptable, 107 cracking, 68 69, 70, 71, 155, 186 encryption of, 67, 68, 69, 245n35 les, 67, 68 guessable, 70 71 secrets and, 69 trading, 188 UNIX, 70 Windows NT, 106 7 Patents, 40 PCs. See Personal computers Penetration, metaphors of, 177 Pengo, xiii, 244n14 Pentagon, hacking, 43, 44, 45, 46 Performative, constitutive and, 186 87 Personal computers (PCs), 37, 81, 105, 204, 217 evolution of, 39 40 hacking and, 17, 86 introduction to, xi, 3, 18, 218 mass marketing, 145 success of, 64 ubiquity of, 42 46 user-friendly, 64, 65 youth culture and, xvii Peterson, Justin Tanner (Agent Steal), 185, 187 Pfaelzer, Marianne: Mitnick case and, 193, 205, 22223, 224, 226 Phaedrus (Plato), 57, 58, 244n19 Phalken, Professor, 60 Phantom Phreaker, 92 Phear, provoking, xvi Phiber Optik. See Abene, Mark
261
Philes, 122 Phone system, crashing, 59, 7778, 117, 165 (photo) Phrack (journal), xxvxxvi, 90, 91, 92, 113, 124 BBS of, 122 changes for, 138, 139 40 computer underground and, 141 copyright and, 126 27, 128, 129 30 culture and, 121, 140 described, 116, 121, 139, 140, 244n13 E911 document and, 125 Goggans and, 126 27, 129 Hacker Manifesto and, 72 information from, 119, 122, 130 Lamprecht and, 233, 236 on LOD, 208 Mentor in, xxiv, 245n40 Prophet in, 123 reading, xxvi, 120 22 secrecy/technology and, 130 Phrack Pro-Philes, 92, 121, 140 cultural functions of, 13233 on Erik Bloodaxe, 26 reading, 130 36 sense of community and, 132, 134 35 Phrack World News, 121, 122, 130, 136 40 Phreak/Hack BBSes, 132 Phreaking, 60, 116, 121, 198 Phreaks, 113, 167 phone, 18, 116 Phucked Agent 4, 91 Pi (movie), xv Pirate-80, 134 Pivot of Evil, 95 Plague, The, 157, 160, 166 Plato, 193, 244n19 Platt, Charles: on Mitnick, 202 Politics, 89, 97, 101, 1023, 229 capital/labor and, 82 globalized, 83 hackers and, 82, 96, 104, 115, 116, 120 information and, 96 technology and, 96 Popular culture, 151, 171 hackers and, xixv, xx, 26, 113, 156, 170 technology and, 4
262 / Index
Pornographic images, x, 152, 228 POSIX, 83 Postmodernism, xviii technology and, xviixix, 240nn12, 13 Post-punk generation, 31 Poulsen, Kevin Lee (Dark Dante), xxvi, 6, 36, 217, 233 case of, 176, 21216, 244n21 hunting for, 197 as national security threat, 215 probation for, 19192 secrets and, 215 Pranks, xiii, 37, 47 48, 197, 206, 231 Prince of Hackers, 195, 203 Prisoner, The (Branwyn), 53 Privacy, xxiii, 93, 110, 247n17 Programmers, ix, 14, 65, 144 Programming, 3, 14, 19, 145, 235 Programs, 43 44, 118 cracking, 69 Prophet, The. See Riggs, Robert Protovision, 24, 30 Pseudonyms, 130, 130 31 Publicity, 2023 PumpCon, 92 Punishment as political tactic, 182 as social function, 181 technology and, 175, 180 85, 196 97, 220 22 Pynchon, Thomas, 125 Quittner, Joshua on gang war, 209 10 on hacker underground, 211 on LOD, 210 on Mitnick, 192 Radio call-in contests, xing, 191 Randolph, Don, 205, 227, 250n1 Reagan, Ronald, 95, 193 Rebellion, xiv, 80, 158, 206 Red boxes, 178 Redford, Robert (Sneakers), xv Reno, Janet: cyberterrorism and, 43 Representations, 96 codes/systems of, 149 hacker, xiiixiv, xx, 5, 7274, 90, 138, 150 51, 175, 194, 200, 205 6, 21213, 219 media, 220 popular culture, 220 Reputation, 91, 207 Resistance globalization of, 97 hacking as, 18790 primary/secondary strategy of, 149 styles of, 153 56, 170 Rhoades, Steve, 47 on technology/human relationship, 48 Riggs, Robert (The Prophet), 123, 125 RISKS Digest, postings at, 45 Ross, Andrew: on hacker underground, x Rossetto, Harriet, 192 Rotundo, Anthony, xvi, 47, 158, 206 on boy culture, x Rubin, Jerry, 16 San Diego Supercomputer Center, 198 San Fernando Valley Daily News, Mitnick and, 202 San Jose Mercury News, 7 SATAN (Security Administrator Tool for Analyzing Networks), 7, 8 Schindler, David, 227, 250n1 Schwader, Warren: hieroglyphics of, 40 Schwartau, Winn: Hacker Jeopardy and, 93 Science ction, 19 23 Scorpion, MOD and, 208 Scott, LOD and, 210 Script kiddies, 43, 167 Scripts, 43 44, 46, 167 Secrecy, xxv, 14, 40, 116, 179, 215, 220 body and, 188, 190 code sharing and, 15 corporate, 81, 220 culture of, xixii, xvii, xxi, 3, 12, 31, 35, 52, 113, 122, 123 30, 126, 180, 188 genealogy of, 1215 importance of, 13, 31, 33, 130 institutions of, 128, 129 issues of, 3 4, 15, 188
Index /
language of, 49 50 need for, 39 40, 109, 126 notion of, 13, 110, 179, 189 ownership and, 39 producing, 38, 127 regulation of, 189 technology and, 3, 30, 130, 13132, 221 violating, 13, 19, 23, 110, 130, 131, 133 34, 140, 187, 217, 221, 225 Secret Service, 161, 189 90 Secrets of Windows 95, 50 Security, xixii, xxiii, 99 100, 110, 127, 155, 212 as add-on application, 154 enhancing, 44, 63, 86, 87, 109 aws in, 7, 8, 28, 44, 46, 8586, 88, 89, 235 hardware/software, 89 high-end, 62 63 network, 7, 86, 87 obscurity and, 88, 108 system, 61, 245n35 threats to, 44, 66, 68, 105, 216, 217 UNIX, 67 Security Administrator Tool for Analyzing Networks. See SATAN Security professionals, xxiii, 109, 139, 157, 158, 159 hackers and, 43, 87, 235 Serial hackers, 206 SETEC ASTRONOMY (Sneakers), 30 SF-LOVERS, 20 Sheedy, Ally (War Games), 25 Sherman, Richard, 223, 250n1 Shimomura, Tsutomu, 197, 231 Markoff and, 230 Mitnick and, 198, 199 200, 201, 204, 229, 227 Shockwave Rider (Brunner), 29, 53, 139 Shooting Shark, 26 Silicon Valley, xi, xxii, xxiv, 24, 196 boom in, 42 old school at, 17 Silver Spy (Sysop of Catch 22), 91 Sim, Evian S., 250n1 Sir Francis Drake, 92 6502 CPU, 167, 168
263
SkyNet, 51 Slatalla, Michelle on gang war, 209 10 on hacker underground, 211 on LOD, 210 Sneakers (movie), xv, 30, 51, 53 Social engineering, xxiii, 61 67, 159, 16570, 198 Socialist Review, Haraway in, 71 Social life, hacker, xxivxxv Social movements, 115, 120 Social order, disruption of, 179, 180 Socrates, 58, 244n19 Softley, Iain, 166 Software, 9, 87 copying, xviii, xxvii, 134 developing, xvii, 143, 235 free, 8, 11, 118 hacking, 81, 105, 147, 225 Microsoft, 93 94 proprietary, 34, 225 remote control, 98, 99 Software Blue Box, 134 Sokol, Dan, 39 Sol System, 20 Southwestern Bell circuit boards, theft/sale of, 232 Sparks, Sam, 236 Speech recognition, 14 Speed dialer, 178 Spinrad, Norman, 20 Spot the Fed (game), xxv, 93 Starr, Ken, 222, 228 Star Trek (movie), 60, 70, 202 Stereotypes, hacker, 81, 165 Sterling, Bruce, 243n4, 244n12 on anarchy of convenience, 116 on computer bulletin boards, 118 on hacker underground, 1516 on Phrack, 122 on WarGames, 26 on youth culture, xiii Stoll, Clifford, xiii, 6, 34 Stone, Sandy, x Style computer, 143, 144 48 documentation of, 158 electronic, 149 hacker, 14853, 160 61, 162
264 / Index
Style, continued meaning of, 142, 156 60 of resistance, 153 56, 170 subcultural, 142, 148, 149, 150, 157 Subcultural style, 142, 148, 149 cultural codes and, 150 transformation of, 157 Subculture, xxiii, xxv, 141, 148 coding, 144 complex/varied, 6 computer, ixx, 166 uidity of, 142 formation, xi, xii, 171 hacker, xx, xxi, xxvi, 3, 113, 147, 149, 151, 152, 153, 155 parent culture and, 143 Substitutions, 12, 56, 57 SummerCon, 92 Sun, 101 Superman I (movie), 207 Surveillance, 14, 93, 189, 214 development/deployment of, 216 mechanisms of, 219 Synthetic Slug, 92 SysOp, 152 Systems administrators, hackers and, 43 crashes, 6 resisting/interrupting, xii See also Operating systems Takedown: The Pursuit and Capture of Kevin Mitnick, Americas Most Wanted Computer Outlawby the Man Who Did It (Shimomura and Markoff), 199 200, 202, 204 TAP. See Technical Assistance Program Tapeworms, 29 Taran King. See King, Randy Technical, technology and, 6 10, 61 Technical Assistance Program (TAP), 16, 59, 120, 121, 122 early literature of, 11516 Techno-fetishism, 157, 159 Technological, xvi, 51, 53, 54, 63, 78, 143 hackers/hacking and, 55 technology and, 61 Technology access to, xxii, 53, 115, 191, 193 challenge to, 218 changes in, 67, 110 complexity of, x, 8 culture and, xvii, xx, xxi, 9, 37, 40, 74, 75, 79 demand for, 60 61, 66 deployment of, 82, 216 hackers and, xxi, xxiii, xxiv, xxvxxvi, 11, 12, 73, 75, 78, 113, 155 hacking and, xxi, 11, 37, 5253, 71, 179 80 mastering/controlling, xvi, 48, 49 51, 54, 75, 188 meaning of, 56, 63, 76, 79 memory as, 183 84 performance of, xx, 50, 77, 79 question of, 57, 79 relationship to, 45, 4850, 52, 55, 58, 63, 69, 73, 7578, 127, 175, 183, 196, 237 secrecy and, 3, 30, 130, 13132, 221 separation of, 17778 social dimensions of, xxvi, 75, 182, 188, 193 threat of, 58, 179, 217 Technophobia, 8, 32, 52, 53, 55, 180, 216, 217 Technoscapes, 82, 83, 96 Telcos, 124 Telecommunications, 127, 178, 200 201 Telenet, 133 Terminals, photo of, 165 Terminator lms, 51 Terminus, 60 Terrorists, xxii, 43, 176, 177, 212, 231 Tips and Tricks for Java 1.1, 50 Tom Edison, 16, 60, 116 ToneLoc, 234 35 Torvalds, Linus, 83 Tracking, xxvi, 194, 195, 198, 199, 201 Trade relations, hacker intervention in, 1023 Transformation, 58, 149, 161 Translations, laws governing, 57 Transmitters, making, 224 Transparent interfaces, 151
Index /
Trashing, 62 Trojan (UNIX patch), 167 TRON (movie), xiv TRS-80s, 133 True hacks, 44 derivative hacks and, 43 Truth about Back Orice, The (Microsoft), 98 TRW, 33, 35 T-shirts, xxiv, xxv, 93 FBI, 187 Free Kevin, 228 Tuc, 92 Turing, Alan: Enigma Machine and, 13 Turkle, Sherry, 243n2 on bricolage, 146 47 on Greenblatt/Dijkstra, 145 2600: The Hacker Quarterly, 90, 121, 122, 157, 230 31 described, 116, 119 20, 141 forbidden knowledge from, 119 Tymnet, B. T.: proprietary structure of, 127 berhackers, 197 Ubik (Dick), 20 Ulrich, Skeet (Takedown), 204 Unauthorized access devices, 187, 188, 211 Underground, xx, 6, 90, 157, 244n25 culture, 157 documenting, 136 40 hacker culture and, 148 reputations in, 207 roots of, 15, 16 See also Computer underground; Hacker underground United Nations Commission on Human Rights, 102 University of California computer system, hacking, 6 UNIX, xxiv, 44, 87, 167 bugs in, 105, 106 clones, 85 IRC and, 153 machines, 29, 37, 67, 245n35 security and, 86 shell navigation, 130 Unleashing HTML, 49 Unsolved Mysteries (television show), 219 Poulsen on, 197, 214, 21516 USA Today, on Mitnick, 202
265
VAXstation II, 125 Venema, Wieste, 7 Video games, 157, 218 Videosmith, The, 91 Violence metaphors of, 175 virtual, 212 Virilio, Paul: on commodication, 2223, 3839 Virtual, 181 anxiety and, 218 Virtual/corporeal split, 201 Virtual space, 175, 201, 212, 216, 218 Viruses, 6, 7, 157, 177, 224 biological/computer, 41 42 maliciousness of, 29 networks and, 42 Visibility, 148, 2023 VISICALC, 146 Voice hacker, 74, 75 institutional, 74 75 VR5 (television show), xv VT100, 37 Walker, Kent: Mitnick and, 197 Wannabes, 167 WarGames (movie), xv, xxii, xxiii, 23 31, 45, 51, 53, 60, 118, 156, 164, 168, 170, 235 hacker culture and, ix, 26 WarGames Dialers, 118 War Operations Planned Response. See WOPR Web pages, xxiv, 72, 104, 141, 166 addresses, 46 on hackers, 9 hacking, 165 66, 167, 22829 Well, The, 19899, 200 Wetware, 61 Wetwired, 52 Why Should The CU Care?, 3536
266 / Index
Windows, 82, 84 85, 87, 98 bugs/holes in, 89 le sharing features of, 88 functions, 152 operating system of, 104 Windows 95, 85, 87, 88, 97, 98 L0phtcrack 2.0 and, 108 security features of, 99, 100 Windows 98, 97, 98, 153 security features of, 99, 100 Windows for Dummies, 50 Windows NT, 104 L0phtcrack 2.0 and, 108 password system of, 1067 security and, 100 Wing, MOD and, 208 winhack.c, 88 Winkler, Ira: on breaking into computers, 46 Wired News, 45, 210 Wiretapping, 198, 211, 213, 214 Wizard programs, 49 Wong, Blondie, 97, 246n16 on human rights/trade policy, 1023 on intervention, 103 on publicity, 103 Wood, Michele, 236, 250n1 WOPR (War Operations Planned Response), 24, 25, 27, 60 Word Perfect for Dummies, 50 World Wide Web, 42, 166 Worms, 23 31, 68, 86 Wozniak, Steven Woz, 17, 64, 101 blue boxing and, 18 PC and, 18 Write, 85 Writing, technology and, 57, 58, 61 www.kevinmitnick.com, 231 Xerox, 29 X-Files (television show), xv YIP. See Youth International Party YIPL. See Youth International Party Line Yippies, 16, 59, 116 Youth culture, xi, xvi, 73, 103, 205, 239n11 documentation of, 158 hackers and, xiv, 141 interest in, xiii, xvii online, 141 44 subcultural identity and, 142 technology and, 72 Youth International Party (YIP), 16 Youth International Party Line (YIPL), 59 Youth rebellion, xiv, 80, 206 Zero Cool. See Murphy, Dade Zines, 239n11 Zizek, Slavoj, x
Douglas Thomas is associate professor in the Annenberg School for Communication at the University of Southern California, Los Angeles.