home *** CD-ROM | disk | FTP | other *** search
Text File | 1992-07-14 | 62.3 KB | 1,295 lines | [TEXT/EDIT] |
-
- CRIME AND PUZZLEMENT
- by
-
- John Perry Barlow
- barlow@well.sf.ca.us
-
- Desperados of the DataSphere
-
- So me and my sidekick Howard, we was sitting out in front of the 40 Rod
- Saloon one evening when he all of a sudden says, "Lookee here. What do
- you reckon?" I look up and there's these two strangers riding into town.
- They're young and got kind of a restless, bored way about 'em. A person
- don't need both eyes to see they mean trouble...
-
- Well, that wasn't quite how it went. Actually, Howard and I were
- floating blind as cave fish in the electronic barrens of the WELL, so
- the whole incident passed as words on a display screen:
-
- Howard: Interesting couple of newusers just signed on. One calls himself
- acid and the other's optik.
-
- Barlow: Hmmm. What are their real names?
-
- Howard: Check their finger files.
-
- And so I typed !finger acid. Several seconds later the WELL's
- Sequent computer sent the following message to my Macintosh in
- Wyoming:
-
- Login name: acid In real life: Acid Phreak
-
- By this, I knew that the WELL had a new resident and that his
- corporeal analog was supposedly called Acid Phreak. Typing !finger
- optik yielded results of similar insufficiency, including the claim that
- someone, somewhere in the real world, was walking around calling
- himself Phiber Optik. I doubted it.
-
- However, associating these sparse data with the knowledge that the
- WELL was about to host a conference on computers and security
- rendered the conclusion that I had made my first sighting of genuine
- computer crackers. As the arrival of an outlaw was a major event to
- the settlements of the Old West, so was the appearance of crackers
- cause for stir on the WELL.
-
- The WELL (or Whole Earth 'Lectronic Link) is an example of the
- latest thing in frontier villages, the computer bulletin board. In this
- kind of small town, Main Street is a central minicomputer to which
- (in the case of the WELL) as many as 64 microcomputers may be
- connected at one time by phone lines and little blinking boxes called
- modems.
-
- In this silent world, all conversation is typed. To enter it, one
- forsakes both body and place and becomes a thing of words alone.
- You can see what your neighbors are saying (or recently said), but
- not what either they or their physical surroundings look like. Town
- meetings are continuous and discussions rage on everything from
- sexual kinks to depreciation schedules.
-
- There are thousands of these nodes in the United States, ranging from
- PC clone hamlets of a few users to mainframe metros like
- CompuServe, with its 550,000 subscribers. They are used by
- corporations to transmit memoranda and spreadsheets, universities
- to disseminate research, and a multitude of factions, from apiarists to
- Zoroastrians, for purposes unique to each.
-
- Whether by one telephonic tendril or millions, they are all connected
- to one another. Collectively, they form what their inhabitants call the
- Net. It extends across that immense region of electron states,
- microwaves, magnetic fields, light pulses and thought which sci-fi
- writer William Gibson named Cyberspace.
-
- Cyberspace, in its present condition, has a lot in common with the
- 19th Century West. It is vast, unmapped, culturally and legally
- ambiguous, verbally terse (unless you happen to be a court
- stenographer), hard to get around in, and up for grabs. Large
- institutions already claim to own the place, but most of the actual
- natives are solitary and independent, sometimes to the point of
- sociopathy. It is, of course, a perfect breeding ground for both
- outlaws and new ideas about liberty.
-
- Recognizing this, Harper's Magazine decided in December, 1989 to
- hold one of its periodic Forums on the complex of issues surrounding
- computers, information, privacy, and electronic intrusion or
- "cracking." Appropriately, they convened their conference in
- Cyberspace, using the WELL as the "site."
-
- Harper's invited an odd lot of about 40 participants. These included:
- Clifford Stoll, whose book The Cuckoo's Egg details his cunning efforts
- to nab a German cracker. John Draper or "Cap'n Crunch," the grand-
- daddy of crackers whose blue boxes got Wozniak and Jobs into
- consumer electronics. Stewart Brand and Kevin Kelly of Whole Earth
- fame. Steven Levy, who wrote the seminal Hackers. A retired Army
- colonel named Dave Hughes. Lee Felsenstein, who designed the
- Osborne computer and was once called the "Robespierre of
- computing." A UNIX wizard and former hacker named Jeff
- Poskanzer. There was also a score of aging techno-hippies, the
- crackers, and me.
-
- What I was doing there was not precisely clear since I've spent most
- of my working years either pushing cows or song-mongering, but I at
- least brought to the situation a vivid knowledge of actual cow-towns,
- having lived in or around one most of my life.
-
- That and a kind of innocence about both the technology and morality
- of Cyberspace which was soon to pass into the confusion of
- knowledge.
-
- At first, I was inclined toward sympathy with Acid 'n' Optik as well
- as their colleagues, Adelaide, Knight Lightning, Taran King, and
- Emmanuel. I've always been more comfortable with outlaws than
- Republicans, despite having more certain credentials in the latter
- camp.
-
- But as the Harper's Forum mushroomed into a boom-town of ASCII
- text (the participants typing 110,000 words in 10 days), I began to
- wonder. These kids were fractious, vulgar, immature, amoral,
- insulting, and too damned good at their work.
-
- Worse, they inducted a number of former kids like myself into
- Middle Age. The long feared day had finally come when some
- gunsel would yank my beard and call me, too accurately, an old fart.
-
- Under ideal circumstances, the blind gropings of bulletin board
- discourse force a kind of Noh drama stylization on human commerce.
- Intemperate responses, or "flames" as they are called, are common
- even among conference participants who understand one another,
- which, it became immediately clear, the cyberpunks and techno-
- hippies did not.
-
- My own initial enthusiasm for the crackers wilted under a steady
- barrage of typed testosterone. I quickly remembered I didn't know
- much about who they were, what they did, or how they did it. I also
- remembered stories about crackers working in league with the Mob,
- ripping off credit card numbers and getting paid for them in (stolen)
- computer equipment.
-
- And I remembered Kevin Mitnik. Mitnik, now 25, recently served
- federal time for a variety of computer and telephone related crimes.
- Prior to incarceration, Mitnik was, by all accounts, a dangerous guy
- with a computer. He disrupted phone company operations and
- arbitrarily disconnected the phones of celebrities. Like the kid in
- Wargames, he broke into the North American Defense Command
- computer in Colorado Springs.
-
- Unlike the kid in Wargames, he is reputed to have made a practice of
- destroying and altering data. There is even the (perhaps apocryphal)
- story that he altered the credit information of his probation officer
- and other enemies. Digital Equipment claimed that his depredations
- cost them more than $4 million in computer downtime and file
- rebuilding. Eventually, he was turned in by a friend who, after
- careful observation, had decided he was "a menace to society."
-
- His spectre began to hang over the conference. After several days of
- strained diplomacy, the discussion settled into a moral debate on the
- ethics of security and went critical.
-
- The techno-hippies were of the unanimous opinion that, in Dylan's
- words, one "must be honest to live outside the law." But these
- young strangers apparently lived by no code save those with which
- they unlocked forbidden regions of the Net.
-
- They appeared to think that improperly secured systems deserved to
- be violated and, by extension, that unlocked houses ought to be
- robbed. This latter built particular heat in me since I refuse, on
- philosophical grounds, to lock my house.
-
- Civility broke down. We began to see exchanges like:
-
- Dave Hughes: Clifford Stoll said a wise thing that no one has
- commented on. That networks are
- built on trust. If they aren't, they should be.
-
-
- Acid Phreak: Yeah. Sure. And we should use the 'honor system' as a
- first line of security against hack attempts.
-
-
- Jef Poskanzer: This guy down the street from me sometimes leaves his
- back door unlocked. I told him about it once, but he still
- does it. If I had the chance to do it over, I would go in the
- back door, shoot him, and take all his money and
- consumer electronics. It's the only way to get through to
- him.
-
- Acid Phreak: Jef Poskanker (Puss? Canker? yechh) Anyway, now
- when did you first start having these delusions where
- computer hacking was even *remotely* similar to
- murder?
-
- Presented with such a terrifying amalgam of raw youth and apparent
- power, we fluttered like a flock of indignant Babbitts around the
- Status Quo, defending it heartily. One former hacker howled to the
- Harper's editor in charge of the forum, "Do you or do you not have
- names and addresses for these criminals?" Though they had
- committed no obvious crimes, he was ready to call the police.
-
- They finally got to me with:
-
- Acid: Whoever said they'd leave the door open to their house...
- where do you live? (the address) Leave it to me in mail if you
- like.
-
- I had never encountered anyone so apparently unworthy of my trust
- as these little nihilists. They had me questioning a basic tenet,
- namely that the greatest security lies in vulnerability. I decided it
- was time to put that principal to the test...
-
- Barlow: Acid. My house is at 372 North Franklin Street in
- Pinedale, Wyoming. If you're heading north on Franklin,
- you go about two blocks off the main drag before you run
- into hay meadow on the left. I've got the last house before
- the field. The computer is always on...
-
- And is that really what you mean? Are you merely just
- the kind of little sneak that goes around looking for easy
- places to violate? You disappoint me, pal. For all your
- James Dean-On-Silicon rhetoric, you're not a cyberpunk.
- You're just a punk.
-
- Acid Phreak: Mr. Barlow: Thank you for posting all I need to get your
- credit information and a whole lot more! Now, who is to
- blame? ME for getting it or YOU for being such an idiot?!
- I think this should just about sum things up.
-
-
- Barlow: Acid, if you've got a lesson to teach me, I hope it's not that
- it's idiotic to trust one's fellow man. Life on those terms
- would be endless and brutal. I'd try to tell you something
- about conscience, but I'd sound like Father O'Flannigan
- trying to reform the punk that's about to gutshoot him.
- For no more reason that to watch him die.
-
- But actually, if you take it upon yourself to destroy my
- credit, you might do me a favor. I've been looking for
- something to put the brakes on my burgeoning
- materialism.
-
- I spent a day wondering whether I was dealing with another Kevin
- Mitnik before the other shoe dropped:
-
- Barlow: ... With crackers like acid and optik, the issue is less
- intelligence than alienation. Trade their modems for
- skateboards and only a slight conceptual shift would
- occur.
-
- Optik: You have some pair of balls comparing my talent with
- that of a skateboarder. Hmmm... This was indeed boring,
- but nonetheless:
-
- At which point he downloaded my credit history.
-
- Optik had hacked the core of TRW, an institution which has made
- my business (and yours) their business, extracting from it an
- abbreviated ( and incorrect) version of my personal financial life.
- With this came the implication that he and Acid could and would
- revise it to my disadvantage if I didn't back off.
-
- I have since learned that while getting someone's TRW file is fairly
- trivial, changing it is not. But at that time, my assessment of the
- crackers' black skills was one of superstitious awe. They were digital
- brujos about to zombify my economic soul.
-
- To a middle-class American, one's credit rating has become nearly
- identical to his freedom. It now appeared that I was dealing with
- someone who had both the means and desire to hoodoo mine,
- leaving me trapped in a life of wrinkled bills and money order
- queues. Never again would I call the Sharper Image on a whim.
-
- I've been in redneck bars wearing shoulder-length curls, police
- custody while on acid, and Harlem after midnight, but no one has
- ever put the spook in me quite as Phiber Optik did at that moment. I
- realized that we had problems which exceeded the human
- conductivity of the WELL's bandwidth. If someone were about to
- paralyze me with a spell, I wanted a more visceral sense of him than
- could fit through a modem.
-
- I e-mailed him asking him to give me a phone call. I told him I
- wouldn't insult his skills by giving him my phone number and, with
- the assurance conveyed by that challenge, I settled back and waited
- for the phone to ring. Which, directly, it did.
-
- In this conversation and the others that followed I encountered an
- intelligent, civilized, and surprisingly principled kid of 18 who
- sounded, and continues to sound, as though there's little harm in him
- to man or data. His cracking impulses seemed purely exploratory,
- and I've begun to wonder if we wouldn't also regard spelunkers as
- desperate criminals if AT&T owned all the caves.
-
- The terrifying poses which Optik and Acid had been striking on
- screen were a media-amplified example of a human adaptation I'd
- seen before: One becomes as he is beheld. They were simply living up to
- what they thought we, and, more particularly, the editors of
- Harper's, expected of them. Like the televised tears of disaster
- victims, their snarls adapted easily to mass distribution.
-
- Months later, Harper's took Optik, Acid and me to dinner at a
- Manhattan restaurant which, though very fancy, was appropriately
- Chinese. Acid and Optik, as material beings, were well-scrubbed and
- fashionably-clad. They looked to be dangerous as ducks. But, as
- Harper's and the rest of the media have discovered to their delight,
- the boys had developed distinctly showier personae for their rambles
- through the howling wilderness of Cyberspace.
-
- Glittering with spikes of binary chrome, they strode past the kleig
- lights and into the digital distance. There they would be outlaws. It
- was only a matter of time before they started to believe themselves as
- bad as they sounded. And no time at all before everyone else did.
-
- In this, they were like another kid named Billy, many of whose feral
- deeds in the pre-civilized West were encouraged by the same dime
- novelist who chronicled them. And like Tom Horn, they seemed to
- have some doubt as to which side of the law they were on. Acid even
- expressed an ambition to work for the government someday, nabbing
- "terrorists and code abusers."
-
- There is also a frontier ambiguity to the "crimes" the crackers
- commit. They are not exactly stealing VCR's. Copying a text file
- from TRW doesn't deprive its owner of anything except
- informational exclusivity. (Though it may said that information has
- monetary value only in proportion to its containment.)
-
- There was no question that they were making unauthorized use of
- data channels. The night I met them, they left our restaurant table
- and disappeared into the phone booth for a long time. I didn't see
- them marshalling quarters before they went.
-
- And, as I became less their adversary and more their scoutmaster, I
- began to get "conference calls" in which six or eight of them would
- crack pay phones all over New York and simultaneously land on my
- line in Wyoming. These deft maneuvers made me think of sky-
- diving stunts where large groups convene geometrically in free fall.
- In this case, the risk was largely legal.
-
- Their other favorite risky business is the time-honored adolescent
- sport of trespassing. They insist on going where they don't belong.
- But then teen-age boys have been proceeding uninvited since the
- dawn of human puberty. It seems hard-wired. The only innovation
- is in the new form of the forbidden zone the means of getting in it.
-
- In fact, like Kevin Mitnik, I broke into NORAD when I was 17. A
- friend and I left a nearby "woodsie" (as rustic adolescent drunks
- were called in Colorado) and tried to get inside the Cheyenne
- Mountain. The chrome-helmeted Air Force MP's held us for about 2
- hours before letting us go. They weren't much older than us and
- knew exactly our level of national security threat. Had we come
- cloaked in electronic mystery, their alert status certainly would have
- been higher.
-
- Whence rises much of the anxiety. Everything is so ill-defined. How
- can you guess what lies in their hearts when you can't see their eyes?
- How can one be sure that, like Mitnik, they won't cross the line from
- trespassing into another adolescent pastime, vandalism? And how
- can you be sure they pose no threat when you don't know what a
- threat might be?
-
- And for the crackers some thrill is derived from the metamorphic
- vagueness of the laws themselves. On the Net, their effects are
- unpredictable. One never knows when they'll bite.
-
- This is because most of the statutes invoked against the crackers were
- designed in a very different world from the one they explore. For
- example, can unauthorized electronic access can be regarded as the
- ethical equivalent of old-fashioned trespass? Like open range, the
- property boundaries of Cyberspace are hard to stake and harder still
- to defend.
-
- Is transmission through an otherwise unused data channel really
- theft? Is the track-less passage of a mind through TRW's mainframe
- the same as the passage of a pickup through my Back 40? What is a
- place if Cyberspace is everywhere? What are data and what is free
- speech? How does one treat property which has no physical form
- and can be infinitely reproduced? Is a computer the same as a
- printing press? Can the history of my business affairs properly
- belong to someone else? Can anyone morally claim to own
- knowledge itself?
-
- If such questions were hard to answer precisely, there are those who
- are ready to try. Based on their experience in the Virtual World, they
- were about as qualified to enforce its mores as I am to write the Law
- of the Sea. But if they lacked technical sophistication, they brought to
- this task their usual conviction. And, of course, badges and guns.
-
- ******
-
-
- Operation Sun Devil
-
- "Recently, we have witnessed an alarming number of young people who, for
- a variety of sociological and psychological reasons, have become attached to
- their computers and are exploiting their potential in a criminal manner.
- Often, a progression of criminal activity occurs which involves
- telecommunications fraud (free long distance phone calls), unauthorized
- access to other computers (whether for profit, fascination, ego, or the
- intellectual challenge), credit card fraud (cash advances and unauthorized
- purchases of goods), and then move on to other destructive activities like
- computer viruses."
-
- "Our experience shows that many computer hacker suspects are no longer
- misguided teenagers mischievously playing games with their computers in
- their bedrooms. Some are now high tech computer operators using
- computers to engage in unlawful conduct."
- -- Excerpts from a statement by
- Garry M. Jenkins
- Asst. Director, U. S. Secret Service
-
- "The right of the people to be secure in their persons, houses, papers, and
- effects, against unreasonable searches and seizures, shall not be violated, and
- no warrants shall issue but upon probable cause, support by oath or
- affirmation, and particularly describing the place to be searched, and the
- persons or things to be seized."
- -- Amendment IV
- United States Constitution
-
- On January 24, 1990, a platoon of Secret Service agents entered the
- apartment which Acid Phreak shares with his mother and 12 year-old
- sister. The latter was the only person home when they burst through
- the door with guns drawn. They managed to hold her at bay for
- about half an hour until their quarry happened home.
-
- By then, they were nearly done packing up Acid's worldly goods,
- including his computer, his notes (both paper and magnetic), books,
- and such dubiously dangerous tools as a telephone answering
- machine, a ghetto blaster and his complete collection of audio tapes.
- One agent asked him to define the real purpose of the answering
- machine and was frankly skeptical when told that it answered the
- phone. The audio tapes seemed to contain nothing but music, but
- who knew what dark data Acid might have encoded between the
- notes...
-
- When Acid's mother returned from work, she found her apartment a
- scene of apprehended criminality. She asked what, exactly, her son
- had done to deserve all this attention and was told that, among other
- things, he had caused the AT&T system crash several days earlier.
- (Previously AT&T had taken full responsibility.) Thus, the agent
- explained, her darling boy was thought to have caused over a billion
- dollars in damage to the economy of the United States.
-
- This accusation was never turned into a formal charge. Indeed, no
- charge of any sort of was filed against Mr. Phreak then and, although
- the Secret Service maintained resolute possession of his hardware,
- software, and data, no c harge had been charged 4 months later.
-
- Across town, similar scenes were being played out at the homes of
- Phiber Optik and another colleague code-named Scorpion. Again,
- equipment, notes, disks both hard and soft, and personal effects were
- confiscated. Again no charges were filed.
-
- Thus began the visible phase of Operation Sun Devil, a two-year
- Secret Service investigation which involved 150 federal agents,
- numerous local and state law enforcement agencies. and the
- combined security resources of PacBell, AT&T, Bellcore, Bell South
- MCI, U.S. Sprint, Mid-American, Southwestern Bell, NYNEX, U.S.
- West and American Express.
-
- The focus of this impressive institutional array was the Legion of
- Doom, a group which never had any formal membership list but was
- thought by the members with whom I spoke to number less than 20,
- nearly all of them in their teens or early twenties.
-
- I asked Acid why they'd chosen such a threatening name. "You
- wouldn't want a fairy kind of thing like Legion of Flower Pickers or
- something. But the media ate it up too. Probing the Legion of Doom
- like it was a gang or something, when really it was just a bunch of
- geeks behind terminals."
-
- ******
-
-
- Sometime in December 1988, a 21 year-old Atlanta-area Legion of
- Doomster named The Prophet cracked a Bell South computer and
- downloaded a three-page text file which outlined, in bureaucrat-ese
- of surpassing opacity, the administrative procedures and
- responsibilities for marketing, servicing, upgrading, and billing for
- Bell South's 911 system.
-
- A dense thicket of acronyms, the document was filled with passages
- like:
-
- "In accordance with the basic SSC/MAC strategy for provisioning, the
- SSC/MAC will be Overall Control Office (OCO) for all Notes to PSAP circuits
- (official services) and any other services for this customer. Training must be
- scheduled for all SSC/MAC involved personnel during the pre-service stage
- of the project."
-
- And other such.
-
- At some risk, I too have a copy of this document. To read the whole
- thing straight through without entering coma requires either a
- machine or a human who has too much practice thinking like one.
- Anyone who can understand it fully and fluidly has altered his
- consciousness beyond the ability to ever again read Blake, Whitman,
- or Tolstoy. It is, quite simply, the worst writing I have ever tried to
- read.
-
- Since the document contains little of interest to anyone who is not a
- student of advanced organizational sclerosis...that is, no access codes,
- trade secrets, or proprietary information...I assume The Prophet only
- copied this file as a kind of hunting trophy. He had been to the heart
- of the forest and had returned with this coonskin to nail to the barn
- door.
-
- Furthermore, he was proud of his accomplishment, and since such
- trophies are infinitely replicable, he wasn't content to nail it to his
- door alone. Among the places he copied it was a UNIX bulletin
- board (rather like the WELL) in Lockport, Illinois called Jolnet.
-
- It was downloaded from there by a 20 year-old hacker and pre-law
- student (whom I had met in the Harper's Forum) who called himself
- Knight Lightning. Though not a member of the Legion of Doom,
- Knight Lightning and a friend, Taran King, also published from St.
- Louis and his fraternity house at the University of Missouri a
- worldwide hacker's magazine called Phrack. (From phone phreak and
- hack.)
-
- Phrack was an unusual publication in that it was entirely virtual. The
- only time its articles hit paper was when one of its subscribers
- decided to print out a hard copy. Otherwise, its editions existed in
- Cyberspace and took no physical form.
-
- When Knight Lightning got hold of the Bell South document, he
- thought it would amuse his readers and reproduced it in the next
- issue of Phrack. He had little reason to think that he was doing
- something illegal. There is nothing in it to indicate that it contains
- proprietary or even sensitive information. Indeed, it closely
- resembles telco reference documents which have long been publicly
- available.
-
- However, Rich Andrews, the systems operator who oversaw the
- operation of Jolnet, thought there might be something funny about
- the document when he first ran across it in his system. To be on the
- safe side, he forwarded a copy of it to AT&T officials. He was
- subsequently contacted by the authorities, and he cooperated with
- them fully. He would regret that later.
-
- On the basis of the forgoing, a Grand Jury in Lockport was persuaded
- by the Secret Service in early February to hand down a seven count
- indictment against The Prophet and Knight Lightning, charging
- them, among other things, with interstate transfer of stolen property
- worth more than $5,000. When The Prophet and two of his Georgia
- colleagues were arrested on February 7, 1990, the Atlanta papers
- reported they faced 40 years in prison and a $2 million fine. Knight
- Lightning was arrested on February 15.
-
- The property in question was the affore-mentioned blot on the
- history of prose whose full title was A Bell South Standard Practice
- (BSP) 660-225-104SV-Control Office Administration of Enhanced 911
- Services for Special Services and Major Account Centers, March, 1988.
-
- And not only was this item worth more than $5,000.00, it was worth,
- according to the indictment and Bell South, precisely $79,449.00. And
- not a penny less. We will probably never know how this figure was
- reached or by whom, though I like to imagine an appraisal team
- consisting of Franz Kafka, Joseph Heller, and Thomas Pynchon...
-
- In addition to charging Knight Lightning with crimes for which he
- could go to jail 30 years and be fined $122,000.00, they seized his
- publication, Phrack, along with all related equipment, software and
- data, including his list of subscribers, many of whom would soon lose
- their computers and data for the crime of appearing on it.
-
- I talked to Emmanuel Goldstein, the editor of 2600, another hacker
- publication which has been known to publish purloined documents.
- If they could shut down Phrack, couldn't they as easily shut down
- 2600?
-
- He said, "I've got one advantage. I come out on paper and the
- Constitution knows how to deal with paper."
-
- In fact, nearly all publications are now electronic at some point in
- their creation. In a modern newspaper, stories written at the scene
- are typed to screens and then sent by modem to a central computer.
- This computer composes the layout in electronic type and the entire
- product transmitted electronically to the presses. There, finally, the
- bytes become ink.
-
- Phrack merely omitted the last step in a long line of virtual events.
- However, that omission, and its insignificant circulation, left it
- vulnerable to seizure based on content. If the 911 document had been
- the Pentagon Papers (another proprietary document) and Phrack the
- New York Times, a completion of the analogy would have seen the
- government stopping publication of the Times and seizing its every
- material possession, from notepads to presses.
-
- Not that anyone in the newspaper business seemed particularly
- worried about such implications. They, and the rest of the media
- who bothered to report Knight Lightning's arrest were too obsessed
- by what they portrayed as actual disruptions of emergency service
- and with marvelling at the sociopathy of it. One report expressed
- relief that no one appeared to have died as a result of the
- "intrusions."
-
- Meanwhile, in Baltimore, the 911 dragnet snared Leonard Rose, aka
- Terminus. A professional computer consultant who specialized in
- UNIX, Rose got a visit from the government early in February. The
- G-men forcibly detained his wife and children for six hours while
- they interrogated Rose about the 911 document and ransacked his
- system.
-
- Rose had no knowledge of the 911 matter. Indeed, his only
- connection had been occasional contact with Knight Lightning over
- several years...and admitted membership in the Legion of Doom.
- However, when searching his hard disk for 911 evidence, they found
- something else. Like many UNIX consultants, Rose did have some
- UNIX source code in his possession. Furthermore, there was
- evidence that he had transmitted some of it to Jolnet and left it there
- for another consultant.
-
- UNIX is a ubiquitous operating system, and though its main virtue is
- its openness to amendment at the source level, it is nevertheless the
- property of AT&T. What had been widely d istributed within
- businesses and universities for years was suddenly, in Rose's hands,
- a felonious possession.
-
- Finally, the Secret Service rewarded the good citizenship of Rich
- Andrews by confiscating the computer where Jolnet had dwelt, along
- with all the e-mail, read and un-read, which his subscribers had left
- there. Like the many others whose equipment and data were taken
- by the Secret Service subsequently, he wasn't charged with anything.
- Nor is he likely to be. They have already inflicted on him the worst
- punishment a nerd can suffer: data death.
-
- Andrews was baffled. "I'm the one that found it, I'm the one that
- turned it in...And I'm the one that's suffering," he said.
-
- One wonders what will happen when they find such documents on
- the hard disks of CompuServe. Maybe I'll just upload my copy of
- Bell South Standard Practice (BSP) 660-225-104SV and see...
-
- In any case, association with stolen data is all the guilt you need. It's
- quite as if the government could seize your house simply because a
- guest left a stolen VCR in an upstairs bedroom closet. Or confiscate
- all the mail in a post office upon finding a stolen package there. The
- first concept of modern jurisprudence to have arrived in Cyberspace
- seems to have been Zero Tolerance.
-
- ******
-
-
- Rich Andrews was not the last to learn about the Secret Service's
- debonair new attitude toward the 4th Amendment's protection
- against unreasonable seizure.
-
- Early on March 1, 1990, the offices of a role-playing game publisher in
- Austin, Texas called Steve Jackson Games were visited by agents of
- the United States Secret Service. They ransacked the premises, broke
- into several locked filing cabinets (damaging them irreparably in the
- process) and eventually left carrying 3 computers, 2 laser printers,
- several hard disks, and many boxes of paper and floppy disks.
-
- Later in the day, callers to the Illuminati BBS (which Steve Jackson
- Games operated to keep in touch with roll-players around the
- country) encountered the following message:
-
- "So far we have not received a clear explanation of what the Secret Service
- was looking for, what they expected to find, or much of anything else. We are
- fairly certain that Steve Jackson Games is not the target of whatever
- investigation is being conducted; in any case, we have done nothing illegal
- and have nothing whatsoever to hide. However, the equipment that was
- seized is apparently considered to be evidence in whatever they're
- investigating, so we aren't likely to get it back any time soon. It could be a
- month, it could be never."
-
- It's been three months as I write this and, not only has nothing been
- returned to them, but, according to Steve Jackson, the Secret Service
- will no longer take his calls. He figures that, in the months since the
- raid, his little company has lost an estimated $125,000. With such a
- fiscal hemorrhage, he can't afford a lawyer to take after the Secret
- Service. Both the state and national offices of the ACLU told him to
- "run along" when he solicited their help.
-
- He tried to go to the press. As in most other cases, they were
- unwilling to raise the alarm. Jackson theorized, "The conservative
- press is taking the attitude that the suppression of evil hackers is a
- good thing and that anyone who happens to be put out of business in
- the meantime...well, that's just their tough luck."
-
- In fact, Newsweek did run a story about the event, portraying it from
- Jackson's perspective, but they were almost alone in dealing with it.
-
- What had he done to deserve this nightmare? Role-playing games, of
- which Dungeons and Dragons is the most famous, have been accused
- of creating obsessive involvement in their nerdy young players, but
- no one before had found it necessary to prevent their publication.
-
- It seems that Steve Jackson had hired the wrong writer. The
- managing editor of Steve Jackson Games is a former cracker, known
- by his fellows in the Legion of Doom as The Mentor. At the time of
- the raid, he and the rest of Jackson staff had been working for over a
- year on a game called GURPS Cyberpunk, High-Tech Low-Life Role-
- Playing.
-
- At the time of the Secret Service raids, the game resided entirely on
- the hard disks they confiscated. Indeed, it was their target. They told
- Jackson that, based on its author's background, they had reason to
- believe it was a "handbook on computer crime." It was therefore
- inappropriate for publication, 1st Amendment or no 1st Amendment.
-
- I got a copy of the game from the trunk of The Mentor's car in an
- Austin parking lot. Like the Bell South document, it seemed pretty
- innocuous to me, if a little inscrutable. Borrowing its flavor from the
- works of William Gibson and Austin sci-fi author Bruce Sterling, it is
- filled with silicon brain implants, holodecks, and gauss guns.
-
- It is, as the cover copy puts it, "a fusion of the dystopian visions of
- George Orwell and Timothy Leary." Actually, without the gizmos, it
- describes a future kind of like the present its publisher is
- experiencing at the hands of the Secret Service.
-
- An unbelievably Byzantine world resides within its 120 large pages
- of small print. (These roll-players must be some kind of idiots
- savants...) Indeed, it's a thing of such complexity that I can't swear
- there's no criminal information in there, but then I can't swear that
- Grateful Dead records don't have satanic messages if played
- backwards. Anything's possible, especially inside something as
- remarkable as Cyberpunk.
-
- The most remarkable thing about Cyberpunk is the fact that it was
- printed at all. After much negotiation, Jackson was able to get the
- Secret Service to let him have some of his data back. However, they
- told him that he would be limited to an hour and a half with only one
- of his three computers. Also, according to Jackson, "They insisted
- that all the copies be made by a Secret Service agent who was a two-
- finger typist. So we didn't get much. "
-
- In the end, Jackson and his staff had to reconstruct most of the game
- from neural rather than magnetic memory. They did have a few very
- old backups, and they retrieved some scraps which had been passed
- around to game testers. They also had the determination of the
- enraged.
-
- Despite government efforts to impose censorship by prior restraint,
- Cyberpunk is now on the market. Presumably, advertising it as "The
- book that was seized by the U.S. Secret Service" will invigorate sales.
- But Steve Jackson Games, the heretofore prosperous publisher of
- more than a hundred role-playing games, has been forced to lay off
- more than half of its employees and may well be mortally wounded.
-
- Any employer who has heard this tale will think hard before he hires
- a computer cracker. Which may be, of course, among the effects the
- Secret Service desires.
-
- ******
-
-
- On May 8, 1990, Operation Sun Devil, heretofore an apparently
- random and nameless trickle of Secret Service actions, swept down
- on the Legion of Doom and its ilk like a bureaucratic tsunami. On
- that day, the Secret Service served 27 search warrants in 14 cities from
- Plano, Texas to New York, New York.
-
- The law had come to Cyberspace. When the day was over, transit
- through the wide open spaces of the Virtual World would be a lot
- trickier.
-
- In a press release following the sweep, the Secret Service boasted
- having shut down numerous computer bulletin boards, confiscated
- 40 computers, and seized 23,000 disks. They noted in their statement
- that "the conceivable criminal violations of this operation have
- serious implications for the health and welfare of all individuals,
- corporations, and United States Government agencies relying on
- computers and telephones to communicate."
-
- It was unclear from their statement whether "this operation" meant
- the Legion of Doom or Operation Sun Devil. There was room to
- interpret it either way.
-
- Because the deliciously ironic truth is that, aside from the 3 page Bell
- South document, the hackers had neither removed nor damaged
- anyone's data. Operation Sun Devil, on the other hand, had "serious
- implications" for a number of folks who relied on "computers and
- telephones to communicate." They lost the equivalent of about 5.4
- million pages of information. Not to mention a few computers and
- telephones.
-
- And the welfare of the individuals behind those figures was surely in
- jeopardy. Like the story of the single mother and computer
- consultant in Baltimore whose sole means of supporting herself and
- her 18 year old son was stripped away early one morning. Secret
- Service agents broke down her door with sledge hammers, entered
- with guns drawn, and seized all her computer equipment.
- Apparently her son had also been using it...
-
- Or the father in New York who opened the door at 6:00 AM and
- found a shotgun at his nose. A dozen agents entered. While one of
- the kept the man's wife in a choke-hold, the rest made ready to shoot
- and entered the bedroom of their sleeping 14 year-old. Before
- leaving, they confiscated every piece of electronic equipment in the
- house, including all the telephones.
-
- It was enough to suggest that the insurance companies should start
- writing policies against capricious governmental seizure of circuitry.
-
- In fairness, one can imagine the government's problem. This is all
- pretty magical stuff to them. If I were trying to terminate the
- operations of a witch coven, I'd probably seize everything in sight.
- How would I tell the ordinary household brooms from the getaway
- vehicles?
-
- But as I heard more and more about the vile injustices being heaped
- on my young pals in the Legion of Doom, not to mention the
- unfortunate folks nearby, the less I was inclined toward such
- temperate thoughts as these. I drifted back into a 60's-style sense of
- the government, thinking it a thing of monolithic and evil efficiency
- and adopting an up-against-the-wall willingness to spit words like
- "pig" or "fascist" into my descriptions.
-
- In doing so, I endowed the Secret Service with a clarity of intent
- which no agency of government will ever possess. Despite almost
- every experience I've ever had with federal authority, I keep
- imagining its competence.
-
- For some reason, it was easier to invest the Keystone Kapers of
- Operation Sun Devil with malign purpose rather than confront their
- absurdity straight-on. There is, after all, a twisted kind of comfort in
- political paranoia. It provides one such a sense of orderliness to think
- that the government is neither crazy nor stupid and that its plots,
- though wicked, are succinct.
-
- I was about to have an experience which would restore both my
- natural sense of unreality and my unwillingness to demean the
- motives of others. I was about to see first hand the disorientation of
- the law in the featureless vastness of Cyberspace.
-
-
-
- ********
-
- In Search of NuPrometheus
-
-
- "I pity the poor immigrant..."
-
- -- Bob Dylan
-
-
- Sometime last June, an angry hacker got hold of a chunk of the highly
- secret source code which drives the Apple Macintosh. He then
- distributed it to a variety of addresses, claiming responsibility for this
- act of information terrorism in the name of the Nu Prometheus
- League.
-
- Apple freaked. NuPrometheus had stolen, if not the Apple crown
- jewels, at least a stone from them. Worse, NuPrometheus had then
- given this prize away. Repeatedly.
-
- All Apple really has to offer the world is the software which lies
- encoded in silicon on the ROM chip of every Macintosh. This set of
- instructions is the cyber-DNA which makes a Macintosh a Macintosh.
-
- Worse, much of the magic in this code was put there by people who
- not only do not work for Apple any longer, but might only do so
- again if encouraged with cattle prods. Apple's attitude toward its
- ROM code is a little like that of a rich kid toward his inheritance. Not
- actually knowing how to create wealth himself, he guards what he
- has with hysterical fervor.
-
- Time passed, and I forgot about the incident. But one recent May
- morning, I leaned that others had not. The tireless search for the
- spectral heart of NuPrometheus finally reached Pinedale, Wyoming,
- where I was the object of a two hour interview by Special Agent
- Richard Baxter, Jr. of the Federal Bureau of Investigation.
-
- Poor Agent Baxter didn't know a ROM chip from a Vise-grip when
- he arrived, so much of that time was spent trying to educate him on
- the nature of the thing which had been stolen. Or whether "stolen"
- was the right term for what had happened to it.
-
- You know things have rather jumped the groove when potential
- suspects must explain to law enforcers the nature of their alleged
- perpetrations.
-
- I wouldn't swear Agent Baxter ever got it quite right. After I showed
- him some actual source code, gave a demonstration of e-mail in
- action, and downloaded a file from the WELL, he took to rubbing his
- face with both hands, peering up over his finger tips and saying, "It
- sure is something, isn't it" Or, "Whooo-ee."
-
- Or "my eight year-old knows more about these things than I do." He
- didn't say this with a father's pride so much as an immigrant's fear of
- a strange new land into which he will be forcibly moved and in
- which his own child is a native. He looked across my keyboard into
- Cyberspace and didn't like what he saw.
-
- We could have made it harder for one another, but I think we each
- sensed that the other occupied a world which was as bizarre and
- nonsensical as it could be. We did our mutual best to suppress
- immune response at the border.
-
- You'd have thought his world might have been a little more
- recognizable to me. Not so, it turns out. Because in his world, I
- found several unfamiliar features, including these:
-
- 1. The Hacker's Conference is an underground organization of
- computer outlaws with likely connections to, and almost certainly
- sympathy with, the NuPrometheus League. (Or as Agent Baxter
- repeatedly put it, the "New Prosthesis League.")
-
- 2. John Draper, the affore-mentioned Cap'n Crunch, in addition to
- being a known member of the Hacker's Conference, is also CEO
- and president of Autodesk, Inc. This is of particular concern to
- the FBI because Autodesk has many top-secret contracts with the
- government to supply Star Wars graphics imaging and
- "hyperspace" technology. Worse, Draper is thought to have
- Soviet contacts.
-
- He wasn't making this up. He had lengthy documents from the San
- Francisco office to prove it. And in which Autodesk's address was
- certainly correct.
-
- On the other hand, I know John Draper. While, as I say, he may have
- once distinguished himself as a cracker during the Pleistocene, he is
- not now, never has been, and never will be CEO of Autodesk. He did
- work there for awhile last year, but he was let go long before he got
- in a position to take over.
-
- Nor is Autodesk, in my experience with it, the Star Wars skunk
- works which Agent Baxter's documents indicated. One could hang
- out there a long time without ever seeing any gold braid.
-
- Their primary product is something called AutoCAD, by far the most
- popular computer-aided design software but generally lacking in
- lethal potential. They do have a small development program in
- Cyberspace, which is what they call Virtual Reality. (This, I assume is
- the "hyperspace" to which Agent Baxter's documents referred.)
-
- However, Autodesk had reduced its Cyberspace program to a couple
- of programmers. I imagined Randy Walser and Carl Tollander toiling
- away in the dark and lonely service of their country. Didn't work.
- Then I tried to describe Virtual Reality to Agent Baxter, but that
- didn't work either. In fact, he tilted. I took several runs at it, but I
- could tell I was violating our border agreements. These seemed to
- include a requirement that neither of us try to drag the other across
- into his conceptual zone.
-
- I fared a little better on the Hacker's Conference. Hardly a
- conspiracy, the Hacker's Conference is an annual convention
- originated in 1984 by the Point Foundation and the editors of Whole
- Earth Review. Each year it invites about a hundred of the most gifted
- and accomplished of digital creators. Indeed, they are the very people
- who have conducted the personal computer revolution. Agent Baxter
- looked at my list of Hacker's Conference attendees and read their
- bios.
-
- "These are the people who actually design this stuff, aren't they?" He
- was incredulous. Their corporate addresses didn't fit his model of
- outlaws at all well.
-
- Why had he come all the way to Pinedale to investigate a crime he
- didn't understand which had taken place (sort of) in 5 different
- places, none of which was within 500 miles?
-
- Well, it seems Apple has told the FBI that they can expect little
- cooperation from Hackers in and around the Silicon Valley, owing to
- virulent anti-Apple sentiment there. They claim this is due to the
- Hacker belief that software should be free combined with festering
- resentment of Apple's commercial success. They advised the FBI to
- question only those Hackers who were as far as possible from the
- twisted heart of the subculture.
-
- They did have their eye on some local people though. These
- included a couple of former Apple employees, Grady Ward and
- Water Horat, Chuck Farnham (who has made a living out of
- harassing Apple), Glenn Tenney (the purported leader of the
- Hackers), and, of course, the purported CEO of Autodesk.
-
- Other folks Agent Baxter asked me about included Mitch Kapor, who
- wrote Lotus 1-2-3 and was known to have received some this
- mysterious source code. Or whatever. But I had also met Mitch
- Kapor, both on the WELL and in person. A less likely computer
- terrorist would be hard to come by.
-
- Actually, the question of the source code was another area where
- worlds but shadow-boxed. Although Agent Baxter didn't know
- source code from Tuesday, he did know that Apple Computer had
- told his agency that what had been stolen and disseminated was the
- complete recipe for a Macintosh computer. The distribution of this
- secret formula might result in the creation of millions of Macintoshes
- not made by Apple. And, of course, the ruination of Apple
- Computer.
-
- In my world, NuPrometheus (whoever they, or more likely, he might
- be) had distributed a small portion of the code which related
- specifically to Color QuickDraw. QuickDraw is Apple's name for the
- software which controls the Mac's on-screen graphics. But this was
- another detail which Agent Baxter could not capture. For all he
- knew, you could grow Macintoshes from floppy disks.
-
- I explained to him that Apple was alleging something like the ability
- to assemble an entire human being from the recipe for a foot, but
- even he know the analogy was inexact. And trying to get him to
- accept the idea that a corporation could go mad with suspicion was
- quite futile. He had a far different perception of the emotional
- reliability of institutions.
-
- When he finally left, we were both dazzled and disturbed. I spent
- some time thinking about Lewis Carroll and tried to return to writing
- about the legal persecution of the Legion of Doom. But my heart
- wasn't in it. I found myself suddenly too much in sympathy with
- Agent Baxter and his struggling colleagues from Operation Sun Devil
- to get back into a proper sort of pig-bashing mode.
-
- Given what had happened to other innocent bystanders like Steve
- Jackson, I gave some thought to getting scared. But this was Kafka in
- a clown suit. It wasn't precisely frightening. I also took some
- comfort in a phrase once applied to the administration of Frederick
- the Great: "Despotism tempered by incompetence."
-
- Of course, incompetence is a double-edged banana. While we may
- know this new territory better than the authorities, they have us
- literally out-gunned. One should pause before making well-armed
- paranoids feel foolish, no matter how foolish they seem.
-
-
- ******
-
- The Fear of White Noise
-
- "Neurosis is the inability to tolerate ambiguity."
-
- -- Sigmund Freud,
- appearing to me in a dream
-
-
- I'm a member of that half of the human race which is inclined to
- divide the human race into two kinds of people. My dividing line
- runs between the people who crave certainty and the people who
- trust chance.
-
- You can draw this one a number of ways, of course, like Control vs.
- Serendipity, Order vs. Chaos, Hard answers vs. Silly questions, or
- Newton, Descartes & Aquinas vs. Heisenberg, Mandelbrot & the
- Dalai Lama. Etc.
-
- Large organizations and their drones huddle on one end of my scale,
- busily trying to impose predictable homogeneity on messy
- circumstance. On the other end, free-lancers and ne'er-do-wells
- cavort about, getting by on luck if they get by at all.
-
- However you cast these poles, it comes down to the difference
- between those who see life as a struggle against cosmic peril and
- human infamy and those who believe, without any hard evidence,
- that the universe is actually on our side. Fear vs. Faith.
-
- I am of the latter group. Along with Gandhi and Rebecca of
- Sunnybrook Farm, I believe that other human beings will quite
- consistently merit my trust if I'm not doing something which scares
- them or makes them feel bad about themselves. In other words, the
- best defense is a good way to get hurt.
-
- In spite of the fact that this system works very reliably for me and my
- kind, I find we are increasingly in the minority. More and more of
- our neighbors live in armed compounds. Alarms blare continuously.
- Potentially happy people give their lives over to the corporate state as
- though the world were so dangerous outside its veil of collective
- immunity that they have no choice.
-
- I have a number of theories as to why this is happening. One has to
- do with the opening of Cyberspace. As a result of this development,
- humanity is now undergoing the most profound transformation of its
- history. Coming into the Virtual World, we inhabit Information.
- Indeed, we become Information. Thought is embodied and the Flesh
- is made Word. It's weird as hell.
-
- Beginning with the invention of the telegraph and extending through
- television into Virtual Reality, we have been, for a over a century,
- experiencing a terrifying erosion in our sense of both body and place.
- As we begin to realize the enormity of what is happening to us, all
- but the most courageous have gotten scared.
-
- And everyone, regardless of his psychic resilience, feels this
- overwhelming sense of strangeness. The world, once so certain and
- tangible and legally precise, has become an infinite layering of
- opinions, perceptions, litigation, camera-angles, data, white noise,
- and, most of all, ambiguities. Those of us who are of the fearful
- persuasion do not like ambiguities.
-
- Indeed, if one were a little jumpy to start with, he may now be fairly
- humming with nameless dread. Since no one likes his dread to be
- nameless, the first order of business is to find it some names.
-
- For a long time here in the United States, Communism provided a
- kind of catch-all bogeyman. Marx, Stalin and Mao summoned forth
- such a spectre that, to many Americans, annihilation of all life was
- preferable to the human portion's becoming Communist. But as Big
- Red wizened and lost his teeth, we began to cast about for a
- replacement.
-
- Finding none of sufficient individual horror, we have draped a
- number of objects with the old black bunting which once shrouded
- the Kremlin. Our current spooks are terrorists, child abductors,
- AIDS, and the underclass. I would say drugs, but anyone who thinks
- that the War on Drugs is not actually the War on the Underclass
- hasn't been paying close enough attention.
-
- There are a couple of problems with these Four Horsemen. For one
- thing, they aren't actually very dangerous. For example, only 7
- Americans died in worldwide terrorist attacks in 1987. Fewer than 10
- (out of about 70 million) children are abducted by strangers in the
- U.S. each year. Your chances of getting AIDS if you are neither gay
- nor a hemophiliac nor a junkie are considerably less than your
- chances of getting killed by lightning while golfing. The underclass is
- dangerous, of course, but only, with very few exceptions, if you are a
- member of it.
-
- The other problem with these perils is that they are all physical. If we
- are entering into a world in which no one has a body, physical threats
- begin to lose their sting.
-
- And now I come to the point of this screed: The perfect bogeyman
- for Modern Times is the Cyberpunk! He is so smart he makes you
- feel even more stupid than you usually do. He knows this complex
- country in which you're perpetually lost. He understands the value
- of things you can't conceptualize long enough to cash in on. He is the
- one-eyed man in the Country of the Blind.
-
- In a world where you and your wealth consist of nothing but beeps
- and boops of micro-voltage, he can steal all your assets in
- nanoseconds and then make you disappear.
-
- He can even reach back out of his haunted mists and kill you
- physically. Among the justifications for Operation Sun Devil was
- this chilling tidbit:
-
- "Hackers had the ability to access and review the files of hospital patients.
- Furthermore, they could have added, deleted, or altered vital patient
- information, possibly causing life- threatening situations."
-
- Perhaps the most frightening thing about the Cyberpunk is the
- danger he presents to The Institution, whether corporate or
- governmental. If you are frightened you have almost certainly taken
- shelter by now in one of these collective organisms, so the very last
- thing you want is something which can endanger your heretofore
- unassailable hive.
-
- And make no mistake, crackers will become to bureaucratic bodies
- what viruses presently are to human bodies. Thus, Operation Sun
- Devil can be seen as the first of many waves of organizational
- immune response to this new antigen. Agent Baxter was a T-cell.
- Fortunately, he didn't know that himself and I was very careful not to
- show him my own antigenic tendencies.
-
- I think that herein lies the way out of what might otherwise become
- an Armageddon between the control freaks and the neo-hip. Those
- who are comfortable with these disorienting changes must do
- everything in our power to convey that comfort to others. In other
- words, we must share our sense of hope and opportunity with those
- who feel that in Cyberspace they will be obsolete eunuchs for sure.
-
- It's a tall order. But, my silicon brothers, our self-interest is strong. If
- we come on as witches, they will burn us. If we volunteer to guide
- them gently into its new lands, the Virtual World might be a more
- amiable place for all of us than this one has been.
-
- Of course, we may also have to fight.
-
- ******
-
- Defining the conceptual and legal map of Cyberspace before the
- ambiguophobes do it for us (with punitive over-precision) is going to
- require some effort. We can't expect the Constitution to take care of
- itself. Indeed, the precedent for mitigating the Constitutional
- protection of a new medium has already been established. Consider
- what happened to radio in the early part of this century.
-
- Under the pretext of allocating limited bandwidth, the government
- established an early right of censorship over broadcast content which
- still seems directly unconstitutional to me. Except that it stuck. And
- now, owing to a large body of case law, looks to go on sticking.
-
- New media, like any chaotic system, are highly sensitive to initial
- conditions. Today's heuristical answers of the moment become
- tomorrow's permanent institutions of both law and expectation.
- Thus, they bear examination with that destiny in mind.
-
- Earlier in this article, I asked a number of tough questions relating to
- the nature of property, privacy, and speech in the digital domain.
- Questions like: "What are data and what is free speech?" or "How
- does one treat property which has no physical form and can be
- infinitely reproduced?" or "Is a computer the same as a printing
- press." The events of Operation Sun Devil were nothing less than an
- effort to provide answers to these questions. Answers which would
- greatly enhance governmental ability to silence the future's
- opinionated nerds.
-
- In over-reaching as extravagantly as they did, the Secret Service may
- actually have done a service for those of us who love liberty. They
- have provided us with a devil. And devils, among their other
- galvanizing virtues, are just great for clarifying the issues and putting
- iron in your spine. In the presence of a devil, it's always easier to
- figure out where you stand.
-
- While I previously had felt no stake in the obscure conundra of free
- telecommunication, I was, thanks to Operation Sun Devil, suddenly
- able to plot a trajectory from the current plight of the Legion of Doom
- to an eventual constraint on opinions much dearer to me. I
- remembered Martin Neimoeller, who said:
-
- "In Germany they came first for the Communists, and I didn't speak up
- because I wasn't a Communist. Then they came for the Jews, and I didn't
- speak up because I wasn't a Jew. They came for the trade unionists, and I
- didn't speak up because I wasn't a trade unionist. Then they came for the
- Catholics, and I didn't speak up because I was a Protestant. Then they came
- for me, and by that time no one was left to speak up."
-
- I decided it was time for me to speak up.
-
- The evening of my visit from Agent Baxter, I wrote an account of it
- which I placed on the WELL. Several days later, Mitch Kapor
- literally dropped by for a chat.
-
- Also a WELL denizen, he had read about Agent Baxter and had
- begun to meditate on the inappropriateness of leaving our civil
- liberties to be defined by the technologically benighted. A man who
- places great emphasis on face-to-face contact, he wanted to discuss
- this issue with me in person. He had been flying his Canadair bizjet
- to a meeting in California when he realized his route took him
- directly over Pinedale.
-
- We talked for a couple of hours in my office while a spring
- snowstorm swirled outside. When I recounted for him what I had
- learned about Operation Sun Devil, he decided it was time for him to
- speak up too.
-
- He called a few days later with the phone number of a civil
- libertarian named Harvey Silverglate, who, as evidence of his
- conviction that everyone deserves due process, is currently
- defending Leona Helmsley. Mitch asked me to tell Harvey what I
- knew, with the inference that he would help support the costs which
- are liable to arise whenever you tell a lawyer anything.
-
- I found Harvey in New York at the offices of that city's most
- distinguished constitutional law firm, Rabinowitz, Boudin, Standard,
- Krinsky, and Lieberman. These are the folks who made it possible
- for the New York Times to print the Pentagon Papers. (Not to dwell
- on the unwilling notoriety which partner Leonard Boudin achieved
- back in 1970 when his Weathergirl daughter blew up the family
- home...)
-
- In the conference call which followed, I could almost hear the skeletal
- click as their jaws dropped. The next day, Eric Lieberman and Terry
- Gross of Rabinowitz, Boudin met with Acid Phreak, Phiber Optik,
- and Scorpion.
-
- The maddening trouble with writing this account is that Whole Earth
- Review, unlike, say, Phrack, doesn't publish instantaneously. Events
- are boiling up at such a frothy pace that anything I say about current
- occurrences surely will not obtain by the time you read this. The
- road from here is certain to fork many times. The printed version of
- this will seem downright quaint before it's dry.
-
- But as of today (in early June of 1990), Mitch and I are legally
- constituting the Electronic Frontier Foundation, a two (or possibly
- three) man organization which will raise and disburse funds for
- education, lobbying, and litigation in the areas relating to digital
- speech and the extension of the Constitution into Cyberspace.
-
- Already, on the strength of preliminary stories about our efforts in
- the Washington Post and the New York Times, Mitch has received an
- offer from Steve Wozniak to match whatever funds he dedicates to
- this effort. (As well as a fair amount of abuse from the more
- institutionalized precincts of the computer industry.)
-
- The Electronic Frontier Foundation will fund, conduct, and support
- legal efforts to demonstrate that the Secret Service has exercised prior
- restraint on publications, limited free speech, conducted improper
- seizure of equipment and data, used undue force, and generally
- conducted itself in a fashion which is arbitrary, oppressive, and
- unconstitutional.
-
- In addition, we will work with the Computer Professionals for Social
- Responsibility and other organizations to convey to both the public
- and the policy-makers metaphors which will illuminate the more
- general stake in liberating Cyberspace.
-
- Not everyone will agree. Crackers are, after all, generally beyond
- public sympathy. Actions on their behalf are not going to be popular
- no matter who else might benefit from them in the long run.
-
- Nevertheless, in the litigations and political debates which are certain
- to follow, we will endeavor to assure that their electronic speech is
- protected as certainly as any opinions which are printed or, for that
- matter, screamed. We will make an effort to clarify issues
- surrounding the distribution of intellectual property. And we will
- help to create for America a future which is as blessed by the Bill of
- Rights as its past has been.
-
-
-
-
- John Perry Barlow
- barlow@well.sf.ca.us
- Friday, June 8, 1990
-
-