home *** CD-ROM | disk | FTP | other *** search
-
-
- Computer Underground Digest--Fri Sept 8, 1991 (Vol #3.32)
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- -> SPECIAL ISSUE: REVIEW OF _CYBERPUNK_ <-
-
- CONTENTS, #3.32 (September 8, 1991)
- File 1--CYBERPUNK Review
- File 2--Review of _CYBERPUNK_
- File 3--_CYBERPUNK_ Review
- File 4--Newsweek review CYBERPUNK
- File 5--Review of _CYBERPUNK_
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu,
- chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 08 Sep 91 15:20:16 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 1--CYBERPUNK Review
-
- ((Moderators Note: REVIEWS OF: CYBERPUNK: OUTLAWS AND HACKERS ON THE
- COMPUTER FRONTIER. by Katie Hafner and John Markoff. New York:
- Simon and Schuster. 336 pp. $22.95 pb.
-
- The Hafner and Markoff book has not, to our knowledge, received a bad,
- or even mediocre, review, so we invited a few readers to see if the
- hype is justified. It is, but don't take our word for it. Grab a copy
- and read it!))
-
- Reviewed by: Gordon R. Meyer
- September 8, 1991
- ++++++++++++++++++
-
- The promotional materials for _CYBERPUNK_ describe the book using
- these words:
-
- A fascinating and revealing account of the world of hackers
- and the threat they pose in the age of computer networks.
- (....)
- With society completely dependent on computer networks,
- Hafner and Markoff reveal how real a threat these hackers
- represent, and address what we should or can do about them.
-
- While I certainly agree that _CYBERPUNK_ is fascinating and revealing,
- I found little about "the world of hackers," and even less about what
- should be done about 'them'. I realize authors often have little, if
- any, control over the jacket copy of their books, however as this is a
- mass-market publication the jacket copy does indeed play a role in
- influencing the perception and positioning of this volume in
- marketplace. Also, as an observational aside, it is interesting to
- note the phrase "...what we should or can do about them." A small
- semantic twist that focuses attention on those who engage in the
- behavior, and not the problem itself.
-
- _CYBERPUNK_ focuses on three "infamous" computer hackers that have
- risen into the public consciousness in the last few years. The
- stories of Kevin Mitnick, "Pengo," and Robert Morris are presented in
- a fast-paced, narrative manner. It is a very enjoyable romp through
- their lives, and the events that brought them into the public eye.
-
- The first chapter of the book concerns Mitnick, and is entitled
- "Kevin: The dark-side hacker." As indicated in the authors' reference
- notes, they were unable to contact Mitnick directly, therefore this
- chapter appears to construct events based on third and second-party
- interviews, and police/court documents. Despite this handicap, Hafner
- and Markoff have created a very intriguing narrative of some of
- Mitnick's activities. It is unfortunate that they were unable to talk
- to Mitnick himself, as a more balanced, or rather "inside,"
- perspective on the events would improve this chapter. In some ways it
- is a bit like reading a historical account of a person who is long
- since dead. Here's hoping that someday Mitnick will himself fill in
- some of the missing parts of the story.
-
- It was probably a wise decision to begin the book with the Mitnick
- story. It certainly has the most "common man" angle to it. Mitnick,
- while a skilled computerist, is closer to the average 'man on the
- street' then Pengo, who was involved with the KGB, or Morris, son of a
- computer scientist. Mitnick, excluding his computer related activity,
- is not unlike other young men in many respects. This leads the reader
- to conclude that anyone, perhaps the kid next door, could also be
- involved in Mitnick-like activity. And certainly Mitnick's propensity
- to taking computerized revenge against his 'enemies' will entertain
- those who would daydream of, but never enact, such schemes.
-
- This chapter does exhibit one peculiar tendency, that was thankfully
- absent from the rest of the chapters. Specifically, there is somewhat
- of a focus on Kevin's weight, and on the the authors, was an active
- phone phreak/hacker in the early days of the computer underground.
- She plays a prominent role in the first part of the Mitnick story,
- then quickly fades from the scene. This was puzzling, as Hafner and
- Markoff treat us to stories of her days as a prostitute, (and the time
- she was thrown out of drug rehab for fellating a staff member in the
- restroom), then after numerous descriptions of her "unusually large
- hips and buck teeth" she quietly fades from the story, exiting into a
- life of professional tournament poker. While physical descriptions
- are important in helping the reader form mental images of the
- characters, the focus on was a bit too sharp on the physical
- attributes of the actors in Mitnick's story. Luckily this propensity
- was dropped as the book continued. However, I'm still hoping for
- _CYBERPUNK 2: The Return Of Thunder_ .
-
- An interesting picture emerges from the story of the police
- investigation into Mitnick. CuD readers will be familiar with the
- steps taken by Secret Service agents executing warrants in the Sun
- Devil investigations. In Mitnick's story we are treated to the image
- of the L.A. Police following Mitnick from classroom to classroom, and
- various fast-food restaurants, using a "tag team" of twelve officers,
- sometimes leaping from roof top to roof top, or driving at speeds in
- excess of one hundred miler per hour, all to ensure they didn't lose
- sight of the evil hacker.
-
- Mitnick's story ends with his arrest, by the FBI, in a parking garage.
- While we are later given a brief postscript stating that he currently
- lives in Las Vegas, I would was left wanting more regarding not only
- the trial, but also his wife Bonnie Mitnick, his
- co-hacker-turned-snitch Lenny, and the various other people connected
- with Mitnick's story. Admittedly, I found the section on Mitnick to
- be the most interesting aspect of _CYBERPUNK_, and it left me wanting
- more. Others may be more than satisfied with what is already offered.
-
- However, I did not have the same feeling regarding the story of Hans
- Heinrich, "Pengo and Project Equalizer." I felt the story was
- well-covered, with adequate details regarding Pengo's association with
- "Hagbard Celine," all the way up to the ensuing trial, and aftermath.
-
- Hafner and Markoff present essentially the same story as Cliff Stoll's
- _The Cuckoo's Egg_, but from the other side of the phone, so to speak.
- It also brings some interesting questions to light regarding the
- interaction of the FBI, CIA, NSA, West German officials, and Laszlo,
- the Philadelphian who ultimately requested Stoll's bogus SDINet
- information. Fascinating stuff, and after reading this section I
- immediately wanted to re-read Stoll's book, just to form a better
- picture of the situation.
-
- For anyone wanting to understand what all the fuss was over the
- incident described in _The Cuckoo's Egg_, but not wanting to read
- Stoll's account, _CYBERPUNK_ offers a cogent, and equally compelling
- summary of the events. Anyone who has read Stoll's book, should be
- equally interested in this section as well.
-
- The final focus of _CYBERPUNK_ is on Robert T. Morris, author of the
- so-called "Internet Worm." Here the authors' offer some insight into
- the Morris family, and the actions taken by Robert and his associates
- as the Worm was working its way throughout the Internet. As an
- accounting of the trial, and documentation of the questions and issues
- the Justice Department needed to confront in attending to this case,
- it is more than worthwhile reading. There has been much written on
- the actions of the Worm, and the aftermath of its release. Hafner and
- Markoff give us a peek behind the scenes and illustrate that many of
- the questions and issues raised by the actions of Morris, are as of
- yet unanswered.
-
- In conclusion, _CYBERPUNK_ is very enjoyable and quite entertaining.
- I highly recommend it to CuD readers, it is worth the minimal time
- required to read it. I found myself disappointed that it offered no
- insights into the computer underground per se, and in fact I would
- argue that it is not a book about the computer underground, or as the
- dust jacket puts it "the computer frontier" at all. It is an
- interesting account of three talented individuals, who each happen to
- have used computers as their tools of choice. Is _CYBERPUNK_ a
- definitive peek into the world of computer hackers? It is not. Does
- it provide insight and raise questions for the student of the computer
- underground? Absolutely. Read it.
-
- ------------------------------
-
- From: joeholms@DORSAI.COM(Joseph Holmes)
- Subject: File 2--Review of _CYBERPUNK_
- Date: Mon, 24 Jun 91 15:38:40 PDT
-
- "Cyberpunk: Outlaws and Hackers on the Computer Frontier," is
- journalism's second mainstream book on hackers, although since 1984
- when Steven Levy wrote his "Hackers," the definition has certainly
- changed. Cyberpunk is the story of three groups of "outlaw" hackers --
- Kevin Mitnick, whom the authors call the "darkside" hacker, and his
- friends in California, Pengo and the other West German hackers who
- were pursued by Cliff Stoll in "The Cuckoo's Egg," and Robert Morris,
- the author of the worm that took down the Internet in 1988. The
- authors, Katie Hafner, technology and computer reporter for "Business
- Week," and John Markoff, computer industry reporter for "The New York
- Times," live up to both the best and the worst of journalism.
-
- The good news is that they've assembled a ton of new details,
- including the days leading up to Robert Morris's release of his worm
- into the Internet, and lots of information about Pengo, Hagbard
- Celine, and the other West German hackers visiting their Soviet
- connection. For that reason alone, the book is sure to sell well. On
- the other hand, there are passages in the book that leave the reader
- more than a little skeptical about the reporters' accuracy.
- Pittsburgh's Monroeville mall, for example, did not serve as the "set
- for the cult film 'Night of the Living Dead'"--that was "Dawn of the
- Dead." While that's hardly an important detail, such inattention does
- nothing to inspire confidence.
-
- And unfortunately, very little of the detail is put to any interesting
- use, since the book offers almost no analysis of the facts. There's no
- suggestion offered as to why Pengo, Mitnick, or Robert Morris did what
- they did (the authors could take a lesson from "The Falcon and the
- Snowman"--the book, that is, not the movie). Instead, Hafner and
- Markoff have apparently drawn their own conclusions about the Mitnick,
- Pengo, and Morris, and they seem to have written Cyberpunk to convince
- us that Kevin Mitnick is a shallow, vindictive, and dangerous genius,
- while Robert Morris is an innocent, misunderstood genius, more
- scapegoat than outlaw. While those conclusions might easily be true,
- we're never trusted to discover that from the facts alone.
-
- As they tell about the dangerous pranks and hacks by Mitnick, for
- example, they seem always ready to pass along every scary anecdote
- about his power over everything from computers to the phone company to
- security guards. No matter what the source (and it's usually
- impossible to tell what their sources were), they apparently believe
- every story they're told, even when the stories are obviously the
- bragging of the participants. On the other hand, when they discuss
- Morris, he gets the benefit of every possible doubt as they trace him
- from his loving upbringing through his trial and sentence. They
- mention, for example, Robert Morris's habit of ranging throughout
- various networks and computers using decyphered or stolen passwords,
- and they note, "Robert made a practice of breaking into only the
- computers of people he knew wouldn't mind." Incredibly, this is stated
- without the slightest bit of irony or skepticism. I myself have long
- believe that Morris was something of a scapegoat, but what I'd like to
- learn from a book like Cyberpunk are the facts to help me make up my
- mind about Morris, not apologies and half-baked conclusions.
-
- Cyberpunk is ostensibly about the people involved, not the science, so
- computer and science readers will be disappointed to find that it
- avoids explaining how phreaking and hacking works. I sorely miss Cliff
- Stoll's ability to clearly explain to nonprogrammers the technology
- behind all these exploits. Stoll, for example, easily explained how a
- hacker with a dictionary and a little patience could figure out a slew
- of encrypted passwords using simple logic rather than brute force.
- Because Cyberpunk doesn't bother to delve into such details, it misses
- the opportunity to involve the reader more deeply.
-
- The writing style will win no awards (Hugh Kenner's review of the book
- in the July Byte calls it "sledgehammer prose"). But of course,
- Cyberpunks will nevertheless be gobbled up by all the
- computer-literates -- the users and the hackers -- as well as a public
- ready to be scared by news of the new evil breed of young computer
- masterminds who are about to take over the world. Or at least the
- world's credit ratings.
-
- ------------------------------
-
- Date: Wed, 10 Jul 1991 19:37:22 -0400
- From: Brendan Kehoe <brendan@CS.WIDENER.EDU>
- Subject: File 3--_CYBERPUNK_ Review
-
- A capsule & review by Brendan Kehoe.
-
- "Cyberpunk", by Katie Hafner and John Markoff, provides the reader
- with a peek inside the very real world of the computer "hacker".
- Labeled members of a "counterculture", these people, generally in
- their teens and early twenties, have added a sharp tint to the
- normally bland design of the computing world.
-
- Divided into three contrasting sections, "Cyberpunk" provides an
- insight into what drives a hacker, from the extreme to the accidental.
- (To allay any complaints, I'll use hacker in its common vernacular; as
- Steven Bellovin said a couple of years ago, "the battle is over, and
- the purists have lost." For our purposes, "hacker" will imply
- "criminal".)
-
- Kevin Mitnick, a overweight and markedly shy youth, satisfied many of
- the stereotypes that have been developed over the years regarding
- hackers. He ran the full gamut of "evil deeds," from altering credit
- ratings to turning off telephones at will. Remarkably adept at social
- engineering, Mitnick could talk himself into (or out of) nearly any
- situation. In one escapade, Mitnick and his compatriots ("Roscoe",
- "Susan", and a third phreak) managed to enter, raid, and leave a
- PacBell COSMOS center (where much of PacBell's main computing takes
- place for things like billing), leaving with a wealth of door-lock
- codes and, more importantly, manuals. All with the PacBell guard's
- unwitting permission. (They were later turned in by Susan, who is
- described as a very vindictive and dangerous young woman.)
-
- All adventure aside, Kevin had a serious problem. He was, by clinical
- definition, addicted to hacking of any sort. It became impossible for
- him to stop. Even after incidents with USC, GTE, Pierce College, and
- the Santa Cruz Operation (makers of SCO Unix), Mitnick kept following
- the endless road of systems to be conquered.
-
- He disappeared for a year (purportedly to Israel, but in reality only
- a few miles outside of San Francisco), to return after his warrant for
- the SCO incidents had been dropped. He immediately looked up his
- friend Lenny DiCiccio, who had spent a number of his teenage years
- following Kevin as a trainee might follow a mentor. Lenny found
- himself increasingly unhappy, as the fevered hacker's hold upon him
- returned. Mitnick insisted that he be allowed to come to Lenny's
- office (a small software company) after hours to hack. Under normal
- circumstances, such constant imposition would lead to some sort of
- objection---but Lenny couldn't help himself. Kevin appealed to the
- criminal in him that normally lay dormant. With Kevin, he could do
- things he had previously only schemed about.
-
- After a few months, Kevin and Lenny happened upon a virtual gold mine:
- Digital's Star development cluster in Nashua, New Hampshire, where
- their most proprietary systems development takes place. Since DEC's
- VMS operating system was their favorite, they couldn't have been
- happier. Or more greedy. "Kevin had always approached his illicit
- computing as a serious project [ ... his ] project for 1988 was
- downloading Digital's VMS source code."
-
- In the course of following Mitnick's tale, Hafner and Markoff do an
- excellent job of drawing the reader into Kevin's never-ending search
- for the "perfect hack." The eventual outcome of their Digital
- exploits, and the end of their (illegal) hacking careers (to slip out
- of the vernacular for just a moment), is nothing short of amazing.
- The authors' depiction is both disturbing as it is riveting.
-
- By now, many people are acquainted with the story of the "Wily
- Hacker", the electronic intruder that skyrocketed Cliff Stoll, an
- astronomer by degree who found himself a system manager, into
- wide-spread notoriety as an authority on computer security. Stoll's
- paper in the Communications of the ACM, "Stalking the Wily Hacker",
- graduated to become the book "The Cuckoo's Egg", which was on the best
- seller lists for weeks, and also took the form of a Nova documentary.
- This all, however, was presented from Stoll's point of view. Hafner
- and Markoff now afford people the opportunity to see the "other side"
- of the whole affair---from the world of Markus Hess, Pengo, and the
- German hacking underground.
-
- Hans Huebner went by the name "Pengo" in his youth, and is the main
- character in the second part of "Cyberpunk". Pengo grew from a
- Commodore 64 and BASIC programming to a network "cowboy" in a matter
- of months. Video games (including the one that provided his namesake)
- were his first passion---he could spend hours upon hours completely
- engrossed in the tiny world that exposed itself before him. Then a
- friend introduced him to using a modem, and the vast web of computers
- only a phone call or network connection away. He found in hacking an
- excitement and adrenaline rush normal video games could only attempt
- to equal.
-
- Pengo's world was strewn with drugs---one of his fellow hackers, Karl
- Koch (nicknamed "Hagbard Celine", for the protagonist in the
- Illuminatus! trilogy), regularly abused hashish and LSD. All members
- of their small group (with the exception of Markus Hess) spent a
- substantial amount of time in a chemical haze.
-
- Peter Carl and Dirk-Otto Brzezinski (aka "Dob") also played a major
- role in Germany's hacking scene. It was ultimately Carl who
- introduced a new angle to their computer crimes---the potential for
- making money by selling their knowledge to the Soviets. Starved for
- technology, the pre-Glastnost Russian republic absorbed the booming
- computer industry with relish at every opportunity. Members of the
- KGB worked with agents around the world, smuggling electronics and
- high-tech computers into the Soviet Union. The hackers, particularly
- Carl and Dob, wanted in.
-
- Carl approached one KGB agent with an offer to provide the fruits of
- their hacking ventures in exchange for one million German marks.
- After small rewards, it became clear that they would never reach their
- lofty goal---they received at best a few thousand marks for a copy of
- the source code to Berkeley Unix. Often, they sold what was otherwise
- public domain software, much to the Soviets' chagrin.
-
- Eventually, internal struggles drew the hackers apart---Pengo, for not
- being able to "produce" often enough for Carl; Hagbard, falling
- further and further into an incoherent world only he knew; Dob, who
- went to prison for weeks because Pengo forgot to pay a bill; and Hess,
- who became increasingly wary about how much he should share with the
- others, until he rarely heard from them.
-
- Pengo, growing weary of the entire KGB ordeal, let the secret slip
- during a routine interview with the local media. The German press was
- habitually interested in the darkly intriguing German hackers. When
- the reporters realized the magnitude of the story that Pengo mentioned
- so casually, they felt society draw its breath at the idea that
- espionage, considered inevitable by many, had actually been
- demonstrated in the computer underground.
-
- "Cyberpunk" spends a good deal of time describing the aftermath of the
- exposure of the KGB dealings. The arduous ordeal of deciding who was
- responsible for what crime(s), trying to educate a computer illiterate
- court in the intricacies of computer networks and use in general, and
- the conflicting stories of each of the hackers would make a normal
- writer's head spin. Hafner and Markoff demonstrate an ability to
- organize the entire matter into a sensible, and interesting,
- counterplay. At the closing of the final section, we learn of a truly
- unexpected casualty of the entire affair.
-
- Finally, probably the most widely known case of computer malfeasance,
- the story of Robert Tappan Morris (aka "RTM") and his Internet worm of
- 1988 is described. The section begins in a room at Berkeley called
- the "fishbowl", where Phil Lapsley notices a strange process running
- on his system. It soon becomes clear that many of the computers on
- the campus display similar characteristics to Phil's. They later
- discover that it's not confined to Berkeley---it's happening all over
- the Internet.
-
- Morris, a Cornell graduate student in computer science, had written a
- program that would "reproduce" itself from computer to computer, in a
- relatively benign way (inasmuch as it didn't destroy any information).
- He made some careless errors, however, which made the program go out
- of control. He released it on Wednesday afternoon, November 2, 1988.
- Rather than replicate itself only after a long period of time on the
- same system, it did so at a rate so fast that the computer soon became
- unusable. When Morris returned from dinner only an hour later, it had
- already ground hundreds of systems to a halt.
-
- It traveled the network by exploiting holes in certain Unix systems'
- software. Teams at Berkeley and MIT spent all night studying a copy
- of his program, trying to return it to its original source form.
- Slowly "patches" for the holes were worked together, and sent out to
- system administrators and posted to the Usenet news network.
- Unfortunately, many systems had completely disconnected themselves
- from the Internet as soon as the worm hit, so they didn't get the
- fixes until days later.
-
- Robert Morris, RTM's father and a computer scientist for the National
- Security Agency, stood by his son while he went to trial and faced
- reprimand for the results of his actions. Hafner and Markoff portray
- the young Morris as an extremely bright student who probably only now
- realizes the full effect of his relatively small programming errors.
- What happened behind the scenes of the whole incident completes the
- story given by the news media and various technical and electronic
- journals. (As a note, also included is the story of how the senior
- Morris came to work for the NSA.)
-
- "Cyberpunk" brings to the forefront an issue facing computer
- professionals and enthusiasts alike---the legal systems of the world
- are sorely lacking in appropriate investigation and treatment of cases
- like the three detailed in this book. Oftentimes the punishments and
- results of captures are far too harsh--other times, they're lenient
- enough to be laughable. "Do young people who illegally enter
- computers really represent such a menace? We hope that from reading
- the following stories readers will learn that the answer isn't a
- simple one." Throughout the book, the authors never let the reader
- forget that they're describing real people and real consequences, not
- fictional events.
-
- In all, I found "Cyberpunk" to be an excellent read (I devoured it in
- about 4 days, coupled with work and other things) that anyone remotely
- connected with computers, or intrigued by the computer underground in
- general, will find truly fascinating.
- As an aside, I think the first section on Kevin Mitnick would make an
- absolutely fantastic docu-drama.
-
- ------------------------------
-
- Date: 04 Aug 91 19:54:15 EDT
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 4--Newsweek review CYBERPUNK
-
- "Inside the Head of the Hacker"
- Reviewed by John Schwartz, NEWSWEEK July 29,
-
- ((Moderators' note: the following is a excerpt/adaptation from
- Schwartz's review. Interested readers should review the complete text
- of the article.))
-
- ... [ John ] Markoff's story [ on Morris' Internet worm ] was the
- first of a journalistic flood. But for all the ink spilled over the
- Cornell graduate student's case, little insight into his personality
- emerged. Computer-security experts would later try to paint Morris as
- a menacing rebel; Abu Nidal at the keyboard. Some journalists probed
- the irony of a computer-security expert's son-turned-security-threat,
- ham-handedly coming up with a dark psychological portrait, an Oedipus
- Techs.
-
- If you ever wanted a clearer picture of the nerd who brought down the
- network, a new book, "Cyberpunk: Outlaws and Hackers on the Computer
- Frontier," delivers him, and the entire Morris family, up in rich
- detail. ...
-
- "Cyberpunk" throws a spotlight on two other computer fanatics whose
- acts took them over the line of law. One is Kevin Mitnick, an
- obsessive system cracker... The other, West German Hans Hu%"bner,
- attempted to sell information from his Internet trespasses to the
- KGB... Like the Morris story, each is told in a full context that,
- while not justifying criminal acts, goes a long way toward explaining
- them.
-
- Though readers who know a modem from a Model T have a head start, the
- authors offer lucid explanations of just enough technology to make the
- stories work, even for the computer illiterate. If the prose
- sometimes seems a bit workmanlike, there's plenty of juicy detail to
- keep the narrative moving. Hafner and Markoff, like the dedicated,
- intense cyberpunks they illuminate, appear to have stopped at nothing
- to hack their way into the cyberpunk subculture.
-
- ------------------------------
-
- Date: Tue, 2 Sep 91 13:31:51 CDT
- From: jthomas@well.sf.ca.us
- Subject: File 5--Review of _CYBERPUNK_
-
- (Reviewed by Jim Thomas)
-
- I'm always suspicious of books highly praised by competent reviewers
- and _Cyberpunk_ (CP) was no exception. Layfolk and professionals
- alike have found it provocative and accurate, and the closest I've seen
- to criticism is Walter Mosely's review in the NYT Book Review (Aug 11,
- p. 15). He calls it "overlong, a bit melodramatic and repetitive,"
- and adds "If you do't know much about the power of computers, what you
- learn here may frighten you." Mosely's cavil is far overshadowed by
- his praise. Discussions with others who had read the volume range from
- favorable to hysterically enthusiastic. Even though I find John Markoff
- to be a consistently competent and incisive journalist, I refused to
- believe that any book can be *that* good. I was wrong. _Cyberpunk_
- *is* that good. The stories are uneven, some potentially helpful
- detail is omitted, and the book is outrageously mistitled. Yet, it
- remains a captivating volume that, once begun, cannot be put down.
-
- Hafner and Markoff are story tellers, but their stories are not simply
- about hackers or the computer underground. The tales of each
- character are used as a prism through which to view human fraility,
- excess, and amoralism. Unlike some prosecutorial accounts that have been
- egocentric and judgmental, Hafner and Markoff let their data do the
- talking, and we no longer see "good guys" and "bad guys," but just an
- array of different personalities caught up in their own agendas for
- their own interests.
-
- Most readers find the title objectionable, and I am tentatively
- inclined to agree. My dissatisfaction with "_Cyberpunk_" (as a title)
- is mainly that cyberculture simply isn't what the book is about. In
- the BBS culture, cyberpunk reflects a particular style of activity and
- communication, and the trilogy doesn't mirror the culture of such BBSs
- as Demon Roach Underground, Cyberpunk 'zine, the heavy-metal
- influenced youth boards, or the yippie-like anarchists' disregard of
- social convention. To do that, a strong contextualizing chapter would
- have helped, coupled with conceptual links illustrating how each of
- the subjects served as an exemplar for one thread in the cyberpunk
- mosaic. To consider Hafner and Markoff's' subjects as "cyberpunkers"
- expands the meaning of the term such that any member of the computer
- underground could be included within the ambit of techno-outlaw. My
- concern isn't, as it is for some, that the title distorts the meaning
- of the term cyberpunk, an issue over which it is difficult to generate
- much emotion. By contrast, the definition of "hacker" is important
- because of its use by law enforcement to stigmatize and weave
- guild-laden associative rhetorical threads from a rather strained
- syllogism: "Hackers are evil; you are a hacker; ergo..." This was the
- line used in some of the search affidavits and indictments, and the
- terms "cyberpunk" and "hacker" were used interchangeably by some
- prosecutors. As a consequence, the stakes over precise definitions of
- the term "hacker" are much higher than for "cyberpunk."
-
- _Cyberpunk_ isn't even about "hackers and outlaws." This objection
- isn't a quibble about the meaning of words, but about matching a title
- to its contents, and the tendency of marketeers to sacrifice "art" to
- enterprise. The fact that the characters are hackers is incidental to
- the primary subject and sub-themes, which include (in my reading) the
- antinomy between new forms of social meanings (eg, definitions of
- crime, ethics), new ways to express one's individuality (computer
- intrusion), and the ways that "newness" transforms basic existential
- dilemmas into (in this case) self-destructive behaviors.
-
- The narratives are about real people, and Hafner and Markoff convey
- all characters as complex, a refreshing change from the cartoon
- characters portrayed by law enforcement and most media. The unifying
- thread binding the characters is an amoral fascination for computer
- technology and the ways in which the intrusion caused by this
- fascination disrupt not only computer systems but the lives of those
- involved.
-
- The first story of the trilogy, "Kevin: The Dark-Side Hacker,"
- describes the exploits *as well as the lives* of Kevin Mitnick and his
- associates. Mitnick gained national notoriety through his ability to
- break into almost any system by combining technological prowess with
- social engineering (or "conning"), and for his equal inability to
- restrain himself from hacking, which led one California judge to
- revoke his bail because the "pathology" made Mitnick a major "social
- menace."
-
- The "dark-side" subtitle may cause some to wince in recognition that
- it seems to sensationalize the deeds of Mitnick & Co. But as the
- narrative evolves, an alternative reading would interpret "dark-side"
- as refering instead to the psyches, not the behavior, of the drama's
- front-stage characters. Roscoe, a talented but errant phreak, is
- depicted as a self-centered and manipulative twit lusted after by
- Susan Thunder, an equally manipulative lanky and unstable run-away who
- moved through a succession of jobs ranging from prostitution to
- computer security with equal facility. Lenny DiCicco, a compulsive
- button pusher and gadget meddler, seemed to lack a strong persona or
- will of his own and was vulnerable to Mitnick's manipulation. He
- ultimately freed himself by betraying Mitnick to the FBI. Finally,
- Mitnick himself appears center-stage as a talented cracker and phreak
- whose obsession with telephone and computer technology provided the
- existence of this fat, troubled youth with some meaning.
-
- If one reads _Cyberpunk_ only for the hacking exploits, the pathos of
- these characters will be lost. In most ways that count, they share a
- fatal flaw: None is able to control their passions or to redirect them
- toward less intrusive actions. Kevin, Lenny, and Susan constantly
- display mutual vindictiveness, jealousy, suspicion, insecurity,
- betrayal, and an amazing inability to step back from situations that
- bring each to the brink of existential disaster. These people are
- neither evil nor dangerous. They are pathetic social nuisances unable
- to utilize their own talents or move beyond the cycle of errant
- behavior that characterizes rebels without a cause. The dark side of
- their behavior lies not in the consequences of their "crimes," but in
- their failure to act in their own or society's interests.
-
- _Cyberpunk's_ remaining two narratives are competent, informative, and
- detailed, but they lack the rich texture of the first. The second
- tale relates the escapades of Pengo, Peter Carl, Markus Hess, Hagbard,
- and others, whose most notorious exploit was selling relatively
- worthless information and software to the Russians (although the real
- names of Hagbard and Pengo are given in the book, they are generally
- referred to by their handles). The characters range from reasonably
- normal students leading somewhat normal lives to the totally
- whacked-out Hagbard, who believed he was fighting an international
- conspiracy. The group is loosely-knit, with dramatically different
- individual motivations, skills, ideologies, and intents. The group
- named its self-appointed mission "Project Equalizer" because it was
- believed that a balance of political power--and thus world
- peace--could be obtained by technological parity between the
- super-powers. However, despite the name, none of the members appeared
- to have any coherent political sophistication or interests, and one
- can readily believe that it was the "thrill of game" that provided the
- primary motivation. Peter Carl kept the bulk of the modest sum
- provided by the Russians, sharing relatively little with his friends.
- Although Carl is depicted as the most mercenary of the lot, and both
- he and Hagbard needed funds to support their drug habit, the others
- seemed unaffected by the lure of money.
-
- These are not "evil hackers," and unlike the Mitnick saga, these
- people, with the exception of Hagbard, are neither pathetic nor
- particularly unusual. Their passions are controlled if misdirected,
- and most seem to lead reasonably normal lives. Their flaw is not
- felonious predations, but gross lack of perspective and judgement.
- They were engaged in behaviors they did not fully understand and of
- which they were unable to see the consequences.
-
- The final tale describes the unleashing of the Internet worm by Robert
- Morris. The most matter-of-fact journalistic account of the trilogy,
- Hafner and Markoff depict a bright college student whose primary crime
- was grossly screwing up an intrusive software program. Son of
- brilliant computer scientist Bob Morris, the junior Morris learned
- computers and programming as a child and was fascinated by computer
- bugs that allowed system entry. The Internet worm was the result of
- an attempt to see how many computers he could reach with a software
- program, and was intended to be a harmless network security probe. Due
- to a minor programming error with major consequences, the worm, once
- inside another computer, wildly replicated itself, slowing down and
- filling up systems, and ultimately causing many to crash, some to be
- brought back up only to crash again.
-
- The worm itself did not destroy programs or data, but did disrupt
- system use. Morris intended no harm, but the havoc his program created
- grabbed media attention and raised the visibility of hackers. The
- Morris incident flamed the calls for setting punitive examples to
- these social menaces. Hafner and Markoff cite one national computer
- expert who went so far as to incharitably call for an industry-wide
- boycott of any computer company that would hire Morris. But, Morris
- is not depicted as a nasty, dangerous character in need of punishment.
- On the contrary: He comes across as a frightened young man who
- realizes too late the consequences of his act and is terribly
- concerned about it.
-
- Of the primary characters in _Cyberpunk_, only Mitnick served prison
- time (one year in a federal prison and mandatory psychiatric
- counselling). DiCicco pled guilty to one felony count and received a
- sentence of 5 years probation, 750 hours of community service, and a
- $12,000 restitution order to Digital. All charges were dropped
- against Pengo, and his attorney negotiated with DEC to avoid a civil
- suit. Hagbard apparently committed suicide by self-immolation in a
- German forest. Peter Carl received two years and a 3,000 mark fine,
- Hess was was sentenced to 20 months with a 10,000 mark fine, but the
- prison sentences were changed to probation. For the worm, Morris
- received three years probation, a $10,000 fine, and 400 hours of
- community service.
-
- Perhaps, on reconsidering, _Cyberpunk_ is aptly named after all. John
- Brunner's 1975 _Shockwave Rider_, generally considered the original
- model for the genre, depicted a world in which technological
- information was used to control the masses, and Nickie Haflinger, the
- protagonist/anti-hero, was both outlaw and savior. He used his talents
- cynically and manipulatively until dramatic events added wisdom and
- maturity to his world vision. The cyberpunk characters possess
- knowledge, but not wisdom. Little distinguishes Pengo, Mitnick or
- Susan Thunder from Case, William Gibson's cybernaut in _Neuromancer_.
- They all share social marginality and the amoral cynicism often found
- among bright, alienated youth short on political consciousness and
- vision, but long on passion for techno-thrills. Like the world Bruce
- Stirling portrays in _Islands in the Net_, contemporary society is
- increasingly dominated by those with the ability to control knowledge,
- global boundaries are dissolving, and computer technology is a form of
- oppression.
-
- However, in the cyberpunk genre, the protagonists attain salvation by
- turning techno-power against itself through illegal incursions into
- its realm. They challenge the authority of those who control, unleash
- the potentially emancipating power of chaos, and ultimately save the
- world for a presumably brighter tomorrow. In their own way, each of
- Hafner's and Markoff's characters has done the same. Their actions,
- for better or ill, have raised the question of the relationship of
- information control to social welfare, revealed the gap between law
- and a changing society, and, along with numerous others who live on
- the limits of the cybercrest, through their actions have brought to
- center stage the problems that computer technology poses for
- individual rights of speech, privacy, and property.
-
- In Eco's _The Name of the Rose_, Brother William stumbles into a
- monastery mystery during an era when entrenched conventional ideas are
- challenged by a renaissance in knowledge. Confronted with the the
- danger of being labelled a heretic, he painstakingly assembles,
- through interviews and documents, images of a diverse community from
- which he can ultimately make sense of the strange events surrounding
- him. Hafner and Markoff do the same: Their matter-of-fact,
- non-judgmental portrayal may seem heretical to some law-and-order
- advocates, but they neither laud nor condemn, but display each
- character in a naturalistic mirror in which we vicariously re-live the
- events. We see Mitnick's transgressions, Lenny's betrayal, and Morris's
- terror just as we experience the pettiness of FBI agent Joe O'Brien's
- mean-spirited insensitivity toward two witnesses and prosecutor Mark
- Rasch's continued mispronunciation of Morris's name as Robert "Tap-in"
- (instead of "Tappan") Morris.
-
- The image of hackers permeating _Cyberpunk_ is not one of dangerous
- predators who should be locked up. They are confused, not-yet-mature,
- and insensitive to the issues in which they were involved. Their
- actions were wrong and the consequences unacceptable. But after
- reading Hafner and Markoff, one doubts the value of punishment and
- wonders if, perhaps, part of the problem might not lie not so much in
- individual transgressors, but rather with a social system that has
- sacrificed casuistry on the alter of technology and materialism.
-
- _Cyberpunk_ brought to mind the words of the cynical preacher in
- Steinbeck's _Grapes of Wrath_:
-
- "There ain't no sin and there ain't no virtue. There' just stuff
- people do. It's all part of the nice, but that's as far as any
- man got a right to say."
-
- ------------------------------
-
- End of Computer Underground Digest #3.32
- ************************************
-