home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 55.0 KB | 1,098 lines |
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Three, File 12 of 27
-
-
- My Bust
- Or,
- An Odyssey of Ignorance
-
- (C) 1993 Robert W. F. Clark
-
-
- [This is a factual account; however, certain innocent parties have
- already suffered enough damage to their reputations
- without further identification. I have changed their names.
- Where I have done so I follow the name with an asterisk [*].
-
-
- I. _In flagrante delicto_
-
- I am writing this article for the benefit of those who have yet to
- become acquainted with the brotherhood of law enforcement, a subculture
- as warped and depraved as any criminal organization.
-
- The law enforcement community entered my life in the early part of
- December 1989. I am yet to be quit of it. My initial contact with law
- enforcement and its quaint customs was one afternoon as I was reading email.
- Suddenly, without warning, I heard a voice shout: "Freeze, and get away from
- the computer." Nonplussed, but still with some command of my faculties, I
- drawled: "So, which do you want me to do?"
-
- The police officer did not answer.
-
- I was in the main public academic computing facility at Penn State,
- which was occupied by several startled-looking computer users, who now trained
- their eyes on the ensuing drama with all the solicitous concern of Romans
- attending an arena event.
-
- The officer, Police Services Officer Anne Rego, then left the room,
- and my immediate concern was to kill all processes and
- delete all incriminating files, or at least to arrange an accidental
- disruption of power. However, before I could do anything, Miss Rego
- reappeared with a grim, mustached police officer and what appeared to be the
- cast of Revenge of the Nerds.
-
- Angela Thomas, computer science instructor, immediately commandeered
- both terminals I had been using and began transferring the contents of
- all directories to a safe machine; the newcomer, Police Services Officer
- Sam Ricciotti, volunteered the helpful information: "You're in big
- trouble, kid."
-
- In an excess of hospitality, they then offered me a ride to Grange
- Building, police headquarters of Penn State, for an afternoon of
- conversation and bright lights.
-
- I asked if I were under arrest, and finding that I was not, asked
- what would happen if I refused their generous offer. They said that
- it might have negative repercussions, and that the wise choice was to
- accompany them.
-
- So, after a moment of thought, I agreed to accompany them. Forming a
- strange procession, with a police officer preceding me and another
- following, we entered an elevator. Then, still in formation, we exited
- the building to be greeted by two police cars with flashing red and
- blue lights. Like a chauffeur, Officer Ricciotti opened the door for
- me, and it was only after he closed it that I realized, for the first
- time, that the back doors of police cars have no handles on the inside.
-
- I had made yet another mistake in a long series.
-
- The purpose of this article is to detail several possible mistakes in dealing
- with police and how they may be avoided. As I made almost every possible
- mistake, my experience should prove enlightening.
-
- While I hope that this article might prevent you from being busted,
- I will have been successful if even one person does not make the
- mistakes I made when I was busted.
-
- II. Prelude
-
- To provide the reader with context, I shall explain the series of events
- which culminated in my apprehension.
-
- On my entrance to the Pennsylvania State University as a University
- Scholar, the highest distinction available from an institution remarkable for
- its lack of distinction, I received an account on PSUVM, an IBM 3090 running
- VM/CMS. Before receiving the account, I acquired all available documentation
- from the Information Desk and read it. As it happened, the first document I
- read concerned "Netnews," the local name for Usenet.
-
- As soon as my account was activated, I immediately typed netnews.
- I have never been the same since. Within a week, I began posting
- articles of my own and was immediately lambasted, flamed and roasted
- to a crisp. Discovering my own talent in the area of malediction,
- I became an alt.flame and talk.bizarre regular. I also read comp.risks,
- comp.dcom.telecom and other technical journals assiduously.
-
- I began hacking VM/CMS, independently discovering a vast
- number of flaws in the system. Within a few months, I was able to
- access any information in the system which interested me, submit
- anonymous batch jobs, and circumvent the 'ration' utility which limited
- a luser's time on the system. It was a trivial matter to write a trojan
- horse which imitated the login screen and grabbed passwords. Late
- at night, when there were few users, I would crank the CPU, of
- a system capable of handling 300 users simultaneously,
- to 100% capacity just for the sake of doing it. I discovered a
- simple method of crashing the system, but felt no need to do it,
- as I knew that it would work. To avoid disk space rationing, I
- would store huge files in my virtual punch. To my credit, lest
- I seem a selfish pig unconcerned with the welfare of
- other users, I limited such exercises to the later hours of the
- night, and eliminated large files when they were no longer useful
- to me.
-
- Like one starved, I glutted myself on information. To have
- legitimate access to such a system was marvellous. For a few months,
- I was satisfied with my level of 'power,' that elusive quality which is
- like a drug to those of a certain peculiarity of mind.
-
- However, it was not long before I realized that despite the sheer
- power of the system, the user interface was clumsy,
- unaesthetic and intolerable to anyone desiring to understand
- the machine directly. The damn thing had a virtual punch
- card system!
-
- I had heard about Unix, and was interested in trying this system. However,
- without an affiliation with the Computer Science Department, I had no
- way to get Unix access.
-
- Comparative Literature majors apparently should not clutter their heads with
- such useless and destructive nonsense as the Unix operating system,
- just as an Engineering major can only be damaged by such
- mental clutter as the works of Shakespeare; this, in any case, seemed
- to be the only justification for such an arcane, Byzantine
- policy of restricting access to a nearly unlimited resource.
-
- The academic community is addicted to the unhealthy practice of restricting
- information, and its policies are dedicated to the end of turning agile, eager
- young minds into so many identical cogs in the social mill. Those unable or
- unwilling to become cogs are of no use to this machine, and are dispensable.
-
- Thus, in the latter part of my freshman year, I became increasingly
- frustrated and disillusioned with higher education in general, and
- by the very idea of specialized education in particular. I stopped
- attending classes, and even skipped tests. I became increasingly
- nocturnal and increasingly obsessed with Usenet. Nevertheless, even
- by doing the entire semester's work during finals week, I still
- barely managed to maintain honors status.
-
- The summer restored my spirits greatly. I experimented
- with LSD for the first time, and found that it allowed me to see
- myself as I truly was, and to come to a certain grudging acceptance of
- myself, to a greater degree than any psychologist had. I found that I
- preferred marijuana to alcohol, and soon no longer subjected myself to
- prolonged bouts of drinking.
-
- However, I mistook my upturn in spirits for a rejuvenation, when
- it was more likely due to the lack of pressure and hedonism
- of summer.
-
- Near the end of my first year, I met Dale Garrison [*], an
- electronic musician and audio man for WPSX-TV, the university
- public television station. He also recorded music recitals
- for faculty and visiting luminaries, and thus had access to
- the Electronic Music Lab and all its facilities.
- His friend Shamir Kamchatka [*] had bequeathed him a Unix
- account on the mail hub of the Pennsylvania State University.
- Another friend, Ron Gere [*], a systems operator for the
- Engineering Computer Lab, had created an account for him on
- the departmental VAXcluster following the termination of his
- legitimate account due to a change in policy. They gave the
- account the cover name of Huang Chang [*] as a sort of joke,
- but this name was remarkably inconspicuous with the preponderance
- of Asian names on the system. Dale began posting articles under
- this name, as he had no account with his real name, but by a slow
- process, the nom-de-plume became a well-developed and individual
- personality, and the poems, articles and diatribes written
- under this name became quite popular. Even when we later
- realized the ease with which he could forge articles with his
- actual name, he was disinclined to do so. The wit and
- intelligence of the assumed identity became so unique to
- that identity that it would have been difficult to shed.
-
- I often used the Unix account, and quickly began to
- understand and appreciate the complexity and organic unity
- of the Internet.
-
- I had no moral qualms about using a computer account with the
- permission of the legitimate owner of the account, any more than
- I would have moral qualms about checking out a book from the
- mathematics library. A source of information for which my tuition
- and taxes has paid is a source of information which I have every
- right to access. To deny my access is a crime greater by far
- than for me to claim my rights by nondestructive means. Any
- university will allow a student of any college to check out a book
- on any subject from the library.
-
- However, myopic university administrations seem to believe that restricting
- access to information, rather than allowing a free exchange of ideas, is the
- purpose of an educational institution. Every department will have its own
- computer subnetwork, regardless of whether it is sensible or equitable to do
- so. The stagnation and redundancy we see on the Internet is the inevitable
- result of such an absurd _de facto_ standard.
-
- This policy is by no means limited to computers. It extends to
- class scheduling, work-study programs, any technical equipment worth
- using, arts training, religious studies, athletic facilities, degree
- requirements, musical instruments, literature and any thing which is
- useful to the mind. Bean-counters who can neither read a line
- of Baudelaire nor parse a line of C decide what is to be the canned
- curriculum for anyone who chooses a major. This is the obvious
- outcome in a society where education is so undervalued that
- Education majors have the lowest SAT scores of any degree-level
- students.
-
- So I thought as I saw resources wasted, minds distorted,
- the lives of close friends ruined by the slow, inexorable grinding
- of the vast, impersonal machine known as higher education. I saw
- professors in computer science tell blatant falsehoods, professors
- in philosophy misquote Nietzsche, professors in English Literature
- hand out typewritten memos rife with grammatical errors.
- I grew entirely disgusted with the mismanagement of higher
- education. When I discovered that the most intelligent and individual
- people around me were usually not students, I gave up on college
- as a means of self-actualization.
-
- My second year of college was essentially the first repeated,
- except that my frustration with the academic world bloomed into
- nihilism, and my depression into despair. I no longer even bothered to
- attend most tests, and even skipped finals. I allowed my paperwork for
- the University Scholars Program to lapse, rather than suffer
- the indignity of ejection for poor academic performance.
-
- Another summer followed, with less cheer than the previous. Very early in the
- summer, a moron rear-ended my car without even slowing down before slamming
- into me. My mother and stepfather ejected me from their house, and I moved to
- Indiana to live with my father. When the insurance money arrived from my
- totalled car, I purchased a cheap vehicle and hit the highway with no
- particular destination in mind. With a lemming's logic, I turned east instead
- of west on I-70, and returned to State College, Pennsylvania.
-
- At the last moment, I registered for part-time classes.
-
-
- III. History of a Conflagration
-
- >From the beginning of this semester, I neglected my classes, and
- instead read RFCs and Unix system security manuals. I began
- experimenting with the communications capabilities of the TCP/IP protocol
- suite, and began to understand more deeply how it was that such a network
- could exist as an organic whole greater than the sum of its parts.
-
- In the interest of experimenting with these interconnections, I
- began to acquire a number of Internet 'guest' accounts. When possible, I
- would use these to expand my area of access, with the goal of testing the
- speed and reliability of the network; and, I freely admit, for my amusement.
-
- I realized, at the time, that what I was doing was, legally, in
- a gray area; but I did not give moral considerations more than
- a passing thought. Later, I had leisure to ponder the moral and legal aspects
- of my actions at great length, but at the time I was collecting accounts I
- only considered the technical aspects of what I was doing.
-
- I discovered Richard Stallman's accounts on a variety of computers.
- I used these only for testing mail and packet routing.
- I realized that it would be trivial to use them for malicious
- purposes, but the thought of doing so did not occur to me. The very
- idea of hacking a computer system implies the desire to outsmart the
- security some unknown person had designed to prevent intrusion; to
- abuse a trust in this manner has all the appeal to a hacker that a
- hunter would find in stalking a kitten with a howitzer. To hack an
- open system requires no intelligence and little knowledge, and
- imparts no deeper knowledge than is available by legitimate use of
- the system.
-
- I soon had a collection of accounts widely scattered around
- the continent: at the University of Chicago, at the Pennsylvania
- State University, at Johns Hopkins, at Lawrence-Berkeley Laboratories
- and a number of commercial and government sites.
-
- However, the deadly mistake of hacking close to home was my downfall.
- I thought I was untouchable and infallible, and in a regrettable accident I
- destroyed the /etc/groups file at the Software Engineering Laboratory at Penn
- State, due to a serious lapse in judgment combined with a series of
- typographical errors. This is the only action for which I should have been
- held accountable; however, as you shall see, it is the only action for which
- I was not penalized in any way.
-
- I halt the narrative here to deliver some advice suggested by my
- mistakes.
-
- My first piece of advice is: avoid the destruction of information by not
- altering any information beyond that necessary to maintain
- access and avoid detection. Try to protect yourself from typographical
- errors by backing up information. My lack of consideration in this
- important regard cost Professor Dhamir Mannai many hours
- reconstructing the groups file. Dhamir plays a major role in the
- ensuing fracas, and turned out very sympathetic. I must
- emphasize that the computer security people with whom we have such
- fun are often decent people. Treat a system you have invaded as
- you would wish someone to treat your system if they had done the
- same to you. Protect both the system and yourself. Damage to the system
- will have a significant effect on any criminal case which is filed
- against you. Even the harshest of judges is likely to respond to a
- criminal case with a bewildered dismissal if no damage is alleged.
- However, if there is any damage to a system, the police will most certainly
- allege that you maliciously damaged the machine. It is their job
- to do so.
-
- My second piece of advice is: avoid hacking systems geographically
- local to you, even by piggybacking multiple connections across the
- country and back to mask your actions. In any area there is a limited
- number of people both capable of and motivated to hack.
- When the local security gurus hear that a hacker is on the loose,
- they will immediately check their mental list of people who fit the
- profile. They are in an excellent position to monitor their own network.
- Expect them to do so.
-
- I now return to my narrative.
-
- Almost simultaneous with my activities, the Computer Emergency Response
- Team was formed in the wake of the Morris Worm, and was met with an
- almost palpable lack of computer crime worth prosecuting.
- They began issuing grimly-worded advisories about the ghastly horrors
- lurking about the Internet, and warned of such dangerous events as
- the WANK (Worms Against Nuclear Killers) worm, which displayed
- an anti-nuclear message when a user logged on to an infected
- machine.
-
- To read the newspaper article concerning Dale and me, a person who
- collects guest accounts is, if not Public Enemy Number One, at least
- a major felon who can only be thwarted by the combined efforts of
- a major university's police division, two computer science departments,
- and Air Force Intelligence, which directly funds CERT.
-
- Matt Crawford, at the University of Chicago, notified CERT of my
- intrusions into their computer systems. The slow machinery
- of justice began to creak laboriously into motion. As I had
- taken very few precautions, they found me within two weeks.
-
- As it happens, both the Penn State and University of Chicago
- systems managers had publicly boasted about the impenetrability of
- their systems, and perhaps this contributed to their rancor at discovering
- that the nefarious computer criminal they had apprehended was a
- Comparative Literature major who had failed his only computer science
- course.
-
-
- IV. In the Belly of the Beast
-
- When we arrived at the police station, the police left me in a room
- alone for approximately half an hour. My first response was to check
- the door of the room. It was unlocked. I checked the barred
- window, which was locked, but could be an escape if necessary.
- Then, with nothing to do, I considered my options. I considered
- getting up and leaving, and saying that I had nothing to discuss
- with them. This was a sensible option at the outset, I thought,
- but certainly not sensible now. This was a repetition of
- a mistake; I could have stopped talking to them at any time.
-
- Finally, I assumed the lotus position on the table in order to collect my
- thoughts. When I had almost collected my thoughts, Anne Rego and Sam
- Ricciotti returned to the room, accompanied by two men I took to be criminals
- at first glance: a scruffy, corpulent, bearded man I mentally tagged as a
- public indecency charge; and a young man with the pale and flaccid ill-health
- of a veal calf, perhaps a shoplifter. However, the pair was Professor Robert
- Owens of the computer science department and Daniel Ehrlich, Owens' student
- flunky.
-
- Professor Owens sent Ehrlich out of the room on some trivial
- errand. Ricciotti began the grilling. First, he requested
- that I sign a document waiving my Miranda rights. He explained that it
- was as much for my benefit as for theirs. I laughed out loud. However,
- I thought that as I had done nothing wrong, I should have no fear of
- talking to them, and I signed the fatal document.
-
- I assumed that what I was going to say would be taken at
- face value, and that my innocence was invulnerable armor.
- Certainly I had made a mistake, but this could be explained, could it
- not? Despite my avowed radical politics, my fear of authority was
- surpassed by a trust for apparent sincerity.
-
- As they say, a con's the easiest mark there is.
-
- I readily admitted to collecting guest accounts, as I found nothing
- culpable in using a guest account, my reasoning being that if a public
- building had not only been unlocked, but also a door in that
- building had been clearly marked as for a "Guest," and that door opened
- readily, then no one would have the gall to arrest someone for trespass, even
- if other, untouched parts of the building were marked
- "No Visitors." Using a 'guest' account is no more computer crime than
- using a restroom in a McDonald's is breaking-and-entering.
-
- Ricciotti continued grilling me, and I gave him further information.
- I fell prey to the temptation to explain to him what he clearly did
- not understand. If you are ever in a similar circumstance, do not do
- so. The opaque ignorance of a police officer is, like a well-
- constructed security system, a very tempting challenge to a hacker.
- However, unlike the security system, the ignorance of a police
- officer is uncrackable.
-
- If you attempt to explain the Internet to a police officer investigating
- you for a crime, and the notion of leased WATS lines seems
- a simple place to start, it will be seen as evidence of some vast,
- bizarre conspiracy. The gleam in the cop's eye is not one of
- comprehension; it is merely the external evidence that a power fantasy
- is running in the cop's brain. "I," the cop thinks, "will definitely be
- Cop of the Year! I'm going to find out more about this Internet thing
- and bust the people responsible."
-
- Perhaps you will be lucky or unlucky enough to be busted by a cop
- who has some understanding of technical issues. Never having been
- busted by a computer-literate cop, I have no opinion as to whether
- this would be preferable. However, having met more cops than I care to
- remember, I can tell you that the chances are slim that you will meet a cop
- capable of tying shoelaces in the morning. The chances of meeting a cop
- capable of understanding the Internet are nearly nonexistent.
-
- Apparently, this is changing, but by no means as rapidly
- as the volatile telecommunications scene. At present, the cop who busts
- you might have a Mac hooked up to NCIC and be able to use it clumsily;
- or may be able to cope with the user interface of a BBS, but don't
- bother trying to explain anything if the cop doesn't understand you.
-
- If the cop understands you, you have no need to explain; if not, you
- are wasting your time. In either case, you are giving the police the
- rope they need to hang you.
-
- You have nothing to gain by talking to the police. If you are not under
- arrest, they can do nothing to you if you refuse to speak to them. If you
- must speak to them, insist on having an attorney present. As edifying as it
- is to get a first-hand glimpse of the entrenched ignorance of the law-
- enforcement community, this is one area of knowledge where book-learning is
- far preferable to hands-on experience. Trust me on this one.
-
- If you do hack, do not use your personal computing equipment and
- do not do it from your home. To do so is to invite them to confiscate every
- electronic item in your house from your telephone to your microwave. Expert
- witnesses are willing to testify that anything taken could be used for illegal
- purposes, and they will be correct.
-
- Regardless of what they may say, police have no authority to offer
- you anything for your cooperation; they have the power to tell the
- magistrate and judge that you cooperated. This and fifty cents will
- get you a cup of coffee.
-
- Eventually, the session turned into an informal debate with Professor
- Owens, who showed an uncanny facility for specious argument and
- proof by rephrasing and repeating. The usual argument ensued,
- and I will encapsulate rather than include it in its entirety.
-
- "If a bike wasn't locked up, would that mean it was right to steal it or
- take it for a joyride?"
-
- "That argument would hold if a computer were a bike; and if the bike
- weren't returned when I was done with it; and if, in fact, the bike
- hadn't been in the same damn place the whole time you assert it was
- stolen."
-
- "How do you justify stealing the private information of others?"
-
- "For one thing, I didn't look at anyone's private information.
- In addition, I find the idea of stealing information so grotesque
- as to be absurd. By the way, how do you justify working for Penn State, an
- institution that condoned the illegal sale of the Social Security
- Numbers of its students?"
-
- "Do you realize what you did is a crime?" interjected Ricciotti.
-
- "No, I do not, and after reading this law you've shown me, I still
- do not believe that what I did violates this law. Beyond that, what
- happened to presumed innocent until proven guilty?"
-
- The discussion continued in a predictable vein for about two hours,
- when we adjourned until the next day. Sam sternly advised me that as
- this was a criminal investigation in progress, I was not to tell
- anyone anything about it. So, naturally, I immediately told
- everyone I knew everything I knew about it.
-
- With a rapidly mounting paranoia, I left the grim, cheerless
- interrogation room and walked into the bustle of an autumn day
- at Penn State, feeling strangely separate from the crowd around
- me, as if I had been branded with a scarlet 'H.'
-
- I took a circuitous route, often doubling back on myself, to detect
- tails, and when I was sure I wasn't being followed, I headed straight
- for a phone booth to call the Electronic Music Lab.
-
- The phone on the other end was busy. This could only mean one thing,
- that Dale was online. His only crime was that he borrowed an
- account from the legitimate user, and used the Huang account
- at the Engineering Computer Lab, but I realized after my discussion
- with the police that they would certainly not see the matter as
- I did.
-
- I realized that the situation had the possibility to erupt into
- a very ugly legal melee. Even before Operation Sun-Devil, I realized
- that cops have a fondness for tagging anything a conspiracy
- if they feel it will garner headlines. I rushed to the Lab.
-
-
- V. A Desperate Conference
-
- "Get off the computer now! I've been busted!"
-
- "This had better not be a goddamn joke."
-
- He rapidly disconnected from his session and turned off the computer.
- We began to weigh options. We tried to figure out the worst thing they
- could do to me. Shortly, we had a list of possibilities. The police
- could jail me, which seemed unlikely. The police could simply forget
- about the whole thing, which seemed very unlikely. Anything between
- those two poles was possible. Anything could happen, and as I was
- to find, anything would. We planned believing that it was only
- I who was in jeopardy.
-
- If you are ever busted, you will witness the remarkable migration
- habits of the fair-weather friend. People who yesterday had
- nothing better to do than sit around and drink your wine will
- suddenly have pressing duties elsewhere.
-
- If you are lucky, perhaps half a dozen people will consent to speak
- to you. If you are very lucky, three of them will be willing to be
- seen with you in public.
-
- Very shortly the police would begin going after everyone I knew for no other
- reason than that they knew me. I was very soon to be given yet another of the
- blessings accorded to those in whom the authorities develop an interest.
-
- I would discover my true friends.
-
- I needed them.
-
-
- VI. The Second Interrogation
-
- I agreed to come in for a second interview.
-
- At this interview, I was greeted by two new cops. The first cop,
- with the face of an unsuccessful pugilist, was Jeffery Jones.
- I detested him on sight.
-
- The second, older cop, with brown hair and a mustache, was Wayne
- Weaver, and had an affable, but stern demeanor, somewhat reminiscent
- of a police officer in a fifties family sitcom.
-
- As witness to this drama, a battered tape recorder sat between us
- on the wooden table. In my blithe naivete, I once again waived
- my Miranda rights, this time on tape.
-
- The interview began with a deranged series of accusations by Jeffery
- Jones, in which were combined impossibilities, implausibilities,
- inaccuracies and incongruities. He accused me of everything
- from international espionage to electronic funds transfer. Shortly
- he exhausted his vocabulary with a particularly difficult
- two-syllable word and lapsed into silence.
-
- Wayne filled the silence with a soft-spoken inquiry, seemingly
- irrelevant to the preceding harangue. I answered, and we began
- a more sane dialogue.
-
- Jeffery Jones remained mostly silent. He twiddled his thumbs, studied
- the intricacies of his watch, and investigated the gum stuck under the table.
- Occasionally he would respond to a factual statement by rapidly turning,
- pounding the table with his fists and shouting: "We know you're lying!"
-
- Finally, after one of Jeffery's outbursts, I offered to terminate the
- interview if this silliness were to continue. After a brief consultation
- with Wayne, we reached an agreement of sorts and Jeff returned to a dumb,
- stony silence.
-
- I was convinced that Wayne and Jeff were pulling the good cop/bad cop
- routine, having seen the mandatory five thousand hours of cop shows the
- Nielsen people attribute to the average American. This was, I thought,
- standard Mutt and Jeff. I was to change my opinion. This was not good
- cop/bad cop. It was smart cop/dumb cop. And, more frighteningly, it
- was no act.
-
- After some more or less idle banter, and a repetition of my previous
- story, and a repetition of my refusal to answer certain other questions,
- the interrogation began to turn ugly.
-
- Frustrated by my refusal to answer, he suddenly announced that he knew
- I was involved in a conspiracy, and made an offer to go easy on me if
- I would tell him who else was involved in the conspiracy.
-
- I refused point-blank, and said that it was despicable of him to
- request that I do any such thing. He began to apply pressure and
- I will provide a reconstruction of the conversation. As the police
- have refused all requests by me to receive transcripts of interviews,
- evidence and information regarding the case, I am forced to rely on
- memory.
-
- "These people are criminals. You'd be doing the country a service
- by giving us their names."
-
- "What people are criminals? I don't know any criminals."
-
- "Don't give me that. We just want their names. We won't do
- anything except ask them for information."
-
- "Yeah, sure. Like I said, I don't know any criminals. I'm not a criminal,
- and I won't turn in anyone for your little witch-hunt, because I don't
- know any criminals, and I'd be lying if I gave you any names."
-
- "You're not going to protect anyone. We'll get them anyway."
-
- "If you're going to get them, you don't need my help."
-
- "We won't tell anyone that you told them about us."
-
- "Fuck that. I'll know I did it. How does that affect the morality
- of it, anyway?"
-
- Dropping the moral argument, he went to the emotional argument:
-
- "If you help us, we'll help you. When you won't help us, you
- stand alone. Those people don't care about you, anyway."
-
- "What people? I don't know any people."
-
- "Just people who could help us with our investigation. It doesn't
- mean that they're criminals."
-
- "I don't know anything about any criminals I said."
-
- "In fact, one of your friends turned you in. Why should you take
- this high moral ground when you're a criminal anyway, and they'd
- do the same thing to you if they were in the situation you're in.
- You just have us now, and if you won't stand with us, you stand
- alone."
-
- "I don't have any names. And no one I knew turned me in."
-
- This tactic, transparent as it was, instilled a worm of doubt in my mind.
- That was its purpose.
-
- This is the purpose of any of the blandishments, threats and lies
- that the police will tell you in order to get names from you. They
- will attempt to make it appear as if you will not be harming the
- people you tell them about. Having been told that hackers are just
- adolescent pranksters who will crack like eggs at the slightest
- pressure and cough up a speech of tearful remorse and hundreds of
- names, they will be astonished at your failure to give them names.
-
- I will here insert a statement of ethics, rather than the merely
- practical advice which I have heretofore given. If you crack at the
- slightest pressure, don't even bother playing cyberpunk. If
- your shiny new gadget with a Motorola 68040 chip and gee-whiz
- lightning Weitek math co-processor is more important to you than
- the lives of your friends, and you'd turn in your own grandmother
- rather than have it confiscated, please fuck off. The computer underground
- does not need you and your lame calling-card and access code rip-offs.
- Grow up and get a job at IBM doing the same thing a million
- other people just like you are doing, buy the same car a million
- other people just like you have, and go to live in the same suburb
- that a million other people like you call home, and die quietly at
- an old age in Florida. Don't go down squealing like a pig,
- deliberately and knowingly taking everyone you know with you.
-
- If you run the thought-experiment of imagining yourself in this
- situation, and wondering what you would do, and this description
- seems very much like what meets you in the bathroom mirror, please
- stop hacking now.
-
- However, if you feel you must turn someone in to satisfy the cops,
- I can only give the advice William S. Burroughs gives in _Junky_
- to those in a similar situation: give them names they already have, without
- any accompanying information; give them the names of people who have left the
- country permanently. Be warned, however, that giving false information to the
- police is a crime; stick to true, but entirely useless information.
-
- Now, for those who do not swallow the moral argument for not finking,
- I offer a practical argument. If you tell the police about
- others you know who have committed crimes, you have admitted
- your association with criminals, bolstering their case
- against you. You have also added an additional charge against
- yourself, that of conspiracy. You have fucked over the very
- friends you will sorely need for support in the near future,
- because the investigation will drag on for months, leaving your life
- in a shambles. You will need friends, and if you have sent
- them all up the river, you will have none. Worse, you will
- deserve it. You have confessed to the very crimes you
- are denying, making it difficult for you to stop giving them
- names if you have second thoughts. They have the goods on you.
-
- In addition, any offers they make if you will give them names are legally
- invalid and non-binding. They can't do jack-shit for you and wouldn't if they
- could. The cop mind is still a human mind, and there is nothing more
- despicable to the human mind than a traitor.
-
- Do not allow yourself to become something that you can not tolerate being.
- Like Judas, the traitor commits suicide both figuratively and literally.
-
- I now retire from the soapbox and return to the confessional.
-
- My motives were pure and my conscience was clean. With a sense
- of self-righteousness unbecoming in a person my age, I assumed that
- my integrity was invulnerability, and that my refusal to give them
- any names was going to prevent them from fucking over my friends.
-
- I had neglected to protect my email. I had not encrypted my
- communications. I had not carefully deleted any incriminating
- information from my disks, and because of this I am as guilty
- as the people who blithely rat out their friends. I damaged
- the lives of a number of people by my carelessness, a number of
- people who had more at stake than I had, and all my good intentions
- were not worth a damn. I had one encrypted file, that a list
- of compromised systems and account names, and that was DES encrypted
- with a six-character alphanumeric.
-
- As I revelled in my self-righteousness, Dan Ehrlich and Robert Owens
- arrived with a two-foot high pile of hardcopy on which was printed
- every file on my PSUVM accounts, including at least a year of email
- and all my posts to the net, including those in groups such as
- alt.drugs, and articles by other people.
-
- Wayne assumed that any item on the list, even saved posts from other
- people, was something that had been sent to me personally by its
- author, and that these people were, thus, involved in some vast conspiracy.
- While keeping the printed email out of my sight, he began listing
- names and asking me for information about that person. I answered,
- for every person, that I knew nothing about that person except what
- they knew. He asked such questions as "What is Emily Postnews'
- real name, and how is she involved in the conspiracy?"
-
- Ehrlich and Owens had conveniently disappeared, so I couldn't expect them to
- explain the situation to Wayne; and had, myself, given up any attempt to
- explain, realizing that anything I said would simply reinforce the cops'
- paranoid conspiracy theories. By then, I was refusing to answer practically
- every question put to me, and finally realized I was outgunned. When I had
- arrived, I was puffed up with bravado and certain that I could talk my way out
- of this awful situation. Having made rather a hash of it as a hacker, I
- resorted to my old standby, my tongue, with which I had been able
- to escape any previous situation. However, not only had I not talked
- my way out of being busted, I had talked my way further into it.
-
- If you believe, from years of experience at social engineering,
- that you will be able to talk your way out of being busted, I wish
- you luck; but don't expect it to happen. If you talk with the police, and
- you are not under arrest at the time, expect that one or two of
- your sentences will be able to be taken out of context and used
- as a justification for issuing an arrest warrant. If you talk with
- the police and you are under arrest, the Miranda statement: "Anything
- you say can and will be held against you in a court of law," is perhaps
- the only true statement in that litany of lies.
-
- In any case, my bravado had collapsed. I still pointedly
- called the cops "Wayne" and "Jeff," but otherwise, resorted to
- repeating mechanically that I knew nothing about nothing.
-
- Owens and Ehrlich returned, and announced that they had discovered
- an encrypted file on my account, called holy.nodes. I bitterly regretted
- the flippant name, and the arrogance of keeping such a file.
-
- If you must have an encrypted list of passwords and accounts
- sitting around, at least give it a name that makes it seem like some
- sort of executable, so that you have plausible deniability.
-
- They assured me that they could decrypt it within six hours on a
- Cray Y-MP to which they had access. I knew that the Computer Science
- Department had access to a Cray at the John von Neuman Computer Center.
- I made a brief attempt to calculate the rate of brute-force password
- cracking on a Cray and couldn't do it in my head. However, as
- the password was only six alphanumeric characters, I realized that it
- was quite possible that it could be cracked. I believe now that
- I should have called their bluff, but I gave them the key, yet another
- in a series of stupid moves.
-
- Shortly, they had a list of computer sites, accounts and passwords,
- and Wayne began grilling me on those. Owens was livid when he noted
- that a machine at Lawrence-Berkeley Labs, shasta.lbl.gov, was in the
- list. This was when my trouble started.
-
- You might recall that Lawrence-Berkeley Labs figures prominently in
- Clifford Stoll's book _The Cuckoo's Egg_. The Chaos Computer
- Club had cracked a site there in the mistaken belief that it was Lawrence-
- Livermore. As it happens, I had merely noticed a guest account there,
- logged in and done nothing further. Of course, this was too
- simple an explanation for a cop to believe it.
-
- Owens had given the police a tiny bit of evidence to support the
- bizarre structure of conspiracy theories they had built; and a paranoid
- delusion, once validated in even the most inconsequential manner, becomes
- unshakably firm.
-
- Wayne returned to the interrogation with renewed vigor. I continued
- giving answers to the effect that I knew nothing. He came to the name of
- Raymond Gary [*], who had generously allowed me to use an old account on
- PSUVM, that of a friend of his who had left the area. I attempted to assure
- them of his innocence. This was another bad move.
-
- It was a bad move because this immediately reinforces the conspiracy
- theory, and the cops wish to have more information on that
- person. I obfuscated, and returned to the habit of repeating: "Not to
- the best of my recollection," as if I were in the Watergate hearings.
-
- Another name surfaced, that of a person who had allowed me to use his
- account because our respective machines could not manage a tolerable
- talk connection. This person, without his knowledge, joined the
- conspiracy. Once again, I foolishly tried to explain the situation.
- This simply made it worse, as the cop did not understand a word
- I was saying; and Owens was incapable of appreciating the difference
- between violating the letter of the law and the spirit of the law.
-
- Wayne repeatedly asked about my overseas friends, informed me that he knew
- there were foreign governments involved, again told me that a friend of mine
- had informed on me. I was told lies so outrageous that I hesitate to put them
- on paper. I denied everything.
-
- I made another lengthy attempt at explanation, trying to defuse the conspiracy
- theory, and gave a speech on the difference between breaking into someone's
- house and ripping off everything there, voyeuristically spying on people, and
- temporarily borrowing an account simply to talk to someone because a network
- link was not working. I made an analogy between this and asking
- someone who is driving a corporate vehicle to give a jump to a
- disabled vehicle, and tried to explain that this was certainly not
- the same as if the authorized user of the corporate vehicle had simply
- handed a passerby the keys. I again attempted to explain the Internet, leased
- lines, the difference between FTP and mail, why everyone on the Internet
- allowed anyone else to transfer files from, to and through their machines, and
- once again failed to explain anything.
-
- Directly following this tirade, delivered almost at a shout, Wayne
- leaned over the desk and asked me: "Who's Bubba?"
-
- This was too much to tolerate. My ability to take the situation
- seriously, already very shaky, simply vanished in the face of
- this absurdity. I lost it entirely. I laughed hysterically.
-
- I asked, my anger finally getting the better of my amusement: "What the
- fuck kind of question is that?"
-
- He repeated the question, not appreciating the humor inherent in
- this absurd contretemps; I was beyond trying to maintain the appearance
- of solemnity. Everything, the battered table, the primitive
- tape recorder, the stony-faced cops, the overweight computer security
- guys, seemed entirely empty of meaning. I could no longer accept as real that
- I was in this dim room with a person asking me the question: "Who's Bubba?"
-
- I said: "I have no idea. You tell me."
-
- Finally, Wayne came to Dale's name. Dale did not use his last name
- in any of the email he had sent to me, and I hoped that his name
- was not in any file on any machine anywhere. I recovered some of
- my equilibrium, and refused to answer.
-
- A number of references to "lab supplies" were made in the email, and
- I was questioned as to the meaning of this phrase. I answered that
- it simply meant quarter-inch reels of tape for music. They refused
- to accept this explanation, and accused me of running a drug ring over
- the computer network.
-
- Veiled threats, repetitions of the question, rephrasings of it,
- assurances that they were going to get everyone anyway, and similar
- cop routines followed.
-
- Finally, having had altogether too much of this nonsense, I
- said: "This interview's over. I'm leaving." As simply as that,
- and as quickly, I got up and left. I wish I could say that I did
- not look back, but I did glance over my shoulder as I left.
-
- "We'll be in touch," said Wayne.
-
- "Yeah, sure," I said.
-
-
- VII. Thirty Pieces of Silver
-
- I informed Dale of the ominous turn in the investigation, and
- told him that the cops were now looking for him. From a sort of fatalistic
- curiosity, we logged into Shamir's account to watch the activities
- of the computer security guys, and to confer with some of their
- associates to find out what their motivations might be. We had
- decided that the possibility of a wiretap was slim, and that if
- there were a wiretap, we were doomed anyway, so what the hell?
-
- There is no conclusive evidence that there was a wiretap, but
- the police would not have needed a warrant to tap university
- phones, as they are on a private branch exchange, which does
- not qualify for legal protection. In addition, one bit of
- circumstantial evidence strikes me as indicative of the possibility
- of a wiretap, that being that when Dale called Shamir to explain
- the situation, and left a message in his voice mail box, the
- message directly following Dale's was from Wayne.
-
- We frequented the library, researching every book dealing with the subject of
- computer crime, reading the Pennsylvania State Criminal Code, photocopying and
- transcribing important texts, and compiling a disk of information relevant to
- the case, including any information that someone "on the outside" would need
- to know if we were jailed.
-
- I badly sprained my ankle in this period, but walked on it for three
- miles, and it was not until later in the night that I even realized
- there was anything wrong with it, so preoccupied was I by the bizarre
- situation in which I was embroiled. In addition, an ice storm developed,
- leaving a thin layer of ice over sidewalks, roads and the skeletal
- trees and bushes. I must have seemed a ridiculous figure hobbling
- across the ice on a cane, looking over my shoulder every few seconds;
- and attempting to appear casual whenever a police car passed.
-
- It seemed that wherever I went, there was a police car which slowed
- to my pace, and it always seemed that people were watching me. I
- tried to convince myself that this was paranoia, that not everyone
- could be following me, but the feeling continued to intensify, and
- I realized that I had adopted the mentality of the cops,
- that we were, essentially, part of the same societal process; symbiotic
- and necessary to each other's existence. The term 'paranoia' had no
- meaning when applied to this situation; as there were, indeed, people
- out to get me; people who were equally convinced that I was out to
- get them.
-
- I resolved to accept the situation, and abide by its unspoken rules.
- As vast as the texts are which support the law, there is another
- entity, The Law, which is infinite and can not be explained in
- any number of words, codes or legislation.
-
- Dale and I painstakingly weighed our options.
-
- Finally, Dale decided that he was going to contact the police, and
- called a friend of his in the police department to ask for assistance
- in doing so, Stan Marks [*], who was also an electronic musician.
- On occasion, Stan would visit us in the Lab, turning off his walkie-
- talkie to avoid the irritation of the numerous trivial assignments
- which comprise the day-to-day life of the university cop.
- After conferring with Stan, he decided simply to call Wayne and
- Jeff on the phone to arrange an interview.
-
- I felt like shit. The repercussions of my actions were spreading
- like ripples on a pond, and were to disrupt the lives of several of
- my dearest friends. At the same time, I was enraged. How
- dare they do this? What had I done that warranted this torturous
- and ridiculous investigation? Wasn't this investigation enough of
- a punishment just in and of itself?
-
- I wondered how many more innocent people would have to be fucked
- over before the police would be satisfied, and wondered how many
- innocent people, every day, are similarly fucked over in other
- investigations. How many would it take to satisfy the cops?
- The answer is, simply, every living person.
-
- If you believe that your past, however lily-white, would withstand
- the scrutiny of an investigation of several months' duration, with
- every document and communication subjected to minute investigation,
- you are deluding yourself. To the law-enforcement mentality, there
- are no innocent people. There are only undiscovered criminals.
-
- Only if we are all jailed, cops and criminals alike, will the machinery lie
- dormant, to rust its way to gentle oblivion; and only then will the ruins be
- left undisturbed for the puzzlement of future archaeologists.
-
- With these thoughts, I waited as Dale went to the police station,
- with the realization that I was a traitor by inaction, by having
- allowed this to happen.
-
- I was guilty, but this guilt was not a matter of law. My innocent
- actions were those which were to be tried.
-
- If you are ever busted, you will witness this curious inversion of
- morality, as if by entering the world of cops you have walked
- through a one-way mirror, in which your good actions are suddenly
- and arbitrarily punished, and the evil you have done is rewarded.
-
-
- VIII. Third and Fourth Interrogations
-
- I waited anxiously for Dale to return from his meeting. He had
- brought with him a professional tape recorder, in order to tape
- the interview. The cops were rather upset by this turn
- of events, but had no choice but to allow him to tape. While they
- attempted to get their tape recorder to work, he offered to loan
- them a pair of batteries, as theirs were dead.
-
- The interrogation followed roughly the same twists and turns as
- mine had, with more of an emphasis on the subject of "lab supplies."
- Question followed question, and Dale insisted that his actions were innocent.
-
- "Hell, if we'd have had a couple of nice women, none of this
- would even have happened," he said.
-
- When asked about the Huang account that Ron Gere had created for
- him, he explained that Huang was a nom-de-plume, and certainly not
- an alias for disguising crime.
-
- The police persisted, and returned to the subject of "lab supplies",
- and finally declared that they knew Dale and I were dealing in some
- sort of contraband, but that they would be prepared to offer leniency
- if he would give them names. Dale was adamant in his refusal.
-
- Finally, they said that they wanted him to make a drug buy for
- them.
-
- "Well, you'll have to introduce me to someone, because I sure
- don't know anyone who does that kind of stuff."
-
- Eventually, they set an appointment with him to speak with Ron
- Schreffler, the university cop in charge of undercover narcotics
- investigations.
-
- He called to reschedule the appointment a few days later, and then,
- eventually, cancelled it entirely, saying: "I have nothing to talk
- to him about."
-
- Finally, they ceased following this tack, realizing that even in
- Pennsylvania pursuing an entirely fruitless avenue of investigation
- is seen very dimly by their superiors. The topic of "lab supplies"
- was never mentioned again, and certainly not in the arrest warrant
- affidavit, as we were obviously innocent of any wrongdoing in that
- area.
-
- Warning Dale not to leave the area, they terminated the interview.
-
- Shortly thereafter, there was a fourth and final interview, with
- Dale and I present. We discussed nothing of any significance, and
- it was almost informal, as if we and the cops were cronies of some sort.
- Only Jeffery Jones was excluded from this circle, as he was limited
- largely to monosyllabic grunts and wild, paranoid accusations. We
- discovered that Wayne Weaver was a twenty-three year veteran, and
- it struck me that if I had met him in other circumstances I could
- have found him quite likable. He was, if nothing else, a professional,
- and acted in a professional manner even when he was beyond his
- depth in the sea of information which Dale and I navigated with
- ease.
-
- I felt almost sympathetic toward him, and wondered how it was for
- him to be involved in a case so complex and bizarre. I still failed
- to realize why he was acting toward us as he was, and realized that
- he, similarly, had no idea what to make of us, who must have seemed
- to him like remorseless, arrogant criminals. Unlike my prejudiced
- views of what a police officer should be, Wayne was a competent,
- intelligent man doing the best he could in a situation beyond his
- range of experience, and tried to behave in a conscientious manner.
-
- I feel that Wayne was a good man, but that the very system
- he upheld gave him no choice but to do evil, without realizing it.
- I am frustrated still by the fact that no matter how much we could
- discuss the situation, we could never understand each other in
- fullness, because our world-views were so fundamentally different.
- Unlike so many of the incompetent losers and petty sadists who
- find police work a convenient alternative to criminality, Wayne
- was that rarity, a good cop.
-
- Still, without an understanding of the computer subculture, he could not but
- see anything we might say to explain it to him as anything other than alien
- and criminal, just as a prejudiced American finds a description of the customs
- of some South Sea tribe shocking and bizarre. Until we realize what
- underlying assumptions we share with the rest of society, we shall be
- divided, subculture from culture, criminals from police.
-
- The ultimate goal of the computer underground is to create the circumstances
- which will underlie its own dissolution, to enable the total and free
- dissemination of all information, and thus to destroy itself by becoming
- mainstream. When everyone thinks nothing of doing in daylight what we are
- forced to do under cover of darkness, then we shall have succeeded.
-
- Until then, we can expect the Operation Sun-Devils to continue,
- and the witch-hunts to extend to every corner of cyberspace. The
- public at large still holds an ignorant dread of computers, having
- experienced oppression by those who use computers as a tool of
- secrecy and intrusion, having been told that they are being audited
- by the IRS because of "some discrepancies in the computer," that
- their paycheck has been delayed because "the computer's down,"
- that they can't receive their deceased spouse's life-insurance benefits
- because "there's nothing about it in the computer." The computer
- has become both omnipresent and omnipotent in the eyes of many,
- is blamed by incompetent people for their own failure, is used
- to justify appalling rip-offs by banks and other major social
- institutions, and in addition is not understood at all by the
- majority of the population, especially those over thirty, those
- who comprise both the law-enforcement mentality and aging hippies,
- both deeply distrustful of anything new.
-
- It is thus that such a paradox would exist as a hacker, and if
- we are to be successful, we must be very careful to understand
- the difference between secrecy and privacy. We must understand
- the difference between freedom of information and freedom from
- intrusion. We must understand the difference between invading
- the inner sanctum of oppression and voyeurism, and realize that
- even in our finest hours we too are fallible, and that in
- negotiating these finely-hued gray areas, we are liable to
- lose our path and take a fall.
-
- In this struggle, we can not allow a justifiable anger to become
- hatred. We can not allow skepticism to become nihilism. We can
- not allow ourselves to harm innocents. In adopting the
- intrusive tactics of the oppressors, we must not allow ourselves
- to perform the same actions that we detest in others.
-
- Perhaps most importantly, we must use computers as tools to serve
- humanity, and not allow humans to serve computers. For the
- non-living to serve the purposes of the living is a good and
- necessary thing, but for the living to serve the purposes of
- the non-living is an abomination.
-
-
-
-