💾 Archived View for gemini.spam.works › mirrors › textfiles › news › digundrg.txt captured on 2020-10-31 at 16:34:15.
-=-=-=-=-=-=-
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X X/\/ \/\X X\/X - Digital Underground - X\/X X/\X Story by Mark Bennett. Published in i-D Technology Issue X/\X X\/X X\/X X/\X Transcribed by Phantasm. 12th September 1992 X/\X X\/X X\/X X/\X Unauthorised Access UK. Online 10.00pm-7.00am. +44-636-708063 X/\X X\/\ /\/X X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X They've got a file on you. It's on computer. And that computer is connected to a global network. Who's going to stand up for our civil liberties in the digital era? Can the anarchic activities of hackers and cyberpunks make them freedom fighters for the information age? CYBERPUNK TECHNOLOGY Cyberspace, the Net, Non-Space, or the Electronic Frontier call it what you will, but it's out there now, spread across the world like an opulent immaterial spider's web, growing as each new computer, telephone or fax machine is plugged in, as satellites close continental divides, hooking independent phone systems together. It's almost a living entity - the backbone is the various telephone exchanges, the limbs the copper and fibre- optic links. Increasingly the world is shifting to this unseen plane. Your earnings, your purchasing patterns and your poll tax records are processed there. You may not realise it exists, but it's part of everyday life. As John Barlow, writer and electronic activist puts it, "Cyberspace is the place you are when you're on the telephone." As life moves to this electronic frontier, politicians and corporations are starting to exert increasing control over the new digital realm, policing information highways with growing strictness. Before we even realise we're there, we may find ourselves boxed into a digital ghetto, denied simple rights of access, while corporations and governments agencies make out their territory and roam free. So who will oppose the big guys? Who's going to stand up for our digital civil liberties? Who has the techno-literacy necessary to ask a few pertinent questions about what's going down in cyberspace? Perhaps the people who have been living there the longest might have a few answers. You could argue that hackers have been the most misrepresented of all sub- cultures. In the mainstream press they've been cast as full-blown electronic folk devils, either dangerous adolescents and electronic vandals or malevolent masterminds in the pay of organised crime or evil foreign powers. Others have tried to put forward a rather romantic view of hackers as freedom fighters for the information age. And the cyberpunk media industry that grew from William Gibson and Bruce Sterling's science fiction has mytholised them as digital rebels, computer cowboys. The truthis more complex. As more and more people explore cyberspace, it's becoming harder than ever to make generalisations about a hacker ethic, to even figure out what hackers are doing and why. All you can say is that between them they have created a genuine digital underground, an electronic bohemia where diverse subcultures can take root, where new ideas, dodgy tech and weird science can flourish. In Europe, the centres for hacking activity are Germany, Holland and Italy. UK hacking remains relatively stagnant and disorganised. In part it's down to the relatively high cost of computers and telephone calls. In part it's down to a difference in attitude. It seems typical that the most famous hack in Britain came when two hackers broke into Prince Philip's electronic mailbox. As Andrew Ross points out in an essay on the subject in Strange Weather, hacking in the UK has a quaint, 'Little England' air about it. Hugo Cornwall, author of The Hacker's Handbook, has compared hacking to electronic rambling and has suggested developing a kind of Country Code for computer ramblers. It's all very benign, a matter of closing gates behind you, respecting the lands you cross and never ignoring the 'No Trespassing' signs you might encounter. As Ross says, this amounts to a kind of electronic feudalism, with digital peasants respecting the inherited land rights of information barons and never asking bigger questions about property, state surveillance and the activity of corporations and governments. The Europeans tend to take a more politicised, sceptical stance. The focus for most hacking activity on the continent is the Hamburg-based Chaos Computer Club, which organises meetings, lectures, publishes magazines and books on the politics of information and holds an annual conference which usually draws hackers from around Europe. The club, who's motto is "access public data freely while protecting private data firmly", was formed by Wau Holland after the publication of the A5 hacking magazine Datenschleuder in 1982. An article in the mainstream press stimulated interest and subscribers decided to set up the club. With home computing a minority hobby in Germany during the mid-'80s, the club couldn't really limit itself to one type of computer as a similar club in the States might do. Instead it cut across product loyalties and hobbyist pettines and brought together all computer users. Similarly, the club aimed to be as open-minded about their activites. They weren't just interested in swapping access codes and passwords. Instead Datenschleuder published informed speculation about the way information technology might develop. Realising that the majority of the public were unaccustomed to, and in some cases frightened of, the new technology, they attempted to open up and demystify thre computerised landscape. Alongside the regular magazine, they have published four books on computers and hacking, including the essential Die Hacker Bible One which reprints back copies of Datenschleuder and the first 50 issues of TAP (aka Technological Assistance Program), a magazine put together back in the '70s by phone phreakers (early tech-pranksters who gained free phonecalls with gadgets like Blue Boxes and touch pads). Like most hackers, the Chaos Club takes a critical stance towards the phone companies of the world. As in the UK, the Germans have to live with high prices for their phone services, something which has prevented the growth of a network of computerised bulletin boards as in the US. In general, communications regulations are very restrictive in Germany. Something as simple as acquiring an extension telephone requires applications for permission, excessive paperwork and extra charges. In this area the club acts rather like a technoliterate consumer group, fighting to loosen the phone company's monopoly and open up the system's potential to ordinary punters. In many ways, the Chaos Club is determinedly respectable, at times more like a special interest pressure group than a hacking club. These days they're particularly concerned to distance themselves from what they see as irresponsible elements within the digital underground, perhaps because some of their members have performed some of the most notorious hacks in the past. Hackers from the Chaos Club bust into NASA's system in the mid-'80s. In addition, three years ago, it became apparent that some of the club's members had hacked into Western military computers and tried to sell what they found to the KGB. This somewhat sullied the carefully cultivated image of openness and responsibility and the club has been through something of a crisis. More recently, confidence has picked up and the last two annual conferences have attracted around 500 hackers and other interested parties. These annual get-togethers have become much more than just illicit swap meets for Europe's computer intruders. They're part digital be-in, part electronic think tank, part R&D lab, part informal high-tech trade fair. The centrepiece is still usually the hacking rooms. Hooked into the phone system by means of bundles of illegal extension cords, these feature rows of terminals on which visitors could access networks around the world, call up the club's various databases or tele-conference with members who couldn't make the event. The 1991 event featured a room housing various rudimentary explorations into the world of 'brain hacking'. Here people were swapping ideas about the possibilities of making a real life version of the electrodes which feature in William Gibson's cyberpunk novels and which allow users to jack into a network and move from computer to computer purely by thought. The technology that was actually up and running was little more than a biofeedback system (basically an EEG machine which displays a user's brain waves in order to help them to achieve particular frequencies and corresponding mental states). Some present were talking about actually developing a brain- controlled system, in which information could be moved around the screen via something like ESP or telekinesis. More functional future tech was demonstrated at the same conference by John Draper, aka Captain Crunch, one of the first phone phreakers and a legend in hacking circles, who had been flown in by the Virtual Travel Project, an organisation designed to bring East and West together via technology. He brought along an old Panasonic videophone which comes complete with a two inch square display lens and a small camera. When hooked up to standard telephone lines, the videophone can transmit still images taken by the built in camera and transmit them to a similar telephone or computer equipped with the right software. Draper was able to visually connect with the US in a conference call that hooked up Hamburg, New York, the Electronic Cafe in Santa Cruz in California and San Francisco. Although the Chaos Club is the best-known European hacking group, others are beginning to achieve a higher profile, particularly the self-styled Italian Cyberpunks, who are based in Milan and produce the magazine Decoder, which reads like a politically tougher version of Mondo 2000 and mixes hacker info and socio-political opinion pieces on information technology with interviews with the likes of William Gibson, underground comics and scratchy DIY graphics. With its roots in Italian anarchist traditions and connections to the free radio movement of the '70's, the Cyberpunks have tried to theorise hacker activity and present it as a coherent form of political protest. They're taken relatively seriously by Italian society at large and their recently published Cyberpunk Anthology managed to make it onto the bestseller list for several weeks. They are currently working on an English translation which they hope to publish here (in the UK) by the Summer. Like the Chaos Club, the Cyberpunks are less hung up on getting hold of the latest technology and more interested in educating the public and spreading information. Invited to participate in the Santarcangelo Arts Festival, held in Rimini last Summer, they organised lectures on virtual reality and multi- media, flying in speakers from Germany and Britain and running an 'information wall'. This comprised of a wall of old TVs playing feeds which were processed by an Amiga video editing system and mixed raw footage of the festival events, computer graphics and the Cyberpunks' own videos. There were also plans to set up a pirate TV station and broadcast in a narrow 2km band towards Rimini. Unfortunately, after technical problems and concern voiced by members of the Mutoid Waste Company (also present at the festival) that the material transmitted might be X rated, this had to be called off. Whilst groups in Europe seem to be gradually evolving into artful campaigners and consciousness-raising pranksters, the majority of US hackers have remained simple tech freaks. However, things may be changing. US hacker culture has been going through a crisis in the last two years. In a full- blown moral panic, they have been systematically hunted down by the Secret Service and have become the focus for hysteria reminiscent of the red scares of the '50s. (A time magazine cover from 1988 talked about "The Invasion Of The Data Snatchers".) Things began to happen in January 1990 as the Secret Service began to arrest members of The Legion Of Doom, one of the most celebrated US hacker groups, on suspicion of having entered the computer systems of the Bell South company. Although in many cases no charges were filed, electronic equipment and discs were confiscated. things came to a head with Operation Sun Devil in May 1990, which involved 28 raids in 14 days; 42 computers and 23,000 discs were confiscated, many of which have never been returned. Government agents carried out dawn raids on teenage bedrooms across the US, confiscating calculators and answerphones. All quite comical. Except things began to get more serious. Raids became like precision strikes on terrorists and teenagers found themselves threatened with jail sentences for accessing computer systems with no password, copying files or just being vaguely mischievous. Their offence might have been no more than the electronic equivalent of walking on the grass or breaking and entering, but the punishment they faced was ten times more severe. In addition, the authorities began to target and close down electronic bulletin boards. In the States, there are now boards for every obsession going, every hobby, belief, vice or fad. So many that regulation of the kind of information being circulated is increasingly difficult. For that reason, it has been argued that the powers that be don't like the idea of boards per se. Although a lot of the information that is circulated on some of the more underground boards (how to build bombs, for example) is available elsewhere, they feel spooked by the thougth that it can be accessed by anyone with a computer. They feel particularly spooked by the idea of hacker bulletin boards, and have begun to charge people merely for allowing 'dangerous information' to pass through their systems. The scapegoat for this anxiety was Craig Neidorf, aka Knight Lightning, who ran the electronic magazine Phrack which was circulated on a number of hacker boards. In February 1990, he was raided and charged with circulating a document about the workings of the 911 emergency number. His computers were confiscated and the magazine put out of business. When the case came to court in July, it was thrown out - the information Neidorf had published was available to consumers for less than $30. Nevertheless, Neidorf was wound up stuck with over $100,000 in legal expenses. Hacker reaction to all this has been varied. After receiving prison sentences for their activities, the majority of the Legion Of Doom have decided to go legit and have set up as Comsec Data Security Corporation, a computer protection consultancy. Others have taken a campaigning stance reminiscent of the Europeans. The East Coast hacker quarterly 2600, which published hardcore hacking info on phreaking and accessing computer networks, has tried to highlight the hypocrisy of the hacker busts. "An individual cannot take a big credit checking corporation like TRW to court because they collect personal data on them without his or her permission," 2600 editor Emmanuel Goldstein comments. "But TRW could claim its privacy was violated if a hacker figures out how to access their system." Other organisations have been set up to raise concern about civil liberties and freedom of speech, the most high profile being the Electronic Frontier Foundation, which was set up by Mitch Kapor, a millionaire software pioneer, along with other big cheeses from the computer industry (including Steve Wozniak of Apple, an ex-phone phreaker), as a direct response to anti-hacking hysteria. A self-confessed hacker/software pirate in the '70s, Kapor is worried that the current panic may lead to the formation of restrictive regulations which may hamper the development of cyberspace in the future. However he isn't in favour of legalising hacking. He thinks hackers should still be punished. Although the EFF has had some success in its moves to end Secret Service excesses, not all hackers are happy with the way it draws a line between the old '60s hackers and modern computer intruders. "There are a lot of similarities between these 15-year-olds who are playing around in corporate computers and the 40-year-olds who played around with phones and are now writing software somewhere," comments Emmanuel Goldstein. "They may be legit now, but they weren't always legitimate". Goldstein is also sceptical of the 'cyberpunk' tag which hackers appropriated from the fiction of William Gibson and Bruce Sterling, dismissing it as a fashion thing. Whilst it may have helped to give hackers a sense of identity, the image of leather-clad anti-social rebels backfired when the authorities started to take it seriosly. Something which places original cyberpunk writers like Bruce Sterling in a tricky position. "I've had law enforcement people tell me that if they see a copy of (William Gibson's) Neuromancer in a kid's bedroom when they're doing a raid, they know he's bad, he's gone," he observes. "There are people who use the word 'cyberpunk' as a synonym for computer criminal now. There's little that we can do about it really." Except write a book, something Sterling decided to do when anti-hacker hysteria reached his home town of Austin, Texas. The Chicago Computer Fraud and Abuse Task Force seized hardware and software from a texas SF publisher and made statements to the local press that cyberpunks were dangerous. "Being quite well-known as a cyberpunk myself, I thought I'd better find out what was going on". The results of his investigations will be published as The Hacker Crackdown in October in the US. As an outsider, Sterling offers a refreshingly sceptical perspective on the scene. Of the 5,000 or so hackers currently practicing in the States, he says the majority are just mischievous teens, electronic joyriders who are more curious than malicious. Most of them don't hack beyond the age of 22. They get bored and get a life outside of cyberspace. He laughs off the idea that hackers might be seen as radicals. "The idea that these are like fresh-faced idealistic genius kids who are linked arm-in-arm to deal a telling blow to the establishment is just bullshit. They all hate each other's guts. They turn each other in at the drop of a hat." Far from being proto-political rebels, he argues that young US hackers are actually political footballs, part of a larger game which is about the future and management of cyberspace. Thats why the rich software entrepreneurs of the Electronic Frontier Foundation have become involved. "The EFF and their civil liberties fellow travellers are an interest group like any other. They shouldn't be shrouded in this air of 'Oh they're old '60s people, look how idealistic and non-materialistic they are. These guys are pretty sharp operators who've made a lot of money in the computer industry, and would now like to get their mouse gripping mitts on some lever of political power that is consonant with the amount of money they have and the influence they wield in the business world". A cynic might argue that the EFF aren't just concerned with the freedom of speech. They really want to make sure that in the heat of hacker hysteria, a set of excessive laws don't get passed which might restrict their business operations in the future. This kind of thing is only to be expected, since as Sterling says, the electronic community is expanding daily. In the rush to go digital, hackers may even find themselves sidelined. "Every aspect of society is moving into electronic networking and that includes hippies, criminals, lawyers, politicians, bikers, knitting societies, even cops. Cops have their own bulletin boards now. There are hacker cops. All these subcultures and sub-groups are moving in, and in a while what was once called hacker culture may get swamped by other kinds of electronic bohemia." US hackers may have acted as the pioneers of the new electronic landscape. But like the real pioneers who first explored the American West, they may find it difficult to find a foothold in the new communities they helped to create. The simple thing is to go in to business for the people they formerly thought of as the enemy. Alternatively they could band together in informal vaguely politicised pressure groups like the Europeans. But they need to update their act. Otherwise they could even wind up a dying breed. "In the end the thing about American hackers that'll kill them off is that they're dilettantes," Sterling concludes. "They're not getting any money for this. They're doing it for free, because it's like a cool subculture do. They're doing it for power and knowledge. But anything these jerk-offs can do for power and knowledge, a real operator can do for a lot of money." The pioneer age is over. The Net is here to grow. And as the digital community expands and corporate control of computerised data increases, hackers will have to raise their political consciousness if they intend to fulfil their mythical role as electronic watchmen. CONTACTS Italian Cyberpunk magazine and book: Dutch hacking magazine: Decoder Hack-Tic Shake Edizioni PO Box 22953 Via Cesare Balbo 10 1100 DL Amsterdam 20136 Milan, Italy The Netherlands 2600 Magazine - subscriptions, back issues and uncut NTSC video: 2600 Subscription Dept PO Box 752 Middle Island New York 11953-0752 USA Tel: 0101 516 751 2600 Back issues of TAP can be found in the classified section of 2600. Die Hacker Bible 1 is available in bookshops in Germany. Transcribed by Phantasm. 12th September 1992 X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X/\X X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X\/X