💾 Archived View for spam.works › mirrors › textfiles › bbs › cyberthr.txt captured on 2023-06-14 at 15:52:22.

View Raw

More Information

-=-=-=-=-=-=-


Reprinted from SPIN (5:12 pg 25) - March 1990




CYBERThrash
by
Julian Dibbell


 in their Megadeth t-shirts are the new heroes of the information age.*

Eleven o'clock Saturday night, and I was headed for the DMZ again. I 
had the feeling the Big Kahuna would be there-and that he'd know what the
 hell was going on with the Cardboard Box. I sure didn't, and it was making
 me nervous.
    On the TV set outside my dim Brooklyn bedroom, and Cold War was ending.
 Furious Czechs gathered in plazas, East Germans ogled West Berlin shop
 windows-great infotainment, if you like rubble. I was after a different
 story. No broken bricks, no raging crowds, just phantom signals playing
 hide-and-seek through a fiber-optic maze that slithered across the world.
 On the TV screen the present was crumbling into the past. On my computer
 screen a future was taking shape, and the Big Kahuna was somewhere inside
 it.
    Amber glow brightened the room as I fired up my bargain-basement 
IBM clone and dialed into Telenet. The modem shrieked and crackled and
 suddenly I was in, gliding down the Main Street of the world's computer
 networks. I typed in a series of numbers charging the call to a hulking
 defense contractor somewhere in the Midwest, then I entered the 12-digit
 network-user address that routed my connection across the Atlantic to a PC
 in France.
    The cursor sat panting for a moment, then slid across the screen,
 spelling out the welcome logo: big block letters D, M, and Z. I entered a
 handle and dropped on in. It was the usual scene. A chat system capable of
 taking 25 callers at once, the DMZ was a hangout for hackers and phone
 phreaks from all over the world. A list of their handles glowed out at me
 from my monitor, silent and serene, but behind it a phreak/hack Casbah
 seethed. All those handles were passing private messages back and forth,
 cutting deals, trading short-lived codes, passwords, and other fetishized
 bits of information that are the illegal tender of the hacker economy.
    But I wasn't here to cop. I was here to find the Big Kahuna, and he was
 nowhere in sight. The list of handles glowed on, losing or adding a name
 now and then.
    There was nothing to do but wait.
    In France? Wait in France for a kid who lives an area code away from me?
 Things had gotten weird so fast I'd barely noticed.
    In the beginning it was all as simple as the headline: On October 4, 1989
, Grumman Aerospace Corporation, a key supplier of combat aircraft to the
 Pentagon, sent police to arrest a 15-year-old boy for slipping into the VAX
 mainframe at Grumman's Long Island plant from his bedroom in Levittown, New
 York.
    It wasn't much. Just another hacker story in a year bursting with them.
 The biggest was on its way to court: Robert T. Morris Jr., who had loosed a
 worm into the defense department's national research network,
 unintentionally paralyzing over 6000 computers, faced five years and a $250,
000 fine. Earlier in the year a federal judge had sentenced 18-year-old
 Herbert Zinn Jr., a/k/a "Shadow Hawk," to nine months in prison plus a
 $10,000 fine and two and a half years' probation for sneaking into phone
 company systems and copying "highly sensitive" software. On the book-tour
 circuit, computer security hero Clifford Stoll was out plugging The Cuckoo's
 Egg, his nonfiction account of KGB-backed West German hackers snooping for
 secrets in American networks.
    Nineteen eighty-nine was shaping up into the year of the hacker, and I
 wanted a piece of it the way some people wanted a piece of the Berlin wall.
 I'd been getting more obsessed with computers every day since I bought my
 PC, and more fed up with writing record reviews. As things went, the Grumman
 bust was small potatoes, but by the conventions of the emerging media
 subgenre of the hacker story, it had the earmarks of a minor classic- crime,
 punishment, feds, teenager, suburbia. I wanted to write it.
    Looking for dirt, I opened the latest issue of 2600, "The Hacker
 Quarterly," a Long-Island based 'zine. It was filled with how-to briefs,
 updates on worldwide hacker feats and busts, and a tough, political-minded
 defense of hacking and its constant companion, phone phreaking the high-tech
 defrauding of Ma Bell). No mention of Grumman, though.
    But hidden among all the other goodies was a list of computer bulletin
 boards or BBSs) loosely affiliated with the magazine. I switched on the PC,
 called one of the numbers- a Westchester exchange- and browsed a bit.
    I'd been riding the tri-state boards for over a year, and at first didn't
 see anything so different about this one. There was the usual pile of
 messages, friendly exchanges and occasional swipes, points of information
 and wisecracks. Subjects ranged from politics and music to personal-computer
 tech- with some notable additions, including general discussions of hacking
 and phreaking. But as the posted messages scrolled up my screen I could see
 that the tone here was unusual in the generally conservative world of BBSs.
 Talk was looser here, more anarchic, people used handles rather than real
 names and actually swore without fear of getting booted by the folks who
 ran the board, the sysops (systems operators). There was a muted festivity
 to the place, as if somewhere nearby, maybe in a back room no one would tell
 me about, one motherfucker of a party was going on.
    But there was nothing on the Grumman bust, so I scrolled through the
 section devoted to hyping other BBSs. There were some well-pitched appeals
 for calls, but the ad that caught by eye only needed its Long Island area
 code to bait the hook:


Call: The Cardboard Box. 516-742-0801*

My computer dialed the number, the modem connected, and then suddenly I was
 facing the heaviest dose of paranoia I'd ever encountered on a board. The
 BBS program asked for my handle (Dr. Bombay) and then slapped me with a
 questionnaire asking me to     (a) declare that I was not an employee of
 any long-distance phone company or any local, state, or federal law
 enforcement agency,   (b) identify a series of cryptic technical terms and
 acronyms, and (c) leave a note to the sysop, Wintermute, and his cosysops
 the X25 Warrior and the Big Kahuna, describing some of my hacking exploits.
 I passed the first part with flying colors, bullshitted my way miserably
 through the second, and confessed in the third that my greatest exploit was
 subscribing to 2600. So much for that board. After that performance they'd
 never let me in. I was back to square one.
    A few days later I checked the board to see whether I'd been validated.
 I keyed through the login procedure and waited for the brush-off. It didn't
 come-I'd been granted full access. I was in.
    I cut straight to the message base and worked my way down the menu. The
 email section was unreadable, nothing but private messages. The PHREAKING
 section was full of phone company techno-lore and strange tales of making
 pay phones do things that they weren't designed to. In HACKING the messages
 listed phone numbers and passwords for all kinds of computers-university,
 corporate, NASA. PIRATES' LAIR was the "wares" section, a place to trade
 illegally copied commercial software. In CARDING there were messages on how
 to scam other people's credit card numbers and use them safely. The more I
 read, the wider my eyes bugged. Whoever these people were- The Signal Jockey
, Dan Hackroyd, Exile- they were hardcore.
    I shook my amazement and headed for the HACKING NEWS/BUSTS section. A
 good idea: the second message that scrolled up brought the news of the
 Grumman bust to the board, and in the third Wintermute dropped the bomb
 that the unnamed minor in the papers, on TV, on the radio, was most likely
 A-TNT, until recently a regular at the Box. With this the conversation
 quickly heated up. How could they be sure it was him? Would he narc? Would
 they bust the board? As the days and messages scrolled by, though, it became
 clear that the board was safe, and the questions grew more philosophical.
 For instance: was A-TNT, or was he not, a lamer?
    Lameness, it seemed, was the ultimate sin around here, and not everybody
 was sure A-TNT was guilty.
    *"He wasn't such a bad guy. He was just getting started,"* wrote the
 Mechanic. *"It's too bad."*
    *"People get busted because they get lazy,"* Mirage suggested.
    But the Watchman wasn't going for it: *"Lazy...lame...I don't see much
 difference. If you make a mistake you're lame. So we're all lame to an
 extent...but, whether you're the eLiTeSt hacker or the lowliest k0dez d00d,
 it takes a BIG fuck-up to get busted."*
    Whatever A-TNT was, though he sure wasn't the whiz kid the media was
 calling him. *"Shit, he was asking ME for help,"* cracked the Mechanic,
 *"so you KNOW he wasn't no genius."* But what else was new? The media got
 it wrong again. Pretty soon the little lamer would be on "Gerlado,"
 repenting his evil ways, frightening the old folks with tales of
 sneaker-worshipping and skinhead hacker cults.
    *"Why is it when you see a computer user on TV it is always some total
 fucking modem-GEEK?"* asked the Watchman, clearly pissed-off. *"Why don't
 they ever show computer usrs like us, chugging Buds and dragging on
 Marlboro 100s in our Megadeth t-shirts and hacking k00l shit?"*
    I was starting to wonder myself. The moment I dropped in here I knew I
 had found that back-room party at last. These people were having the time
 of their adolescent lives, and they were doing it with enough style and
 attitude to qualify for a full-fledged MTV-sanction youth subculture status.
 All right, so maybe A-TNT wasn't a lamer, but who wanted to read another
 morality play about a computer delinquent scared straight by a brush with
 the law? The real story was still on the loose, and I was staring right at
 it.
    The only problem was that a mountain of hacker paranoia was standing
 between me and the story. There were good reasons trust is such a hard-won
 and fragile commodity down in the computer underground. Since the breezy
 "War Games" days of the early 80s, the federal and state governments have
 criminalized the shit out of hacking-by last year every state by pinko
 Vermont had passed laws against computer trespassing and "theft" and the
 federal Computer Fraud and Abuse Act of 1986 had made hacking punishable by
 anywhere from one year to 20.
    After a brief period of relative impunity, hackers were beginning to go
 to jail. That kind of atmosphere tightens definitions of common sense. On
 boards around the country, the elite hacker group Legion of Doom was
 circulating a novice's guide that warned against leaving your real phone
 number on any BBS ("no matter how k-rad it seems") or sharing real-life
 information with any one you didn't know too well.
    "Don't be afraid to be paranoid," the guide concluded. "Remember, you
 *are* breaking the law. It doesn't hurt to store everything encrypted on
 your hard disk, or keep your notes buried in the backyard or in the trunk
 of your car. You may feel a little funny, but you'll feel a lot funnier
 when you meet Bruno, your transvestite cellmate who axed his family to
 death."
    Still, I got the feeling that even if the dangers didn't exist at all
 hackers would have to invent some. The main thrill of the hack may indeed
 be, as the LOD intro insists, "the pursuit and capture of knowledge," but
 paranoia is at least part of the kick. As the pop culture industry is quick
 to recognize (see horror-writer Chet Day's new book The Hacker for a
 deliciously schlocky tale of an elite hacker board infiltrated not by the
 feds but by a terrorizing demon handled "The Succumbus"), the technology
 just lends itself to cloak-and-dagger drama.
    So it wouldn't do for me to start asking pesky-reporter questions. If I
 spooked the phreak/hackers who populated the place they might scatter,
 leaving me with the blood of a dead BBS on my hands. I decided to approach
 the sysops instead. On my computer I carefully composed a text-file
 suggesting we meet and explaining my intentions and my sympathy towards
 hackers. Then I called the Box, uploaded the text to Wintermute in the
 private file-transfer section, logged off, and crossed my fingers.
    I called back the next day, adrenaline rushing as soon as I saw hat I
 had private mail from the sysops. But it was only a message acknowledging
 that they'd received the file. I called back again the following day. No
 answer. I called later in the week. Still nothing.
    My nerves were frazzling, but at least the waiting gave me time to
 browse the message bases and get a better picture of the board. Slowly I
 began to figure out what any seasoned member of the computer underground
 would have sussed at first glance: the Cardboard Box was not to be confused
 with a pirate board. This was a hack/phreak board, dedicated primarily to
 the mutual education of its members in the arts of second-story
 telecommunications. According to Northern Illinois University criminologist
 Gordon Meyer (I downloaded his master's thesis from the Box's database),
 there are roughly a hundred such board in existence, varying widely in
 quality (the wares boards, where uploading and downloading pirated software
 is the main activity, outnumber the h/p's by about 20 to one).
    I also got to know the players. There was the Fone Ranger who called in
 regularly from Chicago to rant about the lameness of "warez d00dz." There
 were one or two other out-of-staters, and occasionally someone would drop
 in from England or Switzerland. The rest of the 20 or so regulars were
 spread out between deep Long Island and far Manhattan- not a huge area, but
 diverse. When Exile, and inner-city color of color, referred to A-TNT with
 the generic "nigga," he got back a clueness explanation from the 'burban
 Big Kahuna to the effect that the kid didn't appear to be black in any of
 the pictures he'd seen. In the obligatory MUSIC section, similar culture
 clashes flared an fizzled- the Mechanic. calling from the heart of the
 Boogie-Down Bronx, went toe-to-toe with the metalheads and prog-rockers for
 a while in fuck-you defenses of hip hop, house, and reggae. Then he gave up
 in a confession of secret love for Genesis and Phil Collins.
    I was learning all kinds of things. Except why the sysops weren't
 responding to me letter. A week had passed since I uploaded it. I called
 again, planning to leave another anxious, nudgy message. Instead, there it
 was. Contact:


TO: DR. BOMBAY
SUBJECT: ARTICLE...
A REPLY TO #284
------------------
UMM..Well..OK I might be able to manage me X25 Warrior and Big Kahuna
 meeting you (sorry we cant give out addresses or phone #s)...I have a few
 conditions...dont put any real handles or board names...also...I would
 appreciate it if you would say clearly that hackers dont destroy anything
 on a system, they just want to learn how to use it...also...A contribution
 to the BBS for a 38,000 BAUD modem would be appreciated!*

    I didn't kick my heels because there wasn't room under my desk. I just
 sent Wintermute a message saying I didn't think SPIN would cough up
 modem-money but the other conditions would be no problem.
    After all, why not help clean up the hackers' public image? It was sad
 but true enough that the "threat" of computer viruses has obsessed the
 media, which had in general been too lazy to find out that in the
 hack/phreak community planting a destructive virus was something you might
 do to a rival bulletin board but never to a hacked system. And why wouldn't
 the media call bullshit on corporate claims of huge losses to the computer
 underground? The software industries were claiming they lost billions of
 dollars a year to piracy. The phone companies claimed a million a day bled
 to phreaking. No one ever pointed out that they were talking about "theft"
 of goods that didn't disappear from the shelves when stolen and would not
 have been used anyway if they had to be paid for. Information technology
 had a tendency to make us information peddlers-journalists like me- look
 stupid, and it was hardly fair that hackers suffered for our lameness.
    So sure, I would gladly do what I could to make amends, I told Wintermute
- as long as we could meet and talk. *"Just give me a time and place."* I
 said.
    Another long week passed. Finally I got this message:


TO: DR. BOMBAY
SUBJECT: ARTICLE
A REPLY TO #339
------------------
I am having problems...Nobody want to meet you, they think you are gonna
 appear with a dozen cops or something...*

    For Christ's sake. I signed and typed out a reply:


TO: WINTERMUTE
SUBJECT: ARTICLE...
A REPLY TO #341
------------------
Would would it take to convince you i'm not a narc? What do you want? My
 American Express card number so you guys can fuck my life up if I double
 cross you? I don't know. This is a little depressing.  I mean, I only have
 about half a story if I can't meet with anybody. What would it take?*

The next day's e-mail brought this:


TO: DR. BOMBAY
SUBJECT: ARTICLE...
A REPLY TO #348
-----------------
Well...If we wanted yur AMEX # we could have it already...As soon as I talk
 to Kahuna we will call you and see what happens...*


The bravado was gangster-movie perfect. I had to laugh.
    But nobody called. After a couple days I logged onto the Box again and
 got a message from Big Kahuna asking for my social security number. I
 thought about it: I'd already given them my real name and real phone number.
 What more could they do with the SS#? I typed it in. Then I downloaded some
 bedtime reading from the board's library of text-files and logged off.
    I could have picked better bedtime reading. The file I'd leeched turned
 out to contain two brief Newsweek articles by a reporter named Richard
 Sandza. The first recounted his undercover adventures as "Montana Wildhack"
 on hack/phreak boards around the country. The second described the hacker
 response to the first story after it appeared: Sandza was vilified
 throughout the hacker world, inundated with crank calls, and found his
 credit history fucked with and his card numbers posted all over the BBS
 nation. Not a soothing tale. I managed to convince myself that the reason
 he had caught so much hell was that he had used real board names and
 handles. Even so, there was no telling what might piss off some small group
 of hackers somewhere and set me up for the same bitch of a time. I went to
 sleep sorry I'd given up my social security number.
    Four days later I called the board. Email: the Big Kahuna had discovered 
my address. Big deal. They already had my name and phone number; they could
 have gotten the address out of the phone book. I dashed off a quick dis and
 moved on to the next letter waiting for me. It went a little something like
 this:


TO: DR. BOMBAY
SUBJECT: CHECK THIS SHIT OUT
----------------------------
Y365 - PROCEED
NM-DIBBELL, JULIAN


ACCTS:2,HC$0-470, 2-ONES.

P/D RT 30/60/90 MR DLA/ACCOUNT NO
01 I*9060N259 10/89 08/88 470 470 01 00
00 00 01 3719355233500
02 I*9060N25 09/89 10/88 0 0 01 00 00
00 10 3712389469900
END OF REPORT*

    My mouth flapped open. It was brief and pathetic, but it was my credit
 history, and my American Express card numbers gleamed in its midst like a
 pair of hot rhinestones. This should only have intensified my fears of a
 few nights earlier, but all I felt was a mixture of astonishment and
 admiration.
    My hands groped to the keyboard to enter a reply. I didn't know what to
 say. Suddenly the cursor jumped out of my control and started spelling:



    In a bedroom or a basement somewhere in the 516 area, Wintermute had
 broken into chat mode. I typed back:


-Hey. It is no big shit...don't worry I wont post yur card #s all over the
 place...*

    We got talking.


-Why u wanna know!
-Just being a reporter
-Well...should I make the story dramatic and say I am 11 or should I tell
 you my real age?
-The truth would be fine
-Oh. Well....I just turned 15 in September*

Fifteen. Jesus.


-Well X25 Warrior is 14 and Big Kahuna is 16-17 (I really dont know)
-u guys ever meet in person?
-Yeah...me and the Warrior hang out all the time. As for Kahuna, we've never
 met
-U never met him and you let him run the board with you? how can you trust
 him?
-I trust him more than I trust you. I can tell you that...*

    But he kept talking. He told me hacking was fun and I should try it. He
 gave me the numbers of some hacked-out systems to call. This all took a
 long time. The cursor crawled across and down the screen like a maddeningly
 slo-mo game of Centipede. Two hours later my eyes were bloodshot rheumy
 puddles from staring at the monitor and the conversation was ending on a
 sour note. My questions had gotten too personal and Wintermute suddenly
 wanted every detail worth printing off the record. As we said goodbye and
 signed off I though it might be the last time I heard from him. I could see
 the whole story disappearing back into the electronic depths it had emerged
 from.
    I turned off the computer and shuffled out of my bedroom in a daze. On
 the TV in the kitchen Ted Koppel was announcing the fall of the Berlin Wall.
 Right now it was history, but in a few weeks big fat AT&T, every
 phreak/hacker's favorite long distance company, would be using this same
 footage in adspots, as if it had been some basic urge to telecommunicate
 that had smashed the wall. They weren't entirely wrong. People were fighting
 for a number of things in Easter Europe, but would anyone deny that the
 free circulation of news, stock market prices and music videos were high on
 the list?
    On the TV in the kitchen the nuclear age was completing its transition to
 the information age. War, peace, commerce, fun- none of these would be the
 same anymore. It was still possible of course that the new age would turn
 out to be just a digital remastering of the old one. We would measure the
 stockpiles in megabytes rather than megatons, but they'd be stockpiles
 nonetheless- endless lists of data, names and numbers and the power that
 goes with them. Still, as long as three teenagers on a telecomm joyride
 could pick the corporate lock on those lists, there was a chance things
 might be different this time around. I might never speak to Wintermute
 again.
But it was reassuring to know he was out there.

Wintermute didn't disappear. In a few days he and the Big Kahuna and the X25
 Warrior started conference-calling my apartment. I was never home when they
 called- I'd get in and find a series of extended messages on my machine,
 three high-keyed adolescent boy voices cracking jokes, chattering among
 themselves, laughing uncontrollably and making rude comments on my taste in
 outgoing-message music. It was like the Beastie Boys had taken over my
 answering machine.
    Finally they left a number I could call and leave a voice-message at.
 They had pirated a voice mailbox. VMBs are those automated answering-machine
 systems you get nowadays when you call big firms, and it turns out they are
 eminently hackable: find an unused box in the system, hack out its password,
 and it's yours (most phreak/hackers use them as safe places to trade phone
 codes)- until somebody at the office discovers your coup and kills the box.

    The boys' VMB was still good. I left a time they could definitely get
 hold of me. They called back. We talked for two hours. I was full of
 questions:

Like, what was the point? What did you do once you got inside a forbidden
 computer?

    Well first of all you didn't destroy anything. That was rule number one.
 But that left a lot of room. You could take a look at some pretty
 interesting things (the boys claimed that on a NASA computer once they
 found a report about a fatal crash that never made it to the press). You
 could also use some systems as gateways to networks brimming with other
 computers. You could even set up a hidden, parasite BBS. The Mechanic, they
 told me, was in the process of doing just that on a Vax he'd hacked down in
 New Jersey. But all these things merely iced the cake. The big challenge
 was getting in. "Once you're in, " said the Kahuna, "it's like, 'Ho-hum.
 That was fun. What now?'"
    And what were the easiest systems and networks to hack into?
    Well, Arpanet, the defense department's research network, was certainly
 one of them. Then there were the credit report companies- CBI, TRW. There
 were three good ways to get passwords for their computers. One was to go
 "trashing," poking around in the garbage of a credit-database client to see
 what carelessly discarded printouts might reveal. Another was "social
 engineering"- calling up database-users and putting on your best grown-up
 voice to bullshit a password out of them. If neither of these suited your
 style, you could always just trade for the passwords with whatever cool shit
 you might have- a pile of codes, some VMBs.
    And what about the stereotypes of hackers? Were they math prodigies?
    No, not really. The Kahuna sucked at math infact, did much better in
 English. And none of the three knew much about programming. Knowing how to
 program would help, of course, and the most elite hackers knew at least one
 programming language, but it wasn't necessary- hacking wasn't a system of
 rules, it was a craft.
    Well, were they loners then? Troubled kids?
    Loners, no- they all had plenty of friends, Kahuna went to parties on
 the weekends, played a lot of pick-up football. But troubled? Well, they
 were teenagers. "All my friends are troubled," said the Warrior, "and most
 of them don't know anything about computers."
    The boys were sharp. They were funny and in a gruff teen-boy way they
 were friendly too. I liked them and I looked forward to their phone calls,
 which began coming fairly regularly after the first contact. I remained
 uneasy though. Every time I pushed for a face-to-face meeting, they would
 cagily put me off. My deadline loomed and I still hadn't clinched the story.

    It never even occurred to me that they might know the story better than
 I did, but they did, and they'd been feeding it to me in little doses all
 along, a code here, a password there. The sly little bastards were trying
 to show me how easy it was to get hooked on hacking, and they were doing a
 pretty good job. The rush I got when I first called the DMZ (called fucking
 France! and didn't pay a penny!) kept me coming back for more. And when I
 slipped into the Mechanic's Jersey Vax, my first actual illegal entry, I
 suddenly had a glimpse of what it was all about. These were low-grade
 borrowed buzzes, sub-warez d00d activity, but they were heady enough that I
 finally understood Wintermute's uncharacteristically rapturous declarations
 that he would never give up hacking as long as he lived.
    But I still had to meet the boys.

The one week they didn't call. Caught up in other assignments, I didn't have
 time to drop by the Box, but the silence was making me jittery. I was
 jonesing for the underground. It couldn't hurt, I decided at the end of the
 week, to give the board a quick call and see what was up. I switched on the
 computer and dialed up the Cardboard Box. There was no answer. That wasn't
 good. If the hard disk on Wintermute's computer had failed, it could be
 hours before he got the board back up. When I called later that night the
 board was still down. Fuck! Well, it would be back up the next day.
    But the next day there was still no answer from the Cardboard Box. I was
 really uptight now. The boys' VMB had died and I still didn't know any of
 their home phone numbers. The story was disappearing again. There was only
 one way left to get in touch with them. It was a long shot, but fuck it, at
 least it would give me some kind of hackerworld fix.
    So there I was, eleven o'clock Saturday night, back in the DMZ again.
 I'd bumped into the Big Kahuna there a couple times before. Maybe he'd be
 there tonight. The list of handles was long, but no Big Kahuna. There was
 nothing to do but wait.
    Which wasn't so bad. The DMZ was a fun place to hang out. You just sat
 there and people sent you messages. Occasionally you got a racy one from
 one of the gay French locals who seemed to be drawn to the DMZ by its high
 teenage testosterone count. No doubt their presence flustered the hackers,
 who in general like a fag joke as much as the next American adolescent, but
 the hackers' own approaches didn't seem a lot less prurient sometimes. "Got
 any codes?" was the standard opening line. It could spark a nice
 conversation, but as often as not it led straight to a quick and dirty
 exchange of digits.
    There was a lot of codes-cruising going on that night. I was having a
 hard time keeping up since I didn't have any to offer. Finally I decided to
 just go ahead and identify myself as a reporter and see what happened. The
 results were good: within 10 minutes I was carrying on two full-blown
 conversations at the same time. One was with Gestapo, a 16-year-old New Age
 anarchist Dokken fan from Phoenix. The other was with a guy whose handle
 identified him as the sysop of the DMZ, said he was a 28-year-old
 French-based U S Air Force lieutenant colonel who'd been running the system
 out of his home for two years.
    Identity here was even more fluid than on regular boards, since you could
 log on with any handle you felt like, and even change your handle as often
 as you cared to within a single session. I was logged on a "Scrump" at the
 moment. Last session I was "Scratch." Before that I was "Richard Marx."
    Scrump was getting sleepy. I was sending farewell messages to Gestapo
 and the sysop when a message came through from someone tagged Internet, and
 plainly identified as calling from the USA:


HI,* I typed. *Where u calling from?
The USA*, came the reply. 
    Great. More paranoia. Well, this would take care of Internet: *Uh huh.
 Well, dont mind the questions. It's my job. I'm a reporter for SPIN
 magazine.*

    The reply took a little while to get back to me:


-Big Kahuna????
-OH...No this is Wintermute. Hi.
-OH HI, man. Sorry I've been out of touch for so long...
-Well, its no problem. But you missed it...big shit at the Signal Jock's
 house with Grumman security...*

The news was bad. Sort of. Grumman security had traced the Signal Jock and a
 number of other local hackers trying to log onto the same Grumman Vax that
 had been A-TNT's undoing. And now they were making house calls in the
 company of Nassau County police officers and an unidentified guy with "fed"
 written all over him. They didn't have a lot on the Signal Jockey so it
 didn't look like they were going to press charges, but the story didn't end
 there. The jock's mom knew the Big Kahuna's mom and told her about the
 visit. After that it didn't take long for Mr. and Mrs. Kahuna to figure out
 why their son had been spending so much time with his computer, and boy were
 they pissed. They took his modem away and grounded him for a year.
    It got worse. One of the kids Grumman had swooped down on was cosysop
 for Quiet Riot, a board in the neighboring 718 area. Right away the other
 sysops pulled the BBS down, and Wintermute, scared shitless Grumman would
 be coming for him next, took the hint. He wiped all the BBS files off his
 hard disc and retired the board indefinitely.

The Cardboard Box was dead.

In the week that followed Bush met Gorbachev at Malta, and the boys agreed
 to meet me in Manhattan. 
    It was a strange and beautiful world. The military-industrial complex
 had succeeded in killing the Cardboard Box, but there was suddenly a good
 chance it wouldn't survive the century itself. The postwar national security
 state was scrambling to find a new rationale for its undercover shenanigans,
 but hackers were already living in a world in which covert action was
 nothing more than a game children played. The future was rushing towards us
 faster than the past could get out of the way.
    Appropriately enough, the boys and I agreed to rendezvous in front of a
 science-fiction bookstore we all knew. The Kahuna wouldn't make it of
 course. He was still under house arrest.
    There was some doubt about how we'd recognize each other, but when the
 time came I spotted them before I'd gotten within two blocks of the
 bookstore: two sweet-faced, slightly chubby generic white teens, working
 hard at looking inconspicuous. One of them looked like he had a couple of
 growth spurts to go. Both of them had their hands deep in the pockets of
 clothes that looked like last year's Christmas presents. I sidled up and
 muttered, "Got any codes?" The boys laughed, and we all tried to quickly
 get over the weirdness of having faces stuck to our names. The short one
 was the X25 Warrior, the taller blond kid was Wintermute.
    I took them to lunch. The Warrior got a cheeseburger; Wintermute ordered
 ribs and insisted on Pepsi over Coke. The cracked jokes with the waitress,
 awkward and wise-assed at the same time. We talked about how they got into
 hacking, about the superiority of their k-rad Amigas to my boring IBM,
 about the Big Kahuna's bad luck. We talking about the Cardboard Box.
 Neither of them seemed too sorry it was down. It had been going for over a
 year, a ripe old age for a hack/phreak board. And with the modem freed up
 Wintemute could do more of his own hacking now, spend hours scanning out
 entire 800-number exchanges, shit like that.
    After lunch we walked around. We looked in computer-store windows. We
 dropped by a magazine shop that sold 2600. I bought two copies for some
 friends, the Warrior bought one for himself, and Wintermute shoplifted
 another.
    It was getting late, I'd have to head home soon. "OK," said Wintermute,
 "but first you have to do something for us."
    "Whatever," I said.
    "Well, OK. Well we'll give you the money, but um..."- his feet shuffled
 nervously- "OK, can you buy us a copy of Playboy? The one with Kimberly
 Conrad on the cover?" The Warrior giggled.
    We went to three different newsstands looking for that issue, but none
 of them had it yet. Finally the boys decided they would settle for a quart
 of Foster's. I'd never bought alcohol for the underaged before, and
 certainly never dreamed the first minors I did it for would be capable of
 altering my credit history, but I didn't blink. They waited outside the
 store while I made the buy.
    When I came out we opened the can right there on the street and headed
 for the subway swigging. We were all grinning like idiots.
    At the subway entrance I turned and said goodbye, and the boys walked
 off. They were going to catch a movie maybe, they didn't know. I watched as
 they made their way past a nearby newsstand. No Kimberly Conrad, but lots
 of headlines that supposedly added up to the end of history.
    From where I stood it looked like the beginning. New struggles were
 brewing. Information capital was accumulating like crazy, and the gap
 between the info-haves and the info-have-nots was gaping wider all the
 time. Sooner or later it would come down to a fight, and whether they knew
 it or not, kids like the Big Kahuna, the X25 Warrior and Wintermute were
 among the first people to be on the right side.
    I saw Wintermute take one last gulp of beer. Then the boys disappeared
 into the city crowds.