Introduction 4. 4 .! . . . The Following sections in this introduction expand upon the theme of the sensa-tionalistion of hacking referred to in the Preface. This is done to provide a context for the subsequent analysis Df hacking and is necessary groundwork for an exploration of the social processes at work in the depiction of hacking by 'both its opponents and proponents. Fear, ignorance and vulnerability: hyping hacking The cops, and their patrons in the telephone companies, just don't understand the modern world of computers, and they're scared. They think there are masterminds running spy-rings who employ us,' a hacker told me. 'They don't understand that we don't do this for money, we do it for power and knowledge.' Telephone security people who reach out to the underground are accused of divided loyalties and Ered by panicked employers. A young Missourian coolly psychoanalyzed the apposition. 'They're overdependent on things they don't understand. They've surrendered their lives to computers.' ' j (Staling 1991:4) Whilst the allegedly criminal aspects of hacking alone would seem enough to create a media interest in the activity, it also contains a mysterious technological element manifested in the lay person's uninitiated awe of computers' complexities and capabilities.' Despite the passible existence of reasons for us to welcome their mavenck spirit, hackers also serve to remind us of our technological vulnerability/ ignorance. This has been manifested in the problems experienced by law enforcement officials and legislators in their encounters witf l the computer underground and are perhaps merely smaller-scale illustrations of some of the wider problems society encounters as it attempts to assimilate new information technologies into existing social structures. There have been various cases of alleged over-reactions to computer security incidents by law enforcement agents. A legal example is provided by the E911 case whereby a member of the hacker group Legion of Doom. Craie- NeidorC was accused of threatening' the safctv of residents 2 introduction jj^ugbout the US by having copied a document containing details of the telephone emergency 911 system. When the case came to trial the federal prosecutors were embarrassed when it was proved by the defence team that the allegedly sensitive document valued at380,000 was in fact available to the general public for S13.2 •yjie authorities* often dramatic response to hackers and their activities was perhaP5 m°st vividly manifested in the series of police raids on the homes of hackers c°de-named 'Operation Sun Devil* by gun-carrying US law enforcement officers. Officers were accused of over-reacting to the physical threat posed by hackers in their homes by entering with their guns drawn and of removing excessive amounts of computing equipment unrelated to their specific investiga-jjjjus. Whilst such a response can be interpreted as exhibiting displaced fear it is also viewed by some as deliberate strategy that fulfils a pragmatic function: Where the target of the raids is an individual, usually at his or her own home, this simple approach to raid and seizure is ... entirely appropriate and very effective. Hackers and paedophiles in particular are used to dealing ^rith people and problems by means of remote connections; suddenly to be faced with by a veritable army of (in the US, gun carrying) officers is usually sufficient to persuade total - indeed, often abject— co-operation. (Barrett 1997: 157 [emphasis in the original]) ^ British perspective on allegedly over-zealous law enforcement is provided by father of the 16-year-old London-based hacker, Richard Pryce, who was accused of hacking into the systems of US military bases: jt was around 7 p.m. and I was watching TV when about eight cars pulled up and people started banging on the door. When I answered it, the officers carne filing in ... there were so many of them, I thought he must have killed 5orneone. They burst into his room and pulled his hands away from his computer keyboard. They then stripped his room. When I went up the stairs he >vas sitting there in shock while they were ripping up his floor-boards. The/ searched his room for 5 hours. "(Sterling 1991: website) Similarly, with reference to the case of Kevin Poulsen,3 his attorney, Paul Mdtzer, argued: 'It's ludicrous, it's absurd. ... They can't decide if they've got a kid pl^y^S m Sarage or Julius Rosenberg'.* Mcltzer said he was 'very [Jisturbed by the inability of federal prosecutors to distinguish between assault ^[1, a deadly weapon and assault with a computer. I mean, c'mon, the guy's non-violcnt' (Fine 1995). Poulsen's own words are also instructive: flic trouble began before I was released. I planned on living with my parents when I got out of prison, until I could find employment and live on my own. My probation officer anticipated this months before my release-date, and visited my parents. He was shocked to find that they had recently Introduction 3 purchased an IBM compatible computer, and he warned them that they must get rid of it before I moved in. They didn't have a modem, mind you, but as a notorious hacker I might easily fashion a modem out of ordinary household appliances. ... It gat even more interesting when I was released. When I reported to my P.O., he explained to me that, not only could I not use any computer, with or without a modem, but that I couldn't be in the same mam as a computer. ... Judge Real declined to second-guess the decisions of the probation officer, and specifically rejected the contention that I should be allowed to obtain employment that allows access to computers without modems, noting, 'Who knows what a computer can do?' (Poulsen undated-a: website) Justin Petersen, (alias Agent Steal) reinforces the claim that there is an apparent culture and knowledge gap between hackers and the legal authorities. Petersen spent forty-one months in Federal Prison for hacking into a bank's computer and transferring funds. Whilst serving his sentence he met up with Chris Lamprecht (abas Minor Threat}, another hacker. He describes how. The prison officials were terrified of us. They became obsessed as they read . our mail, screened our magazines, listened to our phone calls, and sent informants to try and infiltrate our litde group of technophiles. The only conclusion they could come to was that they had no idea what we were up to. When the computer at the prison industries plant crashed, Chris was prompdy fired from his job there. It wasn't his doing, but unbridled paranoia spreads far and wide among bureaucrats. (Petersen 1997: website) This general fear and ignorance of the authorities towards the abilities of hackers is further evident from Chris Lamprecbt's experience of the court system. His judge, Sam Sparks, stipulated in his sentencing that: Upon release from imprisonment ... for a term of three years, the defendant cannot be employed where he is the installer, programmer, or trouble shooter for computer equipment; may not purchase, possess or receive a personal computer which uses a modem; and may not utilize the internet or other computer networks. (cited in Thieme 1996:21) From the perspective of the computer underground: Doesn't Sparks know that anyone with a few dollars can buy a social security number in the data marketplace? Besides, good hackers are equally adept at 'social engineering' If Lamprecht talks someone out of their social security number, should we cut out his tongue? In short, does the judge have a clue as to how life is led these days? Lamprecht's former boss, Selwyn Polk of ODT, laughed when asked about the case 'They're dead scared of him because of the computer stuff;' he said. "They treat him differently because they think if he just thinks about computers, he can do magical things.' Unfortunately, Lamprechťs statements feed these projections. He plays enthusiastically to the 'evil hacker genius* image. fThiemc 1996: 21-2) A cultural gap is again evident in the fate of a young bulletin board operator in New Brunswick in 1985, held liable for the material posted by other users. His arrest, in 1985, led Jeffrey Fogel of the ACLU to use a forceful analogy5 in order to claim that the youth was unfairly singled out 'He has an electronic bulletin board and arresting him and seizing his computer amounts to seizing a printing press', Fogel said. 'It would he like if someone put a stolen credit card number in a newspaper classified. Would you close down the newspaper?' (PR Newswire 1985). Frustration from the computer underground at the perceived inappropri-ateness of the establishment's fear-induced responses is exhibited in the way in which metaphors are reappropriated in order to reinforce their own rhetorical points: Denying a criminal access to computer networks is like breaking his fingers for writing a hold-up note and forbidding him to'use a pen. When the crime has nothing to do with computers or networks in the first place, it's like putting him into a sensory-deprivation tank simply to punish him. (Thieme 1996: 21) Hacking's predominancy non-physical character and its accompanying air of mystery tends to heighten its potential for creating fear and anxiety. Its anonymity mixed with its illicit nature makes it easier far the media to portray the actions of hackers, who are rarely seen in the flesh, in such forms as 'electronic stalkers'. According to the convicted hacker, Kevin Paulsen: 'Criminal cases involving suspected unauthorized computer access, or "hacking", are frequendy subject to wild, unsubstantiated, and often bizarre claims by prosecutors and investigators' {Poulsen undated-b). This claim of a tendency to over-dramatise would seem to be at least partially borne out by the ominous sounding subtide of the book written about his exploits, The Watchman. This seemed designed to make a none-too-subliminal association with serial killing, being subtided: The Twisted Life and Crimes of Serial Hacker Kaiin Pouben. Hackers who hype - It was no longer enough to break into computer systems, now it was essential to break into the limelight of national media attention, as well. (Hawn 1996: 2) Introduction 5 Srhc hyperbole and mystery surrounding hacking is not always something that ^hackers passively suffer.- They also make use of the immaterial anonymity of ^cyberspace in order to heighten the effects of the various on-line personae they "adopt. On occasion they can revel in exaggeratedly malevolent poses: jSCyberspace is a new world and in it the hacker is a datalord, a baudrate Ib'arbarian who takes what he wants' (Marotta 1993: 3), Under the cover of laBouymity hackers project threatening personalities to the outside world and fjiiedia facilitating the subsequent over-reactions of the police and legal establish-li'ificnL: Hacking groups generally choose colourful names such as 'Bad Ass j-Modier Fuckers, Chaos Computer Club, Circle of Death, Fanners of Doom*6 - and this can create a self-fulfilling prophecy in terms of the authorities' response. ir'Anonymity allows hackers to indulge in extravagant role-playing whereby they 1 form a dangerous underground movement with revolutionary credentials: Since we are engaged in Revolutionary War in Cyberspace ... Our Guerilla Warfare Operating Area, (GWOA), is the Internet ... Our greatest tactical > advantages are the speed of light and non location specificity. ... One small _ screen before him. Against all the odds — and using just a £400 High Street 7 ;1 system — the 17-year-old had hacked into the American Air Force's FLEX project... Force Level Execution. With an awful realisation he watched his twitching index finger hover over the nuclear button. One twitch more, he says, and he might have launched a Peacekeeper missile with a 150 kUotons nuclear payload. Its maximum range is 12,000 kilometres. It guarantees total devastation within a 20-mile radius of. impact With that, Bevan could lay waste to whole cities, kill millions ... and start World War HI. Hr a few numbing seconds his Cardiff street was mission control fir the apocalypse. {News of the World 23 November 1997: 43 [emphasis in the original]) Whilst the significance of the above sentiments could be played down by reference to the sensationalistic excesses of tabloid journalism, not too dissimilar sentiments are encountered in a broadsheet newspaper's account of the US's vulnerability to hackers: President Bill Clinton will announce plans this week to build ramparts against a new and invisible enemy threatening to spread more chaos in America than any conventional terrorist attack. He will unveil defence measures unprecedented in the history of human conflict to protect America from the potentially devastating peril posed by cyber warfare, in 8 Intmductwn which computer systems controlling airports, hospitals, traffic lights, banks and even nuclear weapons could be destroyed creating havoc It sounds like a science Action fantasy. But it is already happening. This month the Pentagon reported 'a series of systematic attacks' on its computer systems in an incident considered so ominous that the President was told it could be the work of Iraq's Saddam Hussein. The prospect of Saddam hiring a computer hacker to try to cripple American computer systems fills defence experts with horror: by a strange paradox, America's technological superiority and consequent dependence on computers, leave it more vulnerable than most countries to cyber attack. (Sunday Tuna 17 May 1998: 26) The feelings of vulnerability experienced by otherwise extremely powerful groups are caused by the potent mix of the anonymity of one's opponent (and the exaggerated perceptions such anonymity may then give rise to) and die paradox that one's own apparent strength and superiority may in fact prove to be an Achilles' heeL This combination of factors is portrayed as the new threat, coming quickly after a Gulf War which illustrated the apparent unassailability of the US's conventional military capability: Making things even more difficult for American defence experts is not knowing who the enemy is. Whether they are disgruntled Americans, Hamas terrorists or pariah dictators such as Saddam, the attackers could wage cyber warfare undetected on any laptop computer from the Sinai desert to Singapore, Just as exasperating for the government would be deciding how to deploy its vast military. *If you don't know who your enemy is, haw can you retaliate?' said one expert This makes cyber warfare the great equaliser, a cheap and effective weapon for any Third Worid rogue ■ state or small terrorist organisation wanting to wage war against a superpower — and win. All they might need is a few million dollars to hire a handful of 'cyber mercenaries* capable of penetrating supposedly secure government systems. {Sunday Times 17 May 1998: 26) One might expect that the use of Cold-War imagery and language would be restricted to those on the right of the political spectrum. However, in a book otherwise devoted to analysing the Internet as an extension of Western imperialist practices, somewhat reactionary language is used to describe the role of those opposing the dominant system: Cellular phone ... hackers can tap into any conversation and trace anyone almost anywhere. ... Online terrorism is not too far away and most of the early proponents of this sick art are hackers. While some hackers will be causing increasing havoc, other hackers will be tracking them down. (Sardar 1996: 23) m * Intmdnc&m 9 The disturbing prospect is that opposition to the microcybernetic tbhsumerist dictatorship will then find its only effective location deep underground, in the hands of zealots or fanatics who are content to destroy - without bothering to dialogue. And microcybernetic technology is particularly vulnerable to just such a sort of opposition; as we have seen, hackers :gcnerally>get caught only when they become brazen; and a determined band of computer rohilists, endowed with patience as well as skill, could even now tbe ensconced deep in the system, planting their bugs, worms and bombs. (Ravetz 1996: 52) ' The loss of the old certainties of the Cold War thus seems to affect Right and Left equally. The purported vulnerability to attack from outsiders used as part of I Id-War rhetoric is recycled here in the new context of the hi-tech worid. The . ity of phone-hackers to eavesdrop and trace people's whereabouts is implic-jtlv placed on the same level of concern as that given to the 'microcybernetic i sumenst dictatorship'. The ambivalence with which hackers are viewed I ressed earlier in this chapter resurfaces here when hacking is emotively iibed as a 'sick art1 whilst at the same time there is the explicit recognition of '□cicty's dependence upon such figures: 'while some hackers will be causing i leasing havoc, other hackers will be tracking them down1. Hooks and movies about hacking: specific examples of sjuedia coverage Popular media's fascmation with things subversive and spectacular ... has the * ^ unfortunate side effect that it hides the 'other side' of hacking, the side that involves skilled craftsmen who believe that a computer is more than a means -j of production - it is, among many other things an instrument for creation, communication, mastery, artistic expression and political empowerment (Hannemyr 1997: 2) Given the above acknowledgement that hackers are not averse to sensationalising their activity, the widespread sensationalising of hacking by those seeking to marginalise and stigmatise hackers is, for a variety of reasons to be explored at length in the rest or this book, potentially debilitating for a society struggling to come to terms with the full ramifications or the information society and all the potentially profound changes that concept may signify for our everyday lives.7 To ■■ illustrate briefly the media's role in sensationalising hacking, I describe below the non-fictional accounts of hacking and Hollywood's movie portrayals.8 Books There is frequently in non-Fictional accounts of hacking a rather curious mix of self-indulgent reliance upon seemingly trivial, tangential or simply mundane 10 Introduction details of different hacking episodes coupled with a simultaneous and frequent resort to hyperbolic description. Voluminous biographical details are provided on hackers and their dedicated but inevitably repetitive activities are described in exhaustive and somewhat exhausting detaiL In The Cuckoo's Egg, for example, we are given various descriptions of the author's girlfriend and seemingly irrelevant details of their shared Californian lifestyle, in conjunction with a narrative suffused with recourse to references about the excitement of detective work and the underlying menace of KGB spying In Cyberpunk the authors illustrate the use of hyperbolic imagery with their consideration of the issues at stake in the hiring of a hacker for security work 'But hire such a mean-spirited person? That would be like giving the Boston Strangler a maintenance job in a nursing-school dormitory' (Hairier and Markoff 1991: 40). An overtly sensationalist tendency is evident in a sample of the titles and subtitles of some of the best-known recent books from the spate of non-fictional and journalistic accounts of hacking published in recent years: The Cuckoo's Egg: Tracking a Spy through the Ma& of Computer Espionage (Stall 1989); Cyberpunk Outlaws and Hackers on the Computer Frontier (Hafher and Markoff 1991); The Hacker Crackdown: Law and Disorder on the Electronic Frontier (Sterling 1992); Approaching Zero: Data Crime ami the Computer Underworld (Claugh and Mungo 1992); Takedown: The Pursuit and Capture of Kevin Mitnick the World's most Notorious Cybsrcrimaial — by the Man who did it (Shimomura with MarkoET 1995); Masters of Deception: The Gang Thai Ruled Cyberspace (Quittner and Slatalla 1995); 77« Fugitive Game: Online with Kevin Mitnkk, the Inside Story of the Great Cyberthase (Liftman 1996); The Cyberthief and the Samurai: The True Story of Kclvi Mitnkk and theMan who Hunted him Down [Gadeii 1996); Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier (Dreyfus 1997); 77k Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Paulsen (Liftman 1997). The movies Various movies have used hacking for their subject matter including; War Games, Sneakers, Die Hard II, The Net, Hackers and Johnny Mnemonic. Whilst it is perhaps unsurprising that such a topical issue with particularly appealing subject matter (high technology, a subculture of apparently rebellious and anarchistic youths, the security of the nation, etc.) the movies' representations of hacking have had a disproportionately important influence upon the legislative response to the activity. Over-reliance upon fictional portrayals of hacking9 by the authorities has contributed to helping to create a generally fearful and ignorant atmosphere surrounding computer security, which has in turn led to the charge to be fully analysed subsequently that hackers have become the victims of a somewhat hysterical witch-hunt Introduction 11 ||||j£rt.WJeer hysteria had gripped the nation in 1990. Huge law enforcement fl&icflprts had been mounted against illusory threats. In Washington DC ... a gffebngressional committee had been formally presented with the plot-line of Ittthriller movie - DIE HARD II, in which hacker terrorists seize an airport ^computer - as if this Hollywood fantasy posed a clear and present danger to Bpthe American republic, A similar hacker thriller, WAR GAMES, had been jggmJ^ presented to Congress in the mid-1980s. Hysteria served no one's purposes, §§P*%V ■ ■! rid created a stampede of foolish and unenforceable laws likely to do more } 'ig:-harm than good. (Sterling 1991: 6) flSHffisl^fi^fictional movie portrayals of hacking have assumed the status of fact for ^^^^^^E^' members of the establishment has rather obvious and worrying implications r, ~- , .i^gi their fundamentally unrealistic nature: »&||?yrA Hollywood thriller film about hackers - is very much part and parcel of ^4&'" die Hollywood thriller film tradition. Hollywood is not in the business of ^^fefjburnalism or social analysis; Hollywood is in the mass entertainment busi-S^^^^:'?*'nesi I hope you wouldn't think that Hollywood gangsters or Hollywood ^^^^^r^V; 'cops bear much coherent resemblance to the quotidian dally lives of actual "gangsters and actual cops. Nevertheless, cops go to cop films and gangsters dsgHpa^13* j gff to gangster films, and sometimes gangsters (like George Raft) even become actors. Sometimes cops (like Joseph Wambaugh) become authors JV. ■" ¥ ' whose work is filmed. Criminals tend to be unrealistic and not very bright, o a lot of them have found compelling role models in deeply unrealistic .'icreen portrayals of dashing, snappily-dressed criminals. Teenagers are also .easily star-struck, so the film WAR GAMES was a major factor in the mid-j!80s boom of teenage computer-hacking But to go to a typical hacker movie • and think that the thrilling cyber-derring-do on the screen is a factual ' portrayal of the bleak, voyeuristic tedium of actual harking — well, don't do that. It would be silly. :! (Sterling: email interview) (Hackers themselves would seem to concur with Sterling's evaluation of the factual accuracy of hacker movies: *', In the recent round of "Netsploitation" films, the worst offender was mast likely Hackers. When we got the press photos we couldn't believe that Hollywood would actually think that hackers look like that We have never seen any hacker on rollerblades. In fact, we have never seen a hacker break sweat (Newton undated: website)