Hacker Crackdown by Bruce Sterling (i have read the book TXT) đź“•
You can put the book on disks and give the disks away, aslong as you don't take any money for it.
But this book is not public domain. You can't copyrightit in your own name. I own the copyright. Attempts to piratethis book and make money from selling it may involve you in aserious litigative snarl. Believe me, for the pittance you mightwring out of such an action, it's really not worth it. This bookdon't "belong" to you. In an odd but very genuine way, I feel itdoesn't "belong" to me, either. It's a book about the people ofcyberspace, and distributing it in this way is the best way Iknow to actually make this information available, freely andeasily, to all the people of cyberspace--including people faroutside the borders of the United States, who otherwise may neverhave a chance to see any edition of the book, and who may perhapslearn something useful from this strange story of distant,obscure, but por
Read free book «Hacker Crackdown by Bruce Sterling (i have read the book TXT) 📕» - read online or download for free at americanlibrarybooks.com
- Author: Bruce Sterling
- Performer: 055356370X
Read book online «Hacker Crackdown by Bruce Sterling (i have read the book TXT) 📕». Author - Bruce Sterling
Now our lecturer distributed copied diagrams of a typical LAN or “Local Area Network”, which happened to be out of Connecticut. ONE HUNDRED AND FIFTY-NINE desktop computers, each with its own peripherals. Three “file servers.” Five “star couplers” each with thirty-two ports. One sixteen-port coupler off in the corner office. All these machines talking to each other, distributing electronic mail, distributing software, distributing, quite possibly, criminal evidence. All linked by high-capacity fiber-optic cable. A bad guy—cops talk a lot about “bad guys”—might be lurking on PC #47 or #123 and distributing his ill doings onto some dupe’s “personal” machine in another office—or another floor—or, quite possibly, two or three miles away! Or, conceivably, the evidence might be “data-striped”—split up into meaningless slivers stored, one by one, on a whole crowd of different disk drives.
The lecturer challenged us for solutions. I for one was utterly clueless. As far as I could figure, the Cossacks were at the gate; there were probably more disks in this single building than were seized during the entirety of Operation Sundevil.
“Inside informant,” somebody said. Right. There’s always the human angle, something easy to forget when contemplating the arcane recesses of high technology. Cops are skilled at getting people to talk, and computer people, given a chair and some sustained attention, will talk about their computers till their throats go raw. There’s a case on record of a single question—“How’d you do it?”—eliciting a forty-five- minute videotaped confession from a computer criminal who not only completely incriminated himself but drew helpful diagrams.
Computer people talk. Hackers BRAG. Phone-phreaks talk PATHOLOGICALLY—why else are they stealing phone-codes, if not to natter for ten hours straight to their friends on an opposite seaboard? Computer-literate people do in fact possess an arsenal of nifty gadgets and techniques that would allow them to conceal all kinds of exotic skullduggery, and if they could only SHUT UP about it, they could probably get away with all manner of amazing information-crimes. But that’s just not how it works—or at least, that’s not how it’s worked SO FAR.
Most every phone-phreak ever busted has swiftly implicated his mentors, his disciples, and his friends. Most every white-collar computer-criminal, smugly convinced that his clever scheme is bulletproof, swiftly learns otherwise when, for the first time in his life, an actual no-kidding policeman leans over, grabs the front of his shirt, looks him right in the eye and says: “All right, ASSHOLE—you and me are going downtown!” All the hardware in the world will not insulate your nerves from these actual real-life sensations of terror and guilt.
Cops know ways to get from point A to point Z without thumbing through every letter in some smart-ass bad-guy’s alphabet. Cops know how to cut to the chase. Cops know a lot of things other people don’t know.
Hackers know a lot of things other people don’t know, too. Hackers know, for instance, how to sneak into your computer through the phonelines. But cops can show up RIGHT UP YOUR DOORSTEP and carry off YOU and your computer in separate steel boxes. A cop interested in hackers can grab them and grill them. A hacker interested in cops has to depend on hearsay, underground legends, and what cops are willing to publicly reveal. And the Secret Service didn’t get named “the SECRET Service” because they blab a lot.
Some people, our lecturer informed us, were under the mistaken impression that it was “impossible” to tap a fiber-optic line. Well, he announced, he and his son had just whipped up a fiber-optic tap in his workshop at home. He passed it around the audience, along with a circuit-covered LAN plug-in card so we’d all recognize one if we saw it on a case. We all had a look.
The tap was a classic “Goofy Prototype”—a thumb-length rounded metal cylinder with a pair of plastic brackets on it. From one end dangled three thin black cables, each of which ended in a tiny black plastic cap. When you plucked the safety-cap off the end of a cable, you could see the glass fiber—no thicker than a pinhole.
Our lecturer informed us that the metal cylinder was a “wavelength division multiplexer.” Apparently, what one did was to cut the fiber-optic cable, insert two of the legs into the cut to complete the network again, and then read any passing data on the line by hooking up the third leg to some kind of monitor. Sounded simple enough. I wondered why nobody had thought of it before. I also wondered whether this guy’s son back at the workshop had any teenage friends.
We had a break. The guy sitting next to me was wearing a giveaway baseball cap advertising the Uzi submachine gun. We had a desultory chat about the merits of Uzis. Long a favorite of the Secret Service, it seems Uzis went out of fashion with the advent of the Persian Gulf War, our Arab allies taking some offense at Americans toting Israeli weapons. Besides, I was informed by another expert, Uzis jam. The equivalent weapon of choice today is the Heckler & Koch, manufactured in Germany.
The guy with the Uzi cap was a forensic photographer. He also did a lot of photographic surveillance work in computer crime cases. He used to, that is, until the firings in Phoenix. He was now a private investigator and, with his wife, ran a photography salon specializing in weddings and portrait photos. At—one must repeat—a considerable rise in income.
He was still FCIC. If you were FCIC, and you needed to talk to an expert about forensic photography, well, there he was, willing and able. If he hadn’t shown up, people would have missed him.
Our lecturer had raised the point that preliminary investigation of a computer system is vital before any seizure is undertaken. It’s vital to understand how many machines are in there, what kinds there are, what kind of operating system they use, how many people use them, where the actual data itself is stored. To simply barge into an office demanding “all the computers” is a recipe for swift disaster.
This entails some discreet inquiries beforehand. In fact, what it entails is basically undercover work. An intelligence operation. SPYING, not to put too fine a point on it.
In a chat after the lecture, I asked an attendee whether “trashing” might work.
I received a swift briefing on the theory and practice of “trash covers.” Police “trash covers,” like “mail covers” or like wiretaps, require the agreement of a judge. This obtained, the “trashing” work of cops is just like that of hackers, only more so and much better organized. So much so, I was informed, that mobsters in Phoenix make extensive use of locked garbage cans picked up by a specialty high-security trash company.
In one case, a tiger team of Arizona cops had trashed a local residence for four months. Every week they showed up on the municipal garbage truck, disguised as garbagemen, and carried the contents of the suspect cans off to a shade tree, where they combed through the garbage—a messy task, especially considering that one of the occupants was undergoing kidney dialysis. All useful documents were cleaned, dried and examined. A discarded typewriter-ribbon was an especially valuable source of data, as its long one-strike ribbon of film contained the contents of every letter mailed out of the house. The letters were neatly retyped by a police secretary equipped with a large desk-mounted magnifying glass.
There is something weirdly disquieting about the whole subject of “trashing”—an unsuspected and indeed rather disgusting mode of deep personal vulnerability. Things that we pass by every day, that we take utterly for granted, can be exploited with so little work. Once discovered, the knowledge of these vulnerabilities tend to spread.
Take the lowly subject of MANHOLE COVERS. The humble manhole cover reproduces many of the dilemmas of computer-security in miniature. Manhole covers are, of course, technological artifacts, access-points to our buried urban infrastructure. To the vast majority of us, manhole covers are invisible. They are also vulnerable. For many years now, the Secret Service has made a point of caulking manhole covers along all routes of the Presidential motorcade. This is, of course, to deter terrorists from leaping out of underground ambush or, more likely, planting remote-control car-smashing bombs beneath the street.
Lately, manhole covers have seen more and more criminal exploitation, especially in New York City. Recently, a telco in New York City discovered that a cable television service had been sneaking into telco manholes and installing cable service alongside the phonelines—WITHOUT PAYING ROYALTIES. New York companies have also suffered a general plague of (a) underground copper cable theft; (b) dumping of garbage, including toxic waste, and (c) hasty dumping of murder victims.
Industry complaints reached the ears of an innovative New England industrial-security company, and the result was a new product known as “the Intimidator,” a thick titanium-steel bolt with a precisely machined head that requires a special device to unscrew. All these “keys” have registered serial numbers kept on file with the manufacturer. There are now some thousands of these “Intimidator” bolts being sunk into American pavements wherever our President passes, like some macabre parody of strewn roses. They are also spreading as fast as steel dandelions around US military bases and many centers of private industry.
Quite likely it has never occurred to you to peer under a manhole cover, perhaps climb down and walk around down there with a flashlight, just to see what it’s like. Formally speaking, this might be trespassing, but if you didn’t hurt anything, and didn’t make an absolute habit of it, nobody would really care. The freedom to sneak under manholes was likely a freedom you never intended to exercise.
You now are rather less likely to have that freedom at all. You may never even have missed it until you read about it here, but if you’re in New York City it’s gone, and elsewhere it’s likely going. This is one of the things that crime, and the reaction to crime, does to us.
The tenor of the meeting now changed as the Electronic Frontier Foundation arrived. The EFF, whose personnel and history will be examined in detail in the next chapter, are a pioneering civil liberties group who arose in direct response to the Hacker Crackdown of 1990.
Now Mitchell Kapor, the Foundation’s president, and Michael Godwin, its chief attorney, were confronting federal law enforcement MANO A MANO for the first time ever. Ever alert to the manifold uses of publicity, Mitch Kapor and Mike Godwin had brought their own journalist in tow: Robert Draper, from Austin, whose recent well-received book about ROLLING STONE magazine was still on the stands. Draper was on assignment for TEXAS MONTHLY.
The Steve Jackson/EFF civil lawsuit against the Chicago Computer Fraud and Abuse Task Force was a matter of considerable regional interest in Texas. There were now two Austinite journalists here on the case. In fact, counting Godwin (a former Austinite and former journalist) there were three of us. Lunch was like Old Home Week.
Later, I took Draper up to my hotel room. We had a long frank talk about the case, networking earnestly like a miniature freelance-journo version of the FCIC: privately confessing the numerous blunders of journalists covering the story, and trying hard to figure out who was who and what the hell was really going on out there. I showed Draper everything I had dug out of the Hilton trashcan. We pondered the ethics of “trashing” for a while, and agreed that they were dismal. We also agreed that finding a SPRINT bill on your
Comments (0)