American library books ยป Computers ยป Hacker Crackdown by Bruce Sterling (i have read the book TXT) ๐Ÿ“•

Read book online ยซHacker Crackdown by Bruce Sterling (i have read the book TXT) ๐Ÿ“•ยป.   Author   -   Bruce Sterling



1 ... 37 38 39 40 41 42 43 44 45 ... 54
Go to page:
tra) Work (g work)

 

Electronic Frontier Foundation (g eff) Computers, Freedom & Privacy (g cfp) Computer Professionals for Social Responsibility (g cpsr)

 

Social - Political - Humanities

โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“

Aging (g gray) AIDS (g aids) Amnesty International (g amnesty) Archives (g arc) Berkeley (g berk) Buddhist (g wonderland) Christian (g cross) Couples (g couples) Current Events (g curr) Dreams (g dream) Drugs (g dru) East Coast (g east) Emotional Health**** (g private) Erotica (g eros) Environment (g env) Firearms (g firearms) First Amendment (g first) Fringes of Reason (g fringes) Gay (g gay) Gay (Private)# (g gaypriv) Geography (g geo) German (g german) Gulf War (g gulf) Hawaii (g aloha) Health (g heal) History (g hist) Holistic (g holi) Interview (g inter) Italian (g ital) Jewish (g jew) Liberty (g liberty) Mind (g mind) Miscellaneous (g misc) Men on the WELL** (g mow) Network Integration (g origin) Nonprofits (g non) North Bay (g north) Northwest (g nw) Pacific Rim (g pacrim) Parenting (g par) Peace (g pea) Peninsula (g pen) Poetry (g poetry) Philosophy (g phi) Politics (g pol) Psychology (g psy) Psychotherapy (g therapy) Recovery## (g recovery) San Francisco (g sanfran) Scams (g scam) Sexuality (g sex) Singles (g singles) Southern (g south) Spanish (g spanish) Spirituality (g spirit) Tibet (g tibet) Transportation (g transport) True Confessions (g tru) Unclear (g unclear) WELL Writerโ€™s Workshop*** (g www) Whole Earth (g we) Women on the WELL* (g wow) Words (g words) Writers (g wri)

 

**** Private Conference - mail wooly for entry ***Private conference - mail sonia for entry ** Private conference - mail flash for entry * Private conference - mail reva for entry # Private Conference - mail hudu for entry ## Private Conference - mail dhawk for entry

 

Arts - Recreation - Entertainment

โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€”

ArtCom Electronic Net (g acen) Audio-Videophilia (g aud) Bicycles (g bike) Bay Area Tonight** (g bat) Boating (g wet) Books (g books) CDโ€™s (g cd) Comics (g comics) Cooking (g cook) Flying (g flying) Fun (g fun) Games (g games) Gardening (g gard) Kids (g kids) Nightowls* (g owl) Jokes (g jokes) MIDI (g midi) Movies (g movies) Motorcycling (g ride) Motoring (g car) Music (g mus) On Stage (g onstage) Pets (g pets) Radio (g rad) Restaurant (g rest) Science Fiction (g sf) Sports (g spo) Star Trek (g trek) Television (g tv) Theater (g theater) Weird (g weird) Zines/Factsheet Five (g f5)

 

Open from midnight to 6am * Updated daily

 

Grateful Dead

โ€“โ€“โ€“โ€“-

Grateful Dead (g gd) Deadplan* (g dp) Deadlit (g deadlit) Feedback (g feedback) GD Hour (g gdh) Tapes (g tapes) Tickets (g tix) Tours (g tours)

 

* Private conference - mail tnf for entry

 

Computers

โ€“โ€“โ€“โ€”

AI/Forth/Realtime (g realtime) Amiga (g amiga) Apple (g app) Computer Books (g cbook) Art & Graphics (g gra) Hacking (g hack) HyperCard (g hype) IBM PC (g ibm) LANs (g lan) Laptop (g lap) Macintosh (g mac) Mactech (g mactech) Microtimes (g microx) Muchomedia (g mucho) NeXt (g next) OS/2 (g os2) Printers (g print) Programmerโ€™s Net (g net) Siggraph (g siggraph) Software Design (g sdc) Software/Programming (g software) Software Support (g ssc) Unix (g unix) Windows (g windows) Word Processing (g word)

 

Technical - Communications

โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“โ€“-

Bioinfo (g bioinfo) Info (g boing) Media (g media) NAPLPS (g naplps) Netweaver (g netweaver) Networld (g networld) Packet Radio (g packet) Photography (g pho) Radio (g rad) Science (g science) Technical Writers (g tec) Telecommunications (g tele) Usenet (g usenet) Video (g vid) Virtual Reality (g vr)

 

The WELL Itself

โ€“โ€“โ€“โ€“โ€“

Deeper (g deeper) Entry (g ent) General (g gentech) Help (g help) Hosts (g hosts) Policy (g policy) System News (g news) Test (g test)

 

The list itself is dazzling, bringing to the untutored eye a dizzying impression of a bizarre milieu of mountain-climbing Hawaiian holistic photographers trading true-life confessions with bisexual word-processing Tibetans.

But this confusion is more apparent than real. Each of these conferences was a little cyberspace world in itself, comprising dozens and perhaps hundreds of sub-topics. Each conference was commonly frequented by a fairly small, fairly like-minded community of perhaps a few dozen people. It was humanly impossible to encompass the entire Well (especially since access to the Wellโ€™s mainframe computer was billed by the hour). Most longtime users contented themselves with a few favorite topical neighborhoods, with the occasional foray elsewhere for a taste of exotica. But especially important news items, and hot topical debates, could catch the attention of the entire Well community.

Like any community, the Well had its celebrities, and John Perry Barlow, the silver-tongued and silver-modemed lyricist of the Grateful Dead, ranked prominently among them. It was here on the Well that Barlow posted his true-life tale of computer-crime encounter with the FBI.

The story, as might be expected, created a great stir. The Well was already primed for hacker controversy. In December 1989, HARPERโ€™S magazine had hosted a debate on the Well about the ethics of illicit computer intrusion. While over forty various computer-mavens took part, Barlow proved a star in the debate. So did โ€œAcid Phreakโ€ and โ€œPhiber Optik,โ€ a pair of young New York hacker-phreaks whose skills at telco switching-station intrusion were matched only by their apparently limitless hunger for fame. The advent of these two boldly swaggering outlaws in the precincts of the Well created a sensation akin to that of Black Panthers at a cocktail party for the radically chic.

Phiber Optik in particular was to seize the day in 1990. A devotee of the 2600 circle and stalwart of the New York hackersโ€™ group โ€œMasters of Deception,โ€ Phiber Optik was a splendid exemplar of the computer intruder as committed dissident. The eighteen-year-old Optik, a high-school dropout and part-time computer repairman, was young, smart, and ruthlessly obsessive, a sharp-dressing, sharp-talking digital dude who was utterly and airily contemptuous of anyoneโ€™s rules but his own. By late 1991, Phiber Optik had appeared in HARPERโ€™S, ESQUIRE, THE NEW YORK TIMES, in countless public debates and conventions, even on a television show hosted by Geraldo Rivera.

Treated with gingerly respect by Barlow and other Well mavens, Phiber Optik swiftly became a Well celebrity. Strangely, despite his thorny attitude and utter singlemindedness, Phiber Optik seemed to arouse strong protective instincts in most of the people who met him. He was great copy for journalists, always fearlessly ready to swagger, and, better yet, to actually DEMONSTRATE some off-the-wall digital stunt. He was a born media darling.

Even cops seemed to recognize that there was something peculiarly unworldly and uncriminal about this particular troublemaker. He was so bold, so flagrant, so young, and so obviously doomed, that even those who strongly disapproved of his actions grew anxious for his welfare, and began to flutter about him as if he were an endangered seal pup.

In January 24, 1990 (nine days after the Martin Luther King Day Crash), Phiber Optik, Acid Phreak, and a third NYC scofflaw named Scorpion were raided by the Secret Service. Their computers went out the door, along with the usual blizzard of papers, notebooks, compact disks, answering machines, Sony Walkmans, etc. Both Acid Phreak and Phiber Optik were accused of having caused the Crash.

The mills of justice ground slowly. The case eventually fell into the hands of the New York State Police. Phiber had lost his machinery in the raid, but there were no charges filed against him for over a year. His predicament was extensively publicized on the Well, where it caused much resentment for police tactics. Itโ€™s one thing to merely hear about a hacker raided or busted; itโ€™s another to see the police attacking someone youโ€™ve come to know personally, and who has explained his motives at length. Through the HARPERโ€™S debate on the Well, it had become clear to the Wellbeings that Phiber Optik was not in fact going to โ€œhurt anything.โ€ In their own salad days, many Wellbeings had tasted tear-gas in pitched street-battles with police. They were inclined to indulgence for acts of civil disobedience.

Wellbeings were also startled to learn of the draconian thoroughness of a typical hacker search-and-seizure. It took no great stretch of imagination for them to envision themselves suffering much the same treatment.

As early as January 1990, sentiment on the Well had already begun to sour, and people had begun to grumble that โ€œhackersโ€ were getting a raw deal from the ham-handed powers-that-be. The resultant issue of HARPERโ€™S magazine posed the question as to whether computer-intrusion was a โ€œcrimeโ€ at all. As Barlow put it later: โ€œIโ€™ve begun to wonder if we wouldnโ€™t also regard spelunkers as desperate criminals if AT&T owned all the caves.โ€

In February 1991, more than a year after the raid on his home, Phiber Optik was finally arrested, and was charged with first-degree Computer Tampering and Computer Trespass, New York state offenses. He was also charged with a theft-of-service misdemeanor, involving a complex free-call scam to a 900 number. Phiber Optik pled guilty to the misdemeanor charge, and was sentenced to 35 hours of community service.

This passing harassment from the unfathomable world of straight people seemed to bother Optik himself little if at all. Deprived of his computer by the January search-and-seizure, he simply bought himself a portable computer so the cops could no longer monitor the phone where he lived with his Mom, and he went right on with his depredations, sometimes on live radio or in front of television cameras.

The crackdown raid may have done little to dissuade Phiber Optik, but its galling affect on the Wellbeings was profound. As 1990 rolled on, the slings and arrows mounted: the Knight Lightning raid, the Steve Jackson raid, the nation-spanning Operation Sundevil. The rhetoric of law enforcement made it clear that there was, in fact, a concerted crackdown on hackers in progress.

The hackers of the Hackers Conference, the Wellbeings, and their ilk, did not really mind the occasional public misapprehension of โ€œhackingโ€; if anything, this membrane of differentiation from straight society made the โ€œcomputer communityโ€ feel different, smarter, better. They had never before been confronted, however, by a concerted vilification campaign.

Barlowโ€™s central role in the counter-struggle was one of the major anomalies of 1990. Journalists investigating the controversy often stumbled over the truth about Barlow, but they commonly dusted themselves off and hurried on as if nothing had happened. It was as if it were TWO MUCH TO BELIEVE that a 1960s freak from the Grateful Dead had taken on a federal law enforcement operation head-to-head and ACTUALLY SEEMED TO BE WINNING!

Barlow had no easily detectable power-base for a political struggle of this kind. He had no formal legal or technical credentials. Barlow was, however, a computer networker of truly stellar brilliance. He had a poetโ€™s gift of concise, colorful phrasing. He also had a journalistโ€™s shrewdness, an off-the-wall, self-deprecating wit, and a phenomenal wealth of simple personal charm.

The kind of influence Barlow possessed is fairly common currency in literary, artistic, or musical circles. A gifted critic can wield great artistic influence simply through defining the temper of the times, by coining the catch-phrases and the terms of debate that become the common currency of the period. (And as it happened, Barlow WAS a part-time art critic, with a special fondness for the Western art of Frederic Remington.)

Barlow was the first commentator to adopt William Gibsonโ€™s striking science-fictional term โ€œcyberspaceโ€ as a synonym for the present-day nexus of computer and telecommunications networks. Barlow was insistent that cyberspace should be regarded as a qualitatively new world, a โ€œfrontier.โ€ According to Barlow, the world of electronic communications, now made visible through the computer screen, could no longer be usefully regarded as just a tangle of high-tech wiring. Instead, it had become a PLACE, cyberspace, which demanded a new set of metaphors, a new set of rules and behaviors. The term, as Barlow employed it, struck a useful chord, and this concept of cyberspace was picked

1 ... 37 38 39 40 41 42 43 44 45 ... 54
Go to page:

Free e-book: ยซHacker Crackdown by Bruce Sterling (i have read the book TXT) ๐Ÿ“•ยป   -   read online now on website american library books (americanlibrarybooks.com)

Comments (0)

There are no comments yet. You can be the first!
Add a comment