Hacker Crackdown by Bruce Sterling (i have read the book TXT) 📕
You can put the book on disks and give the disks away, aslong as you don't take any money for it.
But this book is not public domain. You can't copyrightit in your own name. I own the copyright. Attempts to piratethis book and make money from selling it may involve you in aserious litigative snarl. Believe me, for the pittance you mightwring out of such an action, it's really not worth it. This bookdon't "belong" to you. In an odd but very genuine way, I feel itdoesn't "belong" to me, either. It's a book about the people ofcyberspace, and distributing it in this way is the best way Iknow to actually make this information available, freely andeasily, to all the people of cyberspace--including people faroutside the borders of the United States, who otherwise may neverhave a chance to see any edition of the book, and who may perhapslearn something useful from this strange story of distant,obscure, but por
Read free book «Hacker Crackdown by Bruce Sterling (i have read the book TXT) 📕» - read online or download for free at americanlibrarybooks.com
- Author: Bruce Sterling
- Performer: 055356370X
Read book online «Hacker Crackdown by Bruce Sterling (i have read the book TXT) 📕». Author - Bruce Sterling
Godwin, however, was uniquely, almost magically, qualified to carry Jackson’s case to the outside world. Godwin was a board enthusiast, a science fiction fan, a former journalist, a computer salesman, a lawyer-to-be, and an Austinite. Through a coincidence yet more amazing, in his last year of law school Godwin had specialized in federal prosecutions and criminal procedure. Acting entirely on his own, Godwin made up a press packet which summarized the issues and provided useful contacts for reporters. Godwin’s behind-the-scenes effort (which he carried out mostly to prove a point in a local board debate) broke the story again in the AUSTIN AMERICAN-STATESMAN and then in NEWSWEEK.
Life was never the same for Mike Godwin after that. As he joined the growing civil liberties debate on the Internet, it was obvious to all parties involved that here was one guy who, in the midst of complete murk and confusion, GENUINELY UNDERSTOOD EVERYTHING HE WAS TALKING ABOUT. The disparate elements of Godwin’s dilettantish existence suddenly fell together as neatly as the facets of a Rubik’s cube.
When the time came to hire a full-time EFF staff attorney, Godwin was the obvious choice. He took the Texas bar exam, left Austin, moved to Cambridge, became a full-time, professional, computer civil libertarian, and was soon touring the nation on behalf of EFF, delivering well-received addresses on the issues to crowds as disparate as academics, industrialists, science fiction fans, and federal cops.
Michael Godwin is currently the chief legal counsel of the Electronic Frontier Foundation in Cambridge, Massachusetts.
Another early and influential participant in the controversy was Dorothy Denning. Dr. Denning was unique among investigators of the computer underground in that she did not enter the debate with any set of politicized motives. She was a professional cryptographer and computer security expert whose primary interest in hackers was SCHOLARLY. She had a B.A. and M.A. in mathematics, and a Ph.D. in computer science from Purdue. She had worked for SRI International, the California think-tank that was also the home of computer-security maven Donn Parker, and had authored an influential text called CRYPTOGRAPHY AND DATA SECURITY. In 1990, Dr. Denning was working for Digital Equipment Corporation in their Systems Reseach Center. Her husband, Peter Denning, was also a computer security expert, working for NASA’s Research Institute for Advanced Computer Science. He had edited the well-received COMPUTERS UNDER ATTACK: INTRUDERS, WORMS AND VIRUSES.
Dr. Denning took it upon herself to contact the digital underground, more or less with an anthropological interest. There she discovered that these computer-intruding hackers, who had been characterized as unethical, irresponsible, and a serious danger to society, did in fact have their own subculture and their own rules. They were not particularly well-considered rules, but they were, in fact, rules. Basically, they didn’t take money and they didn’t break anything.
Her dispassionate reports on her researches did a great deal to influence serious-minded computer professionals—the sort of people who merely rolled their eyes at the cyberspace rhapsodies of a John Perry Barlow.
For young hackers of the digital underground, meeting Dorothy Denning was a genuinely mindboggling experience. Here was this neatly coiffed, conservatively dressed, dainty little personage, who reminded most hackers of their moms or their aunts. And yet she was an IBM systems programmer with profound expertise in computer architectures and high-security information flow, who had personal friends in the FBI and the National Security Agency.
Dorothy Denning was a shining example of the American mathematical intelligentsia, a genuinely brilliant person from the central ranks of the computer-science elite. And here she was, gently questioning twenty-year-old hairy-eyed phone-phreaks over the deeper ethical implications of their behavior.
Confronted by this genuinely nice lady, most hackers sat up very straight and did their best to keep the anarchy-file stuff down to a faint whiff of brimstone. Nevertheless, the hackers WERE in fact prepared to seriously discuss serious issues with Dorothy Denning. They were willing to speak the unspeakable and defend the indefensible, to blurt out their convictions that information cannot be owned, that the databases of governments and large corporations were a threat to the rights and privacy of individuals.
Denning’s articles made it clear to many that “hacking” was not simple vandalism by some evil clique of psychotics. “Hacking” was not an aberrant menace that could be charmed away by ignoring it, or swept out of existence by jailing a few ringleaders. Instead, “hacking” was symptomatic of a growing, primal struggle over knowledge and power in the age of information.
Denning pointed out that the attitude of hackers were at least partially shared by forward-looking management theorists in the business community: people like Peter Drucker and Tom Peters. Peter Drucker, in his book THE NEW REALITIES, had stated that “control of information by the government is no longer possible. Indeed, information is now transnational. Like money, it has no ‘fatherland.’”
And management maven Tom Peters had chided large corporations for uptight, proprietary attitudes in his bestseller, THRIVING ON CHAOS: “Information hoarding, especially by politically motivated, power-seeking staffs, had been commonplace throughout American industry, service and manufacturing alike. It will be an impossible millstone aroung the neck of tomorrow’s organizations.”
Dorothy Denning had shattered the social membrane of the digital underground. She attended the Neidorf trial, where she was prepared to testify for the defense as an expert witness. She was a behind-the-scenes organizer of two of the most important national meetings of the computer civil libertarians. Though not a zealot of any description, she brought disparate elements of the electronic community into a surprising and fruitful collusion.
Dorothy Denning is currently the Chair of the Computer Science Department at Georgetown University in Washington, DC.
There were many stellar figures in the civil libertarian community. There’s no question, however, that its single most influential figure was Mitchell D. Kapor. Other people might have formal titles, or governmental positions, have more experience with crime, or with the law, or with the arcanities of computer security or constitutional theory. But by 1991 Kapor had transcended any such narrow role. Kapor had become “Mitch.”
Mitch had become the central civil-libertarian ad-hocrat. Mitch had stood up first, he had spoken out loudly, directly, vigorously and angrily, he had put his own reputation, and his very considerable personal fortune, on the line. By mid-‘91 Kapor was the best-known advocate of his cause and was known PERSONALLY by almost every single human being in America with any direct influence on the question of civil liberties in cyberspace. Mitch had built bridges, crossed voids, changed paradigms, forged metaphors, made phone-calls and swapped business cards to such spectacular effect that it had become impossible for anyone to take any action in the “hacker question” without wondering what Mitch might think—and say—and tell his friends.
The EFF had simply NETWORKED the situation into an entirely new status quo. And in fact this had been EFF’s deliberate strategy from the beginning. Both Barlow and Kapor loathed bureaucracies and had deliberately chosen to work almost entirely through the electronic spiderweb of “valuable personal contacts.”
After a year of EFF, both Barlow and Kapor had every reason to look back with satisfaction. EFF had established its own Internet node, “eff.org,” with a well-stocked electronic archive of documents on electronic civil rights, privacy issues, and academic freedom. EFF was also publishing EFFector, a quarterly printed journal, as well as EFFector Online, an electronic newsletter with over 1,200 subscribers. And EFF was thriving on the Well.
EFF had a national headquarters in Cambridge and a full-time staff. It had become a membership organization and was attracting grassroots support. It had also attracted the support of some thirty civil-rights lawyers, ready and eager to do pro bono work in defense of the Constitution in Cyberspace.
EFF had lobbied successfully in Washington and in Massachusetts to change state and federal legislation on computer networking. Kapor in particular had become a veteran expert witness, and had joined the Computer Science and Telecommunications Board of the National Academy of Science and Engineering.
EFF had sponsored meetings such as “Computers, Freedom and Privacy” and the CPSR Roundtable. It had carried out a press offensive that, in the words of EFFector, “has affected the climate of opinion about computer networking and begun to reverse the slide into ‘hacker hysteria’ that was beginning to grip the nation.”
It had helped Craig Neidorf avoid prison.
And, last but certainly not least, the Electronic Frontier Foundation had filed a federal lawsuit in the name of Steve Jackson, Steve Jackson Games Inc., and three users of the Illuminati bulletin board system. The defendants were, and are, the United States Secret Service, William Cook, Tim Foley, Barbara Golden and Henry Kleupfel.
The case, which is in pre-trial procedures in an Austin federal court as of this writing, is a civil action for damages to redress alleged violations of the First and Fourth Amendments to the United States Constitution, as well as the Privacy Protection Act of 1980 (42 USC 2000aa et seq.), and the Electronic Communications Privacy Act (18 USC 2510 et seq and 2701 et seq).
EFF had established that it had credibility. It had also established that it had teeth.
In the fall of 1991 I travelled to Massachusetts to speak personally with Mitch Kapor. It was my final interview for this book.
The city of Boston has always been one of the major intellectual centers of the American republic. It is a very old city by American standards, a place of skyscrapers overshadowing seventeenth-century graveyards, where the high-tech start-up companies of Route 128 co-exist with the hand-wrought pre-industrial grace of “Old Ironsides,” the USS CONSTITUTION.
The Battle of Bunker Hill, one of the first and bitterest armed clashes of the American Revolution, was fought in Boston’s environs. Today there is a monumental spire on Bunker Hill, visible throughout much of the city. The willingness of the republican revolutionaries to take up arms and fire on their oppressors has left a cultural legacy that two full centuries have not effaced. Bunker Hill is still a potent center of American political symbolism, and the Spirit of ‘76 is still a potent image for those who seek to mold public opinion.
Of course, not everyone who wraps himself in the flag is necessarily a patriot. When I visited the spire in September 1991, it bore a huge, badly-erased, spray-can grafitto around its bottom reading “BRITS OUT—IRA PROVOS.” Inside this hallowed edifice was a glass-cased diorama of thousands of tiny toy soldiers, rebels and redcoats, fighting and dying over the green hill, the riverside marshes, the rebel trenchworks. Plaques indicated the movement of troops, the shiftings of strategy. The Bunker Hill Monument is occupied at its very center by the toy soldiers of a military war-game simulation.
The Boston metroplex is a place of great universities, prominent among the Massachusetts Institute of Technology, where the term “computer hacker” was first coined. The Hacker Crackdown of 1990 might be interpreted as a political struggle among American cities: traditional strongholds of longhair intellectual liberalism, such as Boston, San Francisco, and Austin, versus the bare-knuckle industrial pragmatism of Chicago and Phoenix (with Atlanta and New York wrapped in internal struggle).
The headquarters of the Electronic Frontier Foundation is on 155 Second Street in Cambridge, a Bostonian suburb north of the River Charles. Second Street has weedy sidewalks of dented, sagging brick and elderly cracked asphalt; large street-signs warn “NO PARKING DURING DECLARED SNOW EMERGENCY.” This is an old area of modest manufacturing industries; the EFF is catecorner from the Greene Rubber Company. EFF’s building is two stories of red brick; its large wooden windows feature gracefully arched tops and stone sills.
The glass window beside the Second Street entrance bears three sheets of neatly laser-printed paper, taped against the
Comments (0)