Underground by Suelette Dreyfus (top rated books of all time txt) š
The critics have been good to `Underground', for which I am verygrateful. But the best praise came from two of the hackers detailed inthe book. Surprising praise, because while the text is free of thenarrative moralising that plague other works, the selection of materialis often very personal and evokes mixed sympathies. One of the hackers,Anthrax dropped by my office to say `Hi'. Out of the blue, he said witha note of amazement, `When I read those chapters, it was so real, as ifyou had been right there inside my head'. Not long after Par, half aworld away, and with a real tone of bewildered incredulity in his voicemade exactly the same observation. For a writer, it just doesn't get anybetter than that.
By releasing this book for free on the Net, I'm hoping more peoplewill not only enjoy the story of how the international computerunderground rose to power, but also make
Read free book Ā«Underground by Suelette Dreyfus (top rated books of all time txt) šĀ» - read online or download for free at americanlibrarybooks.com
- Author: Suelette Dreyfus
- Performer: 1863305955
Read book online Ā«Underground by Suelette Dreyfus (top rated books of all time txt) šĀ». Author - Suelette Dreyfus
Wandiiās lawyers told the media that this showcase was tantamount to a state trial. It was the first major hacking case under the new legislation which didnāt involve disgruntled employees. While having no different legal status from a normal trial, the term state trial suggested a greater degree of official wrathāthe kind usually reserved for cases of treason.
On 22 February 1993, within two months of Electronās decision to turn Crown witness against Phoenix and Nom, the three 8lgm hackers stood in the dock at Southwark Crown Court in South London to enter pleas in their own case.
In the dim winter light, Southwark couldnāt look less appealing, but that didnāt deter the crowds. The courtroom was going to be packed, just as Bow Street had been. Scotland Yard detectives were turning out in force. The crowd shuffled toward Room 12.
The prosecution told the media they had about 800 computer disks full of evidence and court materials. If all the data had been printed out on A4 paper, the stack would tower more than 40 metres in the air, they said. Considering the massive amount of evidence being heaved, rolled and tugged through the building by teams of legal eagles, the choice of locationāon the fifth floorāproved to be a challenge.
Standing in the dock next to Wandii, Pad and Gandalf pleaded guilty to two computer conspiracy charges: conspiring to dishonestly obtain telecommunications services, and conspiring to cause unauthorised modification to computer material. Pad also pleaded guilty to a third charge: causing damage to a computer. This last charge related to the almost a quarter of a million pounds worth of `damageā to the Central London Polytechnic. Unlike the Australiansā case, none of the British hackers faced charges about specific sites such as NASA.
Pad and Gandalf pleaded guilty because they didnāt think they had much choice. Their lawyers told them that, in light of the evidence, denying their guilt was simply not a realistic option. Better to throw yourself on the mercy of the court, they advised. As if to underline the point, Gandalfās lawyer had told him after a meeting at the end of 1992, `Iād like to wish you a happy Christmas, but I donāt think itās going to be oneā.
Wandiiās lawyers disagreed. Standing beside his fellow hackers, Wandii pleaded not guilty to three conspiracy charges: plotting to gain unauthorised access to computers, conspiring to make unauthorised modifications to computer material, and conspiring to obtain telecommunications services dishonestly. His defence team was going to argue that he was addicted to computer hacking and that, as a result of this addiction, he was not able to form the criminal intent necessary to be convicted.
Pad thought Wandiiās case was on shaky ground. Addiction didnāt seem a plausible defence to him, and he noticed Wandii looked very nervous in court just after his plea.
Pad and Gandalf left London after their court appearance, returning to the north to prepare for their sentencing hearings, and to watch the progress of Wandiiās case through the eyes of the media.
They werenāt disappointed. It was a star-studded show. The media revved itself up for a feeding frenzy and the prosecution team, headed by James Richardson, knew how to feed the pack. He zeroed in on Wandii, telling the court how the schoolboy `was tapping into offices at the EC in Luxembourg and even the experts were worried. He caused havoc at universities all around the worldā.4 To do this, Wandii had used a simple BBC Micro computer, a Christmas present costing [sterling]200.
The hacking didnāt stop at European Communityās computer, Richardson told the eager crowd of journalists. Wandii had hacked Lloydās, The Financial Times and Leeds University. At The Financial Times machine, Wandiiās adventures had upset the smooth operations of the FTSE 100 share index, known in the City as `footsieā. The hacker installed a scanning program in the FTās network, resulting in one outgoing call made every second. The upshot of Wandiiās intrusion: a [sterling]704 bill, the deletion of an important file and a management decision to shut down a key system. With the precision of a banker, FT computer boss Tony Johnson told the court that the whole incident had cost his organisation [sterling]24871.
But the FT hack paled next to the prosecutionās real trump card: The European Organisation for the Research and Treatment of Cancer in Brussels. They had been left with a [sterling]10000 phone bill as a result of a scanner Wandii left on its machine,5 the court was told. The scanner had left a trail of 50000 calls, all documented on a 980-page phone bill.
The scanner resulted in the system going down for a day, EORTC information systems project manager Vincent Piedboeuf, told the jury. He went on to explain that the centre needed its system to run 24 hours a day, so surgeons could register patients. The centreās database was the focal point for pharmaceutical companies, doctors and research centresāall coordinating their efforts in fighting the disease.
For the media, the case was headline heaven. `Teenage computer hacker ācaused worldwide chaosāā the Daily Telegraph screamed across page one. On page three, the Daily Mail jumped in with `Teenage hacker ācaused chaos for kicksāā. Even The Times waded into the fray. Smaller, regional newspapers pulled the story across the countryside to the far reaches of the British Isles. The Herald in Glasgow told its readers `Teenage hacker āran up [sterling]10000 telephone billāā. Across the Irish Sea, the Irish Times caused a splash with its headline, `Teenage hacker broke EC computer securityā.
Also in the first week of the case, The Guardian announced Wandii had taken down the cancer centre database. By the time The Independent got hold of the story, Wandii hadnāt just shut down the database, he had been reading the patientsā most intimate medical details: `Teenager āhacked into cancer patient filesāā. Not to be outdone, on day four of the trial, the Daily Mail had christened Wandii as a `computer geniusā. By day five it labelled him as a `computer invaderā who `cost FT [sterling]25000ā.
The list went on. Wandii, the press announced, had hacked the Tokyo Zoo and the White House. It was difficult to tell which was the more serious offence.
Wandiiās defence team had a few tricks of its own. Ian MacDonald, QC, junior counsel Alistair Kelman and solicitor Deborah Tripley put London University Professor James Griffith-Edwards, an authoritative spokesman on addictive and compulsive behaviours, on the stand as an expert witness. The chairman of the National Addiction Centre, the professor had been part of a team which wrote the World Health Organisationās definition of addiction. No-one was going to question his qualifications.
The professor had examined Wandii and he announced his conclusion to the court: Wandii was obsessed by computers, he was unable to stop using them, and his infatuation made it impossible for him to choose freely. `He repeated 12 times in police interviews, āIām just addicted. I wish I wasnātā,ā Griffith-Edwards told the court. Wandii was highly intelligent, but was unable to escape from the urge to beat computersā security systems at their own game. The hacker was obsessed by the intellectual challenge. `This is the core ā¦ of what attracts the compulsive gambler,ā the professor explained to the entranced jury of three women and nine men.
But Wandii, this obsessive, addicted, gifted young man, had never had a girlfriend, Griffith-Edwards continued. In fact, he shyly admitted to the professor that he wouldnāt even know how to ask a girl out. `He [Wandii] became profoundly embarrassed when asked to talk about his own feelings. He simply couldnāt cope when asked what sort of person he was.ā6
People in the jury edged forward in their seats, concentrating intently on the distinguished professor. And why wouldnāt they? This was amazing stuff. This erudite man had delved inside the mind of the young man of bizarre contrasts. A man so sophisticated that he could pry open computers belonging to some of Britainās and Europeās most prestigious institutions, and yet at the same time so simple that he had no idea how to ask a girl on a date. A man who was addicted not to booze, smack or speed, which the average person associates with addiction, but to a computerāa machine most people associated with kidsā games and word processing programs.
The defence proceeded to present vivid examples of Wandiiās addiction. Wandiiās mother, a single parent and lecturer in English, had terrible trouble trying to get her son away from his computer and modem. She tried hiding his modem. He found it. She tried again, hiding it at his grandmotherās house. He burgled grannyās home and retrieved it. His mother tried to get at his computer. He pushed her out of his attic room and down the stairs.
Then he ran up a [sterling]700 phone bill as a result of his hacking. His mother switched off the electricity at the mains. Her son reconnected it. She installed a security calling-code on the phone to stop him calling out. He broke it. She worried he wouldnāt go out and do normal teenage things. He continued to stay up all nightāand sometimes all dayāhacking. She returned from work to find him unconsciousāsprawled across the living room floor and looking as though he was dead. But it wasnāt death, only sheer exhaustion. He hacked until he passed out, then he woke up and hacked some more.
The stories of Wandiiās self-confessed addiction overwhelmed, appalled and eventually engendered pity in the courtroom audience. The media began calling him `the hermit hackerā.
Wandiiās defence team couldnāt fight the prosecutionās evidence head-on, so they took the prosecutionās evidence and claimed it as their own. They showed the jury that Wandii hadnāt just hacked the institutions named by the prosecution; he had hacked far, far more than that. He didnāt just hack a lotāhe hacked too much. Most of all, Wandiiās defence team gave the jury a reason to acquit the innocent-faced young man sitting before them.
During the trial, the media focused on Wandii, but didnāt completely ignore the other two hackers. Computer Weekly hunted down where Gandalf was working and laid it bare on the front page. A member of `the UKās most notorious hacking gangā, the journal announced, had been working on software which would be used at Barclayās Bank.7 The implication was clear. Gandalf was a terrible security risk and should never be allowed to do any work for a financial institution. The report irked the hackers, but they tried to concentrate on preparing for their sentencing hearing.
From the beginning of their case, the hackers had problems obtaining certain evidence. Pad and Gandalf believed some of the material seized in the police raids would substantially help their caseāsuch as messages from admins thanking them for pointing out security holes on their systems. This material had not been included in the prosecutionās brief. When the defendants requested access to it, they were refused access on the grounds that there was classified data on the optical disk. They were told to go read the Attorney-Generalās guidelines on disclosure of information. The evidence of the hackersā forays into military and government systems was jumbled in with their intrusions into computers such as benign JANET systems, the defence team was told. It would take too much time to separate the two.
Eventually, after some wrangling, Pad and Gandalf were told they could inspect and copy materialāprovided it was done under the supervision of the police. The hackers travelled to London, to Holborn police station, to gather supporting evidence for their case. However, it soon became clear that this time-consuming exercise would be impossible to manage on an ongoing basis. Finally, the Crown Prosecution Service relented, agreeing to release the material on
Comments (0)