The Hacker Crackdown - BestLightNovel.com
You’re reading novel The Hacker Crackdown Part 48 online at BestLightNovel.com. Please use the follow button to get notification about the latest chapter next time when you visit BestLightNovel.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
Confronted by this genuinely nice lady, most hackers sat up very straight and did their best to keep the anarchy-file stuff down to a faint whiff of brimstone. Nevertheless, the hackers WERE in fact prepared to seriously discuss serious issues with Dorothy Denning. They were willing to speak the unspeakable and defend the indefensible, to blurt out their convictions that information cannot be owned, that the databases of governments and large corporations were a threat to the rights and privacy of individuals.
Denning's articles made it clear to many that "hacking"
was not simple vandalism by some evil clique of psychotics.
"Hacking" was not an aberrant menace that could be charmed away by ignoring it, or swept out of existence by jailing a few ringleaders.
Instead, "hacking" was symptomatic of a growing, primal struggle over knowledge and power in the age of information.
Denning pointed out that the att.i.tude of hackers were at least partially shared by forward-looking management theorists in the business community: people like Peter Drucker and Tom Peters. Peter Drucker, in his book The New Realities, had stated that "control of information by the government is no longer possible. Indeed, information is now transnational.
Like money, it has no 'fatherland.'"
And management maven Tom Peters had chided large corporations for uptight, proprietary att.i.tudes in his bestseller, Thriving on Chaos: "Information h.o.a.rding, especially by politically motivated, power-seeking staffs, had been commonplace throughout American industry, service and manufacturing alike. It will be an impossible millstone aroung the neck of tomorrow's organizations."
Dorothy Denning had shattered the social membrane of the digital underground. She attended the Neidorf trial, where she was prepared to testify for the defense as an expert witness.
She was a behind-the-scenes organizer of two of the most important national meetings of the computer civil libertarians. Though not a zealot of any description, she brought disparate elements of the electronic community into a surprising and fruitful collusion.
Dorothy Denning is currently the Chair of the Computer Science Department at Georgetown University in Was.h.i.+ngton, DC.
There were many stellar figures in the civil libertarian community.
There's no question, however, that its single most influential figure was Mitch.e.l.l D. Kapor. Other people might have formal t.i.tles, or governmental positions, have more experience with crime, or with the law, or with the arcanities of computer security or const.i.tutional theory. But by 1991 Kapor had transcended any such narrow role. Kapor had become "Mitch."
Mitch had become the central civil-libertarian ad-hocrat.
Mitch had stood up first, he had spoken out loudly, directly, vigorously and angrily, he had put his own reputation, and his very considerable personal fortune, on the line.
By mid-'91 Kapor was the best-known advocate of his cause and was known PERSONALLY by almost every single human being in America with any direct influence on the question of civil liberties in cybers.p.a.ce.
Mitch had built bridges, crossed voids, changed paradigms, forged metaphors, made phone-calls and swapped business cards to such spectacular effect that it had become impossible for anyone to take any action in the "hacker question" without wondering what Mitch might think-- and say--and tell his friends.
The EFF had simply NETWORKED the situation into an entirely new status quo.
And in fact this had been EFF's deliberate strategy from the beginning.
Both Barlow and Kapor loathed bureaucracies and had deliberately chosen to work almost entirely through the electronic spiderweb of "valuable personal contacts."
After a year of EFF, both Barlow and Kapor had every reason to look back with satisfaction. EFF had established its own Internet node, "eff.org," with a well-stocked electronic archive of doc.u.ments on electronic civil rights, privacy issues, and academic freedom.
EFF was also publis.h.i.+ng EFFector, a quarterly printed journal, as well as EFFector Online, an electronic newsletter with over 1,200 subscribers. And EFF was thriving on the Well.
EFF had a national headquarters in Cambridge and a full-time staff.
It had become a members.h.i.+p organization and was attracting gra.s.s-roots support. It had also attracted the support of some thirty civil-rights lawyers, ready and eager to do pro bono work in defense of the Const.i.tution in Cybers.p.a.ce.
EFF had lobbied successfully in Was.h.i.+ngton and in Ma.s.sachusetts to change state and federal legislation on computer networking.
Kapor in particular had become a veteran expert witness, and had joined the Computer Science and Telecommunications Board of the National Academy of Science and Engineering.
EFF had sponsored meetings such as "Computers, Freedom and Privacy"
and the CPSR Roundtable. It had carried out a press offensive that, in the words of EFFector, "has affected the climate of opinion about computer networking and begun to reverse the slide into 'hacker hysteria' that was beginning to grip the nation."
It had helped Craig Neidorf avoid prison.
And, last but certainly not least, the Electronic Frontier Foundation had filed a federal lawsuit in the name of Steve Jackson, Steve Jackson Games Inc., and three users of the Illuminati bulletin board system. The defendants were, and are, the United States Secret Service, William Cook, Tim Foley, Barbara Golden and Henry Kleupfel.
The case, which is in pre-trial procedures in an Austin federal court as of this writing, is a civil action for damages to redress alleged violations of the First and Fourth Amendments to the United States Const.i.tution, as well as the Privacy Protection Act of 1980 (42 USC 2000aa et seq.), and the Electronic Communications Privacy Act (18 USC 2510 et seq and 2701 et seq).
EFF had established that it had credibility. It had also established that it had teeth.
In the fall of 1991 I travelled to Ma.s.sachusetts to speak personally with Mitch Kapor. It was my final interview for this book.
The city of Boston has always been one of the major intellectual centers of the American republic. It is a very old city by American standards, a place of skysc.r.a.pers overshadowing seventeenth-century graveyards, where the high-tech start-up companies of Route 128 co-exist with the hand-wrought pre-industrial grace of "Old Ironsides," the USS CONSt.i.tUTION.
The Battle of Bunker Hill, one of the first and bitterest armed clashes of the American Revolution, was fought in Boston's environs. Today there is a monumental spire on Bunker Hill, visible throughout much of the city.
The willingness of the republican revolutionaries to take up arms and fire on their oppressors has left a cultural legacy that two full centuries have not effaced. Bunker Hill is still a potent center of American political symbolism, and the Spirit of '76 is still a potent image for those who seek to mold public opinion.
Of course, not everyone who wraps himself in the flag is necessarily a patriot. When I visited the spire in September 1991, it bore a huge, badly-erased, spray-can grafitto around its bottom reading "BRITS OUT--IRA PROVOS." Inside this hallowed edifice was a gla.s.s-cased diorama of thousands of tiny toy soldiers, rebels and redcoats, fighting and dying over the green hill, the riverside marshes, the rebel trenchworks. Plaques indicated the movement of troops, the s.h.i.+ftings of strategy. The Bunker Hill Monument is occupied at its very center by the toy soldiers of a military war-game simulation.
The Boston metroplex is a place of great universities, prominent among the Ma.s.sachusetts Inst.i.tute of Technology, where the term "computer hacker" was first coined. The Hacker Crackdown of 1990 might be interpreted as a political struggle among American cities: traditional strongholds of longhair intellectual liberalism, such as Boston, San Francisco, and Austin, versus the bare-knuckle industrial pragmatism of Chicago and Phoenix (with Atlanta and New York wrapped in internal struggle).
The headquarters of the Electronic Frontier Foundation is on 155 Second Street in Cambridge, a Bostonian suburb north of the River Charles. Second Street has weedy sidewalks of dented, sagging brick and elderly cracked asphalt; large street-signs warn "NO PARKING DURING DECLARED SNOW EMERGENCY." This is an old area of modest manufacturing industries; the EFF is catecorner from the Greene Rubber Company. EFF's building is two stories of red brick; its large wooden windows feature gracefully arched tops and stone sills.
The gla.s.s window beside the Second Street entrance bears three sheets of neatly laser-printed paper, taped against the gla.s.s. They read: ON Technology. EFF. KEI.
"ON Technology" is Kapor's software company, which currently specializes in "groupware" for the Apple Macintosh computer. "Groupware" is intended to promote efficient social interaction among office-workers linked by computers. ON Technology's most successful software products to date are "Meeting Maker" and "Instant Update."
"KEI" is Kapor Enterprises Inc., Kapor's personal holding company, the commercial ent.i.ty that formally controls his extensive investments in other hardware and software corporations.
"EFF" is a political action group--of a special sort.
Inside, someone's bike has been chained to the handrails of a modest flight of stairs. A wall of modish gla.s.s brick separates this anteroom from the offices. Beyond the brick, there's an alarm system mounted on the wall, a sleek, complex little number that resembles a cross between a thermostat and a CD player.
Piled against the wall are box after box of a recent special issue of Scientific American, "How to Work, Play, and Thrive in Cybers.p.a.ce,"
with extensive coverage of electronic networking techniques and political issues, including an article by Kapor himself.
These boxes are addressed to Gerard Van der Leun, EFF's Director of Communications, who will shortly mail those magazines to every member of the EFF.
The joint headquarters of EFF, KEI, and ON Technology, which Kapor currently rents, is a modestly bustling place.
It's very much the same physical size as Steve Jackson's gaming company.
It's certainly a far cry from the gigantic gray steel-sided railway s.h.i.+pping barn, on the Monsignor O'Brien Highway, that is owned by Lotus Development Corporation.
Lotus is, of course, the software giant that Mitch.e.l.l Kapor founded in the late 70s. The software program Kapor co-auth.o.r.ed, "Lotus 1-2-3," is still that company's most profitable product.
"Lotus 1-2-3" also bears a singular distinction in the digital underground: it's probably the most pirated piece of application software in world history.
Kapor greets me cordially in his own office, down a hall.
Kapor, whose name is p.r.o.nounced KAY-por, is in his early forties, married and the father of two. He has a round face, high forehead, straight nose, a slightly tousled mop of black hair peppered with gray.
His large brown eyes are wideset, reflective, one might almost say soulful.
He disdains ties, and commonly wears Hawaiian s.h.i.+rts and tropical prints, not so much garish as simply cheerful and just that little bit anomalous.
There is just the whiff of hacker brimstone about Mitch Kapor.
He may not have the hard-riding, h.e.l.l-for-leather, guitar-strumming charisma of his Wyoming colleague John Perry Barlow, but there's something about the guy that still stops one short. He has the air of the Eastern city dude in the bowler hat, the dreamy, Longfellow-quoting poker shark who only HAPPENS to know the exact mathematical odds against drawing to an inside straight.
Even among his computer-community colleagues, who are hardly known for mental sluggishness, Kapor strikes one forcefully as a very intelligent man. He speaks rapidly, with vigorous gestures, his Boston accent sometimes slipping to the sharp nasal tang of his youth in Long Island.
Kapor, whose Kapor Family Foundation does much of his philanthropic work, is a strong supporter of Boston's Computer Museum. Kapor's interest in the history of his industry has brought him some remarkable curios, such as the "byte" just outside his office door. This "byte"-- eight digital bits--has been salvaged from the wreck of an electronic computer of the pre-transistor age. It's a standing gunmetal rack about the size of a small toaster-oven: with eight slots of hand-soldered breadboarding featuring thumb-sized vacuum tubes.
If it fell off a table it could easily break your foot, but it was state-of-the-art computation in the 1940s.
(It would take exactly 157,184 of these primordial toasters to hold the first part of this book.)
There's also a coiling, multicolored, scaly dragon that some inspired techno-punk artist has cobbled up entirely out of transistors, capacitors, and brightly plastic-coated wiring.