BestLightNovel.com

Hacker Crackdown Part 12

Hacker Crackdown - BestLightNovel.com

You’re reading novel Hacker Crackdown Part 12 online at BestLightNovel.com. Please use the follow button to get notification about the latest chapter next time when you visit BestLightNovel.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy

Delaney has seen a lot of action. He did Vietnam. He's been shot at, he has shot people. He's a homicide cop from New York. He has the appearance of a man who has not only seen the s.h.i.+t hit the fan but has seen it splattered across whole city blocks and left to ferment for years. This guy has been around.

He listens to Steve Jackson tell his story. The dreamy game strategist has been dealt a bad hand. He has played it for all he is worth. Under his nerdish SF-fan exterior is a core of iron. Friends of his say Steve Jackson believes in the rules, believes in fair play. He will never compromise his principles, never give up. "Steve," Delaney says to Steve Jackson, "they had some b.a.l.l.s, whoever busted you. You're all right!" Jackson, stunned, falls silent and actually blushes with pleasure.

Neidorf has grown up a lot in the past year. The kid is a quick study, you gotta give him that. Dressed by his mom, the fas.h.i.+on manager for a national clothing chain, Missouri college techie-frat Craig Neidorf out-dappers everyone at this gig but the toniest East Coast lawyers. The iron jaws of prison clanged shut without him and now law school beckons for Neidorf. He looks like a larval Congressman.

Not a "hacker," our Mr. Neidorf. He's not interested in computer science. Why should he be? He's not interested in writing C code the rest of his life, and besides, he's seen where the chips fall. To the world of computer science he and PHRACK were just a curiosity. But to the world of law.... The kid has learned where the bodies are buried. He carries his notebook of press clippings wherever he goes.

Phiber Optik makes fun of Neidorf for a Midwestern geek, for believing that "Acid Phreak" does acid and listens to acid rock. h.e.l.l no. Acid's never done ACID! Acid's into ACID HOUSE MUSIC. Jesus. The very idea of doing LSD. Our PARENTS did LSD, ya clown.

Thackeray suddenly turns upon Craig Neidorf the full lighthouse glare of her attention and begins a determined half- hour attempt to WIN THE BOY OVER. The Joan of Arc of Computer Crime is GIVING CAREER ADVICE TO KNIGHT LIGHTNING! "Your experience would be very valuable--a real a.s.set," she tells him with unmistakeable sixty-thousand-watt sincerity. Neidorf is fascinated. He listens with unfeigned attention. He's nodding and saying yes ma'am. Yes, Craig, you too can forget all about money and enter the glamorous and horribly underpaid world of PROSECUTING COMPUTER CRIME! You can put your former friends in prison--ooops....

You cannot go on dueling at modem's length indefinitely. You cannot beat one another senseless with rolled-up press- clippings. Sooner or later you have to come directly to grips. And yet the very act of a.s.sembling here has changed the entire situation drastically. John Quarterman, author of THE MATRIX, explains the Internet at his symposium. It is the largest news network in the world, it is growing by leaps and bounds, and yet you cannot measure Internet because you cannot stop it in place. It cannot stop, because there is no one anywhere in the world with the authority to stop Internet. It changes, yes, it grows, it embeds itself across the post-industrial, postmodern world and it generates community wherever it touches, and it is doing this all by itself.

Phiber is different. A very fin de siecle kid, Phiber Optik. Barlow says he looks like an Edwardian dandy. He does rather. Shaven neck, the sides of his skull cropped hip-hop close, unruly tangle of black hair on top that looks pomaded, he stays up till four a.m. and misses all the sessions, then hangs out in payphone booths with his acoustic coupler gutsily CRACKING SYSTEMS RIGHT IN THE MIDST OF THE HEAVIEST LAW ENFORCEMENT DUDES IN THE U.S., or at least PRETENDING to.... Unlike "Frank Drake." Drake, who wrote Dorothy Denning out of nowhere, and asked for an interview for his cheapo cyberpunk fanzine, and then started grilling her on her ethics. She was squirmin', too.... Drake, scarecrow-tall with his floppy blond mohawk, rotting tennis shoes and black leather jacket lettered ILLUMINATI in red, gives off an unmistakeable air of the bohemian literatus. Drake is the kind of guy who reads British industrial design magazines and appreciates William Gibson because the quality of the prose is so tasty. Drake could never touch a phone or a keyboard again, and he'd still have the nose-ring and the blurry photocopied fanzines and the sampled industrial music. He's a radical punk with a desktop-publis.h.i.+ng rig and an Internet address. Standing next to Drake, the diminutive Phiber looks like he's been physically coagulated out of phone-lines. Born to phreak.

Dorothy Denning approaches Phiber suddenly. The two of them are about the same height and body-build. Denning's blue eyes flash behind the round window-frames of her gla.s.ses. "Why did you say I was 'quaint?'" she asks Phiber, quaintly.

It's a perfect description but Phiber is nonplussed... "Well, I uh, you know...."

"I also think you're quaint, Dorothy," I say, novelist to the rescue, the journo gift of gab... She is neat and dapper and yet there's an arcane quality to her, something like a Pilgrim Maiden behind leaded gla.s.s; if she were six inches high Dorothy Denning would look great inside a china cabinet... The Cryptographeress.... The Cryptographrix... whatever... Weirdly, Peter Denning looks just like his wife, you could pick this gentleman out of a thousand guys as the soulmate of Dorothy Denning. Wearing tailored slacks, a spotless fuzzy varsity sweater, and a neatly knotted academician's tie.... This fineboned, exquisitely polite, utterly civilized and hyperintelligent couple seem to have emerged from some cleaner and finer parallel universe, where humanity exists to do the Brain Teasers column in Scientific American. Why does this Nice Lady hang out with these unsavory characters?

Because the time has come for it, that's why. Because she's the best there is at what she does.

Donn Parker is here, the Great Bald Eagle of Computer Crime.... With his bald dome, great height, and enormous Lincoln-like hands, the great visionary pioneer of the field plows through the lesser mortals like an icebreaker.... His eyes are fixed on the future with the rigidity of a bronze statue.... Eventually, he tells his audience, all business crime will be computer crime, because businesses will do everything through computers. "Computer crime" as a category will vanish.

In the meantime, pa.s.sing fads will flourish and fail and evaporate.... Parker's commanding, resonant voice is sphinxlike, everything is viewed from some eldritch valley of deep historical abstraction... Yes, they've come and they've gone, these pa.s.sing flaps in the world of digital computation.... The radio- frequency emanation scandal... KGB and MI5 and CIA do it every day, it's easy, but n.o.body else ever has.... The salami-slice fraud, mostly mythical... "Crimoids," he calls them.... Computer viruses are the current crimoid champ, a lot less dangerous than most people let on, but the novelty is fading and there's a crimoid vacuum at the moment, the press is visibly hungering for something more outrageous.... The Great Man shares with us a few speculations on the coming crimoids.... Desktop Forgery! Wow.... Computers stolen just for the sake of the information within them--data-napping! Happened in Britain a while ago, could be the coming thing.... Phantom nodes in the Internet!

Parker handles his overhead projector sheets with an ecclesiastical air... He wears a grey double-breasted suit, a light blue s.h.i.+rt, and a very quiet tie of understated maroon and blue paisley... Aphorisms emerge from him with slow, leaden emphasis... There is no such thing as an adequately secure computer when one faces a sufficiently powerful adversary.... Deterrence is the most socially useful aspect of security... People are the primary weakness in all information systems... The entire baseline of computer security must be s.h.i.+fted upward.... Don't ever violate your security by publicly describing your security measures...

People in the audience are beginning to squirm, and yet there is something about the elemental purity of this guy's philosophy that compels uneasy respect.... Parker sounds like the only sane guy left in the lifeboat, sometimes. The guy who can prove rigorously, from deep moral principles, that Harvey there, the one with the broken leg and the checkered past, is the one who has to be, err.... that is, Mr. Harvey is best placed to make the necessary sacrifice for the security and indeed the very survival of the rest of this lifeboat's crew.... Computer security, Parker informs us mournfully, is a nasty topic, and we wish we didn't have to have it... The security expert, armed with method and logic, must think--imagine--everything that the adversary might do before the adversary might actually do it. It is as if the criminal's dark brain were an extensive subprogram within the s.h.i.+ning cranium of Donn Parker. He is a Holmes whose Moriarty does not quite yet exist and so must be perfectly simulated.

CFP is a stellar gathering, with the giddiness of a wedding. It is a happy time, a happy ending, they know their world is changing forever tonight, and they're proud to have been there to see it happen, to talk, to think, to help.

And yet as night falls, a certain elegiac quality manifests itself, as the crowd gathers beneath the chandeliers with their winegla.s.ses and dessert plates. Something is ending here, gone forever, and it takes a while to pinpoint it.

It is the End of the Amateurs.

Afterword: The Hacker Crackdown Three Years Later.

Three years in cybers.p.a.ce is like thirty years anyplace real. It feels as if a generation has pa.s.sed since I wrote this book. In terms of the generations of computing machinery involved, that's pretty much the case.

The basic shape of cybers.p.a.ce has changed drastically since 1990. A new U.S. Administration is in power whose personnel are, if anything, only too aware of the nature and potential of electronic networks. It's now clear to all players concerned that the status quo is dead-and-gone in American media and telecommunications, and almost any territory on the electronic frontier is up for grabs. Interactive multimedia, cable-phone alliances, the Information Superhighway, fiber-to- the-curb, laptops and palmtops, the explosive growth of cellular and the Internet--the earth trembles visibly.

The year 1990 was not a pleasant one for AT&T. By 1993, however, AT&T had successfully devoured the computer company NCR in an unfriendly takeover, finally giving the pole-climbers a major piece of the digital action. AT&T managed to rid itself of owners.h.i.+p of the troublesome UNIX operating system, selling it to Novell, a netware company, which was itself preparing for a savage market dust-up with operating-system t.i.tan Microsoft. Furthermore, AT&T acquired McCaw Cellular in a gigantic merger, giving AT&T a potential wireless whip-hand over its former progeny, the RBOCs. The RBOCs themselves were now AT&T's clearest potential rivals, as the Chinese firewalls between regulated monopoly and frenzied digital entrepreneurism began to melt and collapse headlong.

AT&T, mocked by industry a.n.a.lysts in 1990, was reaping awestruck praise by commentators in 1993. AT&T had managed to avoid any more major software crashes in its switching stations. AT&T's newfound reputation as "the nimble giant" was all the sweeter, since AT&T's traditional rival giant in the world of multinational computing, IBM, was almost prostrate by 1993. IBM's vision of the commercial computer-network of the future, "Prodigy," had managed to spend $900 million without a whole heck of a lot to show for it, while AT&T, by contrast, was boldly speculating on the possibilities of personal communicators and hedging its bets with investments in handwritten interfaces. In 1990 AT&T had looked bad; but in 1993 AT&T looked like the future.

At least, AT&T's ADVERTISING looked like the future. Similar public attention was riveted on the ma.s.sive $22 billion megamerger between RBOC Bell Atlantic and cable-TV giant Tele- Communications Inc. Nynex was buying into cable company Viacom International. BellSouth was buying stock in Prime Management, Southwestern Bell acquiring a cable company in Was.h.i.+ngton DC, and so forth. By stark contrast, the Internet, a noncommercial ent.i.ty which officially did not even exist, had no advertising budget at all. And yet, almost below the level of governmental and corporate awareness, the Internet was stealthily devouring everything in its path, growing at a rate that defied comprehension. Kids who might have been eager computer-intruders a mere five years earlier were now surfing the Internet, where their natural urge to explore led them into cybers.p.a.ce landscapes of such mindboggling vastness that the very idea of hacking pa.s.swords seemed rather a waste of time.

By 1993, there had not been a solid, knock 'em down, panic-striking, teenage-hacker computer-intrusion scandal in many long months. There had, of course, been some striking and well- publicized acts of illicit computer access, but they had been committed by adult white-collar industry insiders in clear pursuit of personal or commercial advantage. The kids, by contrast, all seemed to be on IRC, Internet Relay Chat.

Or, perhaps, frolicking out in the endless gla.s.s-roots network of personal bulletin board systems. In 1993, there were an estimated 60,000 boards in America; the population of boards had fully doubled since Operation Sundevil in 1990. The hobby was trans.m.u.ting fitfully into a genuine industry. The board community were no longer obscure hobbyists; many were still hobbyists and proud of it, but board sysops and advanced board users had become a far more cohesive and politically aware community, no longer allowing themselves to be obscure.

The specter of cybers.p.a.ce in the late 1980s, of outwitted authorities trembling in fear before teenage hacker whiz-kids, seemed downright antiquated by 1993. Law enforcement emphasis had changed, and the favorite electronic villain of 1993 was not the vandal child, but the victimizer of children, the digital child p.o.r.nographer. "Operation Longarm," a child-p.o.r.nography computer raid carried out by the previously little-known cybers.p.a.ce rangers of the U.S. Customs Service, was almost the size of Operation Sundevil, but received very little notice by comparison.

The huge and well-organized "Operation Disconnect," an FBI strike against telephone rip-off con-artists, was actually larger than Sundevil. "Operation Disconnect" had its brief moment in the sun of publicity, and then vanished utterly. It was unfortunate that a law-enforcement affair as apparently well- conducted as Operation Disconnect, which pursued telecom adult career criminals a hundred times more morally repugnant than teenage hackers, should have received so little attention and fanfare, especially compared to the abortive Sundevil and the basically disastrous efforts of the Chicago Computer Fraud and Abuse Task Force. But the life of an electronic policeman is seldom easy.

If any law enforcement event truly deserved full-scale press coverage (while somehow managing to escape it), it was the amazing saga of New York State Police Senior Investigator Don Delaney Versus the Orchard Street Finger-Hackers. This story probably represents the real future of professional telecommunications crime in America. The finger-hackers sold, and still sell, stolen long-distance phone service to a captive clientele of illegal aliens in New York City. This clientele is desperate to call home, yet as a group, illegal aliens have few legal means of obtaining standard phone service, since their very presence in the United States is against the law. The finger- hackers of Orchard Street were very unusual "hackers," with an astonis.h.i.+ng lack of any kind of genuine technological knowledge. And yet these New York call-sell thieves showed a street-level ingenuity appalling in its single-minded sense of larceny.

There was no dissident-hacker rhetoric about freedom-of- information among the finger-hackers. Most of them came out of the cocaine-dealing fraternity, and they retailed stolen calls with the same street-crime techniques of lookouts and bagholders that a crack gang would employ. This was down-and-dirty, urban, ethnic, organized crime, carried out by crime families every day, for cash on the barrelhead, in the harsh world of the streets. The finger-hackers dominated certain payphones in certain strikingly unsavory neighborhoods. They provided a service no one else would give to a clientele with little to lose.

With such a vast supply of electronic crime at hand, Don Delaney rocketed from a background in homicide to teaching telecom crime at FLETC in less than three years. Few can rival Delaney's hands-on, street-level experience in phone fraud. Anyone in 1993 who still believes telecommunications crime to be something rare and arcane should have a few words with Mr Delaney. Don Delaney has also written two fine essays, on telecom fraud and computer crime, in Joseph Grau's CRIMINAL AND CIVIL INVESTIGATIONS HANDBOOK (McGraw Hill 1993).

PHRACK was still publis.h.i.+ng in 1993, now under the able editors.h.i.+p of Erik Bloodaxe. Bloodaxe made a determined attempt to get law enforcement and corporate security to pay real money for their electronic copies of PHRACK, but, as usual, these stalwart defenders of intellectual property preferred to pirate the magazine. Bloodaxe has still not gotten back any of his property from the seizure raids of March 1, 1990. Neither has the Mentor, who is still the managing editor of Steve Jackson Games.

Nor has Robert Izenberg, who has suspended his court struggle to get his machinery back. Mr. Izenberg has calculated that his $20,000 of equipment seized in 1990 is, in 1993, worth $4,000 at most. The missing software, also gone out his door, was long ago replaced. He might, he says, sue for the sake of principle, but he feels that the people who seized his machinery have already been discredited, and won't be doing any more seizures. And even if his machinery were returned--and in good repair, which is doubtful--it will be essentially worthless by 1995. Robert Izenberg no longer works for IBM, but has a job programming for a major telecommunications company in Austin.

Steve Jackson won his case against the Secret Service on March 12, 1993, just over three years after the federal raid on his enterprise. Thanks to the delaying tactics available through the legal doctrine of "qualified immunity," Jackson was tactically forced to drop his suit against the individuals William Cook, Tim Foley, Barbara Golden and Henry Kluepfel. (Cook, Foley, Golden and Kluepfel did, however, testify during the trial.) The Secret Service fought vigorously in the case, battling Jackson's lawyers right down the line, on the (mostly previously untried) legal turf of the Electronic Communications Privacy Act and the Privacy Protection Act of 1980. The Secret Service denied they were legally or morally responsible for seizing the work of a publisher. They claimed that (1) Jackson's gaming "books" weren't real books anyhow, and (2) the Secret Service didn't realize SJG Inc was a "publisher" when they raided his offices, and (3) the books only vanished by accident because they merely happened to be inside the computers the agents were appropriating.

The Secret Service also denied any wrongdoing in reading and erasing all the supposedly "private" e-mail inside Jackson's seized board, Illuminati. The USSS attorneys claimed the seizure did not violate the Electronic Communications Privacy Act, because they weren't actually "intercepting" electronic mail that was moving on a wire, but only electronic mail that was quietly sitting on a disk inside Jackson's computer. They also claimed that USSS agents hadn't read any of the private mail on Illuminati; and anyway, even supposing that they had, they were allowed to do that by the subpoena.

The Jackson case became even more peculiar when the Secret Service attorneys went so far as to allege that the federal raid against the gaming company had actually IMPROVED JACKSON'S BUSINESS thanks to the ensuing nationwide publicity.

It was a long and rather involved trial. The judge seemed most perturbed, not by the arcane matters of electronic law, but by the fact that the Secret Service could have avoided almost all the consequent trouble simply by giving Jackson his computers back in short order. The Secret Service easily could have looked at everything in Jackson's computers, recorded everything, and given the machinery back, and there would have been no major scandal or federal court suit. On the contrary, everybody simply would have had a good laugh. Unfortunately, it appeared that this idea had never entered the heads of the Chicago-based investigators. They seemed to have concluded unilaterally, and without due course of law, that the world would be better off if Steve Jackson didn't have computers. Golden and Foley claimed that they had both never even heard of the Privacy Protection Act. Cook had heard of the Act, but he'd decided on his own that the Privacy Protection Act had nothing to do with Steve Jackson.

The Jackson case was also a very politicized trial, both sides deliberately angling for a long-term legal precedent that would stake-out big claims for their interests in cybers.p.a.ce. Jackson and his EFF advisors tried hard to establish that the least e-mail remark of the lonely electronic pamphleteer deserves the same somber civil-rights protection as that afforded THE NEW YORK TIMES. By stark contrast, the Secret Service's attorneys argued boldly that the contents of an electronic bulletin board have no more expectation of privacy than a heap of postcards. In the final a.n.a.lysis, very little was firmly nailed down. Formally, the legal rulings in the Jackson case apply only in the federal Western District of Texas. It was, however, established that these were real civil-liberties issues that powerful people were prepared to go to the courthouse over; the seizure of bulletin board systems, though it still goes on, can be a perilous act for the seizer. The Secret Service owes Steve Jackson $50,000 in damages, and a thousand dollars each to three of Jackson's angry and offended board users. And Steve Jackson, rather than owning the single-line bulletin board system "Illuminati" seized in 1990, now rejoices in possession of a huge privately-owned Internet node, "io.com," with dozens of phone- lines on its own T-1 trunk.

Jackson has made the entire blow-by-blow narrative of his case available electronically, for interested parties. And yet, the Jackson case may still not be over; a Secret Service appeal seems likely and the EFF is also gravely dissatisfied with the ruling on electronic interception.

The WELL, home of the American electronic civil libertarian movement, added two thousand more users and dropped its aging Sequent computer in favor of a snappy new Sun Sparcstation. Search-and-seizure dicussions on the WELL are now taking a decided back-seat to the current hot topic in digital civil liberties, unbreakable public-key encryption for private citizens.

The Electronic Frontier Foundation left its modest home in Boston to move inside the Was.h.i.+ngton Beltway of the Clinton Administration. Its new executive director, ECPA pioneer and longtime ACLU activist Jerry Berman, gained a reputation of a man adept as dining with tigers, as the EFF devoted its attention to networking at the highest levels of the computer and telecommunications industry. EFF's pro-encryption lobby and anti-wiretapping initiative were especially impressive, successfully a.s.sembling a herd of highly variegated industry camels under the same EFF tent, in open and powerful opposition to the electronic ambitions of the FBI and the NSA.

EFF had trans.m.u.ted at light-speed from an insurrection to an inst.i.tution. EFF Co-Founder Mitch Kapor once again sidestepped the bureaucratic consequences of his own success, by remaining in Boston and adapting the role of EFF guru and gray eminence. John Perry Barlow, for his part, left Wyoming, quit the Republican Party, and moved to New York City, accompanied by his swarm of cellular phones. Mike G.o.dwin left Boston for Was.h.i.+ngton as EFF's official legal adviser to the electronically afflicted.

After the Neidorf trial, Dorothy Denning further proved her firm scholastic independence-of-mind by speaking up boldly on the usefulness and social value of federal wiretapping. Many civil libertarians, who regarded the practice of wiretapping with deep occult horror, were crestfallen to the point of comedy when nationally known "hacker sympathizer" Dorothy Denning sternly defended police and public interests in official eavesdropping. However, no amount of public uproar seemed to swerve the "quaint" Dr. Denning in the slightest. She not only made up her own mind, she made it up in public and then stuck to her guns.

In 1993, the stalwarts of the Masters of Deception, Phiber Optik, Acid Phreak and Scorpion, finally fell afoul of the machineries of legal prosecution. Acid Phreak and Scorpion were sent to prison for six months, six months of home detention, 750 hours of community service, and, oddly, a $50 fine for conspiracy to commit computer crime. Phiber Optik, the computer intruder with perhaps the highest public profile in the entire world, took the longest to plead guilty, but, facing the possibility of ten years in jail, he finally did so. He was sentenced to a year in prison.

As for the Atlanta wing of the Legion of Doom, Prophet, Leftist and Urvile... Urvile now works for a software company in Atlanta. He is still on probation and still repaying his enormous fine. In fifteen months, he will once again be allowed to own a personal computer. He is still a convicted federal felon, but has not had any legal difficulties since leaving prison. He has lost contact with Prophet and Leftist. Unfortunately, so have I, though not through lack of honest effort.

Knight Lightning, now 24, is a technical writer for the federal government in Was.h.i.+ngton DC. He has still not been accepted into law school, but having spent more than his share of time in the company of attorneys, he's come to think that maybe an MBA would be more to the point. He still owes his attorneys $30,000, but the sum is dwindling steadily since he is manfully working two jobs. Knight Lightning customarily wears a suit and tie and carries a valise. He has a federal security clearance.

Unindicted PHRACK co-editor Taran King is also a technical writer in Was.h.i.+ngton DC, and recently got married.

Terminus did his time, got out of prison, and currently lives in Silicon Valley where he is running a full-scale Internet node, "netsys.com." He programs professionally for a company specializing in satellite links for the Internet.

Carlton Fitzpatrick still teaches at the Federal Law Enforcement Training Center, but FLETC found that the issues involved in sponsoring and running a bulletin board system are rather more complex than they at first appear to be.

Gail Thackeray briefly considered going into private security, but then changed tack, and joined the Maricopa County District Attorney's Office (with a salary). She is still vigorously prosecuting electronic racketeering in Phoenix, Arizona.

The fourth consecutive Computers, Freedom and Privacy Conference will take place in March 1994 in Chicago.

As for Bruce Sterling... well *8-). I thankfully abandoned my brief career as a true-crime journalist and wrote a new science fiction novel, HEAVY WEATHER, and a.s.sembled a new collection of short stories, GLOBALHEAD. I also write nonfiction regularly, for the popular-science column in THE MAGAZINE OF FANTASY AND SCIENCE FICTION.

I like life better on the far side of the boundary between fantasy and reality; but I've come to recognize that reality has an unfortunate way of annexing fantasy for its own purposes. That's why I'm on the Police Liaison Committee for EFF-Austin, a local electronic civil liberties group (eff- [email protected]). I don't think I will ever get over my experience of the Hacker Crackdown, and I expect to be involved in electronic civil liberties activism for the rest of my life.

It wouldn't be hard to find material for another book on computer crime and civil liberties issues. I truly believe that I could write another book much like this one, every year. Cybers.p.a.ce is very big. There's a lot going on out there, far more than can be adequately covered by the tiny, though growing, cadre of network-literate reporters. I do wish I could do more work on this topic, because the various people of cybers.p.a.ce are an element of our society that definitely require sustained study and attention.

But there's only one of me, and I have a lot on my mind, and, like most science fiction writers, I have a lot more imagination than discipline. Having done my stint as an electronic-frontier reporter, my hat is off to those stalwart few who do it every day. I may return to this topic some day, but I have no real plans to do so. However, I didn't have any real plans to write "Hacker Crackdown," either. Things happen, nowadays. There are landslides in cybers.p.a.ce. I'll just have to try and stay alert and on my feet.

The electronic landscape changes with astounding speed. We are living through the fastest technological transformation in human history. I was glad to have a chance to doc.u.ment cybers.p.a.ce during one moment in its long mutation; a kind of strobe-flash of the maelstrom. This book is already out-of-date, though, and it will be quite obsolete in another five years. It seems a pity.

However, in about fifty years, I think this book might seem quite interesting. And in a hundred years, this book should seem mind-bogglingly archaic and bizarre, and will probably seem far weirder to an audience in 2092 than it ever seemed to the contemporary readers.h.i.+p.

Keeping up in cybers.p.a.ce requires a great deal of sustained attention. Personally, I keep tabs with the milieu by reading the invaluable electronic magazine Computer underground Digest ([email protected] with the subject header: SUB CuD and a message that says: SUB CuD your name [email protected]).

I also read Jack Rickard's bracingly iconoclastic BOARDWATCH MAGAZINE for print news of the BBS and online community. And, needless to say, I read WIRED, the first magazine of the 1990s that actually looks and acts like it really belongs in this decade. There are other ways to learn, of course, but these three outlets will guide your efforts very well.

When I myself want to publish something electronically, which I'm doing with increasing frequency, I generally put it on the gopher at Texas Internet Consulting, who are my, well, Texan Internet consultants (tic.com). This book can be found there. I think it is a worthwhile act to let this work go free.

From thence, one's bread floats out onto the dark waters of cybers.p.a.ce, only to return someday, tenfold. And of course, thoroughly soggy, and riddled with an entire amazing ecosystem of bizarre and gnawingly hungry cybermarine life-forms. For this author at least, that's all that really counts.

Please click Like and leave more comments to support and keep us alive.

RECENTLY UPDATED MANGA

Hacker Crackdown Part 12 summary

You're reading Hacker Crackdown. This manga has been translated by Updating. Author(s): Bruce Sterling. Already has 760 views.

It's great if you read and follow any novel on our website. We promise you that we'll bring you the latest, hottest novel everyday and FREE.

BestLightNovel.com is a most smartest website for reading manga online, it can automatic resize images to fit your pc screen, even on your mobile. Experience now by using your smartphone and access to BestLightNovel.com