mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1097 lines
54 KiB
Text
1097 lines
54 KiB
Text
![]() |
==Phrack Magazine==
|
|||
|
|
|||
|
Volume Four, Issue Forty-Three, File 12 of 27
|
|||
|
|
|||
|
|
|||
|
My Bust
|
|||
|
Or,
|
|||
|
An Odyssey of Ignorance
|
|||
|
|
|||
|
(C) 1993 Robert W. F. Clark
|
|||
|
|
|||
|
|
|||
|
[This is a factual account; however, certain innocent parties have
|
|||
|
already suffered enough damage to their reputations
|
|||
|
without further identification. I have changed their names.
|
|||
|
Where I have done so I follow the name with an asterisk [*].
|
|||
|
|
|||
|
|
|||
|
I. _In flagrante delicto_
|
|||
|
|
|||
|
I am writing this article for the benefit of those who have yet to
|
|||
|
become acquainted with the brotherhood of law enforcement, a subculture
|
|||
|
as warped and depraved as any criminal organization.
|
|||
|
|
|||
|
The law enforcement community entered my life in the early part of
|
|||
|
December 1989. I am yet to be quit of it. My initial contact with law
|
|||
|
enforcement and its quaint customs was one afternoon as I was reading email.
|
|||
|
Suddenly, without warning, I heard a voice shout: "Freeze, and get away from
|
|||
|
the computer." Nonplussed, but still with some command of my faculties, I
|
|||
|
drawled: "So, which do you want me to do?"
|
|||
|
|
|||
|
The police officer did not answer.
|
|||
|
|
|||
|
I was in the main public academic computing facility at Penn State,
|
|||
|
which was occupied by several startled-looking computer users, who now trained
|
|||
|
their eyes on the ensuing drama with all the solicitous concern of Romans
|
|||
|
attending an arena event.
|
|||
|
|
|||
|
The officer, Police Services Officer Anne Rego, then left the room,
|
|||
|
and my immediate concern was to kill all processes and
|
|||
|
delete all incriminating files, or at least to arrange an accidental
|
|||
|
disruption of power. However, before I could do anything, Miss Rego
|
|||
|
reappeared with a grim, mustached police officer and what appeared to be the
|
|||
|
cast of Revenge of the Nerds.
|
|||
|
|
|||
|
Angela Thomas, computer science instructor, immediately commandeered
|
|||
|
both terminals I had been using and began transferring the contents of
|
|||
|
all directories to a safe machine; the newcomer, Police Services Officer
|
|||
|
Sam Ricciotti, volunteered the helpful information: "You're in big
|
|||
|
trouble, kid."
|
|||
|
|
|||
|
In an excess of hospitality, they then offered me a ride to Grange
|
|||
|
Building, police headquarters of Penn State, for an afternoon of
|
|||
|
conversation and bright lights.
|
|||
|
|
|||
|
I asked if I were under arrest, and finding that I was not, asked
|
|||
|
what would happen if I refused their generous offer. They said that
|
|||
|
it might have negative repercussions, and that the wise choice was to
|
|||
|
accompany them.
|
|||
|
|
|||
|
So, after a moment of thought, I agreed to accompany them. Forming a
|
|||
|
strange procession, with a police officer preceding me and another
|
|||
|
following, we entered an elevator. Then, still in formation, we exited
|
|||
|
the building to be greeted by two police cars with flashing red and
|
|||
|
blue lights. Like a chauffeur, Officer Ricciotti opened the door for
|
|||
|
me, and it was only after he closed it that I realized, for the first
|
|||
|
time, that the back doors of police cars have no handles on the inside.
|
|||
|
|
|||
|
I had made yet another mistake in a long series.
|
|||
|
|
|||
|
The purpose of this article is to detail several possible mistakes in dealing
|
|||
|
with police and how they may be avoided. As I made almost every possible
|
|||
|
mistake, my experience should prove enlightening.
|
|||
|
|
|||
|
While I hope that this article might prevent you from being busted,
|
|||
|
I will have been successful if even one person does not make the
|
|||
|
mistakes I made when I was busted.
|
|||
|
|
|||
|
II. Prelude
|
|||
|
|
|||
|
To provide the reader with context, I shall explain the series of events
|
|||
|
which culminated in my apprehension.
|
|||
|
|
|||
|
On my entrance to the Pennsylvania State University as a University
|
|||
|
Scholar, the highest distinction available from an institution remarkable for
|
|||
|
its lack of distinction, I received an account on PSUVM, an IBM 3090 running
|
|||
|
VM/CMS. Before receiving the account, I acquired all available documentation
|
|||
|
from the Information Desk and read it. As it happened, the first document I
|
|||
|
read concerned "Netnews," the local name for Usenet.
|
|||
|
|
|||
|
As soon as my account was activated, I immediately typed netnews.
|
|||
|
I have never been the same since. Within a week, I began posting
|
|||
|
articles of my own and was immediately lambasted, flamed and roasted
|
|||
|
to a crisp. Discovering my own talent in the area of malediction,
|
|||
|
I became an alt.flame and talk.bizarre regular. I also read comp.risks,
|
|||
|
comp.dcom.telecom and other technical journals assiduously.
|
|||
|
|
|||
|
I began hacking VM/CMS, independently discovering a vast
|
|||
|
number of flaws in the system. Within a few months, I was able to
|
|||
|
access any information in the system which interested me, submit
|
|||
|
anonymous batch jobs, and circumvent the 'ration' utility which limited
|
|||
|
a luser's time on the system. It was a trivial matter to write a trojan
|
|||
|
horse which imitated the login screen and grabbed passwords. Late
|
|||
|
at night, when there were few users, I would crank the CPU, of
|
|||
|
a system capable of handling 300 users simultaneously,
|
|||
|
to 100% capacity just for the sake of doing it. I discovered a
|
|||
|
simple method of crashing the system, but felt no need to do it,
|
|||
|
as I knew that it would work. To avoid disk space rationing, I
|
|||
|
would store huge files in my virtual punch. To my credit, lest
|
|||
|
I seem a selfish pig unconcerned with the welfare of
|
|||
|
other users, I limited such exercises to the later hours of the
|
|||
|
night, and eliminated large files when they were no longer useful
|
|||
|
to me.
|
|||
|
|
|||
|
Like one starved, I glutted myself on information. To have
|
|||
|
legitimate access to such a system was marvellous. For a few months,
|
|||
|
I was satisfied with my level of 'power,' that elusive quality which is
|
|||
|
like a drug to those of a certain peculiarity of mind.
|
|||
|
|
|||
|
However, it was not long before I realized that despite the sheer
|
|||
|
power of the system, the user interface was clumsy,
|
|||
|
unaesthetic and intolerable to anyone desiring to understand
|
|||
|
the machine directly. The damn thing had a virtual punch
|
|||
|
card system!
|
|||
|
|
|||
|
I had heard about Unix, and was interested in trying this system. However,
|
|||
|
without an affiliation with the Computer Science Department, I had no
|
|||
|
way to get Unix access.
|
|||
|
|
|||
|
Comparative Literature majors apparently should not clutter their heads with
|
|||
|
such useless and destructive nonsense as the Unix operating system,
|
|||
|
just as an Engineering major can only be damaged by such
|
|||
|
mental clutter as the works of Shakespeare; this, in any case, seemed
|
|||
|
to be the only justification for such an arcane, Byzantine
|
|||
|
policy of restricting access to a nearly unlimited resource.
|
|||
|
|
|||
|
The academic community is addicted to the unhealthy practice of restricting
|
|||
|
information, and its policies are dedicated to the end of turning agile, eager
|
|||
|
young minds into so many identical cogs in the social mill. Those unable or
|
|||
|
unwilling to become cogs are of no use to this machine, and are dispensable.
|
|||
|
|
|||
|
Thus, in the latter part of my freshman year, I became increasingly
|
|||
|
frustrated and disillusioned with higher education in general, and
|
|||
|
by the very idea of specialized education in particular. I stopped
|
|||
|
attending classes, and even skipped tests. I became increasingly
|
|||
|
nocturnal and increasingly obsessed with Usenet. Nevertheless, even
|
|||
|
by doing the entire semester's work during finals week, I still
|
|||
|
barely managed to maintain honors status.
|
|||
|
|
|||
|
The summer restored my spirits greatly. I experimented
|
|||
|
with LSD for the first time, and found that it allowed me to see
|
|||
|
myself as I truly was, and to come to a certain grudging acceptance of
|
|||
|
myself, to a greater degree than any psychologist had. I found that I
|
|||
|
preferred marijuana to alcohol, and soon no longer subjected myself to
|
|||
|
prolonged bouts of drinking.
|
|||
|
|
|||
|
However, I mistook my upturn in spirits for a rejuvenation, when
|
|||
|
it was more likely due to the lack of pressure and hedonism
|
|||
|
of summer.
|
|||
|
|
|||
|
Near the end of my first year, I met Dale Garrison [*], an
|
|||
|
electronic musician and audio man for WPSX-TV, the university
|
|||
|
public television station. He also recorded music recitals
|
|||
|
for faculty and visiting luminaries, and thus had access to
|
|||
|
the Electronic Music Lab and all its facilities.
|
|||
|
His friend Shamir Kamchatka [*] had bequeathed him a Unix
|
|||
|
account on the mail hub of the Pennsylvania State University.
|
|||
|
Another friend, Ron Gere [*], a systems operator for the
|
|||
|
Engineering Computer Lab, had created an account for him on
|
|||
|
the departmental VAXcluster following the termination of his
|
|||
|
legitimate account due to a change in policy. They gave the
|
|||
|
account the cover name of Huang Chang [*] as a sort of joke,
|
|||
|
but this name was remarkably inconspicuous with the preponderance
|
|||
|
of Asian names on the system. Dale began posting articles under
|
|||
|
this name, as he had no account with his real name, but by a slow
|
|||
|
process, the nom-de-plume became a well-developed and individual
|
|||
|
personality, and the poems, articles and diatribes written
|
|||
|
under this name became quite popular. Even when we later
|
|||
|
realized the ease with which he could forge articles with his
|
|||
|
actual name, he was disinclined to do so. The wit and
|
|||
|
intelligence of the assumed identity became so unique to
|
|||
|
that identity that it would have been difficult to shed.
|
|||
|
|
|||
|
I often used the Unix account, and quickly began to
|
|||
|
understand and appreciate the complexity and organic unity
|
|||
|
of the Internet.
|
|||
|
|
|||
|
I had no moral qualms about using a computer account with the
|
|||
|
permission of the legitimate owner of the account, any more than
|
|||
|
I would have moral qualms about checking out a book from the
|
|||
|
mathematics library. A source of information for which my tuition
|
|||
|
and taxes has paid is a source of information which I have every
|
|||
|
right to access. To deny my access is a crime greater by far
|
|||
|
than for me to claim my rights by nondestructive means. Any
|
|||
|
university will allow a student of any college to check out a book
|
|||
|
on any subject from the library.
|
|||
|
|
|||
|
However, myopic university administrations seem to believe that restricting
|
|||
|
access to information, rather than allowing a free exchange of ideas, is the
|
|||
|
purpose of an educational institution. Every department will have its own
|
|||
|
computer subnetwork, regardless of whether it is sensible or equitable to do
|
|||
|
so. The stagnation and redundancy we see on the Internet is the inevitable
|
|||
|
result of such an absurd _de facto_ standard.
|
|||
|
|
|||
|
This policy is by no means limited to computers. It extends to
|
|||
|
class scheduling, work-study programs, any technical equipment worth
|
|||
|
using, arts training, religious studies, athletic facilities, degree
|
|||
|
requirements, musical instruments, literature and any thing which is
|
|||
|
useful to the mind. Bean-counters who can neither read a line
|
|||
|
of Baudelaire nor parse a line of C decide what is to be the canned
|
|||
|
curriculum for anyone who chooses a major. This is the obvious
|
|||
|
outcome in a society where education is so undervalued that
|
|||
|
Education majors have the lowest SAT scores of any degree-level
|
|||
|
students.
|
|||
|
|
|||
|
So I thought as I saw resources wasted, minds distorted,
|
|||
|
the lives of close friends ruined by the slow, inexorable grinding
|
|||
|
of the vast, impersonal machine known as higher education. I saw
|
|||
|
professors in computer science tell blatant falsehoods, professors
|
|||
|
in philosophy misquote Nietzsche, professors in English Literature
|
|||
|
hand out typewritten memos rife with grammatical errors.
|
|||
|
I grew entirely disgusted with the mismanagement of higher
|
|||
|
education. When I discovered that the most intelligent and individual
|
|||
|
people around me were usually not students, I gave up on college
|
|||
|
as a means of self-actualization.
|
|||
|
|
|||
|
My second year of college was essentially the first repeated,
|
|||
|
except that my frustration with the academic world bloomed into
|
|||
|
nihilism, and my depression into despair. I no longer even bothered to
|
|||
|
attend most tests, and even skipped finals. I allowed my paperwork for
|
|||
|
the University Scholars Program to lapse, rather than suffer
|
|||
|
the indignity of ejection for poor academic performance.
|
|||
|
|
|||
|
Another summer followed, with less cheer than the previous. Very early in the
|
|||
|
summer, a moron rear-ended my car without even slowing down before slamming
|
|||
|
into me. My mother and stepfather ejected me from their house, and I moved to
|
|||
|
Indiana to live with my father. When the insurance money arrived from my
|
|||
|
totalled car, I purchased a cheap vehicle and hit the highway with no
|
|||
|
particular destination in mind. With a lemming's logic, I turned east instead
|
|||
|
of west on I-70, and returned to State College, Pennsylvania.
|
|||
|
|
|||
|
At the last moment, I registered for part-time classes.
|
|||
|
|
|||
|
|
|||
|
III. History of a Conflagration
|
|||
|
|
|||
|
>From the beginning of this semester, I neglected my classes, and
|
|||
|
instead read RFCs and Unix system security manuals. I began
|
|||
|
experimenting with the communications capabilities of the TCP/IP protocol
|
|||
|
suite, and began to understand more deeply how it was that such a network
|
|||
|
could exist as an organic whole greater than the sum of its parts.
|
|||
|
|
|||
|
In the interest of experimenting with these interconnections, I
|
|||
|
began to acquire a number of Internet 'guest' accounts. When possible, I
|
|||
|
would use these to expand my area of access, with the goal of testing the
|
|||
|
speed and reliability of the network; and, I freely admit, for my amusement.
|
|||
|
|
|||
|
I realized, at the time, that what I was doing was, legally, in
|
|||
|
a gray area; but I did not give moral considerations more than
|
|||
|
a passing thought. Later, I had leisure to ponder the moral and legal aspects
|
|||
|
of my actions at great length, but at the time I was collecting accounts I
|
|||
|
only considered the technical aspects of what I was doing.
|
|||
|
|
|||
|
I discovered Richard Stallman's accounts on a variety of computers.
|
|||
|
I used these only for testing mail and packet routing.
|
|||
|
I realized that it would be trivial to use them for malicious
|
|||
|
purposes, but the thought of doing so did not occur to me. The very
|
|||
|
idea of hacking a computer system implies the desire to outsmart the
|
|||
|
security some unknown person had designed to prevent intrusion; to
|
|||
|
abuse a trust in this manner has all the appeal to a hacker that a
|
|||
|
hunter would find in stalking a kitten with a howitzer. To hack an
|
|||
|
open system requires no intelligence and little knowledge, and
|
|||
|
imparts no deeper knowledge than is available by legitimate use of
|
|||
|
the system.
|
|||
|
|
|||
|
I soon had a collection of accounts widely scattered around
|
|||
|
the continent: at the University of Chicago, at the Pennsylvania
|
|||
|
State University, at Johns Hopkins, at Lawrence-Berkeley Laboratories
|
|||
|
and a number of commercial and government sites.
|
|||
|
|
|||
|
However, the deadly mistake of hacking close to home was my downfall.
|
|||
|
I thought I was untouchable and infallible, and in a regrettable accident I
|
|||
|
destroyed the /etc/groups file at the Software Engineering Laboratory at Penn
|
|||
|
State, due to a serious lapse in judgment combined with a series of
|
|||
|
typographical errors. This is the only action for which I should have been
|
|||
|
held accountable; however, as you shall see, it is the only action for which
|
|||
|
I was not penalized in any way.
|
|||
|
|
|||
|
I halt the narrative here to deliver some advice suggested by my
|
|||
|
mistakes.
|
|||
|
|
|||
|
My first piece of advice is: avoid the destruction of information by not
|
|||
|
altering any information beyond that necessary to maintain
|
|||
|
access and avoid detection. Try to protect yourself from typographical
|
|||
|
errors by backing up information. My lack of consideration in this
|
|||
|
important regard cost Professor Dhamir Mannai many hours
|
|||
|
reconstructing the groups file. Dhamir plays a major role in the
|
|||
|
ensuing fracas, and turned out very sympathetic. I must
|
|||
|
emphasize that the computer security people with whom we have such
|
|||
|
fun are often decent people. Treat a system you have invaded as
|
|||
|
you would wish someone to treat your system if they had done the
|
|||
|
same to you. Protect both the system and yourself. Damage to the system
|
|||
|
will have a significant effect on any criminal case which is filed
|
|||
|
against you. Even the harshest of judges is likely to respond to a
|
|||
|
criminal case with a bewildered dismissal if no damage is alleged.
|
|||
|
However, if there is any damage to a system, the police will most certainly
|
|||
|
allege that you maliciously damaged the machine. It is their job
|
|||
|
to do so.
|
|||
|
|
|||
|
My second piece of advice is: avoid hacking systems geographically
|
|||
|
local to you, even by piggybacking multiple connections across the
|
|||
|
country and back to mask your actions. In any area there is a limited
|
|||
|
number of people both capable of and motivated to hack.
|
|||
|
When the local security gurus hear that a hacker is on the loose,
|
|||
|
they will immediately check their mental list of people who fit the
|
|||
|
profile. They are in an excellent position to monitor their own network.
|
|||
|
Expect them to do so.
|
|||
|
|
|||
|
I now return to my narrative.
|
|||
|
|
|||
|
Almost simultaneous with my activities, the Computer Emergency Response
|
|||
|
Team was formed in the wake of the Morris Worm, and was met with an
|
|||
|
almost palpable lack of computer crime worth prosecuting.
|
|||
|
They began issuing grimly-worded advisories about the ghastly horrors
|
|||
|
lurking about the Internet, and warned of such dangerous events as
|
|||
|
the WANK (Worms Against Nuclear Killers) worm, which displayed
|
|||
|
an anti-nuclear message when a user logged on to an infected
|
|||
|
machine.
|
|||
|
|
|||
|
To read the newspaper article concerning Dale and me, a person who
|
|||
|
collects guest accounts is, if not Public Enemy Number One, at least
|
|||
|
a major felon who can only be thwarted by the combined efforts of
|
|||
|
a major university's police division, two computer science departments,
|
|||
|
and Air Force Intelligence, which directly funds CERT.
|
|||
|
|
|||
|
Matt Crawford, at the University of Chicago, notified CERT of my
|
|||
|
intrusions into their computer systems. The slow machinery
|
|||
|
of justice began to creak laboriously into motion. As I had
|
|||
|
taken very few precautions, they found me within two weeks.
|
|||
|
|
|||
|
As it happens, both the Penn State and University of Chicago
|
|||
|
systems managers had publicly boasted about the impenetrability of
|
|||
|
their systems, and perhaps this contributed to their rancor at discovering
|
|||
|
that the nefarious computer criminal they had apprehended was a
|
|||
|
Comparative Literature major who had failed his only computer science
|
|||
|
course.
|
|||
|
|
|||
|
|
|||
|
IV. In the Belly of the Beast
|
|||
|
|
|||
|
When we arrived at the police station, the police left me in a room
|
|||
|
alone for approximately half an hour. My first response was to check
|
|||
|
the door of the room. It was unlocked. I checked the barred
|
|||
|
window, which was locked, but could be an escape if necessary.
|
|||
|
Then, with nothing to do, I considered my options. I considered
|
|||
|
getting up and leaving, and saying that I had nothing to discuss
|
|||
|
with them. This was a sensible option at the outset, I thought,
|
|||
|
but certainly not sensible now. This was a repetition of
|
|||
|
a mistake; I could have stopped talking to them at any time.
|
|||
|
|
|||
|
Finally, I assumed the lotus position on the table in order to collect my
|
|||
|
thoughts. When I had almost collected my thoughts, Anne Rego and Sam
|
|||
|
Ricciotti returned to the room, accompanied by two men I took to be criminals
|
|||
|
at first glance: a scruffy, corpulent, bearded man I mentally tagged as a
|
|||
|
public indecency charge; and a young man with the pale and flaccid ill-health
|
|||
|
of a veal calf, perhaps a shoplifter. However, the pair was Professor Robert
|
|||
|
Owens of the computer science department and Daniel Ehrlich, Owens' student
|
|||
|
flunky.
|
|||
|
|
|||
|
Professor Owens sent Ehrlich out of the room on some trivial
|
|||
|
errand. Ricciotti began the grilling. First, he requested
|
|||
|
that I sign a document waiving my Miranda rights. He explained that it
|
|||
|
was as much for my benefit as for theirs. I laughed out loud. However,
|
|||
|
I thought that as I had done nothing wrong, I should have no fear of
|
|||
|
talking to them, and I signed the fatal document.
|
|||
|
|
|||
|
I assumed that what I was going to say would be taken at
|
|||
|
face value, and that my innocence was invulnerable armor.
|
|||
|
Certainly I had made a mistake, but this could be explained, could it
|
|||
|
not? Despite my avowed radical politics, my fear of authority was
|
|||
|
surpassed by a trust for apparent sincerity.
|
|||
|
|
|||
|
As they say, a con's the easiest mark there is.
|
|||
|
|
|||
|
I readily admitted to collecting guest accounts, as I found nothing
|
|||
|
culpable in using a guest account, my reasoning being that if a public
|
|||
|
building had not only been unlocked, but also a door in that
|
|||
|
building had been clearly marked as for a "Guest," and that door opened
|
|||
|
readily, then no one would have the gall to arrest someone for trespass, even
|
|||
|
if other, untouched parts of the building were marked
|
|||
|
"No Visitors." Using a 'guest' account is no more computer crime than
|
|||
|
using a restroom in a McDonald's is breaking-and-entering.
|
|||
|
|
|||
|
Ricciotti continued grilling me, and I gave him further information.
|
|||
|
I fell prey to the temptation to explain to him what he clearly did
|
|||
|
not understand. If you are ever in a similar circumstance, do not do
|
|||
|
so. The opaque ignorance of a police officer is, like a well-
|
|||
|
constructed security system, a very tempting challenge to a hacker.
|
|||
|
However, unlike the security system, the ignorance of a police
|
|||
|
officer is uncrackable.
|
|||
|
|
|||
|
If you attempt to explain the Internet to a police officer investigating
|
|||
|
you for a crime, and the notion of leased WATS lines seems
|
|||
|
a simple place to start, it will be seen as evidence of some vast,
|
|||
|
bizarre conspiracy. The gleam in the cop's eye is not one of
|
|||
|
comprehension; it is merely the external evidence that a power fantasy
|
|||
|
is running in the cop's brain. "I," the cop thinks, "will definitely be
|
|||
|
Cop of the Year! I'm going to find out more about this Internet thing
|
|||
|
and bust the people responsible."
|
|||
|
|
|||
|
Perhaps you will be lucky or unlucky enough to be busted by a cop
|
|||
|
who has some understanding of technical issues. Never having been
|
|||
|
busted by a computer-literate cop, I have no opinion as to whether
|
|||
|
this would be preferable. However, having met more cops than I care to
|
|||
|
remember, I can tell you that the chances are slim that you will meet a cop
|
|||
|
capable of tying shoelaces in the morning. The chances of meeting a cop
|
|||
|
capable of understanding the Internet are nearly nonexistent.
|
|||
|
|
|||
|
Apparently, this is changing, but by no means as rapidly
|
|||
|
as the volatile telecommunications scene. At present, the cop who busts
|
|||
|
you might have a Mac hooked up to NCIC and be able to use it clumsily;
|
|||
|
or may be able to cope with the user interface of a BBS, but don't
|
|||
|
bother trying to explain anything if the cop doesn't understand you.
|
|||
|
|
|||
|
If the cop understands you, you have no need to explain; if not, you
|
|||
|
are wasting your time. In either case, you are giving the police the
|
|||
|
rope they need to hang you.
|
|||
|
|
|||
|
You have nothing to gain by talking to the police. If you are not under
|
|||
|
arrest, they can do nothing to you if you refuse to speak to them. If you
|
|||
|
must speak to them, insist on having an attorney present. As edifying as it
|
|||
|
is to get a first-hand glimpse of the entrenched ignorance of the law-
|
|||
|
enforcement community, this is one area of knowledge where book-learning is
|
|||
|
far preferable to hands-on experience. Trust me on this one.
|
|||
|
|
|||
|
If you do hack, do not use your personal computing equipment and
|
|||
|
do not do it from your home. To do so is to invite them to confiscate every
|
|||
|
electronic item in your house from your telephone to your microwave. Expert
|
|||
|
witnesses are willing to testify that anything taken could be used for illegal
|
|||
|
purposes, and they will be correct.
|
|||
|
|
|||
|
Regardless of what they may say, police have no authority to offer
|
|||
|
you anything for your cooperation; they have the power to tell the
|
|||
|
magistrate and judge that you cooperated. This and fifty cents will
|
|||
|
get you a cup of coffee.
|
|||
|
|
|||
|
Eventually, the session turned into an informal debate with Professor
|
|||
|
Owens, who showed an uncanny facility for specious argument and
|
|||
|
proof by rephrasing and repeating. The usual argument ensued,
|
|||
|
and I will encapsulate rather than include it in its entirety.
|
|||
|
|
|||
|
"If a bike wasn't locked up, would that mean it was right to steal it or
|
|||
|
take it for a joyride?"
|
|||
|
|
|||
|
"That argument would hold if a computer were a bike; and if the bike
|
|||
|
weren't returned when I was done with it; and if, in fact, the bike
|
|||
|
hadn't been in the same damn place the whole time you assert it was
|
|||
|
stolen."
|
|||
|
|
|||
|
"How do you justify stealing the private information of others?"
|
|||
|
|
|||
|
"For one thing, I didn't look at anyone's private information.
|
|||
|
In addition, I find the idea of stealing information so grotesque
|
|||
|
as to be absurd. By the way, how do you justify working for Penn State, an
|
|||
|
institution that condoned the illegal sale of the Social Security
|
|||
|
Numbers of its students?"
|
|||
|
|
|||
|
"Do you realize what you did is a crime?" interjected Ricciotti.
|
|||
|
|
|||
|
"No, I do not, and after reading this law you've shown me, I still
|
|||
|
do not believe that what I did violates this law. Beyond that, what
|
|||
|
happened to presumed innocent until proven guilty?"
|
|||
|
|
|||
|
The discussion continued in a predictable vein for about two hours,
|
|||
|
when we adjourned until the next day. Sam sternly advised me that as
|
|||
|
this was a criminal investigation in progress, I was not to tell
|
|||
|
anyone anything about it. So, naturally, I immediately told
|
|||
|
everyone I knew everything I knew about it.
|
|||
|
|
|||
|
With a rapidly mounting paranoia, I left the grim, cheerless
|
|||
|
interrogation room and walked into the bustle of an autumn day
|
|||
|
at Penn State, feeling strangely separate from the crowd around
|
|||
|
me, as if I had been branded with a scarlet 'H.'
|
|||
|
|
|||
|
I took a circuitous route, often doubling back on myself, to detect
|
|||
|
tails, and when I was sure I wasn't being followed, I headed straight
|
|||
|
for a phone booth to call the Electronic Music Lab.
|
|||
|
|
|||
|
The phone on the other end was busy. This could only mean one thing,
|
|||
|
that Dale was online. His only crime was that he borrowed an
|
|||
|
account from the legitimate user, and used the Huang account
|
|||
|
at the Engineering Computer Lab, but I realized after my discussion
|
|||
|
with the police that they would certainly not see the matter as
|
|||
|
I did.
|
|||
|
|
|||
|
I realized that the situation had the possibility to erupt into
|
|||
|
a very ugly legal melee. Even before Operation Sun-Devil, I realized
|
|||
|
that cops have a fondness for tagging anything a conspiracy
|
|||
|
if they feel it will garner headlines. I rushed to the Lab.
|
|||
|
|
|||
|
|
|||
|
V. A Desperate Conference
|
|||
|
|
|||
|
"Get off the computer now! I've been busted!"
|
|||
|
|
|||
|
"This had better not be a goddamn joke."
|
|||
|
|
|||
|
He rapidly disconnected from his session and turned off the computer.
|
|||
|
We began to weigh options. We tried to figure out the worst thing they
|
|||
|
could do to me. Shortly, we had a list of possibilities. The police
|
|||
|
could jail me, which seemed unlikely. The police could simply forget
|
|||
|
about the whole thing, which seemed very unlikely. Anything between
|
|||
|
those two poles was possible. Anything could happen, and as I was
|
|||
|
to find, anything would. We planned believing that it was only
|
|||
|
I who was in jeopardy.
|
|||
|
|
|||
|
If you are ever busted, you will witness the remarkable migration
|
|||
|
habits of the fair-weather friend. People who yesterday had
|
|||
|
nothing better to do than sit around and drink your wine will
|
|||
|
suddenly have pressing duties elsewhere.
|
|||
|
|
|||
|
If you are lucky, perhaps half a dozen people will consent to speak
|
|||
|
to you. If you are very lucky, three of them will be willing to be
|
|||
|
seen with you in public.
|
|||
|
|
|||
|
Very shortly the police would begin going after everyone I knew for no other
|
|||
|
reason than that they knew me. I was very soon to be given yet another of the
|
|||
|
blessings accorded to those in whom the authorities develop an interest.
|
|||
|
|
|||
|
I would discover my true friends.
|
|||
|
|
|||
|
I needed them.
|
|||
|
|
|||
|
|
|||
|
VI. The Second Interrogation
|
|||
|
|
|||
|
I agreed to come in for a second interview.
|
|||
|
|
|||
|
At this interview, I was greeted by two new cops. The first cop,
|
|||
|
with the face of an unsuccessful pugilist, was Jeffery Jones.
|
|||
|
I detested him on sight.
|
|||
|
|
|||
|
The second, older cop, with brown hair and a mustache, was Wayne
|
|||
|
Weaver, and had an affable, but stern demeanor, somewhat reminiscent
|
|||
|
of a police officer in a fifties family sitcom.
|
|||
|
|
|||
|
As witness to this drama, a battered tape recorder sat between us
|
|||
|
on the wooden table. In my blithe naivete, I once again waived
|
|||
|
my Miranda rights, this time on tape.
|
|||
|
|
|||
|
The interview began with a deranged series of accusations by Jeffery
|
|||
|
Jones, in which were combined impossibilities, implausibilities,
|
|||
|
inaccuracies and incongruities. He accused me of everything
|
|||
|
from international espionage to electronic funds transfer. Shortly
|
|||
|
he exhausted his vocabulary with a particularly difficult
|
|||
|
two-syllable word and lapsed into silence.
|
|||
|
|
|||
|
Wayne filled the silence with a soft-spoken inquiry, seemingly
|
|||
|
irrelevant to the preceding harangue. I answered, and we began
|
|||
|
a more sane dialogue.
|
|||
|
|
|||
|
Jeffery Jones remained mostly silent. He twiddled his thumbs, studied
|
|||
|
the intricacies of his watch, and investigated the gum stuck under the table.
|
|||
|
Occasionally he would respond to a factual statement by rapidly turning,
|
|||
|
pounding the table with his fists and shouting: "We know you're lying!"
|
|||
|
|
|||
|
Finally, after one of Jeffery's outbursts, I offered to terminate the
|
|||
|
interview if this silliness were to continue. After a brief consultation
|
|||
|
with Wayne, we reached an agreement of sorts and Jeff returned to a dumb,
|
|||
|
stony silence.
|
|||
|
|
|||
|
I was convinced that Wayne and Jeff were pulling the good cop/bad cop
|
|||
|
routine, having seen the mandatory five thousand hours of cop shows the
|
|||
|
Nielsen people attribute to the average American. This was, I thought,
|
|||
|
standard Mutt and Jeff. I was to change my opinion. This was not good
|
|||
|
cop/bad cop. It was smart cop/dumb cop. And, more frighteningly, it
|
|||
|
was no act.
|
|||
|
|
|||
|
After some more or less idle banter, and a repetition of my previous
|
|||
|
story, and a repetition of my refusal to answer certain other questions,
|
|||
|
the interrogation began to turn ugly.
|
|||
|
|
|||
|
Frustrated by my refusal to answer, he suddenly announced that he knew
|
|||
|
I was involved in a conspiracy, and made an offer to go easy on me if
|
|||
|
I would tell him who else was involved in the conspiracy.
|
|||
|
|
|||
|
I refused point-blank, and said that it was despicable of him to
|
|||
|
request that I do any such thing. He began to apply pressure and
|
|||
|
I will provide a reconstruction of the conversation. As the police
|
|||
|
have refused all requests by me to receive transcripts of interviews,
|
|||
|
evidence and information regarding the case, I am forced to rely on
|
|||
|
memory.
|
|||
|
|
|||
|
"These people are criminals. You'd be doing the country a service
|
|||
|
by giving us their names."
|
|||
|
|
|||
|
"What people are criminals? I don't know any criminals."
|
|||
|
|
|||
|
"Don't give me that. We just want their names. We won't do
|
|||
|
anything except ask them for information."
|
|||
|
|
|||
|
"Yeah, sure. Like I said, I don't know any criminals. I'm not a criminal,
|
|||
|
and I won't turn in anyone for your little witch-hunt, because I don't
|
|||
|
know any criminals, and I'd be lying if I gave you any names."
|
|||
|
|
|||
|
"You're not going to protect anyone. We'll get them anyway."
|
|||
|
|
|||
|
"If you're going to get them, you don't need my help."
|
|||
|
|
|||
|
"We won't tell anyone that you told them about us."
|
|||
|
|
|||
|
"Fuck that. I'll know I did it. How does that affect the morality
|
|||
|
of it, anyway?"
|
|||
|
|
|||
|
Dropping the moral argument, he went to the emotional argument:
|
|||
|
|
|||
|
"If you help us, we'll help you. When you won't help us, you
|
|||
|
stand alone. Those people don't care about you, anyway."
|
|||
|
|
|||
|
"What people? I don't know any people."
|
|||
|
|
|||
|
"Just people who could help us with our investigation. It doesn't
|
|||
|
mean that they're criminals."
|
|||
|
|
|||
|
"I don't know anything about any criminals I said."
|
|||
|
|
|||
|
"In fact, one of your friends turned you in. Why should you take
|
|||
|
this high moral ground when you're a criminal anyway, and they'd
|
|||
|
do the same thing to you if they were in the situation you're in.
|
|||
|
You just have us now, and if you won't stand with us, you stand
|
|||
|
alone."
|
|||
|
|
|||
|
"I don't have any names. And no one I knew turned me in."
|
|||
|
|
|||
|
This tactic, transparent as it was, instilled a worm of doubt in my mind.
|
|||
|
That was its purpose.
|
|||
|
|
|||
|
This is the purpose of any of the blandishments, threats and lies
|
|||
|
that the police will tell you in order to get names from you. They
|
|||
|
will attempt to make it appear as if you will not be harming the
|
|||
|
people you tell them about. Having been told that hackers are just
|
|||
|
adolescent pranksters who will crack like eggs at the slightest
|
|||
|
pressure and cough up a speech of tearful remorse and hundreds of
|
|||
|
names, they will be astonished at your failure to give them names.
|
|||
|
|
|||
|
I will here insert a statement of ethics, rather than the merely
|
|||
|
practical advice which I have heretofore given. If you crack at the
|
|||
|
slightest pressure, don't even bother playing cyberpunk. If
|
|||
|
your shiny new gadget with a Motorola 68040 chip and gee-whiz
|
|||
|
lightning Weitek math co-processor is more important to you than
|
|||
|
the lives of your friends, and you'd turn in your own grandmother
|
|||
|
rather than have it confiscated, please fuck off. The computer underground
|
|||
|
does not need you and your lame calling-card and access code rip-offs.
|
|||
|
Grow up and get a job at IBM doing the same thing a million
|
|||
|
other people just like you are doing, buy the same car a million
|
|||
|
other people just like you have, and go to live in the same suburb
|
|||
|
that a million other people like you call home, and die quietly at
|
|||
|
an old age in Florida. Don't go down squealing like a pig,
|
|||
|
deliberately and knowingly taking everyone you know with you.
|
|||
|
|
|||
|
If you run the thought-experiment of imagining yourself in this
|
|||
|
situation, and wondering what you would do, and this description
|
|||
|
seems very much like what meets you in the bathroom mirror, please
|
|||
|
stop hacking now.
|
|||
|
|
|||
|
However, if you feel you must turn someone in to satisfy the cops,
|
|||
|
I can only give the advice William S. Burroughs gives in _Junky_
|
|||
|
to those in a similar situation: give them names they already have, without
|
|||
|
any accompanying information; give them the names of people who have left the
|
|||
|
country permanently. Be warned, however, that giving false information to the
|
|||
|
police is a crime; stick to true, but entirely useless information.
|
|||
|
|
|||
|
Now, for those who do not swallow the moral argument for not finking,
|
|||
|
I offer a practical argument. If you tell the police about
|
|||
|
others you know who have committed crimes, you have admitted
|
|||
|
your association with criminals, bolstering their case
|
|||
|
against you. You have also added an additional charge against
|
|||
|
yourself, that of conspiracy. You have fucked over the very
|
|||
|
friends you will sorely need for support in the near future,
|
|||
|
because the investigation will drag on for months, leaving your life
|
|||
|
in a shambles. You will need friends, and if you have sent
|
|||
|
them all up the river, you will have none. Worse, you will
|
|||
|
deserve it. You have confessed to the very crimes you
|
|||
|
are denying, making it difficult for you to stop giving them
|
|||
|
names if you have second thoughts. They have the goods on you.
|
|||
|
|
|||
|
In addition, any offers they make if you will give them names are legally
|
|||
|
invalid and non-binding. They can't do jack-shit for you and wouldn't if they
|
|||
|
could. The cop mind is still a human mind, and there is nothing more
|
|||
|
despicable to the human mind than a traitor.
|
|||
|
|
|||
|
Do not allow yourself to become something that you can not tolerate being.
|
|||
|
Like Judas, the traitor commits suicide both figuratively and literally.
|
|||
|
|
|||
|
I now retire from the soapbox and return to the confessional.
|
|||
|
|
|||
|
My motives were pure and my conscience was clean. With a sense
|
|||
|
of self-righteousness unbecoming in a person my age, I assumed that
|
|||
|
my integrity was invulnerability, and that my refusal to give them
|
|||
|
any names was going to prevent them from fucking over my friends.
|
|||
|
|
|||
|
I had neglected to protect my email. I had not encrypted my
|
|||
|
communications. I had not carefully deleted any incriminating
|
|||
|
information from my disks, and because of this I am as guilty
|
|||
|
as the people who blithely rat out their friends. I damaged
|
|||
|
the lives of a number of people by my carelessness, a number of
|
|||
|
people who had more at stake than I had, and all my good intentions
|
|||
|
were not worth a damn. I had one encrypted file, that a list
|
|||
|
of compromised systems and account names, and that was DES encrypted
|
|||
|
with a six-character alphanumeric.
|
|||
|
|
|||
|
As I revelled in my self-righteousness, Dan Ehrlich and Robert Owens
|
|||
|
arrived with a two-foot high pile of hardcopy on which was printed
|
|||
|
every file on my PSUVM accounts, including at least a year of email
|
|||
|
and all my posts to the net, including those in groups such as
|
|||
|
alt.drugs, and articles by other people.
|
|||
|
|
|||
|
Wayne assumed that any item on the list, even saved posts from other
|
|||
|
people, was something that had been sent to me personally by its
|
|||
|
author, and that these people were, thus, involved in some vast conspiracy.
|
|||
|
While keeping the printed email out of my sight, he began listing
|
|||
|
names and asking me for information about that person. I answered,
|
|||
|
for every person, that I knew nothing about that person except what
|
|||
|
they knew. He asked such questions as "What is Emily Postnews'
|
|||
|
real name, and how is she involved in the conspiracy?"
|
|||
|
|
|||
|
Ehrlich and Owens had conveniently disappeared, so I couldn't expect them to
|
|||
|
explain the situation to Wayne; and had, myself, given up any attempt to
|
|||
|
explain, realizing that anything I said would simply reinforce the cops'
|
|||
|
paranoid conspiracy theories. By then, I was refusing to answer practically
|
|||
|
every question put to me, and finally realized I was outgunned. When I had
|
|||
|
arrived, I was puffed up with bravado and certain that I could talk my way out
|
|||
|
of this awful situation. Having made rather a hash of it as a hacker, I
|
|||
|
resorted to my old standby, my tongue, with which I had been able
|
|||
|
to escape any previous situation. However, not only had I not talked
|
|||
|
my way out of being busted, I had talked my way further into it.
|
|||
|
|
|||
|
If you believe, from years of experience at social engineering,
|
|||
|
that you will be able to talk your way out of being busted, I wish
|
|||
|
you luck; but don't expect it to happen. If you talk with the police, and
|
|||
|
you are not under arrest at the time, expect that one or two of
|
|||
|
your sentences will be able to be taken out of context and used
|
|||
|
as a justification for issuing an arrest warrant. If you talk with
|
|||
|
the police and you are under arrest, the Miranda statement: "Anything
|
|||
|
you say can and will be held against you in a court of law," is perhaps
|
|||
|
the only true statement in that litany of lies.
|
|||
|
|
|||
|
In any case, my bravado had collapsed. I still pointedly
|
|||
|
called the cops "Wayne" and "Jeff," but otherwise, resorted to
|
|||
|
repeating mechanically that I knew nothing about nothing.
|
|||
|
|
|||
|
Owens and Ehrlich returned, and announced that they had discovered
|
|||
|
an encrypted file on my account, called holy.nodes. I bitterly regretted
|
|||
|
the flippant name, and the arrogance of keeping such a file.
|
|||
|
|
|||
|
If you must have an encrypted list of passwords and accounts
|
|||
|
sitting around, at least give it a name that makes it seem like some
|
|||
|
sort of executable, so that you have plausible deniability.
|
|||
|
|
|||
|
They assured me that they could decrypt it within six hours on a
|
|||
|
Cray Y-MP to which they had access. I knew that the Computer Science
|
|||
|
Department had access to a Cray at the John von Neuman Computer Center.
|
|||
|
I made a brief attempt to calculate the rate of brute-force password
|
|||
|
cracking on a Cray and couldn't do it in my head. However, as
|
|||
|
the password was only six alphanumeric characters, I realized that it
|
|||
|
was quite possible that it could be cracked. I believe now that
|
|||
|
I should have called their bluff, but I gave them the key, yet another
|
|||
|
in a series of stupid moves.
|
|||
|
|
|||
|
Shortly, they had a list of computer sites, accounts and passwords,
|
|||
|
and Wayne began grilling me on those. Owens was livid when he noted
|
|||
|
that a machine at Lawrence-Berkeley Labs, shasta.lbl.gov, was in the
|
|||
|
list. This was when my trouble started.
|
|||
|
|
|||
|
You might recall that Lawrence-Berkeley Labs figures prominently in
|
|||
|
Clifford Stoll's book _The Cuckoo's Egg_. The Chaos Computer
|
|||
|
Club had cracked a site there in the mistaken belief that it was Lawrence-
|
|||
|
Livermore. As it happens, I had merely noticed a guest account there,
|
|||
|
logged in and done nothing further. Of course, this was too
|
|||
|
simple an explanation for a cop to believe it.
|
|||
|
|
|||
|
Owens had given the police a tiny bit of evidence to support the
|
|||
|
bizarre structure of conspiracy theories they had built; and a paranoid
|
|||
|
delusion, once validated in even the most inconsequential manner, becomes
|
|||
|
unshakably firm.
|
|||
|
|
|||
|
Wayne returned to the interrogation with renewed vigor. I continued
|
|||
|
giving answers to the effect that I knew nothing. He came to the name of
|
|||
|
Raymond Gary [*], who had generously allowed me to use an old account on
|
|||
|
PSUVM, that of a friend of his who had left the area. I attempted to assure
|
|||
|
them of his innocence. This was another bad move.
|
|||
|
|
|||
|
It was a bad move because this immediately reinforces the conspiracy
|
|||
|
theory, and the cops wish to have more information on that
|
|||
|
person. I obfuscated, and returned to the habit of repeating: "Not to
|
|||
|
the best of my recollection," as if I were in the Watergate hearings.
|
|||
|
|
|||
|
Another name surfaced, that of a person who had allowed me to use his
|
|||
|
account because our respective machines could not manage a tolerable
|
|||
|
talk connection. This person, without his knowledge, joined the
|
|||
|
conspiracy. Once again, I foolishly tried to explain the situation.
|
|||
|
This simply made it worse, as the cop did not understand a word
|
|||
|
I was saying; and Owens was incapable of appreciating the difference
|
|||
|
between violating the letter of the law and the spirit of the law.
|
|||
|
|
|||
|
Wayne repeatedly asked about my overseas friends, informed me that he knew
|
|||
|
there were foreign governments involved, again told me that a friend of mine
|
|||
|
had informed on me. I was told lies so outrageous that I hesitate to put them
|
|||
|
on paper. I denied everything.
|
|||
|
|
|||
|
I made another lengthy attempt at explanation, trying to defuse the conspiracy
|
|||
|
theory, and gave a speech on the difference between breaking into someone's
|
|||
|
house and ripping off everything there, voyeuristically spying on people, and
|
|||
|
temporarily borrowing an account simply to talk to someone because a network
|
|||
|
link was not working. I made an analogy between this and asking
|
|||
|
someone who is driving a corporate vehicle to give a jump to a
|
|||
|
disabled vehicle, and tried to explain that this was certainly not
|
|||
|
the same as if the authorized user of the corporate vehicle had simply
|
|||
|
handed a passerby the keys. I again attempted to explain the Internet, leased
|
|||
|
lines, the difference between FTP and mail, why everyone on the Internet
|
|||
|
allowed anyone else to transfer files from, to and through their machines, and
|
|||
|
once again failed to explain anything.
|
|||
|
|
|||
|
Directly following this tirade, delivered almost at a shout, Wayne
|
|||
|
leaned over the desk and asked me: "Who's Bubba?"
|
|||
|
|
|||
|
This was too much to tolerate. My ability to take the situation
|
|||
|
seriously, already very shaky, simply vanished in the face of
|
|||
|
this absurdity. I lost it entirely. I laughed hysterically.
|
|||
|
|
|||
|
I asked, my anger finally getting the better of my amusement: "What the
|
|||
|
fuck kind of question is that?"
|
|||
|
|
|||
|
He repeated the question, not appreciating the humor inherent in
|
|||
|
this absurd contretemps; I was beyond trying to maintain the appearance
|
|||
|
of solemnity. Everything, the battered table, the primitive
|
|||
|
tape recorder, the stony-faced cops, the overweight computer security
|
|||
|
guys, seemed entirely empty of meaning. I could no longer accept as real that
|
|||
|
I was in this dim room with a person asking me the question: "Who's Bubba?"
|
|||
|
|
|||
|
I said: "I have no idea. You tell me."
|
|||
|
|
|||
|
Finally, Wayne came to Dale's name. Dale did not use his last name
|
|||
|
in any of the email he had sent to me, and I hoped that his name
|
|||
|
was not in any file on any machine anywhere. I recovered some of
|
|||
|
my equilibrium, and refused to answer.
|
|||
|
|
|||
|
A number of references to "lab supplies" were made in the email, and
|
|||
|
I was questioned as to the meaning of this phrase. I answered that
|
|||
|
it simply meant quarter-inch reels of tape for music. They refused
|
|||
|
to accept this explanation, and accused me of running a drug ring over
|
|||
|
the computer network.
|
|||
|
|
|||
|
Veiled threats, repetitions of the question, rephrasings of it,
|
|||
|
assurances that they were going to get everyone anyway, and similar
|
|||
|
cop routines followed.
|
|||
|
|
|||
|
Finally, having had altogether too much of this nonsense, I
|
|||
|
said: "This interview's over. I'm leaving." As simply as that,
|
|||
|
and as quickly, I got up and left. I wish I could say that I did
|
|||
|
not look back, but I did glance over my shoulder as I left.
|
|||
|
|
|||
|
"We'll be in touch," said Wayne.
|
|||
|
|
|||
|
"Yeah, sure," I said.
|
|||
|
|
|||
|
|
|||
|
VII. Thirty Pieces of Silver
|
|||
|
|
|||
|
I informed Dale of the ominous turn in the investigation, and
|
|||
|
told him that the cops were now looking for him. From a sort of fatalistic
|
|||
|
curiosity, we logged into Shamir's account to watch the activities
|
|||
|
of the computer security guys, and to confer with some of their
|
|||
|
associates to find out what their motivations might be. We had
|
|||
|
decided that the possibility of a wiretap was slim, and that if
|
|||
|
there were a wiretap, we were doomed anyway, so what the hell?
|
|||
|
|
|||
|
There is no conclusive evidence that there was a wiretap, but
|
|||
|
the police would not have needed a warrant to tap university
|
|||
|
phones, as they are on a private branch exchange, which does
|
|||
|
not qualify for legal protection. In addition, one bit of
|
|||
|
circumstantial evidence strikes me as indicative of the possibility
|
|||
|
of a wiretap, that being that when Dale called Shamir to explain
|
|||
|
the situation, and left a message in his voice mail box, the
|
|||
|
message directly following Dale's was from Wayne.
|
|||
|
|
|||
|
We frequented the library, researching every book dealing with the subject of
|
|||
|
computer crime, reading the Pennsylvania State Criminal Code, photocopying and
|
|||
|
transcribing important texts, and compiling a disk of information relevant to
|
|||
|
the case, including any information that someone "on the outside" would need
|
|||
|
to know if we were jailed.
|
|||
|
|
|||
|
I badly sprained my ankle in this period, but walked on it for three
|
|||
|
miles, and it was not until later in the night that I even realized
|
|||
|
there was anything wrong with it, so preoccupied was I by the bizarre
|
|||
|
situation in which I was embroiled. In addition, an ice storm developed,
|
|||
|
leaving a thin layer of ice over sidewalks, roads and the skeletal
|
|||
|
trees and bushes. I must have seemed a ridiculous figure hobbling
|
|||
|
across the ice on a cane, looking over my shoulder every few seconds;
|
|||
|
and attempting to appear casual whenever a police car passed.
|
|||
|
|
|||
|
It seemed that wherever I went, there was a police car which slowed
|
|||
|
to my pace, and it always seemed that people were watching me. I
|
|||
|
tried to convince myself that this was paranoia, that not everyone
|
|||
|
could be following me, but the feeling continued to intensify, and
|
|||
|
I realized that I had adopted the mentality of the cops,
|
|||
|
that we were, essentially, part of the same societal process; symbiotic
|
|||
|
and necessary to each other's existence. The term 'paranoia' had no
|
|||
|
meaning when applied to this situation; as there were, indeed, people
|
|||
|
out to get me; people who were equally convinced that I was out to
|
|||
|
get them.
|
|||
|
|
|||
|
I resolved to accept the situation, and abide by its unspoken rules.
|
|||
|
As vast as the texts are which support the law, there is another
|
|||
|
entity, The Law, which is infinite and can not be explained in
|
|||
|
any number of words, codes or legislation.
|
|||
|
|
|||
|
Dale and I painstakingly weighed our options.
|
|||
|
|
|||
|
Finally, Dale decided that he was going to contact the police, and
|
|||
|
called a friend of his in the police department to ask for assistance
|
|||
|
in doing so, Stan Marks [*], who was also an electronic musician.
|
|||
|
On occasion, Stan would visit us in the Lab, turning off his walkie-
|
|||
|
talkie to avoid the irritation of the numerous trivial assignments
|
|||
|
which comprise the day-to-day life of the university cop.
|
|||
|
After conferring with Stan, he decided simply to call Wayne and
|
|||
|
Jeff on the phone to arrange an interview.
|
|||
|
|
|||
|
I felt like shit. The repercussions of my actions were spreading
|
|||
|
like ripples on a pond, and were to disrupt the lives of several of
|
|||
|
my dearest friends. At the same time, I was enraged. How
|
|||
|
dare they do this? What had I done that warranted this torturous
|
|||
|
and ridiculous investigation? Wasn't this investigation enough of
|
|||
|
a punishment just in and of itself?
|
|||
|
|
|||
|
I wondered how many more innocent people would have to be fucked
|
|||
|
over before the police would be satisfied, and wondered how many
|
|||
|
innocent people, every day, are similarly fucked over in other
|
|||
|
investigations. How many would it take to satisfy the cops?
|
|||
|
The answer is, simply, every living person.
|
|||
|
|
|||
|
If you believe that your past, however lily-white, would withstand
|
|||
|
the scrutiny of an investigation of several months' duration, with
|
|||
|
every document and communication subjected to minute investigation,
|
|||
|
you are deluding yourself. To the law-enforcement mentality, there
|
|||
|
are no innocent people. There are only undiscovered criminals.
|
|||
|
|
|||
|
Only if we are all jailed, cops and criminals alike, will the machinery lie
|
|||
|
dormant, to rust its way to gentle oblivion; and only then will the ruins be
|
|||
|
left undisturbed for the puzzlement of future archaeologists.
|
|||
|
|
|||
|
With these thoughts, I waited as Dale went to the police station,
|
|||
|
with the realization that I was a traitor by inaction, by having
|
|||
|
allowed this to happen.
|
|||
|
|
|||
|
I was guilty, but this guilt was not a matter of law. My innocent
|
|||
|
actions were those which were to be tried.
|
|||
|
|
|||
|
If you are ever busted, you will witness this curious inversion of
|
|||
|
morality, as if by entering the world of cops you have walked
|
|||
|
through a one-way mirror, in which your good actions are suddenly
|
|||
|
and arbitrarily punished, and the evil you have done is rewarded.
|
|||
|
|
|||
|
|
|||
|
VIII. Third and Fourth Interrogations
|
|||
|
|
|||
|
I waited anxiously for Dale to return from his meeting. He had
|
|||
|
brought with him a professional tape recorder, in order to tape
|
|||
|
the interview. The cops were rather upset by this turn
|
|||
|
of events, but had no choice but to allow him to tape. While they
|
|||
|
attempted to get their tape recorder to work, he offered to loan
|
|||
|
them a pair of batteries, as theirs were dead.
|
|||
|
|
|||
|
The interrogation followed roughly the same twists and turns as
|
|||
|
mine had, with more of an emphasis on the subject of "lab supplies."
|
|||
|
Question followed question, and Dale insisted that his actions were innocent.
|
|||
|
|
|||
|
"Hell, if we'd have had a couple of nice women, none of this
|
|||
|
would even have happened," he said.
|
|||
|
|
|||
|
When asked about the Huang account that Ron Gere had created for
|
|||
|
him, he explained that Huang was a nom-de-plume, and certainly not
|
|||
|
an alias for disguising crime.
|
|||
|
|
|||
|
The police persisted, and returned to the subject of "lab supplies",
|
|||
|
and finally declared that they knew Dale and I were dealing in some
|
|||
|
sort of contraband, but that they would be prepared to offer leniency
|
|||
|
if he would give them names. Dale was adamant in his refusal.
|
|||
|
|
|||
|
Finally, they said that they wanted him to make a drug buy for
|
|||
|
them.
|
|||
|
|
|||
|
"Well, you'll have to introduce me to someone, because I sure
|
|||
|
don't know anyone who does that kind of stuff."
|
|||
|
|
|||
|
Eventually, they set an appointment with him to speak with Ron
|
|||
|
Schreffler, the university cop in charge of undercover narcotics
|
|||
|
investigations.
|
|||
|
|
|||
|
He called to reschedule the appointment a few days later, and then,
|
|||
|
eventually, cancelled it entirely, saying: "I have nothing to talk
|
|||
|
to him about."
|
|||
|
|
|||
|
Finally, they ceased following this tack, realizing that even in
|
|||
|
Pennsylvania pursuing an entirely fruitless avenue of investigation
|
|||
|
is seen very dimly by their superiors. The topic of "lab supplies"
|
|||
|
was never mentioned again, and certainly not in the arrest warrant
|
|||
|
affidavit, as we were obviously innocent of any wrongdoing in that
|
|||
|
area.
|
|||
|
|
|||
|
Warning Dale not to leave the area, they terminated the interview.
|
|||
|
|
|||
|
Shortly thereafter, there was a fourth and final interview, with
|
|||
|
Dale and I present. We discussed nothing of any significance, and
|
|||
|
it was almost informal, as if we and the cops were cronies of some sort.
|
|||
|
Only Jeffery Jones was excluded from this circle, as he was limited
|
|||
|
largely to monosyllabic grunts and wild, paranoid accusations. We
|
|||
|
discovered that Wayne Weaver was a twenty-three year veteran, and
|
|||
|
it struck me that if I had met him in other circumstances I could
|
|||
|
have found him quite likable. He was, if nothing else, a professional,
|
|||
|
and acted in a professional manner even when he was beyond his
|
|||
|
depth in the sea of information which Dale and I navigated with
|
|||
|
ease.
|
|||
|
|
|||
|
I felt almost sympathetic toward him, and wondered how it was for
|
|||
|
him to be involved in a case so complex and bizarre. I still failed
|
|||
|
to realize why he was acting toward us as he was, and realized that
|
|||
|
he, similarly, had no idea what to make of us, who must have seemed
|
|||
|
to him like remorseless, arrogant criminals. Unlike my prejudiced
|
|||
|
views of what a police officer should be, Wayne was a competent,
|
|||
|
intelligent man doing the best he could in a situation beyond his
|
|||
|
range of experience, and tried to behave in a conscientious manner.
|
|||
|
|
|||
|
I feel that Wayne was a good man, but that the very system
|
|||
|
he upheld gave him no choice but to do evil, without realizing it.
|
|||
|
I am frustrated still by the fact that no matter how much we could
|
|||
|
discuss the situation, we could never understand each other in
|
|||
|
fullness, because our world-views were so fundamentally different.
|
|||
|
Unlike so many of the incompetent losers and petty sadists who
|
|||
|
find police work a convenient alternative to criminality, Wayne
|
|||
|
was that rarity, a good cop.
|
|||
|
|
|||
|
Still, without an understanding of the computer subculture, he could not but
|
|||
|
see anything we might say to explain it to him as anything other than alien
|
|||
|
and criminal, just as a prejudiced American finds a description of the customs
|
|||
|
of some South Sea tribe shocking and bizarre. Until we realize what
|
|||
|
underlying assumptions we share with the rest of society, we shall be
|
|||
|
divided, subculture from culture, criminals from police.
|
|||
|
|
|||
|
The ultimate goal of the computer underground is to create the circumstances
|
|||
|
which will underlie its own dissolution, to enable the total and free
|
|||
|
dissemination of all information, and thus to destroy itself by becoming
|
|||
|
mainstream. When everyone thinks nothing of doing in daylight what we are
|
|||
|
forced to do under cover of darkness, then we shall have succeeded.
|
|||
|
|
|||
|
Until then, we can expect the Operation Sun-Devils to continue,
|
|||
|
and the witch-hunts to extend to every corner of cyberspace. The
|
|||
|
public at large still holds an ignorant dread of computers, having
|
|||
|
experienced oppression by those who use computers as a tool of
|
|||
|
secrecy and intrusion, having been told that they are being audited
|
|||
|
by the IRS because of "some discrepancies in the computer," that
|
|||
|
their paycheck has been delayed because "the computer's down,"
|
|||
|
that they can't receive their deceased spouse's life-insurance benefits
|
|||
|
because "there's nothing about it in the computer." The computer
|
|||
|
has become both omnipresent and omnipotent in the eyes of many,
|
|||
|
is blamed by incompetent people for their own failure, is used
|
|||
|
to justify appalling rip-offs by banks and other major social
|
|||
|
institutions, and in addition is not understood at all by the
|
|||
|
majority of the population, especially those over thirty, those
|
|||
|
who comprise both the law-enforcement mentality and aging hippies,
|
|||
|
both deeply distrustful of anything new.
|
|||
|
|
|||
|
It is thus that such a paradox would exist as a hacker, and if
|
|||
|
we are to be successful, we must be very careful to understand
|
|||
|
the difference between secrecy and privacy. We must understand
|
|||
|
the difference between freedom of information and freedom from
|
|||
|
intrusion. We must understand the difference between invading
|
|||
|
the inner sanctum of oppression and voyeurism, and realize that
|
|||
|
even in our finest hours we too are fallible, and that in
|
|||
|
negotiating these finely-hued gray areas, we are liable to
|
|||
|
lose our path and take a fall.
|
|||
|
|
|||
|
In this struggle, we can not allow a justifiable anger to become
|
|||
|
hatred. We can not allow skepticism to become nihilism. We can
|
|||
|
not allow ourselves to harm innocents. In adopting the
|
|||
|
intrusive tactics of the oppressors, we must not allow ourselves
|
|||
|
to perform the same actions that we detest in others.
|
|||
|
|
|||
|
Perhaps most importantly, we must use computers as tools to serve
|
|||
|
humanity, and not allow humans to serve computers. For the
|
|||
|
non-living to serve the purposes of the living is a good and
|
|||
|
necessary thing, but for the living to serve the purposes of
|
|||
|
the non-living is an abomination.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|