Crime and Puzzlement - By John Perry Barlow

  • Upload
    tomjorj

  • View
    231

  • Download
    0

Embed Size (px)

Citation preview

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    1/21

    CRIMEANDPUZZLEMENT

    [email protected]

    DesperadosoftheDataSphere

    SomeandmysidekickHoward,wewassittingoutinfrontofthe40RodSaloononeeveningwhenheallofasuddensays,"Lookeehere.Whatdoyoureckon?"Ilookupandthere'sthesetwostrangersridingintotown.They'reyoungandgotkindofarestless,boredwayabout'em.Apersondon'tneedbotheyestoseetheymeantrouble...

    Well,thatwasn'tquitehowitwent.Actually,HowardandIwerefloatingblindascavefishintheelectronicbarrensoftheWELL,sothewholeincidentpassedaswordsonadisplayscreen:

    Howard:Interestingcoupleofnewusersjustsignedon.Onecallshimselfacidandtheother'soptik.

    Barlow:Hmmm.Whataretheirrealnames?

    Howard:Checktheirfingerfiles.

    AndsoItyped!fingeracid.SeveralsecondslatertheWELL'sSequentcomputersentthefollowingmessagetomyMacintoshinWyoming:

    Loginname:acidInreallife:AcidPhreak

    Bythis,IknewthattheWELLhadanewresidentandthathiscorporealanalogwassupposedlycalledAcidPhreak.Typing!fingeroptikyieldedresultsofsimilarinsufficiency,includingtheclaimthatsomeone,somewhereintherealworld,waswalkingaroundcallinghimselfPhiberOptik.Idoubtedit.

    However,associatingthesesparsedatawiththeknowledgethatthe

    WELLwasabouttohostaconferenceoncomputersandsecurityrenderedtheconclusionthatIhadmademyfirstsightingofgenuinecomputercrackers.AsthearrivalofanoutlawwasamajoreventtothesettlementsoftheOldWest,sowastheappearanceofcrackerscauseforstirontheWELL.

    TheWELL(orWholeEarth'LectronicLink)isanexampleofthelatestthinginfrontiervillages,thecomputerbulletinboard.Inthiskindofsmalltown,MainStreetisacentralminicomputertowhich(inthecaseoftheWELL)asmanyas64microcomputersmaybeconnectedatonetimebyphonelinesandlittleblinkingboxescalledmodems.

    Inthissilentworld,allconversationistyped.Toenterit,oneforsakesbothbodyandplaceandbecomesathingofwordsalone.Youcanseewhatyourneighborsaresaying(orrecentlysaid),butnotwhateithertheyortheirphysicalsurroundingslooklike.Townmeetingsarecontinuousanddiscussionsrageoneverythingfromsexualkinkstodepreciationschedules.

    TherearethousandsofthesenodesintheUnitedStates,rangingfromPCclonehamletsofafewuserstomainframemetroslikeCompuServe,withits550,000subscribers.Theyareusedby

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    2/21

    corporationstotransmitmemorandaandspreadsheets,universitiestodisseminateresearch,andamultitudeoffactions,fromapiariststoZoroastrians,forpurposesuniquetoeach.

    Whetherbyonetelephonictendrilormillions,theyareallconnectedtooneanother.Collectively,theyformwhattheirinhabitantscalltheNet.Itextendsacrossthatimmenseregionofelectronstates,microwaves,magneticfields,lightpulsesandthoughtwhichsci-fiwriterWilliamGibsonnamedCyberspace.

    Cyberspace,initspresentcondition,hasalotincommonwiththe19thCenturyWest.Itisvast,unmapped,culturallyandlegallyambiguous,verballyterse(unlessyouhappentobeacourtstenographer),hardtogetaroundin,andupforgrabs.Largeinstitutionsalreadyclaimtoowntheplace,butmostoftheactualnativesaresolitaryandindependent,sometimestothepointofsociopathy.Itis,ofcourse,aperfectbreedinggroundforbothoutlawsandnewideasaboutliberty.

    Recognizingthis,Harper'sMagazinedecidedinDecember,1989toholdoneofitsperiodicForumsonthecomplexofissuessurroundingcomputers,information,privacy,andelectronicintrusionor"cracking."Appropriately,theyconvenedtheirconferenceinCyberspace,usingtheWELLasthe"site."

    Harper'sinvitedanoddlotofabout40participants.Theseincluded:CliffordStoll,whosebookTheCuckoo'sEggdetailshiscunningeffortstonabaGermancracker.JohnDraperor"Cap'nCrunch,"thegrand-daddyofcrackerswhoseblueboxesgotWozniakandJobsintoconsumerelectronics.StewartBrandandKevinKellyofWholeEarthfame.StevenLevy,whowrotetheseminalHackers.AretiredArmycolonelnamedDaveHughes.LeeFelsenstein,whodesignedtheOsbornecomputerandwasoncecalledthe"Robespierreofcomputing."AUNIXwizardandformerhackernamedJeffPoskanzer.Therewasalsoascoreofagingtechno-hippies,thecrackers,andme.

    WhatIwasdoingtherewasnotpreciselyclearsinceI'vespentmostofmyworkingyearseitherpushingcowsorsong-mongering,butIatleastbroughttothesituationavividknowledgeofactualcow-towns,havinglivedinoraroundonemostofmylife.

    ThatandakindofinnocenceaboutboththetechnologyandmoralityofCyberspacewhichwassoontopassintotheconfusionofknowledge.

    Atfirst,IwasinclinedtowardsympathywithAcid'n'Optikaswellastheircolleagues,Adelaide,KnightLightning,TaranKing,andEmmanuel.I'vealwaysbeenmorecomfortablewithoutlawsthanRepublicans,despitehavingmorecertaincredentialsinthelatter

    camp.

    ButastheHarper'sForummushroomedintoaboom-townofASCIItext(theparticipantstyping110,000wordsin10days),Ibegantowonder.Thesekidswerefractious,vulgar,immature,amoral,insulting,andtoodamnedgoodattheirwork.

    Worse,theyinductedanumberofformerkidslikemyselfintoMiddleAge.Thelongfeareddayhadfinallycomewhensomegunselwouldyankmybeardandcallme,tooaccurately,anoldfart.

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    3/21

    Underidealcircumstances,theblindgropingsofbulletinboarddiscourseforceakindofNohdramastylizationonhumancommerce.Intemperateresponses,or"flames"astheyarecalled,arecommonevenamongconferenceparticipantswhounderstandoneanother,which,itbecameimmediatelyclear,thecyberpunksandtechno-hippiesdidnot.

    Myowninitialenthusiasmforthecrackerswiltedunderasteadybarrageoftypedtestosterone.IquicklyrememberedIdidn'tknowmuchaboutwhotheywere,whattheydid,orhowtheydidit.IalsorememberedstoriesaboutcrackersworkinginleaguewiththeMob,rippingoffcreditcardnumbersandgettingpaidforthemin(stolen)computerequipment.

    AndIrememberedKevinMitnik.Mitnik,now25,recentlyservedfederaltimeforavarietyofcomputerandtelephonerelatedcrimes.Priortoincarceration,Mitnikwas,byallaccounts,adangerousguywithacomputer.Hedisruptedphonecompanyoperationsandarbitrarilydisconnectedthephonesofcelebrities.LikethekidinWargames,hebrokeintotheNorthAmericanDefenseCommandcomputerinColoradoSprings.

    UnlikethekidinWargames,heisreputedtohavemadeapracticeof

    destroyingandalteringdata.Thereiseventhe(perhapsapocryphal)storythathealteredthecreditinformationofhisprobationofficerandotherenemies.DigitalEquipmentclaimedthathisdepredationscostthemmorethan$4millionincomputerdowntimeandfilerebuilding.Eventually,hewasturnedinbyafriendwho,aftercarefulobservation,haddecidedhewas"amenacetosociety."

    Hisspectrebegantohangovertheconference.Afterseveraldaysofstraineddiplomacy,thediscussionsettledintoamoraldebateontheethicsofsecurityandwentcritical.

    Thetechno-hippieswereoftheunanimousopinionthat,inDylan'swords,one"mustbehonesttoliveoutsidethelaw."Butthese

    youngstrangersapparentlylivedbynocodesavethosewithwhichtheyunlockedforbiddenregionsoftheNet.

    Theyappearedtothinkthatimproperlysecuredsystemsdeservedtobeviolatedand,byextension,thatunlockedhousesoughttoberobbed.ThislatterbuiltparticularheatinmesinceIrefuse,onphilosophicalgrounds,tolockmyhouse.

    Civilitybrokedown.Webegantoseeexchangeslike:

    DaveHughes:CliffordStollsaidawisethingthatnoonehascommentedon.Thatnetworksarebuiltontrust.Iftheyaren't,theyshouldbe.

    AcidPhreak:Yeah.Sure.Andweshouldusethe'honorsystem'asafirstlineofsecurityagainsthackattempts.

    JefPoskanzer:Thisguydownthestreetfrommesometimesleaveshisbackdoorunlocked.Itoldhimaboutitonce,buthestilldoesit.IfIhadthechancetodoitover,Iwouldgointhebackdoor,shoothim,andtakeallhismoneyandconsumerelectronics.It'stheonlywaytogetthroughtohim.

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    4/21

    AcidPhreak:JefPoskanker(Puss?Canker?yechh)Anyway,nowwhendidyoufirststarthavingthesedelusionswherecomputerhackingwaseven*remotely*similartomurder?

    Presentedwithsuchaterrifyingamalgamofrawyouthandapparentpower,weflutteredlikeaflockofindignantBabbittsaroundtheStatusQuo,defendingitheartily.OneformerhackerhowledtotheHarper'seditorinchargeoftheforum,"Doyouordoyounothavenamesandaddressesforthesecriminals?"Thoughtheyhadcommittednoobviouscrimes,hewasreadytocallthepolice.

    Theyfinallygottomewith:

    Acid:Whoeversaidthey'dleavethedooropentotheirhouse...wheredoyoulive?(theaddress)Leaveittomeinmailifyoulike.

    Ihadneverencounteredanyonesoapparentlyunworthyofmytrustastheselittlenihilists.Theyhadmequestioningabasictenet,namelythatthegreatestsecurityliesinvulnerability.Idecideditwastimetoputthatprincipaltothetest...

    Barlow:Acid.Myhouseisat372NorthFranklinStreetinPinedale,Wyoming.Ifyou'reheadingnorthonFranklin,

    yougoabouttwoblocksoffthemaindragbeforeyourunintohaymeadowontheleft.I'vegotthelasthousebeforethefield.Thecomputerisalwayson...

    Andisthatreallywhatyoumean?Areyoumerelyjustthekindoflittlesneakthatgoesaroundlookingforeasyplacestoviolate?Youdisappointme,pal.ForallyourJamesDean-On-Siliconrhetoric,you'renotacyberpunk.You'rejustapunk.

    AcidPhreak:Mr.Barlow:ThankyouforpostingallIneedtogetyourcreditinformationandawholelotmore!Now,whoistoblame?MEforgettingitorYOUforbeingsuchanidiot?!

    Ithinkthisshouldjustaboutsumthingsup.

    Barlow:Acid,ifyou'vegotalessontoteachme,Ihopeit'snotthatit'sidiotictotrustone'sfellowman.Lifeonthosetermswouldbeendlessandbrutal.I'dtrytotellyousomethingaboutconscience,butI'dsoundlikeFatherO'Flannigantryingtoreformthepunkthat'sabouttogutshoothim.Fornomorereasonthattowatchhimdie.

    Butactually,ifyoutakeituponyourselftodestroymycredit,youmightdomeafavor.I'vebeenlookingforsomethingtoputthebrakesonmyburgeoningmaterialism.

    IspentadaywonderingwhetherIwasdealingwithanotherKevinMitnikbeforetheothershoedropped:

    Barlow:...Withcrackerslikeacidandoptik,theissueislessintelligencethanalienation.Tradetheirmodemsforskateboardsandonlyaslightconceptualshiftwouldoccur.

    Optik:Youhavesomepairofballscomparingmytalentwiththatofaskateboarder.Hmmm...Thiswasindeedboring,

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    5/21

    butnonetheless:

    Atwhichpointhedownloadedmycredithistory.

    OptikhadhackedthecoreofTRW,aninstitutionwhichhasmademybusiness(andyours)theirbusiness,extractingfromitanabbreviated(andincorrect)versionofmypersonalfinanciallife.WiththiscametheimplicationthatheandAcidcouldandwouldreviseittomydisadvantageifIdidn'tbackoff.

    Ihavesincelearnedthatwhilegettingsomeone'sTRWfileisfairlytrivial,changingitisnot.Butatthattime,myassessmentofthecrackers'blackskillswasoneofsuperstitiousawe.Theyweredigitalbrujosabouttozombifymyeconomicsoul.

    Toamiddle-classAmerican,one'screditratinghasbecomenearlyidenticaltohisfreedom.ItnowappearedthatIwasdealingwithsomeonewhohadboththemeansanddesiretohoodoomine,leavingmetrappedinalifeofwrinkledbillsandmoneyorderqueues.NeveragainwouldIcalltheSharperImageonawhim.

    I'vebeeninredneckbarswearingshoulder-lengthcurls,policecustodywhileonacid,andHarlemaftermidnight,butnoonehaseverputthespookinmequiteasPhiberOptikdidatthatmoment.I

    realizedthatwehadproblemswhichexceededthehumanconductivityoftheWELL'sbandwidth.Ifsomeonewereabouttoparalyzemewithaspell,Iwantedamorevisceralsenseofhimthancouldfitthroughamodem.

    Ie-mailedhimaskinghimtogivemeaphonecall.ItoldhimIwouldn'tinsulthisskillsbygivinghimmyphonenumberand,withtheassuranceconveyedbythatchallenge,Isettledbackandwaitedforthephonetoring.Which,directly,itdid.

    InthisconversationandtheothersthatfollowedIencounteredanintelligent,civilized,andsurprisinglyprincipledkidof18whosounded,andcontinuestosound,asthoughthere'slittleharminhimtomanordata.Hiscrackingimpulsesseemedpurelyexploratory,

    andI'vebeguntowonderifwewouldn'talsoregardspelunkersasdesperatecriminalsifAT&Townedallthecaves.

    TheterrifyingposeswhichOptikandAcidhadbeenstrikingonscreenwereamedia-amplifiedexampleofahumanadaptationI'dseenbefore:Onebecomesasheisbeheld.Theyweresimplylivinguptowhattheythoughtwe,and,moreparticularly,theeditorsofHarper's,expectedofthem.Likethetelevisedtearsofdisastervictims,theirsnarlsadaptedeasilytomassdistribution.

    Monthslater,Harper'stookOptik,AcidandmetodinnerataManhattanrestaurantwhich,thoughveryfancy,wasappropriatelyChinese.AcidandOptik,asmaterialbeings,werewell-scrubbedand

    fashionably-clad.Theylookedtobedangerousasducks.But,asHarper'sandtherestofthemediahavediscoveredtotheirdelight,theboyshaddevelopeddistinctlyshowierpersonaefortheirramblesthroughthehowlingwildernessofCyberspace.

    Glitteringwithspikesofbinarychrome,theystrodepastthekleiglightsandintothedigitaldistance.Theretheywouldbeoutlaws.Itwasonlyamatteroftimebeforetheystartedtobelievethemselvesasbadastheysounded.Andnotimeatallbeforeeveryoneelsedid.

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    6/21

    Inthis,theywerelikeanotherkidnamedBilly,manyofwhoseferaldeedsinthepre-civilizedWestwereencouragedbythesamedimenovelistwhochronicledthem.AndlikeTomHorn,theyseemedtohavesomedoubtastowhichsideofthelawtheywereon.Acidevenexpressedanambitiontoworkforthegovernmentsomeday,nabbing"terroristsandcodeabusers."

    Thereisalsoafrontierambiguitytothe"crimes"thecrackerscommit.TheyarenotexacdlystealingVCR's.CopyingatextfilefromTRWdoesn'tdepriveitsownerofanythingexceptinformationalexclusivity.(Thoughitmaysaidthatinformationhasmonetaryvalueonlyinproportiontoitscontainment.)

    Therewasnoquestionthattheyweremakingunauthorizeduseofdatachannels.ThenightImetthem,theyleftourrestauranttableanddisappearedintothephoneboothforalongtime.Ididn'tseethemmarshallingquartersbeforetheywent.

    And,asIbecamelesstheiradversaryandmoretheirscoutmaster,Ibegantoget"conferencecalls"inwhichsixoreightofthemwouldcrackpayphonesalloverNewYorkandsimultaneouslylandonmylineinWyoming.Thesedeftmaneuversmademethinkofskydivingstuntswherelargegroupsconvenegeometricallyinfreefall.Inthiscase,theriskwaslargelylegal.

    Theirotherfavoriteriskybusinessisthetime-honoredadolescentsportoftrespassing.Theyinsistongoingwheretheydon'tbelong.Butthenteen-ageboyshavebeenproceedinguninvitedsincethedawnofhumanpuberty.Itseemshard-wired.Theonlyinnovationisinthenewformoftheforbiddenzonethemeansofgettinginit.

    Infact,likeKevinMitnik,IbrokeintoNORADwhenIwas17.AfriendandIleftanearby"woodsie"(asrusticadolescentdrunkswerecalledinColorado)andtriedtogetinsidetheCheyenneMountain.Thechrome-helmetedAirForceMP'sheldusforabout2hoursbeforelettingusgo.Theyweren'tmucholderthanusandknewexactlyourlevelofnationalsecuritythreat.Hadwecome

    cloakedinelectronicmystery,theiralertstatuscertainlywouldhavebeenhigher.

    Whencerisesmuchoftheanxiety.Everythingissoill-defined.Howcanyouguesswhatliesintheirheartswhenyoucan'tseetheireyes?Howcanonebesurethat,likeMitnik,theywon'tcrossthelinefromtrespassingintoanotheradolescentpastime,vandalism?Andhowcanyoubesuretheyposenothreatwhenyoudon'tknowwhatathreatmightbe?

    Andforthecrackerssomethrillisderivedfromthemetamorphicvaguenessofthelawsthemselves.OntheNet,theireffectsareunpredictable.Oneneverknowswhenthey'llbite.

    Thisisbecausemostofthestatutesinvokedagainstthecrackersweredesignedinaverydifferentworldfromtheonetheyexplore.Forexample,canunauthorizedelectronicaccesscanberegardedastheethicalequivalentofold-fashionedtrespass?Likeopenrange,thepropertyboundariesofCyberspacearehardtostakeandharderstilltodefend.

    Istransmissionthroughanotherwiseunuseddatachannelreallytheft?Isthetrack-lesspassageofamindthroughTRW'smainframe

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    7/21

    thesameasthepassageofapickupthroughmyBack40?WhatisaplaceifCyberspaceiseverywhere?Whataredataandwhatisfreespeech?Howdoesonetreatpropertywhichhasnophysicalformandcanbeinfinitelyreproduced?Isacomputerthesameasaprintingpress?Canthehistoryofmybusinessaffairsproperlybelongtosomeoneelse?Cananyonemorallyclaimtoownknowledgeitself?

    Ifsuchquestionswerehardtoanswerprecisely,therearethosewhoarereadytotry.BasedontheirexperienceintheVirtualWorld,theywereaboutasqualifiedtoenforceitsmoresasIamtowritetheLawoftheSea.Butiftheylackedtechnicalsophistication,theybroughttothistasktheirusualconviction.And,ofcourse,badgesandguns.

    ******

    OperationSunDevil

    "Recently,wehavewitnessedanalarmingnumberofyoungpeoplewho,foravarietyofsociologicalandpsychologicalreasons,havebecomeattachedtotheircomputersandareexploitingtheirpotentialinacriminalmanner.Often,aprogressionofcriminalactivityoccurswhichinvolvestelecommunicationsfraud(freelongdistancephonecalls),unauthorizedaccesstoothercomputers(whetherforprofit,fascination,ego,ortheintellectualchallenge),creditcardfraud(cashadvancesandunauthorized

    purchasesofgoods),andthenmoveontootherdestructiveactivitieslikecomputerviruses."

    "Ourexperienceshowsthatmanycomputerhackersuspectsarenolongermisguidedteenagersmischievouslyplayinggameswiththeircomputersintheirbedrooms.Somearenowhightechcomputeroperatorsusingcomputerstoengageinunlawfulconduct."--ExcerptsfromastatementbyGarryM.JenkinsAsst.Director,U.S.SecretService

    "Therightofthepeopletobesecureintheirpersons,houses,papers,andeffects,againstunreasonablesearchesandseizures,shallnotbeviolated,andnowarrantsshallissuebutuponprobablecause,supportbyoathor

    affirmation,andparticularlydescribingtheplacetobesearched,andthepersonsorthingstobeseized."--AmendmentIV,UnitedStatesConstitution

    OnJanuary24,1990,aplatoonofSecretServiceagentsenteredtheapartmentwhichAcidPhreakshareswithhismotherand12year-oldsister.Thelatterwastheonlypersonhomewhentheyburstthroughthedoorwithgunsdrawn.Theymanagedtoholdheratbayforabouthalfanhouruntiltheirquarryhappenedhome.

    Bythen,theywerenearlydonepackingupAcid'sworldlygoods,includinghiscomputer,hisnotes(bothpaperandmagnetic),books,andsuchdubiouslydangeroustoolsasatelephoneanswering

    machine,aghettoblasterandhiscompletecollectionofaudiotapes.Oneagentaskedhimtodefinetherealpurposeoftheansweringmachineandwasfranklyskepticalwhentoldthatitansweredthephone.Theaudiotapesseemedtocontainnothingbutmusic,butwhoknewwhatdarkdataAcidmighthaveencodedbetweenthenotes...

    WhenAcid'smotherreturnedfromwork,shefoundherapartmentasceneofapprehendedcriminality.Sheaskedwhat,exactly,hersonhaddonetodeserveallthisattentionandwastoldthat,amongotherthings,hehadcausedtheAT&Tsystemcrashseveraldaysearlier.

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    8/21

    (PreviouslyAT&Thadtakenfullresponsibility.)Thus,theagentexplained,herdarlingboywasthoughttohavecausedoverabilliondollarsindamagetotheeconomyoftheUnitedStates.

    Thisaccusationwasneverturnedintoaformalcharge.Indeed,nochargeofanysortofwasfiledagainstMr.Phreakthenand,althoughtheSecretServicemaintainedresolutepossessionofhishardware,software,anddata,nochargehadbeencharged4monthslater.

    Acrosstown,similarsceneswerebeingplayedoutatthehomesofPhiberOptikandanothercolleaguecode-namedScorpion.Again,equipment,notes,disksbothhardandsoft,andpersonaleffectswereconfiscated.Againnochargeswerefiled.

    ThusbeganthevisiblephaseofOperationSunDevil,atwo-yearSecretServiceinvestigationwhichinvolved150federalagents,numerouslocalandstatelawenforcementagencies.andthecombinedsecurityresourcesofPacBell,AT&T,Bellcore,BellSouthMCI,U.S.Sprint,Mid-American,SouthwesternBell,NYNEX,U.S.WestandAmericanExpress.

    ThefocusofthisimpressiveinstitutionalarraywastheLegionofDoom,agroupwhichneverhadanyformalmembershiplistbutwasthoughtbythememberswithwhomIspoketonumberlessthan20,

    nearlyallofthemintheirteensorearlytwenties.

    IaskedAcidwhythey'dchosensuchathreateningname."Youwouldn'twantafairykindofthinglikeLegionofFlowerPickersorsomething.Butthemediaateituptoo.ProbingtheLegionofDoomlikeitwasagangorsomething,whenreallyitwasjustabunchofgeeksbehindterminals."

    ******

    SometimeinDecember1988,a21year-oldAtlanta-areaLegionofDoomsternamedTheProphetcrackedaBellSouthcomputeranddownloadedathree-pagetextfilewhichoutlined,inbureaucrat-ese

    ofsurpassingopacity,theadministrativeproceduresandresponsibilitiesformarketing,servicing,upgrading,andbillingforBellSouth's911system.

    Adensethicketofacronyms,thedocumentwasfilledwithpassageslike:

    "InaccordancewiththebasicSSC/MACstrategyforprovisioning,theSSC/MACwillbeOverallControlOffice(OCO)forallNotestoPSAPcircuits(officialservices)andanyotherservicesforthiscustomer.TrainingmustbescheduledforallSSC/MACinvolvedpersonnelduringthepre-servicestageoftheproject."

    Andothersuch.

    Atsomerisk,Itoohaveacopyofthisdocument.Toreadthewholethingstraightthroughwithoutenteringcomarequireseitheramachineorahumanwhohastoomuchpracticethinkinglikeone.AnyonewhocanunderstanditfullyandfluidlyhasalteredhisconsciousnessbeyondtheabilitytoeveragainreadBlake,Whitman,orTolstoy.Itis,quitesimply,theworstwritingIhaveevertriedtoread.

    Sincethedocumentcontainslittleofinteresttoanyonewhoisnotastudentofadvancedorganizationalsclerosis...thatis,noaccesscodes,tradesecrets,orproprietaryinformation...IassumeTheProphetonly

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    9/21

    copiedthisfileasakindofhuntingtrophy.Hehadbeentotheheartoftheforestandhadreturnedwiththiscoonskintonailtothebarndoor.

    Furthermore,hewasproudofhisaccomplishment,andsincesuchtrophiesareinfinitelyreplicable,hewasn'tcontenttonailittohisdooralone.AmongtheplaceshecopieditwasaUNIXbulletinboard(ratherliketheWELL)inLockport,IllinoiscalledJolnet.

    Itwasdownloadedfromtherebya20year-oldhackerandpre-lawstudent(whomIhadmetintheHarper'sForum)whocalledhimselfKnightLightning.ThoughnotamemberoftheLegionofDoom,KnightLightningandafriend,TaranKing,alsopublishedfromSt.LouisandhisfraternityhouseattheUniversityofMissouriaworldwidehacker'smagazinecalledPhrack.(Fromphonephreakandhack.)

    Phrackwasanunusualpublicationinthatitwasentirelyvirtual.Theonlytimeitsarticleshitpaperwaswhenoneofitssubscribersdecidedtoprintoutahardcopy.Otherwise,itseditionsexistedinCyberspaceandtooknophysicalform.

    WhenKnightLightninggotholdoftheBellSouthdocument,hethoughtitwouldamusehisreadersandreproduceditinthenextissueofPhrack.Hehadlittlereasontothinkthathewasdoingsomethingillegal.Thereisnothinginittoindicatethatitcontains

    proprietaryorevensensitiveinformation.Indeed,itcloselyresemblestelcoreferencedocumentswhichhavelongbeenpubliclyavailable.

    However,RichAndrews,thesystemsoperatorwhooversawtheoperationofJolnet,thoughttheremightbesomethingfunnyaboutthedocumentwhenhefirstranacrossitinhissystem.Tobeonthesafeside,heforwardedacopyofittoAT&Tofficials.Hewassubsequentlycontactedbytheauthorities,andhecooperatedwiththemfully.Hewouldregretthatlater.

    Onthebasisoftheforgoing,aGrandJuryinLockportwaspersuadedbytheSecretServiceinearlyFebruarytohanddownasevencountindictmentagainstTheProphetandKnightLightning,chargingthem,amongotherthings,withinterstatetransferofstolenproperty

    worthmorethan$5,000.WhenTheProphetandtwoofhisGeorgiacolleagueswerearrestedonFebruary7,1990,theAtlantapapersreportedtheyfaced40yearsinprisonanda$2millionfine.KnightLightningwasarrestedonFebruary15.

    Thepropertyinquestionwastheaffore-mentionedblotonthehistoryofprosewhosefulltitlewasABellSouthStandardPractice(BSP)660-225-104SV-ControlOfficeAdministrationofEnhanced911ServicesforSpecialServicesandMajorAccountCenters,March,1988.

    Andnotonlywasthisitemworthmorethan$5,000.00,itwasworth,accordingtotheindictmentandBellSouth,precisely$79,449.00.Andnotapennyless.Wewillprobablyneverknowhowthisfigurewas

    reachedorbywhom,thoughIliketoimagineanappraisalteamconsistingofFranzKafka,JosephHeller,andThomasPynchon...

    InadditiontochargingKnightLightningwithcrimesforwhichhecouldgotojail30yearsandbefined$122,000.00,theyseizedhispublication,Phrack,alongwithallrelatedequipment,softwareanddata,includinghislistofsubscribers,manyofwhomwouldsoonlosetheircomputersanddataforthecrimeofappearingonit.

    ItalkedtoEmmanuelGoldstein,theeditorof2600,anotherhacker

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    10/21

    publicationwhichhasbeenknowntopublishpurloineddocuments.IftheycouldshutdownPhrack,couldn'ttheyaseasilyshutdown2600?

    Hesaid,"I'vegotoneadvantage.IcomeoutonpaperandtheConstitutionknowshowtodealwithpaper."

    Infact,nearlyallpublicationsarenowelectronicatsomepointintheircreation.Inamodernnewspaper,storieswrittenatthescenearetypedtoscreensandthensentbymodemtoacentralcomputer.Thiscomputercomposesthelayoutinelectronictypeandtheentireproducttransmittedelectronicallytothepresses.There,finally,thebytesbecomeink.

    Phrackmerelyomittedthelaststepinalonglineofvirtualevents.However,thatomission,anditsinsignificantcirculation,leftitvulnerabletoseizurebasedoncontent.Ifthe911documenthadbeenthePentagonPapers(anotherproprietarydocument)andPhracktheNewYorkTimes,acompletionoftheanalogywouldhaveseenthegovernmentstoppingpublicationoftheTimesandseizingitseverymaterialpossession,fromnotepadstopresses.

    Notthatanyoneinthenewspaperbusinessseemedparticularlyworriedaboutsuchimplications.They,andtherestofthemediawhobotheredtoreportKnightLightning'sarrestweretooobsessed

    bywhattheyportrayedasactualdisruptionsofemergencyserviceandwithmarvellingatthesociopathyofit.Onereportexpressedreliefthatnooneappearedtohavediedasaresultofthe"intrusions."

    Meanwhile,inBaltimore,the911dragnetsnaredLeonardRose,akaTerminus.AprofessionalcomputerconsultantwhospecializedinUNIX,RosegotavisitfromthegovernmentearlyinFebruary.TheG-menforciblydetainedhiswifeandchildrenforsixhourswhiletheyinterrogatedRoseaboutthe911documentandransackedhissystem.

    Rosehadnoknowledgeofthe911matter.Indeed,hisonlyconnectionhadbeenoccasionalcontactwithKnightLightningoverseveralyears...andadmittedmembershipintheLegionofDoom.

    However,whensearchinghisharddiskfor911evidence,theyfoundsomethingelse.LikemanyUNIXconsultants,RosedidhavesomeUNIXsourcecodeinhispossession.Furthermore,therewasevidencethathehadtransmittedsomeofittoJolnetandleftitthereforanotherconsultant.

    UNIXisaubiquitousoperatingsystem,andthoughitsmainvirtueisitsopennesstoamendmentatthesourcelevel,itisneverthelessthepropertyofAT&T.Whathadbeenwidelydistributedwithinbusinessesanduniversitiesforyearswassuddenly,inRose'shands,afeloniouspossession.

    Finally,theSecretServicerewardedthegoodcitizenshipofRichAndrewsbyconfiscatingthecomputerwhereJolnethaddwelt,along

    withallthee-mail,readandun-read,whichhissubscribershadleftthere.LikethemanyotherswhoseequipmentanddataweretakenbytheSecretServicesubsequently,hewasn'tchargedwithanything.Norishelikelytobe.Theyhavealreadyinflictedonhimtheworstpunishmentanerdcansuffer:datadeath.

    Andrewswasbaffled."I'mtheonethatfoundit,I'mtheonethatturneditin...AndI'mtheonethat'ssuffering,"hesaid.

    Onewonderswhatwillhappenwhentheyfindsuchdocumentson

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    11/21

    theharddisksofCompuServe.MaybeI'lljustuploadmycopyofBellSouthStandardPractice(BSP)660-225-104SVandsee...

    Inanycase,associationwithstolendataisalltheguiltyouneed.It'squiteasifthegovernmentcouldseizeyourhousesimplybecauseaguestleftastolenVCRinanupstairsbedroomcloset.Orconfiscateallthemailinapostofficeuponfindingastolenpackagethere.ThefirstconceptofmodernjurisprudencetohavearrivedinCyberspaceseemstohavebeenZeroTolerance.

    ******

    RichAndrewswasnotthelasttolearnabouttheSecretService'sdebonairnewattitudetowardthe4thAmendment'sprotectionagainstunreasonableseizure.

    EarlyonMarch1,1990,theofficesofarole-playinggamepublisherinAustin,TexascalledSteveJacksonGameswerevisitedbyagentsoftheUnitedStatesSecretService.Theyransackedthepremises,brokeintoseverallockedfilingcabinets(damagingthemirreparablyintheprocess)andeventuallyleftcarrying3computers,2laserprinters,severalharddisks,andmanyboxesofpaperandfloppydisks.

    Laterintheday,callerstotheIlluminatiBBS(whichSteveJacksonGamesoperatedtokeepintouchwithroll-playersaroundthecountry)encounteredthefollowingmessage:

    "SofarwehavenotreceivedaclearexplanationofwhattheSecretServicewaslookingfor,whattheyexpectedtofind,ormuchofanythingelse.WearefairlycertainthatSteveJacksonGamesisnotthetargetofwhateverinvestigationisbeingconducted;inanycase,wehavedonenothingillegalandhavenothingwhatsoevertohide.However,theequipmentthatwasseizedisapparentlyconsideredtobeevidenceinwhateverthey'reinvestigating,sowearen'tlikelytogetitbackanytimesoon.Itcouldbeamonth,itcouldbenever."

    It'sbeenthreemonthsasIwritethisand,notonlyhasnothingbeenreturnedtothem,but,accordingtoSteveJackson,theSecretServicewillnolongertakehiscalls.Hefiguresthat,inthemonthssincetheraid,hislittlecompanyhaslostanestimated$125,000.Withsuchafiscalhemorrhage,hecan'taffordalawyertotakeaftertheSecretService.BoththestateandnationalofficesoftheACLUtoldhimto"runalong"whenhesolicitedtheirhelp.

    Hetriedtogotothepress.Asinmostothercases,theywereunwillingtoraisethealarm.Jacksontheorized,"Theconservativepressistakingtheattitudethatthesuppressionofevilhackersisagoodthingandthatanyonewhohappenstobeputoutofbusinessinthemeantime...well,that'sjusttheirtoughluck."

    Infact,Newsweekdidrunastoryabouttheevent,portrayingitfromJackson'sperspective,buttheywerealmostaloneindealingwithit.

    Whathadhedonetodeservethisnightmare?Role-playinggames,ofwhichDungeonsandDragonsisthemostfamous,havebeenaccusedofcreatingobsessiveinvolvementintheirnerdyyoungplayers,butnoonebeforehadfounditnecessarytopreventtheirpublication.

    ItseemsthatSteveJacksonhadhiredthewrongwriter.The

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    12/21

    managingeditorofSteveJacksonGamesisaformercracker,knownbyhisfellowsintheLegionofDoomasTheMentor.Atthetimeoftheraid,heandtherestofJacksonstaffhadbeenworkingforoverayearonagamecalledGURPSCyberpunk,High-TechLow-LifeRole-Playing.

    AtthetimeoftheSecretServiceraids,thegameresidedentirelyontheharddiskstheyconfiscated.Indeed,itwastheirtarget.TheytoldJacksonthat,basedonitsauthor'sbackground,theyhadreasontobelieveitwasa"handbookoncomputercrime."Itwasthereforeinappropriateforpublication,1stAmendmentorno1stAmendment.

    IgotacopyofthegamefromthetrunkofTheMentor'scarinanAustinparkinglot.LiketheBellSouthdocument,itseemedprettyinnocuoustome,ifalittleinscrutable.BorrowingitsflavorfromtheworksofWilliamGibsonandAustinsci-fiauthorBruceSterling,itisfilledwithsiliconbrainimplants,holodecks,andgaussguns.

    Itis,asthecovercopyputsit,"afusionofthedystopianvisionsofGeorgeOrwellandTimothyLeary."Actually,withoutthegizmos,itdescribesafuturekindoflikethepresentitspublisherisexperiencingatthehandsoftheSecretService.

    AnunbelievablyByzantineworldresideswithinits120largepagesofsmallprint.(Theseroll-playersmustbesomekindofidiots

    savants...)Indeed,it'sathingofsuchcomplexitythatIcan'tswearthere'snocriminalinformationinthere,butthenIcan'tswearthatGratefulDeadrecordsdon'thavesatanicmessagesifplayedbackwards.Anything'spossible,especiallyinsidesomethingasremarkableasCyberpunk.

    ThemostremarkablethingaboutCyberpunkisthefactthatitwasprintedatall.Aftermuchnegotiation,JacksonwasabletogettheSecretServicetolethimhavesomeofhisdataback.However,theytoldhimthathewouldbelimitedtoanhourandahalfwithonlyoneofhisthreecomputers.Also,accordingtoJackson,"TheyinsistedthatallthecopiesbemadebyaSecretServiceagentwhowasatwo-fingertypist.Sowedidn'tgetmuch."

    Intheend,Jacksonandhisstaffhadtoreconstructmostofthegamefromneuralratherthanmagneticmemory.Theydidhaveafewveryoldbackups,andtheyretrievedsomescrapswhichhadbeenpassedaroundtogametesters.Theyalsohadthedeterminationoftheenraged.

    Despitegovernmenteffortstoimposecensorshipbypriorrestraint,Cyberpunkisnowonthemarket.Presumably,advertisingitas"ThebookthatwasseizedbytheU.S.SecretService"willinvigoratesales.ButSteveJacksonGames,theheretoforeprosperouspublisherofmorethanahundredrole-playinggames,hasbeenforcedtolayoffmorethanhalfofitsemployeesandmaywellbemortallywounded.

    Anyemployerwhohasheardthistalewillthinkhardbeforehehires

    acomputercracker.Whichmaybe,ofcourse,amongtheeffectstheSecretServicedesires.

    ******

    OnMay8,1990,OperationSunDevil,heretoforeanapparentlyrandomandnamelesstrickleofSecretServiceactions,sweptdownontheLegionofDoomanditsilklikeabureaucratictsunami.Onthatday,theSecretServiceserved27searchwarrantsin14citiesfrom

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    13/21

    Plano,TexastoNewYork,NewYork.

    ThelawhadcometoCyberspace.Whenthedaywasover,transitthroughthewideopenspacesoftheVirtualWorldwouldbealottrickier.

    Inapressreleasefollowingthesweep,theSecretServiceboastedhavingshutdownnumerouscomputerbulletinboards,confiscated40computers,andseized23,000disks.Theynotedintheirstatementthat"theconceivablecriminalviolationsofthisoperationhaveseriousimplicationsforthehealthandwelfareofallindividuals,corporations,andUnitedStatesGovernmentagenciesrelyingoncomputersandtelephonestocommunicate."

    Itwasunclearfromtheirstatementwhether"thisoperation"meanttheLegionofDoomorOperationSunDevil.Therewasroomtointerpretiteitherway.

    Becausethedeliciouslyironictruthisthat,asidefromthe3pageBellSouthdocument,thehackershadneitherremovednordamagedanyone'sdata.OperationSunDevil,ontheotherhand,had"seriousimplications"foranumberoffolkswhoreliedon"computersandtelephonestocommunicate."Theylosttheequivalentofabout5.4millionpagesofinformation.Nottomentionafewcomputersandtelephones.

    Andthewelfareoftheindividualsbehindthosefigureswassurelyinjeopardy.LikethestoryofthesinglemotherandcomputerconsultantinBaltimorewhosesolemeansofsupportingherselfandher18yearoldsonwasstrippedawayearlyonemorning.SecretServiceagentsbrokedownherdoorwithsledgehammers,enteredwithgunsdrawn,andseizedallhercomputerequipment.Apparentlyhersonhadalsobeenusingit...

    OrthefatherinNewYorkwhoopenedthedoorat6:00AMandfoundashotgunathisnose.Adozenagentsentered.Whileoneofthekepttheman'swifeinachoke-hold,therestmadereadytoshootandenteredthebedroomoftheirsleeping14year-old.Beforeleaving,theyconfiscatedeverypieceofelectronicequipmentinthe

    house,includingallthetelephones.

    Itwasenoughtosuggestthattheinsurancecompaniesshouldstartwritingpoliciesagainstcapriciousgovernmentalseizureofcircuitry.

    Infairness,onecanimaginethegovernment'sproblem.Thisisallprettymagicalstufftothem.IfIweretryingtoterminatetheoperationsofawitchcoven,I'dprobablyseizeeverythinginsight.HowwouldItelltheordinaryhouseholdbroomsfromthegetawayvehicles?

    ButasIheardmoreandmoreaboutthevileinjusticesbeingheapedonmyyoungpalsintheLegionofDoom,nottomentiontheunfortunatefolksnearby,thelessIwasinclinedtowardsuch

    temperatethoughtsasthese.Idriftedbackintoa60's-stylesenseofthegovernment,thinkingitathingofmonolithicandevilefficiencyandadoptinganup-against-the-wallwillingnesstospitwordslike"pig"or"fascist"intomydescriptions.

    Indoingso,IendowedtheSecretServicewithaclarityofintentwhichnoagencyofgovernmentwilleverpossess.DespitealmosteveryexperienceI'veeverhadwithfederalauthority,Ikeepimaginingitscompetence.

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    14/21

    Forsomereason,itwaseasiertoinvesttheKeystoneKapersofOperationSunDevilwithmalignpurposeratherthanconfronttheirabsurditystraight-on.Thereis,afterall,atwistedkindofcomfortinpoliticalparanoia.Itprovidesonesuchasenseoforderlinesstothinkthatthegovernmentisneithercrazynorstupidandthatitsplots,thoughwicked,aresuccinct.

    Iwasabouttohaveanexperiencewhichwouldrestorebothmynaturalsenseofunrealityandmyunwillingnesstodemeanthemotivesofothers.IwasabouttoseefirsthandthedisorientationofthelawinthefeaturelessvastnessofCyberspace.

    ********InSearchofNuPrometheus

    "Ipitythepoorimmigrant..."--BobDylan

    SometimelastJune,anangryhackergotholdofachunkofthehighlysecretsourcecodewhichdrivestheAppleMacintosh.Hethendistributedittoavarietyofaddresses,claimingresponsibilityforthisactofinformationterrorisminthenameoftheNuPrometheusLeague.

    Applefreaked.NuPrometheushadstolen,ifnottheApplecrown

    jewels,atleastastonefromthem.Worse,NuPrometheushadthengiventhisprizeaway.Repeatedly.

    AllApplereallyhastooffertheworldisthesoftwarewhichliesencodedinsiliconontheROMchipofeveryMacintosh.Thissetofinstructionsisthecyber-DNAwhichmakesaMacintoshaMacintosh.

    Worse,muchofthemagicinthiscodewasputtherebypeoplewhonotonlydonotworkforAppleanylonger,butmightonlydosoagainifencouragedwithcattleprods.Apple'sattitudetowarditsROMcodeisalittlelikethatofarichkidtowardhisinheritance.Notactuallyknowinghowtocreatewealthhimself,heguardswhathehaswithhystericalfervor.

    Timepassed,andIforgotabouttheincident.ButonerecentMaymorning,Ileanedthatothershadnot.ThetirelesssearchforthespectralheartofNuPrometheusfinallyreachedPinedale,Wyoming,whereIwastheobjectofatwohourinterviewbySpecialAgentRichardBaxter,Jr.oftheFederalBureauofInvestigation.

    PoorAgentBaxterdidn'tknowaROMchipfromaVise-gripwhenhearrived,somuchofthattimewasspenttryingtoeducatehimonthenatureofthethingwhichhadbeenstolen.Orwhether"stolen"wastherighttermforwhathadhappenedtoit.

    Youknowthingshaveratherjumpedthegroovewhenpotentialsuspects

    mustexplaintolawenforcersthenatureoftheirallegedperpetrations.

    Iwouldn'tswearAgentBaxterevergotitquiteright.AfterIshowedhimsomeactualsourcecode,gaveademonstrationofe-mailinaction,anddownloadedafilefromtheWELL,hetooktorubbinghisfacewithbothhands,peeringupoverhisfingertipsandsaying,"Itsureissomething,isn'tit"Or,"Whooo-ee."

    Or"myeightyear-oldknowsmoreaboutthesethingsthanIdo."Hedidn'tsaythiswithafather'spridesomuchasanimmigrant'sfearof

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    15/21

    astrangenewlandintowhichhewillbeforciblymovedandinwhichhisownchildisanative.HelookedacrossmykeyboardintoCyberspaceanddidn'tlikewhathesaw.

    Wecouldhavemadeitharderforoneanother,butIthinkweeachsensedthattheotheroccupiedaworldwhichwasasbizarreandnonsensicalasitcouldbe.Wedidourmutualbesttosuppressimmuneresponseattheborder.

    You'dhavethoughthisworldmighthavebeenalittlemorerecognizabletome.Notso,itturnsout.Becauseinhisworld,Ifoundseveralunfamiliarfeatures,includingthese:

    1.TheHacker'sConferenceisanundergroundorganizationofcomputeroutlawswithlikelyconnectionsto,andalmostcertainlysympathywith,theNuPrometheusLeague.(OrasAgentBaxterrepeatedlyputit,the"NewProsthesisLeague.")

    2.JohnDraper,theaffore-mentionedCap'nCrunch,inadditiontobeingaknownmemberoftheHacker'sConference,isalsoCEOandpresidentofAutodesk,Inc.ThisisofparticularconcerntotheFBIbecauseAutodeskhasmanytop-secretcontractswiththegovernmenttosupplyStarWarsgraphicsimagingand"hyperspace"technology.Worse,DraperisthoughttohaveSovietcontacts.

    Hewasn'tmakingthisup.HehadlengthydocumentsfromtheSanFranciscoofficetoproveit.AndinwhichAutodesk'saddresswascertainlycorrect.

    Ontheotherhand,IknowJohnDraper.While,asIsay,hemayhaveoncedistinguishedhimselfasacrackerduringthePleistocene,heisnotnow,neverhasbeen,andneverwillbeCEOofAutodesk.Hedidworkthereforawhilelastyear,buthewasletgolongbeforehegotinapositiontotakeover.

    NorisAutodesk,inmyexperiencewithit,theStarWarsskunkworkswhichAgentBaxter'sdocumentsindicated.Onecouldhang

    outtherealongtimewithouteverseeinganygoldbraid.

    TheirprimaryproductissomethingcalledAutoCAD,byfarthemostpopularcomputer-aideddesignsoftwarebutgenerallylackinginlethalpotential.TheydohaveasmalldevelopmentprograminCyberspace,whichiswhattheycallVirtualReality.(This,Iassumeisthe"hyperspace"towhichAgentBaxter'sdocumentsreferred.)

    However,AutodeskhadreduceditsCyberspaceprogramtoacoupleofprogrammers.IimaginedRandyWalserandCarlTollandertoilingawayinthedarkandlonelyserviceoftheircountry.Didn'twork.ThenItriedtodescribeVirtualRealitytoAgentBaxter,butthatdidn'tworkeither.Infact,hetilted.Itookseveralrunsatit,butI

    couldtellIwasviolatingourborderagreements.Theseseemedtoincludearequirementthatneitherofustrytodragtheotheracrossintohisconceptualzone.

    IfaredalittlebetterontheHacker'sConference.Hardlyaconspiracy,theHacker'sConferenceisanannualconventionoriginatedin1984bythePointFoundationandtheeditorsofWholeEarthReview.Eachyearitinvitesaboutahundredofthemostgiftedandaccomplishedofdigitalcreators.Indeed,theyaretheverypeoplewhohaveconductedthepersonalcomputerrevolution.AgentBaxter

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    16/21

    lookedatmylistofHacker'sConferenceattendeesandreadtheirbios.

    "Thesearethepeoplewhoactuallydesignthisstuff,aren'tthey?"Hewasincredulous.Theircorporateaddressesdidn'tfithismodelofoutlawsatallwell.

    WhyhadhecomeallthewaytoPinedaletoinvestigateacrimehedidn'tunderstandwhichhadtakenplace(sortof)in5differentplaces,noneofwhichwaswithin500miles?

    Well,itseemsApplehastoldtheFBIthattheycanexpectlittlecooperationfromHackersinandaroundtheSiliconValley,owingtovirulentanti-Applesentimentthere.TheyclaimthisisduetotheHackerbeliefthatsoftwareshouldbefreecombinedwithfesteringresentmentofApple'scommercialsuccess.TheyadvisedtheFBItoquestiononlythoseHackerswhowereasfaraspossiblefromthetwistedheartofthesubculture.

    Theydidhavetheireyeonsomelocalpeoplethough.TheseincludedacoupleofformerAppleemployees,GradyWardandWaterHorat,ChuckFarnham(whohasmadealivingoutofharassingApple),GlennTenney(thepurportedleaderoftheHackers),and,ofcourse,thepurportedCEOofAutodesk.

    OtherfolksAgentBaxteraskedmeaboutincludedMitchKapor,whowroteLotus1-2-3andwasknowntohavereceivedsomethismysterioussourcecode.Orwhatever.ButIhadalsometMitchKapor,bothontheWELLandinperson.Alesslikelycomputerterroristwouldbehardtocomeby.

    Actually,thequestionofthesourcecodewasanotherareawhereworldsbutshadow-boxed.AlthoughAgentBaxterdidn'tknowsourcecodefromTuesday,hedidknowthatAppleComputerhadtoldhisagencythatwhathadbeenstolenanddisseminatedwasthecompleterecipeforaMacintoshcomputer.ThedistributionofthissecretformulamightresultinthecreationofmillionsofMacintoshesnotmadebyApple.And,ofcourse,theruinationofAppleComputer.

    Inmyworld,NuPrometheus(whoeverthey,ormorelikely,hemightbe)haddistributedasmallportionofthecodewhichrelatedspecificallytoColorQuickDraw.QuickDrawisApple'snameforthesoftwarewhichcontrolstheMac'son-screengraphics.ButthiswasanotherdetailwhichAgentBaxtercouldnotcapture.Forallheknew,youcouldgrowMacintoshesfromfloppydisks.

    IexplainedtohimthatApplewasallegingsomethingliketheabilitytoassembleanentirehumanbeingfromtherecipeforafoot,butevenheknowtheanalogywasinexact.Andtryingtogethimtoaccepttheideathatacorporationcouldgomadwithsuspicionwasquitefutile.Hehadafardifferentperceptionoftheemotional

    reliabilityofinstitutions.

    Whenhefnallyleft,wewerebothdazzledanddisturbed.IspentsometimethinkingaboutLewisCarrollandtriedtoreturntowritingaboutthelegalpersecutionoftheLegionofDoom.Butmyheartwasn'tinit.IfoundmyselfsuddenlytoomuchinsympathywithAgentBaxterandhisstrugglingcolleaguesfromOperationSunDeviltogetbackintoapropersortofpig-bashingmode.

    GivenwhathadhappenedtootherinnocentbystanderslikeSteve

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    17/21

    Jackson,Igavesomethoughttogettingscared.ButthiswasKafkainaclownsuit.Itwasn'tpreciselyfrightening.IalsotooksomecomfortinaphraseonceappliedtotheadministrationofFredericktheGreat:"Despotismtemperedbyincompetence."

    Ofcourse,incompetenceisadouble-edgedbanana.Whilewemayknowthisnewterritorybetterthantheauthorities,theyhaveusliterallyout-gunned.Oneshouldpausebeforemakingwell-armedparanoidsfeelfoolish,nomatterhowfoolishtheyseem.

    ******

    TheFearofWhiteNoise

    "Neurosisistheinabilitytotolerateambiguity."

    --SigmundFreud,appearingtomeinadream

    I'mamemberofthathalfofthehumanracewhichisinclinedtodividethehumanraceintotwokindsofpeople.Mydividinglinerunsbetweenthepeoplewhocravecertaintyandthepeoplewhotrustchance.

    Youcandrawthisoneanumberofways,ofcourse,likeControlvs.

    Serendipity,Ordervs.Chaos,Hardanswersvs.Sillyquestions,orNewton,Descartes&Aquinasvs.Heisenberg,Mandelbrot&theDalaiLama.Etc.

    Largeorganizationsandtheirdroneshuddleononeendofmyscale,busilytryingtoimposepredictablehomogeneityonmessycircumstance.Ontheotherend,free-lancersandne'er-do-wellscavortabout,gettingbyonluckiftheygetbyatall.

    Howeveryoucastthesepoles,itcomesdowntothedifferencebetweenthosewhoseelifeasastruggleagainstcosmicperilandhumaninfamyandthosewhobelieve,withoutanyhardevidence,thattheuniverseisactuallyonourside.Fearvs.Faith.

    Iamofthelattergroup.AlongwithGandhiandRebeccaofSunnybrookFarm,IbelievethatotherhumanbeingswillquiteconsistentlymeritmytrustifI'mnotdoingsomethingwhichscaresthemormakesthemfeelbadaboutthemselves.Inotherwords,thebestdefenseisagoodwaytogethurt.

    Inspiteofthefactthatthissystemworksveryreliablyformeandmykind,Ifindweareincreasinglyintheminority.Moreandmoreofourneighborsliveinarmedcompounds.Alarmsblarecontinuously.Potentiallyhappypeoplegivetheirlivesovertothecorporatestateasthoughtheworldweresodangerousoutsideitsveilofcollectiveimmunitythattheyhavenochoice.

    Ihaveanumberoftheoriesastowhythisishappening.OnehastodowiththeopeningofCyberspace.Asaresultofthisdevelopment,humanityisnowundergoingthemostprofoundtransformationofitshistory.ComingintotheVirtualWorld,weinhabitInformation.Indeed,webecomeInformation.ThoughtisembodiedandtheFleshismadeWord.It'sweirdashell.

    BeginningwiththeinventionofthetelegraphandextendingthroughtelevisionintoVirtualReality,wehavebeen,foraoveracentury,experiencingaterrifyingerosioninoursenseofbothbodyandplace.

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    18/21

    Aswebegintorealizetheenormityofwhatishappeningtous,allbutthemostcourageoushavegottenscared.

    Andeveryone,regardlessofhispsychicresilience,feelsthisoverwhelmingsenseofstrangeness.Theworld,oncesocertainandtangibleandlegallyprecise,hasbecomeaninfinitelayeringofopinions,perceptions,litigation,camera-angles,data,whitenoise,and,mostofall,ambiguities.Thoseofuswhoareofthefearfulpersuasiondonotlikeambiguities.

    Indeed,ifonewerealittlejumpytostartwith,hemaynowbefairlyhummingwithnamelessdread.Sincenoonelikeshisdreadtobenameless,thefirstorderofbusinessistofinditsomenames.

    ForalongtimehereintheUnitedStates,Communismprovidedakindofcatch-allbogeyman.Marx,StalinandMaosummonedforthsuchaspectrethat,tomanyAmericans,annihilationofalllifewaspreferabletothehumanportion'sbecomingCommunist.ButasBigRedwizenedandlosthisteeth,webegantocastaboutforareplacement.

    Findingnoneofsufficientindividualhorror,wehavedrapedanumberofobjectswiththeoldblackbuntingwhichonceshroudedtheKremlin.Ourcurrentspooksareterrorists,childabductors,AIDS,andtheunderclass.Iwouldsaydrugs,butanyonewhothinks

    thattheWaronDrugsisnotactuallytheWarontheUnderclasshasn'tbeenpayingcloseenoughattention.

    ThereareacoupleofproblemswiththeseFourHorsemen.Foronething,theyaren'tactuallyverydangerous.Forexample,only7Americansdiedinworldwideterroristattacksin1987.Fewerthan10(outofabout70million)childrenareabductedbystrangersintheU.S.eachyear.YourchancesofgettingAIDSifyouareneithergaynorahemophiliacnorajunkieareconsiderablylessthanyourchancesofgettingkilledbylightningwhilegolfing.Theunderclassisdangerous,ofcourse,butonly,withveryfewexceptions,ifyouareamemberofit.

    Theotherproblemwiththeseperilsisthattheyareallphysical.Ifweareenteringintoaworldinwhichnoonehasabody,physicalthreatsbegintolosetheirsting.

    AndnowIcometothepointofthisscreed:TheperfectbogeymanforModernTimesistheCyberpunk!Heissosmarthemakesyoufeelevenmorestupidthanyouusuallydo.Heknowsthiscomplexcountryinwhichyou'reperpetuallylost.Heunderstandsthevalueofthingsyoucan'tconceptualizelongenoughtocashinon.Heistheone-eyedmanintheCountryoftheBlind.

    Inaworldwhereyouandyourwealthconsistofnothingbutbeepsandboopsofmicro-voltage,hecanstealallyourassetsin

    nanosecondsandthenmakeyoudisappear.

    Hecanevenreachbackoutofhishauntedmistsandkillyouphysically.AmongthejustificationsforOperationSunDevilwasthischillingtidbit:

    "Hackershadtheabilitytoaccessandreviewthefilesofhospitalpatients.Furthermore,theycouldhaveadded,deleted,oralteredvitalpatientinformation,possiblycausinglife-threateningsituations."

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    19/21

    PerhapsthemostfrighteningthingabouttheCyberpunkisthedangerhepresentstoTheInstitution,whethercorporateorgovernmental.Ifyouarefrightenedyouhavealmostcertainlytakenshelterbynowinoneofthesecollectiveorganisms,sotheverylastthingyouwantissomethingwhichcanendangeryourheretoforeunassailablehive.

    Andmakenomistake,crackerswillbecometobureaucraticbodieswhatvirusespresentlyaretohumanbodies.Thus,OperationSunDevilcanbeseenasthefirstofmanywavesoforganizationalimmuneresponsetothisnewantigen.AgentBaxterwasaT-cell.Fortunately,hedidn'tknowthathimselfandIwasverycarefulnottoshowhimmyownantigenictendencies.

    IthinkthathereinliesthewayoutofwhatmightotherwisebecomeanArmageddonbetweenthecontrolfreaksandtheneo-hip.Thosewhoarecomfortablewiththesedisorientingchangesmustdoeverythinginourpowertoconveythatcomforttoothers.Inotherwords,wemustshareoursenseofhopeandopportunitywiththosewhofeelthatinCyberspacetheywillbeobsoleteeunuchsforsure.

    It'satallorder.But,mysiliconbrothers,ourself-interestisstrong.Ifwecomeonaswitches,theywillburnus.Ifwevolunteertoguidethemgentlyintoitsnewlands,theVirtualWorldmightbeamore

    amiableplaceforallofusthanthisonehasbeen.

    Ofcourse,wemayalsohavetofight.

    ******

    DefiningtheconceptualandlegalmapofCyberspacebeforetheambiguophobesdoitforus(withpunitiveover-precision)isgoingtorequiresomeeffort.Wecan'texpecttheConstitutiontotakecareofitself.Indeed,theprecedentformitigatingtheConstitutionalprotectionofanewmediumhasalreadybeenestablished.Considerwhathappenedtoradiointheearlypartofthiscentury.

    Underthepretextofallocatinglimitedbandwidth,thegovernmentestablishedanearlyrightofcensorshipoverbroadcastcontentwhichstillseemsdirectlyunconstitutionaltome.Exceptthatitstuck.Andnow,owingtoalargebodyofcaselaw,lookstogoonsticking.

    Newmedia,likeanychaoticsystem,arehighlysensitivetoinitialconditions.Today'sheuristicalanswersofthemomentbecometomorrow'spermanentinstitutionsofbothlawandexpectation.Thus,theybearexaminationwiththatdestinyinmind.

    Earlierinthisarticle,Iaskedanumberoftoughquestionsrelatingtothenatureofproperty,privacy,andspeechinthedigitaldomain.Questionslike:"Whataredataandwhatisfreespeech?"or"How

    doesonetreatpropertywhichhasnophysicalformandcanbeinfinitelyreproduced?"or"Isacomputerthesameasaprintingpress."TheeventsofOperationSunDevilwerenothinglessthananefforttoprovideanswerstothesequestions.Answerswhichwouldgreatlyenhancegovernmentalabilitytosilencethefuture'sopinionatednerds.

    Inover-reachingasextravagantlyastheydid,theSecretServicemayactuallyhavedoneaserviceforthoseofuswholoveliberty.Theyhaveprovideduswithadevil.Anddevils,amongtheirother

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    20/21

    galvanizingvirtues,arejustgreatforclarifyingtheissuesandputtingironinyourspine.Inthepresenceofadevil,it'salwayseasiertofigureoutwhereyoustand.

    WhileIpreviouslyhadfeltnostakeintheobscureconundraoffreetelecommunication,Iwas,thankstoOperationSunDevil,suddenlyabletoplotatrajectoryfromthecurrentplightoftheLegionofDoomtoaneventualconstraintonopinionsmuchdearertome.IrememberedMartinNeimoeller,whosaid:

    "InGermanytheycamefirstfortheCommunists,andIdidn'tspeakupbecauseIwasn'taCommunist.ThentheycamefortheJews,andIdidn'tspeakupbecauseIwasn'taJew.Theycameforthetradeunionists,andIdidn'tspeakupbecauseIwasn'tatradeunionist.ThentheycamefortheCatholics,andIdidn'tspeakupbecauseIwasaProtestant.Thentheycameforme,andbythattimenoonewaslefttospeakup."

    Idecideditwastimeformetospeakup.

    TheeveningofmyvisitfromAgentBaxter,IwroteanaccountofitwhichIplacedontheWELL.Severaldayslater,MitchKaporliterallydroppedbyforachat.

    AlsoaWELLdenizen,hehadreadaboutAgentBaxterandhad

    beguntomeditateontheinappropriatenessofleavingourcivillibertiestobedefinedbythetechnologicallybenighted.Amanwhoplacesgreatemphasisonface-to-facecontact,hewantedtodiscussthisissuewithmeinperson.HehadbeenflyinghisCanadairbizjettoameetinginCaliforniawhenherealizedhisroutetookhimdirectlyoverPinedale.

    Wetalkedforacoupleofhoursinmyofficewhileaspringsnowstormswirledoutside.WhenIrecountedforhimwhatIhadlearnedaboutOperationSunDevil,hedecideditwastimeforhimtospeakuptoo.

    HecalledafewdayslaterwiththephonenumberofacivillibertariannamedHarveySilverglate,who,asevidenceofhis

    convictionthateveryonedeservesdueprocess,iscurrentlydefendingLeonaHelmsley.MitchaskedmetotellHarveywhatIknew,withtheinferencethathewouldhelpsupportthecostswhichareliabletoarisewheneveryoutellalawyeranything.

    IfoundHarveyinNewYorkattheofficesofthatcity'smostdistinguishedconstitutionallawfirm,Rabinowitz,Boudin,Standard,Krinsky,andLieberman.ThesearethefolkswhomadeitpossiblefortheNewYorkTimestoprintthePentagonPapers.(NottodwellontheunwillingnotorietywhichpartnerLeonardBoudinachievedbackin1970whenhisWeathergirldaughterblewupthefamilyhome...)

    Intheconferencecallwhichfollowed,Icouldalmostheartheskeletal

    clickastheirjawsdropped.Thenextday,EricLiebermanandTerryGrossofRabinowitz,BoudinmetwithAcidPhreak,PhiberOptik,andScorpion.

    ThemaddeningtroublewithwritingthisaccountisthatWholeEarthReview,unlike,say,Phrack,doesn'tpublishinstantaneously.EventsareboilingupatsuchafrothypacethatanythingIsayaboutcurrentoccurrencessurelywillnotobtainbythetimeyoureadthis.Theroadfromhereiscertaintoforkmanytimes.Theprintedversionofthiswillseemdownrightquaintbeforeit'sdry.

  • 7/31/2019 Crime and Puzzlement - By John Perry Barlow

    21/21

    Butasoftoday(inearlyJuneof1990),MitchandIarelegallyconstitutingtheElectronicFrontierFoundation,atwo(orpossiblythree)manorganizationwhichwillraiseanddisbursefundsforeducation,lobbying,andlitigationintheareasrelatingtodigitalspeechandtheextensionoftheConstitutionintoCyberspace.

    Already,onthestrengthofpreliminarystoriesaboutoureffortsintheWashingtonPostandtheNewYorkTimes,MitchhasreceivedanofferfromSteveWozniaktomatchwhateverfundshededicatestothiseffort.(Aswellasafairamountofabusefromthemoreinstitutionalizedprecinctsofthecomputerindustry.)

    TheElectronicFrontierFoundationwillfund,conduct,andsupportlegaleffortstodemonstratethattheSecretServicehasexercisedpriorrestraintonpublications,limitedfreespeech,conductedimproperseizureofequipmentanddata,usedundueforce,andgenerallyconducteditselfinafashionwhichisarbitrary,oppressive,andunconstitutional.

    Inaddition,wewillworkwiththeComputerProfessionalsforSocialResponsibilityandotherorganizationstoconveytoboththepublicandthepolicy-makersmetaphorswhichwillilluminatethemoregeneralstakeinliberatingCyberspace.

    Noteveryonewillagree.Crackersare,afterall,generallybeyondpublicsympathy.Actionsontheirbehalfarenotgoingtobepopularnomatterwhoelsemightbenefitfromtheminthelongrun.

    Nevertheless,inthelitigationsandpoliticaldebateswhicharecertaintofollow,wewillendeavortoassurethattheirelectronicspeechisprotectedascertainlyasanyopinionswhichareprintedor,forthatmatter,screamed.Wewillmakeanefforttoclarifyissuessurroundingthedistributionofintellectualproperty.AndwewillhelptocreateforAmericaafuturewhichisasblessedbytheBillofRightsasitspasthasbeen.

    [email protected],June8,1990