Hacker Crackdown by Bruce Sterling (the reader ebook txt) đ
- Author: Bruce Sterling
- Performer: 055356370X
Book online «Hacker Crackdown by Bruce Sterling (the reader ebook txt) đ». Author Bruce Sterling
âNo part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without permission in writing from the publisher. For information address: Bantam Books.â
This is a pretty good disclaimer, as such disclaimers go. I collect intellectual-property disclaimers, and Iâve seen dozens of them, and this one is at least pretty straightforward. Unfortunately, it doesnât have much to do with reality. Bantam Books puts that disclaimer on every book they publish, but Bantam Books does not, in fact, own the electronic rights to this book. I do. And Iâve chosen to give them away.
Bantam Books is not going to fuss about this. They are not going to bother you for what you do with the electronic copy of this book. If you want to check this out personally, you can ask them; theyâre at 1540 Broadway NY NY 10036. However, if you were so foolish as to print this book and start retailing it for money in violation of my copyright and the commercial interests of Bantam Books, then Bantam, a part of the gigantic Bertelsmann multinational publishing combine, would roust some of their heavy-duty attorneys out of hibernation and crush you like a bug. This is only to be expected. I didnât write this book so that you could make money out of it. If anybody is gonna make money out of this book, itâs gonna be me and my publisher.
My publisher deserves to make money out of this book. Not only did the folks at Bantam Books commission me to write the book, and pay me a hefty sum to do so, but they bravely printed, in text, an electronic document the reproduction of which was once alleged to be a federal felony. Bantam Books and their numerous attorneys were very brave and forthright about this book. Furthermore, my former editor at Bantam Books, Betsy Mitchell, genuinely cared about this project, and worked hard on it, and had a lot of wise things to say about the manuscript. Betsy deserves genuine credit for this book, credit that editors too rarely get.
The critics were very kind to THE HACKER CRACKDOWN, and commercially the book has done well. On the other hand, I didnât write this book in order to squeeze every last nickel and dime out of the mitts of impoverished sixteen-year-old cyberpunk high-school-students. Teenagers donât have any moneyâno, not even enough for HACKER CRACKDOWN. Thatâs a major reason why they sometimes succumb to the temptation to do things they shouldnât, such as swiping my books out of libraries. Kids: this one is all yours, all right? Go give the paper copy back. *8-)
Well-meaning, public-spirited civil libertarians donât have much money, either. And it seems almost criminal to snatch cash out of the hands of Americaâs grotesquely underpaid electronic law enforcement community.
If youâre a computer cop, a hacker, or an electronic civil liberties activist, you are the target audience for this book. I wrote this book because I wanted to help you, and help other people understand you and your unique, uhm, problems. I wrote this book to aid your activities, and to contribute to the public discussion of important political issues. In giving the text away in this fashion, I am directly contributing to the bookâs ultimate aim: to help civilize cyberspace.
Information WANTS to be free. And the information inside this book longs for freedom with a peculiar intensity. I genuinely believe that the natural habitat of this book is inside an electronic network. That may not be the easiest direct method to generate revenue for the bookâs author, but that doesnât matter; this is where this book belongs by its nature. Iâve written other booksâplenty of other booksâand Iâll write more and I am writing more, but this one is special. I am making THE HACKER CRACKDOWN available electronically as widely as I can conveniently manage, and if you like the book, and think it is useful, then I urge you to do the same with it.
You can copy this electronic book. Copy the heck out of it, be my guest, and give those copies to anybody who wants them. The nascent world of cyberspace is full of sysadmins, teachers, trainers, cybrarians, netgurus, and various species of cybernetic activist. If youâre one of those people, I know about you, and I know the hassle you go through to try to help people learn about the electronic frontier. I hope that possessing this book in electronic form will lessen your troubles. Granted, this treatment of our electronic social spectrum not the ultimate in academic rigor. And politically, it has something to offend and trouble almost everyone. But hey, Iâm told itâs readable, and at least the price is right.
You can upload the book onto bulletin board systems, or Internet nodes, or electronic discussion groups. Go right ahead and do that, I am giving you express permission right now. Enjoy yourself.
You can put the book on disks and give the disks away, as long as you donât take any money for it.
But this book is not public domain. You canât copyright it in your own name. I own the copyright. Attempts to pirate this book and make money from selling it may involve you in a serious litigative snarl. Believe me, for the pittance you might wring out of such an action, itâs really not worth it. This book donât âbelongâ to you. In an odd but very genuine way, I feel it doesnât âbelongâ to me, either. Itâs a book about the people of cyberspace, and distributing it in this way is the best way I know to actually make this information available, freely and easily, to all the people of cyberspaceâincluding people far outside the borders of the United States, who otherwise may never have a chance to see any edition of the book, and who may perhaps learn something useful from this strange story of distant, obscure, but portentous events in so-called âAmerican cyberspace.â
This electronic book is now literary freeware. It now belongs to the emergent realm of alternative information economics. You have no right to make this electronic book part of the conventional flow of commerce. Let it be part of the flow of knowledge: thereâs a difference. Iâve divided the book into four sections, so that it is less ungainly for upload and download; if thereâs a section of particular relevance to you and your colleagues, feel free to reproduce that one and skip the rest.
Just make more when you need them, and give them to whoever might want them.
Now have fun.
Bruce Sterlingâbruces@well.sf.ca.us
CHRONOLOGY OF THE HACKER CRACKDOWN
1865 U.S. Secret Service (USSS) founded.
1876 Alexander Graham Bell invents telephone.
1878 First teenage males flung off phone system by enraged authorities.
1939 âFuturianâ science-fiction group raided by Secret Service.
1971 Yippie phone phreaks start YIPL/TAP magazine.
1972 RAMPARTS magazine seized in blue-box rip-off scandal.
1978 Ward Christenson and Randy Suess create first personal computer bulletin board system.
1982 William Gibson coins term âcyberspace.â
1982 â414 Gangâ raided.
1983-1983 AT&T dismantled in divestiture.
1984 Congress passes Comprehensive Crime Control Act giving USSS jurisdiction over credit card fraud and computer fraud.
1984 âLegion of Doomâ formed.
1984. 2600: THE HACKER QUARTERLY founded.
1984. WHOLE EARTH SOFTWARE CATALOG published.
1985. First police âstingâ bulletin board systems established.
1985. Whole Earth âLectronic Link computer conference (WELL) goes on-line.
1986 Computer Fraud and Abuse Act passed.
1986 Electronic Communications Privacy Act passed.
1987 Chicago prosecutors form Computer Fraud and Abuse Task Force.
1988
July. Secret Service covertly videotapes âSummerConâ hacker convention.
September. âProphetâ cracks BellSouth AIMSX computer network and downloads E911 Document to his own computer and to Jolnet.
September. AT&T Corporate Information Security informed of Prophetâs action.
October. Bellcore Security informed of Prophetâs action.
1989
January. Prophet uploads E911 Document to Knight Lightning.
February 25. Knight Lightning publishes E911 Document in PHRACK electronic newsletter.
May. Chicago Task Force raids and arrests âKyrie.â
June. âNuPrometheus Leagueâ distributes Apple Computer proprietary software.
June 13. Florida probation office crossed with phonesex line in switching-station stunt.
July. âFry Guyâ raided by USSS and Chicago Computer Fraud and Abuse Task Force.
July. Secret Service raids âProphet,â âLeftist,â and âUrvileâ in Georgia.
1990
January 15. Martin Luther King Day Crash strikes AT&T long-distance network nationwide.
January 18-19. Chicago Task Force raids Knight Lightning in St. Louis.
January 24. USSS and New York State Police raid âPhiber Optik,â âAcid Phreak,â and âScorpionâ in New York City.
February 1. USSS raids âTerminusâ in Maryland.
February 3. Chicago Task Force raids Richard Andrewsâ home.
February 6. Chicago Task Force raids Richard Andrewsâ business.
February 6. USSS arrests Terminus, Prophet, Leftist, and Urvile.
February 9. Chicago Task Force arrests Knight Lightning.
February 20. AT&T Security shuts down public-access âattctcâ computer in Dallas.
February 21. Chicago Task Force raids Robert Izenberg in Austin.
March 1. Chicago Task Force raids Steve Jackson Games, Inc., âMentor,â and âErik Bloodaxeâ in Austin.
May 7,8,9.
USSS and Arizona Organized Crime and Racketeering Bureau conduct âOperation Sundevilâ raids in Cincinnatti, Detroit, Los Angeles, Miami, Newark, Phoenix, Pittsburgh, Richmond, Tucson, San Diego, San Jose, and San Francisco.
May. FBI interviews John Perry Barlow re NuPrometheus case.
June. Mitch Kapor and Barlow found Electronic Frontier Foundation; Barlow publishes CRIME AND PUZZLEMENT manifesto.
July 24-27. Trial of Knight Lightning.
1991
February. CPSR Roundtable in Washington, D.C.
March 25-28. Computers, Freedom and Privacy conference in San Francisco.
May 1. Electronic Frontier Foundation, Steve Jackson, and others file suit against members of Chicago Task Force.
July 1-2. Switching station phone software crash affects Washington, Los Angeles, Pittsburgh, San Francisco.
September 17. AT&T phone crash affects New York City and three airports.
IntroductionThis is a book about cops, and wild teenage whiz-kids, and lawyers, and hairy-eyed anarchists, and industrial technicians, and hippies, and high-tech millionaires, and game hobbyists, and computer security experts, and Secret Service agents, and grifters, and thieves.
This book is about the electronic frontier of the 1990s. It concerns activities that take place inside computers and over telephone lines.
A science fiction writer coined the useful term âcyberspaceâ in 1982. But the territory in question, the electronic frontier, is about a hundred and thirty years old. Cyberspace is the âplaceâ where a telephone conversation appears to occur. Not inside your actual phone, the plastic device on your desk. Not inside the other personâs phone, in some other city. THE PLACE BETWEEN the phones. The indefinite place OUT THERE, where the two of you, two human beings, actually meet and communicate.
Although it is not exactly âreal,â âcyberspaceâ is a genuine place. Things happen there that have very genuine consequences. This âplaceâ is not âreal,â but it is serious, it is earnest. Tens of thousands of people have dedicated their lives to it, to the public service of public communication by wire and electronics.
People have worked on this âfrontierâ for generations now. Some people became rich and famous from their efforts there. Some just played in it, as hobbyists. Others soberly pondered it, and wrote about it, and regulated it, and negotiated over it in international forums, and sued one another about it, in gigantic, epic court battles that lasted for years. And almost since the beginning, some people have committed crimes in this place.
But in the past twenty years, this electrical âspace,â which was once thin and dark and one-dimensionalâlittle more than a narrow speaking-tube, stretching from phone to phoneâhas flung itself open like a gigantic jack-in-the-box. Light has flooded upon it, the eerie light of the glowing computer screen. This dark electric netherworld has become a vast flowering electronic landscape. Since the 1960s, the world of the telephone has cross-bred itself with
Comments (0)