Received: by lemuria.sai.com (/\==/\ Smail3.1.21.1 #21.11) id ; Sun, 20 Sep 92 07:32 EDT Received: from uicvm.uic.edu by mv.MV.COM (5.65/1.35) id AA08454; Sun, 20 Sep 92 07:29:42 -0400 Message-Id: <9209201129.AA08454@mv.MV.COM> Received: from NIU.BITNET by UICVM.UIC.EDU (IBM VM SMTP V2R1) with BSMTP id 1389; Sun, 20 Sep 92 06:29:08 CDT Date: Sun, 20 Sep 92 01:32 CDT To: TK0JUT1@NIU.BITNET From: TK0JUT2%NIU.bitnet@UICVM.UIC.EDU Subject: Cu Digest, #4.44 Computer underground Digest Sun Sep 20, 1992 Volume 4 : Issue 44 Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivist: Dan Carosone Copy Editor: Etaion Shrdleau, Srr. CONTENTS, #4.44 (Sep 20, 1992) File 1--The Cuckoo's Egg Revisited File 2--The Egg, Over Easy File 3--Cuckoo's Egg and Life File 4--An Ideal(istic) Egg File 5--The Cuckoo's Egg and I File 6--Hatching the Cuckoo's Egg Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on Genie in the PF*NPC RT libraries; from America Online in the PC Telecom forum under "computing newsletters;" on the PC-EXEC BBS at (414) 789-4210; and by anonymous ftp from ftp.eff.org (192.88.144.4) and ftp.ee.mu.oz.au For bitnet users, back issues may be obtained from the mail server at mailserv@batpad.lgb.ca.us European distributor: ComNet in Luxembourg BBS (++352) 466893. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Wed, 29 Jul 92 21:17:34 EST From: Gene Spafford Subject: File 1--The Cuckoo's Egg Revisited Cuckoo's Egg Revisited by Gene Spafford When I first read Cliff's book, in draft manuscript form (Cliff sent me an advance copy), I found it gripping. So did my wife. We each found that when we started it, we couldn't put it down until we finished it -- both of us staying up past 3am on a weeknight to read through to the end. We weren't the only ones. When the book was published, I bought copies for some friends, several of whom don't use computers. Almost all of them had the same reaction: they found the book engrossing, entertaining, and informative. Several of them also reported spending late nights (and early mornings!) reading to the end. It wasn't that Cliff set down particularly elegant and engrossing prose that made the book so captivating, although his writing is certainly better than many others evidence. It wasn't because Cliff recounted some high-tech adventure either -- many of the readers (myself included) already had experience with computer security incidents. So why was the book so interesting to us, and to so many other people? It wasn't until a few weeks ago, when Jim Thomas asked if I would do a short retrospective on the "Cuckoo's Egg" that I thought about this question. I even went back and skimmed through parts of the book again. Now that I've thought about it, I believe I know why "Cuckoo's Egg" had such an impact: it was a honest sincere, personal accounting of one person's internal struggle with right and wrong, as well as being a challenging mystery story. Cliff's writing portrayed, for many of us, some interesting conflicts and value judgments. For instance, having strong opinions about some governmental and commercial entities, but finding that they are composed of many well-meaning, genuinely nice people. Or discovering that not every "harmless" act is really harmless when multiplied many-fold. Heroic tales often involve journeys of self-discovery and the loss of innocence; we saw Cliff undergo both. To give a more concrete example of this, I consider the anecdote about how Cliff "liberated" several printing terminals to track the logins a perfect example of how rules, particularly property rules, may sometimes be ignored by someone hot on a clever "hack," as Cliff was. As the story unfolded, he made choices that I know he would have reconsidered later on. I also think that Cliff's account of keeping his system open, and observing the cracker break in to other machines through his, is a perfect example of how difficult some choices are to make, and how they must be reevaluated as time goes on. Was Cliff partially responsible for those break-ins? Was his notification of the sites sufficient to counter the harm he had done? Is the argument that "the bad guys would have used some other route" a valid argument? Seeing those conflicts, even if indirectly, made the book something more than just entertaining. Cliff started as a well-meaning academic with strong views (almost anarchistic, perhaps), and through the course of his personal experience became someone with a different view of society. He underwent a transformation, on the pages before us, from a happy-go-lucky scientist, to someone obsessed with a problem. As he recounted his growing awareness of the vast vulnerability our increasing reliability on computers and networks presents, he made us aware. And with this new awareness, we read about the change in Cliff and his view of the world...and how those around him changed their view of him. Cliff admits that he second-guesses some of his decisions made during the time of his pursuit. He's not sure he did the right thing at every step, and he has paid a high price for doing what he felt was right -- losing many things he treasured before and after the publication of the book. I think that's in the book, too, although maybe not explicitly. Or perhaps its because I know Cliff and have talked to him about being thrust into the spotlight that makes me see those things when I reread parts of the book. He lost some cherished possessions in the midst of battling for his principles, and that is always a gripping theme. So, is "Cuckoo's Egg" still worth reading today? I think so. I didn't find it so gripping this time as the first time I read it, but I saw more of the internal struggle Cliff went through as he pursued his investigation. I also saw how little some things have changed in the our world of networks. The book is still entertaining, too. Cliff's account of drying his sneakers in the microwave oven sounds like something I'd do, and his recipe for cookies is still a bonus. If nothing else, "Cuckoo's Egg" is still a good way to expose the uninitiated to some of the problems with computer security and investigation. For that one reason alone, I think the book will continue to have value to us -- as a place to get dialog started, if nothing else. I reflect on the world in Cliff's book, where sites were regularly broken into without sys administrators knowing about it, where security information was difficult to find, and where it was almost impossible to get law enforcement to care about what was happening. Then I think back over the past few weeks: * I have given several continuing education courses in Unix security, here in the US and in Europe, this summer, and turnout has been good * I've spoken on the phone with people in the FBI and US Attorney's office whose full-time job is devoted solely to computer crime issues * I've read in the paper about several arrests on computer crime charges, in the US and in Europe * I've corresponded with representatives of several security response teams, charged with helping to deal with computer security incidents * I've received court papers identifying me as a witness in an upcoming trial on computer abuse * I've been talking with some law enforcement agents in a (unnamed) nearby state who are concerned about how to define laws that help them stop the "bad guys" yet don't hurt innocent third parties. How different the world is now from when Cliff began his adventure and wrote his book! Although we still have sites run with a cavalier attitude towards security, and although there are still people who try to penetrate whatever systems they can, the situation is not the same. We now have dedicated security officers, a growing security industry, new laws and law enforcement efforts, and coordinated responses to unauthorized access and malicious behavior. It's far from ideal, but awareness is growing. Perhaps "Cuckoo's Egg" has had something to do with those changes? If so, we should be grateful, perhaps, that this catalyst was crafted by someone whose vision is that computers are useful if only we can maintain sufficient trust in each other, and not someone with an urge to legislate tight controls. In a way, that is one of the most enduring aspects of Cliff's writing. It is clear that he loved some aspects of computing. The challenge of tracking his intruder was clearly an element of gamesmanship as well as duty. Cliff, like many of us, came to realize that the world came to his workstation through the magic of networks and computers. That world view, however, is based on a foundation of 1's and 0's that bear no definitive stamp of who sent them. The network provides freedoms to be free of stereotypes, and to express your thoughts to millions. Your thoughts come through, and the reader need never know if you are young or old, tall or short, fat or thin, black or red or oriental or hispanic or mongrel, male or female, hale or crippled. That same freedom, however, requires responsibility to not abuse it, and trust that the 1's and 0's aren't carrying lies. It was Cliff's anger at the end of the book -- that his trust in what came across his computer was violated -- that really brought home the change. His anger, about how the abuse of trust by a few threatens the many, clearly came through to me. His concern for our reliance on computers also was clear. And the irony of the epilogue, tugging at him again, after he said he was giving it all up; "I'm returning to astronomy" are his final words in the last chapter. You can't go back Cliff. Sadly, none of us can. ------------------------------ Date: 24 Aug 92 23:27:31 EDT From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: File 2--The Egg, Over Easy The Egg, Over Easy. Gordon R. Meyer, CuD co-moderator It's Thursday, August 20, 1992 and I'm watching the President of the U.S. address his loyal minions. "Fall of communism...I did that," "The reunification of Germany...did that too," "Kuwait is free..thanks to me," "Events in our country?...blame Congress. It's not my fault". The telephone suddenly rings...though semi-catatonic I know, just know, it's the Thought Police. Shit, what will I tell them? I was listening to the President...honest! You must have me confused with someone else. My palms are sweating. The phone is still ringing. I pick it up... "Guten abend" I say, in my best German accent, hoping it will throw them off the track. "Hey Gordon" Jim says without hesitation. "Jim! It's you!" Thank God. I breath easier knowing that it's only Jim Thomas, co-founder and Keeper-Of-CuD on the line. I guess I only thought it was 1984. Or maybe not. Before I know it Jim is asking me to write a review of 'The Cuckoo's Egg' for the next issue of CuD. I check my watch...it's still ticking. A quick glance at the calendar on the wall...'1992'. Hmmmm. Maybe Jim is still in his own RNC-induced trance. "Didn't we review Cliff's book about..oh...two and half years ago?," I ask quietly, trying not to wake him too abruptly. "Yeah." (It's a full sentence for Jim, trust me, he can say a lot in one word.) Admitting my confusion, I ask him to explain. "There has been a lot of water under the bridge since Cliff's book, it'd be good to take another look at it and see what it has to offer now. Besides," he added, "we already have retrospectives from lots of other folks." "Nothing like good old fashioned peer pressure" I mumble, trying to sound enthusiastic. I ask him when he needs the article, knowing the answer won't be as far in the future as I'd like, say eight or nine months from now. "Wednesday latest, tuesday if you can." Great, so I've got around five days to find, then re-read, then review the book. How will I convince him it can't be done? I start to voice my objections, starting with "I don't have time to read...," when he cuts me off before I can finish. "So don't read it again, just review it." Huh? No, wait, oddly enough it starts to make some sense. Or least more sense than what I could hear coming from the television in the other room. We discuss the idea a bit more and hang up with me promising to send the article by wednesday, and Jim making me say "By wednesday the 24th of August 1992 anno Domini, cross my heart and hope to die." Sheesh, what a slave driver... I'm determined *not* to refer to my copy of The Cuckoo's Egg (The Egg) for this exercise. I really do know where it is though, I can see it on the shelf about ten feet away as I write this, but I'm not going to cheat and look at it. I don't need to. Well, except to see how the hell to spell "Cuckoo," but that doesn't count. There's no need for me to tell you what the book says, you know that...or at least you should. If you don't know then you haven't read it. Do so. Now. End of review. (And if you choose to ignore this advice, and not read it, I swear to God you will regret it because the very first non-computer person you meet, who finds out about your interest in security/hackers, will regale you with an enthusiastic 20-minute summation of 'that one hacker book'. So either read it, or never _ever_ admit you haven't. Trust me.) Let's look at The Cuckoo's Egg not as a book, but as a landmark...A cultural/historical icon that escaped from cyberspace into the 'real' world. The Egg, for the most part, was the first to introduce to mainstream (i.e., Non-cyberspace) society the concepts, magic, implications, and yes, possible dangers, of the networked world. The Egg uses popular and familiar "Hollywood" elements (espionage, government agents, goofy liberal scientists) , and melds them with the unfamiliar and obtuse (networks, Unix). Classical elements, fascinating story...It'll sell a zillion copies! And it did. The Egg has been in paperback, on Nova, in Congressional hearings, featured on the Wily Hacker Trading Cards, retold in JPL Comics, selected as a Book-of-the-Month Club Alternate Selection, and the ultimate in mainstream acceptance and recognition...condensed for Readers Digest. No, The Egg is certainly not just a book. I want to liken it to _Hell's Angels_ by Hunter S. Thompson. But I'm not old enough to do so with any credibility. Thompson introduced people to the outlaw motorcycle gangs, and showed their lifestyle and organization in a way that outsiders had never before seen. We share with HST as he learns about the Angels, and we wince when gets beat-up at the end. In The Egg, we mock Cliff's obsession with the teeny tiny accounting error that leads to the discovery of The Intruder. Then, after enticing us with a Brownie Recipe, he gets us caught up in the chase until we cheer when the Bundepost gets a trace on the hacker's line. _Hell's Angels_ is every bit as much as a 'must read' to be able to converse about motorcycle outlaw gangs, as The Egg is to talk about the problems of computer security. Only more so, as I don't think Readers Digest has ever heard of Hunter Thompson. (Note to Jim: Don't worry, I've deleted the discussion of the phallic symbolism of pistols and yo-yo's.) The Egg is also important as it documents an era when the FBI, SS, CIA, Telco Security, and everyone else would laugh off hackers and/or espionage. Those days have ended. In fact, the pendulum has swung so far in the other direction that Stoll's experience with the laise- faire authorities seems quaint. For researchers, The Egg marks somewhat of a transition between Esquire's Cap'n Crunch article, Bill Landreth's confessional book, and the ill-directed Operation Sun Devil. To my knowledge we've never really heard about the 'national defense' impact any of the information Stoll's hacker may have passed on to the Soviets. This is regrettable as The Egg has almost certainly had an effect on concern about computer espionage. It would be interesting to know how this 'classic case' (and oft cited) harmed, or failed to harm, our "National Security." Regardless of the affect, it's a reasonable assumption that Stoll's work has been used as justification for more than one corporate security program sales pitch. The Egg is destined to be a part of Bibliography's and "suggested reading" lists for many years. Finally The Egg has also given us its author, Cliff Stoll. If it wasn't for his book, and his willingness to share it with the world (quite literally, I understand, though haven't confirmed, that it has been translated into many languages) Stoll might well be known only to his fellow Astronomers. That would be a shame, for although I don't always agree with Stoll's suggested solutions or characterizations of the Computer Underground, I think the computer security community would be a bit more boring without him. So there you have it, The Cuckoo's Egg thus far. I'll be interested in seeing how the book holds up over the next two or three years. I predict it will do just fine, joining the ranks of _Hackers_ and _Soul of a New Machine_, as dog-eared after dog-eared copy gets passed from one computer enthusiast to another. Postscript: For those who just can't get enough of the saga of the egg, a book published in Germany, _Hacker for Moscow_, tells the tale as seen from the other side of the terminal. If you were hungry for more information about the German/East German connection, and you want a more detailed description of the actual methods used to gain access, as only the intruder himself can give, check it out. Unfortunately, as far as I know, it hasn't been translated into english...outside of Langley, VA of course. ------------------------------ Date: Sun, 2 Aug 92 18:51:50 PDT From: brendan@CYGNUS.COM(Brendan Kehoe) Subject: File 3--Cuckoo's Egg and Life Life can take you in any number of directions, some of which may bring you through Andy Warhol's proverbial fifteen minutes of fame. Cliff Stoll found himself propelled into that limelight, caught quite unawares. The tale of a six-bit accounting discrepancy leading to spies and intrigue took the world by storm. His life has apparently calmed down now, but the results of his experience are still being realized by the computing community. Advances in technology, groups like CERT and companies with full-time security alert personnel are all, in part, testament to the work represented by his book. The cosmopolitan appeal of The Cuckoo's Egg cannot be ignored, however. Fully half the importance of a message is its capacity to be conveyed to as many people as possible. Cliff accomplished this, in spades. Rather than limit the audience to technophiles who would eat up the juicy details, The Cuckoo's Egg offered readers an insight into how a "diamond in the rough" might go about dealing with what amounted to an impossible situation. Following Cliff as he was knocked about from pillar to post, finding no help at all from those we would assume are paid to investigate such things, made for truly fascinating and, sometimes, disturbing reading. Just over two years ago, I spent Christmas with a friend and his family, the cost of returning to my native Maine proving prohibitively high. While browsing a North Pennsylvania mall, we happened upon The Cuckoo's Egg in a bookstore, and my friend chose to buy it as a gift for his father. Someone I consider to be the perfect example of a not terribly advanced, but quite comfortable, computer user, his dad was instantly captured by the engaging story. He literally inhaled it, along with dozens of cigarettes, over the course of not more than two days. Chapter One on Tuesday, "THE END?" on Thursday evening. A flurry of questions hit over the weekend: was the network used at Widener University, where we were Computer Science majors, capable of these things? had we ever seen anything like what had happened to "that astronomer"? wouldn't it be cool to have it happen to us? The notoriety Cliff Stoll gained from what could be termed an ordeal was not, in my opinion, the reason The Cuckoo's Egg had to happen. Rather, it accomplished precisely what it set out to do: bring the concerns of information security into the thoughts and conversations of thousands of people. People who would otherwise not have ever encountered what may well prove to be one of the most decisive factors in our world's future as we fast approach the new millennium. ------------------------------ Date: Mon, 14 Sep 92 11:14:49 CDT From: Jim Thomas Subject: File 4--An Ideal(istic) Egg Cliff Stoll, the hippy, might appreciate the irony of The Cuckoo's Egg (TCE) symbolizing for the "hacker generation" what Altamont did for the counter-culture of the sixties. Cliff Stoll, the socially committed astronomer would take little pleasure in the prophetic power of his observations. For those of the sixties, the free Rolling Stones concert at Altamont was seen as a west-coast version of Woodstock--a chance to frolic, engage in the excesses of "freedom from responsibility," and live out a fantasy inspired by a romantic image of the flower-power culture. A beating death by the Hell's Angels "peace keepers," seemingly high numbers of drug overdoses, and spiritual rain darkened the event. Altamont itself did not kill the "hippy dream" any more than TCE had a terminal effect on the hacker counterculture. Nonetheless, the experiences recounted in TCE provided an icon for the passing of a romantic era of hacking into one in which personal responsibility (or lack of it), personal excesses, and increasing abuse without concern for the consequences were eroding a culture from within. Like the decay of the sixties' culture, the hacker culture of the 1980s was invaded by newcomers who lacked the romantic idealism of those who had come before them. As access to computers increased, a hoard of newcomers moved in, bringing with them the problems that face any community in a population explosion. In TCE, Cliff only documents one slice of the problem by describing one incident that symbolized the problems of a new society when trust and respect for the rights of others breaks down. In long-lost correspondence, Eric Smith once suggested that TCE represented a turning point for Cliff, for the "hacker community," and for computer users who who lived outside the pale of exploratory computer use. Cliff's work raised consciousness, a few hackles (including my own), praise, and criticism. It was written before Operation Sun Devil, but was read by many of us in the context of the Legion of Doom and Phrack indictments. It was cited by some law enforcement agents in documents and other media as a means of exaggerating the "Hacker Menace" as a national security threat to justify their excesses in early 1990. As a consequence, it was not a work that received many neutral readings. Ironically, much of the criticism directed at Cliff and his work reflected the same passion that prompted Cliff to write it: Betrayal of trust and opposition to injustice and predatory behavior. The metaphors of betrayal and loss permeate TCE. Openness, whether in our personal relationships or on computer systems, require trust. When that trust is violated, we lose. Cliff's persona seeps continually out of the book. One can picture him with keyboard in one hand, yoyo in the other, chocolate chip cookie crumbs scattered about, and sneakers steaming in the microwave, sharing each chapter with the woman he loves with joy and anticipation. The intellectual and other rewards he reaped from his labor also carried a burden. The nearly three years' experience and corresponding time to reflect on events since then cannot but make a re-reading of The Cuckoo's Egg a somewhat sad experience. Cliff has written elsewhere of his personal losses: Some friends abandoned him, he was unfairly criticized, his relationship dissolved, and he found himself at the center of controversy not of his own making. What was the cause of all this? By now, most know that TCE was about tracking an intruder into UC/Berkeley's computer system who was noticed as the result of a miniscule accounting error. Cliff discovered that his system was being used by the hacker to access other systems, and, like a cyber-bloodhound, followed the intruder into other systems and then retraced the steps and ultimately located him on a system in Germany. The narrative made a fascinating detective story, and when read from the protagonist's perspective, one couldn't help root for the detective. Methodologically, patiently, painstakingly, the narrator pursued his quarry. Guided by the same passion for solving a puzzle that motivates hackers (and researchers) and by the feeling that if things are not quite right they should be fixed, Cliff combined curiosity and technology in a way that one might argue celebrates the original hacker ethos while adamantly opposing its excesses. When I first read the Cuckoo's Egg in early 1990, the Legion of Doom, Phrack, and Len Rose were facing legal problems. Sun Devil was still a few months away. Prosecutors, the media, and others alluded to the work to demonstrate the "hacker menace," to raise the spectre of threats to national security through espionage or disrupting the social fabric, and to generally justify the need to bring the full weight of law enforcement down upon teenage joyriders. Although Cliff has taken a strong and unequivocal stand on civil liberties and has publicly denounced excesses that violate Constitutional rights, he had no power of the use of the images that some took from the book. This led some at that time, myself included, to associate him with the excesses. Ironically he was in a sense victimized by the same law enforcement excesses as others in early 1990. By attempting to alert us to a problem, he was unwittingly caught up in it, and the messenger was mistaken for the message. As a series of posts on comp.org.eff.talk indicated this past summer, the mistake lingers. And what *IS* Cliff's message? In TCE and elsewhere, he has made it quite clear: Cyberspace must be based on trust. The sixties' idealism of a better world through cooperation and respect for others' rights is not simply a "PC" perspective, but an ethos that is essential if computer technology and its benefits are to be widely shared. Those who intrude on others subvert this trust, and virus-planters are akin to putting razor blades in the sand at the beach. The attitude of some that it's a right to try to hack into systems with impunity subverts the freedom of others, and when trust dissolves, so does freedom. In some ways, Cliff Stoll *is* The Cuckoo's Egg. His persona has been planted in our psyche, his images have become part of our lore, and his non-compromising insistance on establishing a culture of trust and mutual respect provide a model for teaching young computer users that responsibility comes with knowledge. Gordon Meyer provides the best summary for the legacy of The Cuckoo's Egg: It has hatched and his given us Cliff Stoll and an image of curiosity, decency, and class that can help civilize the cyber-frontier. And there aren't many books or authors about which that can be said. ------------------------------ Date: Thu, 17 Sep 92 23:23:46 EDT From: Mike Godwin Subject: File 5--The Cuckoo's Egg and I THE CUCKOO'S EGG and I By Mike Godwin Copyright (c) 1992, Mike Godwin I won't say that THE CUCKOO'S EGG is *the* book that changed my life, but it's certainly *one* of those books. Here's how it happened: In the middle of my last year of law school (1989-90), I was getting bored with the local BBS scene in Austin, Texas. So, I decided it was finally time to do what I'd been planning for a few years--getting an account on a University of Texas system and participating in the huge, distributed, free-floating conference system called Usenet. By sheer chance, this decision came at a time when the Net was particularly hungry for information about hackers and the law. Usenet was still abuzz with discussion about the Internet Worm case, and there was also a lot of talk about the so-called "Legion of Doom" searches and seizures, which focused on three alleged hackers in Atlanta. (As a third-year law student preparing to become a Texas prosecutor, I had plenty of answers to the legal questions that flooded Usenet newsgroups like misc.legal and comp.dcom.telecom.) And, of course, there were lots of references to a book by some guy named Stoll, who apparently had caught some hacker spies. A fellow Austin BBSer named Al Evans told me he'd been enthralled by the book, and when I saw it listed in the new acquisitions at my law school's library, I decided to check it out. The book was a revelation, and it kept me up half the night--I ended up reading it in one sitting. The mystery of the Hannover Hacker was only part of what fascinated me--the book, almost incidentally, included the first *interesting* discussion I'd come across of the structure and dynamics of the Internet. The image I formed of the Hacker's leaping from network to network helped me begin to appreciate the vast, complicated, deeply connected computer and telephone networks that crossed the oceans and pierced national borders without a pause. I found Cliff's story also to fit well with what I knew, from my own associations with researchers, what life can be like for working scientists. There is a point in the book where Cliff's curiosity and desire to find "the answer" kicks into overdrive--it's then that you see why he became an astronomer. For me, one of the most inspiring passages in the book is Cliff's account of his discussing the Hacker with Nobel Prize-winner Luis Alvarez: "Permission, bah. Funding, forget it. Nobody will pay for research; they're only interested in results," Luie said. "Sure, you could write a detailed proposal to chase this hacker. In fifty pages, you'll describe what you knew, what you expected, how much money it would take. Include the names of three qualified referees, cost benefit ratios, and what papers you've written before. Oh, and don't forget the theoretical justification. "Or you could just chase the bastard. Run faster than him. Faster than the lab's management. Don't wait for someone else, do it yourself. Keep your boss happy, but don't let him tie you down. Don't give them a standing target." That's why Luie won the Nobel Prize.... And yet, the same singleminded approach that Cliff (and I) found so inspiring in Alvarez also inspired a lot of the criticism that Cliff has faced from some quarters since the book was published. (More about this later.) At the time I read the book, it had not yet come out in paperback. When I finished CUCKOO'S EGG, I looked again at the forward and discovered that the author had left an e-mail address. Although not always swift on the uptake, I managed to deduce from this that Cliff wanted feedback from his readers, so, after some hesitation, I sent him a letter in e-mail, giving him my reactions, and making a joke about a humorous grammar error in Chapter 45 (for the curious, it's in the top two lines on page 255 in the Pocket Books paperback). To my surprise, I had mail back from Cliff the next day! He was interested to hear my reactions, and was surprised to discover that I was a law student--his wife, Martha, had been a Berkeley law student during the events chronicled in the book, and was now a clerk for Supreme Court Justice Harry Blackmun! We discussed the need for more people on the Net with genuine knowledge of the law--few people had had more experience than Cliff in running up against the "two cultures" division between those representing the legal system (not just lawyers, but also the FBI and the Secret Service) on the one side, and the programmers, scientists, and students who populated the Net on the other. And as our correspondence progressed, we found ourselves talking from time to time about the "hacker cases" that were being reported on Usenet and in the news media. Cliff had seen what happened when well-meaning and informed law-enforcement agents, like Mike Gibbons of the FBI, took on a case in which a computer intruder clearly sought to steal military secrets and sell them to Eastern Bloc spies. What we both were seeing now were cases in which law-enforcement agents and prosecutors were making obvious mistakes and damaging people's rights in the process. The "Legion of Doom" hackers, for example, were accused of stealing the source code for the Emergency 911 System from a BellSouth computer--yet to anyone with even basic knowledge of what a computer program looks like, the E911 "source code" was nothing more than a bureaucratic memorandum of some sort, with a few definitions and acronyms thrown in. (The myth that the Legion of Doom defendants had access to the E911 source code persists to this very day: columnist "Robert Cringely" of INFOWORLD once reported the "fact" that the AT&T crash of 1990 was due to Legion of Doom sabotage, and that same "fact" appears, along with numerous other egregious errors, in the diskette-based press kit for the new movie "Sneakers.") My growing interest in these hacker prosecutions, my discussions with Cliff and others, and my reflections on THE CUCKOO'S EGG started changing my postings on Usenet. Whereas before, I'd limited myself to fairly dry and academic dispositions in answer to abstract legal questions, I found myself getting emotional about some of these cases. The more I learned about how the seizures and prosecutions were hurting individuals and chilling free discussion on the Net (I even lost an account myself as one sysadmin ended public access to his system in order to minimize risk of having his system seized), the more I found myself arguing with those whose justified anger at computer intruders led them to justify, uncritically, any and all overreaching by law enforcement. And then this War On Hackers struck closer to home. On March 1, 1990, an Austin BBS, run by the nationally famous role-playing-game publisher Steve Jackson Games was seized by the United States Secret Service. Although neither Jackson nor his company turned out to be the targets of the Secret Service's criminal investigation, Jackson was told that the manual for a role-playing game they were about to publish (called GURPS Cyberpunk and stored on the hard disk of the company's BBS computer) was a "handbook for computer crime." The seizure, which shocked Austin's BBS community, had the potential to put Jackson, an innocent third party, out of business. The sheer magnitude of the effect on Jackson and his business outraged the members of an Austin BBS called "Flight," which numbered both me and Jackson among its users. Even more outrageous was the failure of the media to pick up on the injustice that had occurred--one Flight user pontificated that this was because the mainstream press had no interest in BBSs, which publishers saw as nothing more than potential competition. I thought this theory was crazy. I had worked as a newspaper journalist before I went to law school, and I'd even taken time off from law school to edit my university's newspaper. I started arguing on Flight that the media hadn't covered the story because they didn't know about it. Or, at least, they didn't understand the issues. Then it hit me. Why was I sitting at my terminal *talking* about reaching the media, when what I should be doing is making sure that the story gets publicized? With something of the same singlemindedness I think Alvarez was talking about, I set out to see that the story of the Steve Jackson Games raid, and of the other cases, got reported in the mainstream press. I gathered together several postings from local BBSs and from Usenet, and I drove down to the Austin American-Statesman office to talk to a reporter I'd been referred to by a friend of mine who worked on the newspaper's copy desk. I took with me photocopies of the statutes that give the Secret Service jurisdiction over computer crime and lots of phone numbers of potential sources. At the same time, I called and modemed materials to John Schwartz, a friend and former colleague who was now an editor at Newsweek. The story made the front page of the American-Statesman the following weekend. And John Schwartz's story, which covered the Steve Jackson Games incident as well as the Secret Service's involvement in a nationwide computer-crime "dragnet," appeared in Newsweek's April 30 issue. When the latter story appeared, I realized that (in a much smaller way, of course) I'd managed to do to the media what Markus Hess had done to Lawrence Berkeley Labs, and what Cliff Stoll had done to the puzzle created by Markus Hess: I'd hacked it! And yet, really, I can't take full credit for getting the story of the SJG raid out; if I hadn't read THE CUCKOO'S EGG, I'd never have started a dialog with Cliff, and I'd never have begun to piece together the significance of the wrongheaded hacker prosecutions that we heard so much about it 1989 and 1990. That's why it always strikes me as odd, and even offensive, when some net.yahoo decides that Cliff's book is responsible for all the offenses committed by law-enforcement agents in their efforts to fight computer crime. As Cliff himself has remarked, I've found [the book] used to justify increased security, raids on bulletin boards, and monitoring of network traffic. It's also used to refine legislation, to expand the Internet, to better define what constitutes asocial behavior on the networks. It started out as a good story, but Cliff has seen it become the justification for all sorts of actions, both positive and negative. And yet Cliff, because he actually took the leap and tried to explain to law enforcement what was going on, often gets much of the blame for the negative results, and little of the credit for the positive ones. This shortsighted, "kill the messenger" mentality may explain why a few readers have gone so far as to vilify Cliff and his book, saying things like "Cliff Stoll is just as much amoral a hacker as Markus Hess." Even when those readers are making the criticism in good faith (and I think many of them are simply motivated by the common American vice of Let's Criticize the Famous), I think they're victims of a basic confusion. True, Cliff was as *singleminded* as Markus Hess was. (It takes a singular obsession to start wearing a beeper designed to go off whenever a certain user logs in.) But the moral and philosophical dimension of his actions was far different from those of Hess, Pengo, and their associates. Although a few of them justified their actions in political terms, for the most part the East German hackers cracked systems in order to get money or drugs; in the book Cliff tracks the hackers partly in order to solve what had become to him a "scientific" problem, but also--as he begins to realize himself in the book--in order to restore a community order that has been violated and disrupted. It is this same sense of a need to protect this vast, virtual community that has led Cliff to change the way he talks about the Cuckoo's Egg case over the last few years. I've had the privilege several times of seeing Cliff entertain an auditorium full of rapt listeners with the story of that tiny accounting error on the LBL computer. Nowadays, he ends his presentation on an uncharacteristically sober note: he reminds his audience that the need to keep computers secure and to instill shared values in our online communities *never* justifies the government's violation of the civil liberties of individuals. To me, all this casts Cliff and his book in a different light. Even now, I can't say I necessarily approve of all the actions Cliff took in trying to catch the East German hackers. (It is a measure of how much the world has changed since CUCKOO'S EGG that it seems odd to write the words "East German.") But when I reflect for a moment and try to imagine what kind of people I'd want to share this networked community with, it's hard to think of a person better than Cliff Stoll--ferociously smart, passionately curious, self-doubting, idealistic, and (to his own surprise, perhaps) deeply moral. ------------------------------ Date: 29 Jun 92 06:11:10 GMT From: stoll@ocf.berkeley.edu (Cliff Stoll) Subject: File 6--Hatching the Cuckoo's Egg HATCHING THE CUCKOO'S EGG Copyright (c) 1992 by Cliff Stoll This version is posted to Usenet; ask me before you repost or reprint it. Resend it across networks or archive it on servers, but don't include in any digests, publications, or on-line forums. Ask me first, and I'll probably say OK. Yes, I'm active on the Usenet, often reading, seldom posting. I keep a low profile partly because I'm busy (writing a book about astronomy) and because I worry that my opinions are given too much attention due to my notoriety. You'll find my e-mail address in the front page of every copy of Cuckoo's Egg. I read and reply to all my mail. However, because of the huge number (about 18,000 in 3 years), I seldom write more than a short answer. Often I get 3 weeks behind in replying to my mail. Letters astonish me with their diversity: some say I'm a villain, others a hero. I see myself as neither, but as an astronomer who got mixed up in a bizarre computer mystery. I'm now back in Berkeley/Oakland/San Francisco. I've cut down on public speaking, mainly because it's exhausting. I'm a member of the EFF, ACM, CSPR, BMUG, AAS, ARRL, NSS, pay all my shareware fees, and floss nightly. # Point of the book: I started out by writing a technical summary in the Communications of the ACM, 5/88. This article, "Stalking the Wily Hacker" was for computer techies ... I wrote it in an academic style, and with more technical detail than Cuckoo. *** Before asking for more information *** *** about Cuckoo's Egg, please read *** *** Stalking the Wily Hacker *** Throughout that article, as well as the book, I emphasized the many mistakes I made, the difficult choices I worried about, and the need for communities to be built upon trust. I began writing a book about the fundamentals of computer security in a networked environment. This was the logical expansion of my CACM article. My friend, Guy Consolmagno, read the first 5 chapters and said, "Nobody will read this book --it's just about computers and bytes. Don't write about things. Write about people." I'd never given it much thought, so I tried writing in first person. You know, using "I" and "me". Weird ... kinda like walking around nude. It's a lot safer hiding behind the third person passive voice. Since I'd never written anything before, I just followed instinct. I began weaving in different threads: a textbook, a mystery, a bit of romance, and with my sister's suggestion, a coming of age story. Kinda fun to jump from one subject to another. Although I strongly object to anyone breaking into another's system, I didn't wish to write a treatise against hackers, crackers, or phone phreaks. Rather, I wanted to tell what happened to me and how my opinions developed. I wrote the book for fun, not money or fame. These have no value to me. # What's happened since then: A year after Cuckoo's Egg was published, operation Sun Devil was carried out, Steve Jackson Games was busted by the Secret Service, and Craig Neidorff arrested. I knew nothing about these events, and was astounded to hear of them. The Cuckoo's Egg has been misused to justify busts of innocuous bulletin boards, restrictive new laws, investigations into networked activity, and who knows what kind of monitoring by big brother. It's also been misused as a cookbook and justification by bd guys to break into computers. I disagree with all of these. Strongly disagree. I've repeatedly testified before congress and state legislatures: I don't want to lose the friendly sandbox that our usenet has become. Our civil rights -- including free speech and privacy -- must be preserved on the electronic frontier. At the same time, we must respect each others rights to privacy and free speech. This means not writing viruses, breaking into another's computer, or posting messages certain to cause flame wars. Just as important, it means treating each other with civility, respect, and tolerance. # On being notorious: This incident has been good to me in a few ways: 1) My folks are proud of me. Nothing makes me feel better. 2) I've made many friends, over networks, at meetings, and by mail. 3) Several old friends have looked me up. And there's a downside: 1) Alas, but the most important person in my life has left. Deep sadness and hurt. 2) I've become a target of phone phreaks and crackers. 3) No privacy. 4) I'm stereotyped and pigeonholed. 5) Some people become jealous. 6) Several old friends have hit me up for money. # Answers to specific questions: 1) Did Cliff violate Mitre's computers? As written in Cuckoo's Egg, chapter 25, I logged into Mitre Washington Computer Centre and demonstrated the insecurity of their system. Immediately afterwards, I called Mitre and described the problem to them. Up to that point, they (and I) didn't know where the problem was coming from. For a week prior to touching their system, I was in contact with several Mitre officers; we had a working arrangement to try to solve our mutual problem. Moreover, I contacted the CEO of Mitre (James Schlessinger) who questioned me at length and thanked me. 2) Did Cliff run off on his own? At the very start, I contacted three attorneys: our general counsel, my local district attorney, and a friend at the ACLU. Additionally, I asked several professors of law at Boalt Hall and a number of law students. My boss, my lab director, and my colleagues knew what was happening. I contacted systems managers at Stanford, UC/Berkeley, and military sites. I did my best to keep these people in the loop. 3) Was Cliff some kind of sheriff of the west, trampling over rights? Uh, I never thought of myself that way. Indeed, much of the time, I felt this was a chance to do science -- apply simple physics to a curious phenomenon and learn about the environment around me. As much as possible, I wished to remain invisible to the person breaking into my computer, while prodding others to take action. As a system manager, I did my best to monitor only the intruder, to keep him from hurting others, and to find out why he was in our system. 4) Did Cliff track these people to support a political position? No. 5) Am I happy at the sentences meted out to the German defendants? They received 1-2 years of probation and stiff fines. I don't take joy in wrecking another's life -- rather, I'm sad that this entire incident happened. I am glad that they did not end up in prison, glad that at least one of them has said that he will never again break into computers. -Cliff Stoll 29 June 1992 ------------------------------ End of Computer Underground Digest #4.44 ************************************